id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0909.5097
Barnaby Martin
Barnaby Martin (Durham University, UK.), Manuel Bodirsky (CNRS/LIX, Ecole Polytechnique, France), Martin Hils (Equipe de Logique Mathematique, Universite Paris Diderot - Paris 7, France)
On the Scope of the Universal-Algebraic Approach to Constraint Satisfaction
Extended abstract appeared at 25th Symposium on Logic in Computer Science (LICS 2010). This version will appear in the LMCS special issue associated with LICS 2010
Logical Methods in Computer Science, Volume 8, Issue 3 (September 12, 2012) lmcs:674
10.2168/LMCS-8(3:13)2012
null
cs.LO cs.AI cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The universal-algebraic approach has proved a powerful tool in the study of the complexity of CSPs. This approach has previously been applied to the study of CSPs with finite or (infinite) omega-categorical templates, and relies on two facts. The first is that in finite or omega-categorical structures A, a relation is primitive positive definable if and only if it is preserved by the polymorphisms of A. The second is that every finite or omega-categorical structure is homomorphically equivalent to a core structure. In this paper, we present generalizations of these facts to infinite structures that are not necessarily omega-categorical. (This abstract has been severely curtailed by the space constraints of arXiv -- please read the full abstract in the article.) Finally, we present applications of our general results to the description and analysis of the complexity of CSPs. In particular, we give general hardness criteria based on the absence of polymorphisms that depend on more than one argument, and we present a polymorphism-based description of those CSPs that are first-order definable (and therefore can be solved in polynomial time).
[ { "version": "v1", "created": "Mon, 28 Sep 2009 13:56:20 GMT" }, { "version": "v2", "created": "Tue, 4 May 2010 16:02:00 GMT" }, { "version": "v3", "created": "Fri, 28 Jan 2011 17:27:54 GMT" }, { "version": "v4", "created": "Sat, 12 Nov 2011 19:04:55 GMT" }, { "version": "v5", "created": "Tue, 11 Sep 2012 08:10:16 GMT" }, { "version": "v6", "created": "Mon, 18 Mar 2013 13:25:19 GMT" } ]
2015-07-01T00:00:00
[ [ "Martin", "Barnaby", "", "Durham University, UK." ], [ "Bodirsky", "Manuel", "", "CNRS/LIX,\n Ecole Polytechnique, France" ], [ "Hils", "Martin", "", "Equipe de Logique Mathematique,\n Universite Paris Diderot - Paris 7, France" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.5099
Nina Narodytska
George Katsirelos, Nina Narodytska, Toby Walsh
Breaking Generator Symmetry
null
null
null
null
cs.AI cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dealing with large numbers of symmetries is often problematic. One solution is to focus on just symmetries that generate the symmetry group. Whilst there are special cases where breaking just the symmetries in a generating set is complete, there are also cases where no irredundant generating set eliminates all symmetry. However, focusing on just generators improves tractability. We prove that it is polynomial in the size of the generating set to eliminate all symmetric solutions, but NP-hard to prune all symmetric values. Our proof considers row and column symmetry, a common type of symmetry in matrix models where breaking just generator symmetries is very effective. We show that propagating a conjunction of lexicographical ordering constraints on the rows and columns of a matrix of decision variables is NP-hard.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 14:15:07 GMT" } ]
2009-09-29T00:00:00
[ [ "Katsirelos", "George", "" ], [ "Narodytska", "Nina", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.5119
Marios Kountouris
Jeffrey G. Andrews, Steven Weber, Marios Kountouris, Martin Haenggi
Random Access Transport Capacity
Submitted to IEEE Trans. on Wireless Communications, Sept. 2009
null
10.1109/TWC.2010.06.091432
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a new metric for quantifying end-to-end throughput in multihop wireless networks, which we term random access transport capacity, since the interference model presumes uncoordinated transmissions. The metric quantifies the average maximum rate of successful end-to-end transmissions, multiplied by the communication distance, and normalized by the network area. We show that a simple upper bound on this quantity is computable in closed-form in terms of key network parameters when the number of retransmissions is not restricted and the hops are assumed to be equally spaced on a line between the source and destination. We also derive the optimum number of hops and optimal per hop success probability and show that our result follows the well-known square root scaling law while providing exact expressions for the preconstants as well. Numerical results demonstrate that the upper bound is accurate for the purpose of determining the optimal hop count and success (or outage) probability.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 16:34:00 GMT" } ]
2016-11-18T00:00:00
[ [ "Andrews", "Jeffrey G.", "" ], [ "Weber", "Steven", "" ], [ "Kountouris", "Marios", "" ], [ "Haenggi", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.5120
George Amariucai
George Amariucai and Shuangqing Wei
Feedback-Based Collaborative Secrecy Encoding over Binary Symmetric Channels
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a feedback scheme for transmitting secret messages between two legitimate parties, over an eavesdropped communication link. Relative to Wyner's traditional encoding scheme \cite{wyner1}, our feedback-based encoding often yields larger rate-equivocation regions and achievable secrecy rates. More importantly, by exploiting the channel randomness inherent in the feedback channels, our scheme achieves a strictly positive secrecy rate even when the eavesdropper's channel is less noisy than the legitimate receiver's channel. All channels are modeled as binary and symmetric (BSC). We demonstrate the versatility of our feedback-based encoding method by using it in three different configurations: the stand-alone configuration, the mixed configuration (when it combines with Wyner's scheme \cite{wyner1}), and the reversed configuration. Depending on the channel conditions, significant improvements over Wyner's secrecy capacity can be observed in all configurations.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 15:45:18 GMT" } ]
2009-09-29T00:00:00
[ [ "Amariucai", "George", "" ], [ "Wei", "Shuangqing", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.5146
Hagai Cohen
Hagai Cohen and Ely Porat
Fast Set Intersection and Two Patterns Matching
9 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a new problem, the fast set intersection problem, which is to preprocess a collection of sets in order to efficiently report the intersection of any two sets in the collection. In addition we suggest new solutions for the two-dimensional substring indexing problem and the document listing problem for two patterns by reduction to the fast set intersection problem.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 17:13:56 GMT" }, { "version": "v2", "created": "Tue, 12 Jan 2010 19:45:57 GMT" }, { "version": "v3", "created": "Thu, 11 Mar 2010 17:07:48 GMT" } ]
2010-03-12T00:00:00
[ [ "Cohen", "Hagai", "" ], [ "Porat", "Ely", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.5166
Rdv Ijcsis
Neelu Khare, Neeru Adlakha, K. R. Pardasani
An Algorithm for Mining Multidimensional Fuzzy Association Rules
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 72-76, September 2009, USA
null
ISSN 1947 5500
cs.IR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multidimensional association rule mining searches for interesting relationship among the values from different dimensions or attributes in a relational database. In this method the correlation is among set of dimensions i.e., the items forming a rule come from different dimensions. Therefore each dimension should be partitioned at the fuzzy set level. This paper proposes a new algorithm for generating multidimensional association rules by utilizing fuzzy sets. A database consisting of fuzzy transactions, the Apriory property is employed to prune the useless candidates, itemsets.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 18:44:30 GMT" } ]
2009-09-29T00:00:00
[ [ "Khare", "Neelu", "" ], [ "Adlakha", "Neeru", "" ], [ "Pardasani", "K. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.5175
Raghu Meka
Prahladh Harsha, Adam Klivans, Raghu Meka
Bounding the Sensitivity of Polynomial Threshold Functions
Fixed an important flaw. Some proofs are simplified from last version
Theory of Computing, 10(1):1-26, 2013
10.4086/toc.2014.v010a001
null
cs.CC cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give the first non-trivial upper bounds on the average sensitivity and noise sensitivity of polynomial threshold functions. More specifically, for a Boolean function f on n variables equal to the sign of a real, multivariate polynomial of total degree d we prove 1) The average sensitivity of f is at most O(n^{1-1/(4d+6)}) (we also give a combinatorial proof of the bound O(n^{1-1/2^d}). 2) The noise sensitivity of f with noise rate \delta is at most O(\delta^{1/(4d+6)}). Previously, only bounds for the linear case were known. Along the way we show new structural theorems about random restrictions of polynomial threshold functions obtained via hypercontractivity. These structural results may be of independent interest as they provide a generic template for transforming problems related to polynomial threshold functions defined on the Boolean hypercube to polynomial threshold functions defined in Gaussian space.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 19:55:46 GMT" }, { "version": "v2", "created": "Tue, 29 Sep 2009 02:35:36 GMT" }, { "version": "v3", "created": "Wed, 30 Sep 2009 05:34:34 GMT" }, { "version": "v4", "created": "Mon, 9 Nov 2009 23:23:19 GMT" } ]
2014-03-28T00:00:00
[ [ "Harsha", "Prahladh", "" ], [ "Klivans", "Adam", "" ], [ "Meka", "Raghu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0909.5177
Godwin Shen
Godwin Shen and Antonio Ortega
Transform-based Distributed Data Gathering
null
null
10.1109/TSP.2010.2047640
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A general class of unidirectional transforms is presented that can be computed in a distributed manner along an arbitrary routing tree. Additionally, we provide a set of conditions under which these transforms are invertible. These transforms can be computed as data is routed towards the collection (or sink) node in the tree and exploit data correlation between nodes in the tree. Moreover, when used in wireless sensor networks, these transforms can also leverage data received at nodes via broadcast wireless communications. Various constructions of unidirectional transforms are also provided for use in data gathering in wireless sensor networks. New wavelet transforms are also proposed which provide significant improvements over existing unidirectional transforms.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 19:57:13 GMT" }, { "version": "v2", "created": "Tue, 29 Sep 2009 21:22:24 GMT" }, { "version": "v3", "created": "Wed, 27 Jan 2010 07:38:33 GMT" } ]
2015-05-14T00:00:00
[ [ "Shen", "Godwin", "" ], [ "Ortega", "Antonio", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0909.5179
Moshe Mishali
Moshe Mishali and Yonina C. Eldar
Expected RIP: Conditioning of The Modulated Wideband Converter
5 pages, 2 figures, to appear ITW'09
null
null
CCIT Report #736 July-09, EE Pub No. 1693, EE Dept., Technion - Israel Institute of Technology
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The sensing matrix of a compressive system impacts the stability of the associated sparse recovery problem. In this paper, we study the sensing matrix of the modulated wideband converter, a recently proposed system for sub-Nyquist sampling of analog sparse signals. Attempting to quantify the conditioning of the converter sensing matrix with existing approaches leads to unreasonable rate requirements, due to the relatively small size of this matrix. We propose a new conditioning criterion, named the expected restricted isometry property, and derive theoretical guarantees for the converter to satisfy this property. We then show that applying these conditions to popular binary sequences, such as maximal codes or Gold codes, leads to practical rate requirements.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 19:58:59 GMT" } ]
2009-09-29T00:00:00
[ [ "Mishali", "Moshe", "" ], [ "Eldar", "Yonina C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.5216
Vincent Tan
Vincent Y. F. Tan, Animashree Anandkumar and Alan S. Willsky
Learning Gaussian Tree Models: Analysis of Error Exponents and Extremal Structures
Submitted to Transactions on Signal Processing
IEEE Transactions on Signal Processing, May 2010, Volume: 58 Issue:5, pages 2701 - 2714
10.1109/TSP.2010.2042478
null
stat.ML cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of learning tree-structured Gaussian graphical models from independent and identically distributed (i.i.d.) samples is considered. The influence of the tree structure and the parameters of the Gaussian distribution on the learning rate as the number of samples increases is discussed. Specifically, the error exponent corresponding to the event that the estimated tree structure differs from the actual unknown tree structure of the distribution is analyzed. Finding the error exponent reduces to a least-squares problem in the very noisy learning regime. In this regime, it is shown that the extremal tree structure that minimizes the error exponent is the star for any fixed set of correlation coefficients on the edges of the tree. If the magnitudes of all the correlation coefficients are less than 0.63, it is also shown that the tree structure that maximizes the error exponent is the Markov chain. In other words, the star and the chain graphs represent the hardest and the easiest structures to learn in the class of tree-structured Gaussian graphical models. This result can also be intuitively explained by correlation decay: pairs of nodes which are far apart, in terms of graph distance, are unlikely to be mistaken as edges by the maximum-likelihood estimator in the asymptotic regime.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 20:49:32 GMT" }, { "version": "v2", "created": "Tue, 5 Jan 2010 02:26:58 GMT" } ]
2010-05-06T00:00:00
[ [ "Tan", "Vincent Y. F.", "" ], [ "Anandkumar", "Animashree", "" ], [ "Willsky", "Alan S.", "" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0909.5224
Charilaos Efthymiou
Charilaos Efthymiou
Deterministic counting of graph colourings using sequences of subgraphs
null
Combinator. Probab. Comp. 29 (2020) 555-586
10.1017/S0963548320000255
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a deterministic algorithm for approximately counting the $k$-colourings of sparse random graphs $G(n,d/n)$. In particular, our algorithm computes in polynomial time a $(1\pm n^{-\Omega(1)})$approximation of the logarithm of the number of $k$-colourings of $G(n,d/n)$ for $k\geq (2+\epsilon) d$ with high probability over the graph instances. Our algorithm is related to the algorithms of A. Bandyopadhyay et al. in SODA '06, and A. Montanari et al. in SODA '06, i.e. it uses {\em spatial correlation decay} to compute {\em deterministically} marginals of {\em Gibbs distribution}. We develop a scheme whose accuracy depends on {\em non-reconstruction} of the colourings of $G(n,d/n)$, rather than {\em uniqueness} that are required in previous works. This leaves open the possibility for our schema to be sufficiently accurate even for $k<d$. The set up for establishing correlation decay is as follows: Given $G(n,d/n)$, we alter the graph structure in some specific region $\Lambda$ of the graph by deleting edges between vertices of $\Lambda$. Then we show that the effect of this change on the marginals of Gibbs distribution, diminishes as we move away from $\Lambda$. Our approach is novel and suggests a new context for the study of deterministic counting algorithms.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 21:41:07 GMT" }, { "version": "v2", "created": "Wed, 7 Apr 2010 16:22:15 GMT" }, { "version": "v3", "created": "Mon, 13 Dec 2010 16:12:51 GMT" }, { "version": "v4", "created": "Tue, 11 Jun 2013 19:20:40 GMT" } ]
2020-08-12T00:00:00
[ [ "Efthymiou", "Charilaos", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.5263
Przemyslaw Pawelczak
Jinglong Zhou, Vijay S. Rao, Przemys{\l}aw Pawe{\l}czak, Daniel Wu, and Prasant Mohapatra
Practical Rate and Route Adaptation with Efficient Link Quality Estimation for IEEE 802.11b/g Multi-Hop Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Accurate and fast packet delivery rate (PDR) estimation, used in evaluating wireless link quality, is a prerequisite to increase the performance of mobile, multi-hop and multi-rate wireless ad hoc networks. Unfortunately, contemporary PDR estimation methods, i.e. beacon-based packet counting in Estimated Transmission Time and Expected Transmission Count metrics, have unsatisfactory performance. Therefore, in this paper we propose a novel PDR estimation method based on SNR profiles. We classify all possible link quality estimation methods and compare them analytically against our design. Results show that it leads to a more efficient link quality estimation. Further investigations with the prototype implementation of our method in IEEE 802.11b/g testbeds reveal that the accuracy of PDR estimation in mobile scenarios can be improved up to 50% in comparison to generic packet-based PDR. Experiments with the same prototype on link and routing layers for different measurement scenarios show that it leads to a better rate adaptation and route selection in the form of end-to-end throughput increase compared to traditional packet counting methods.
[ { "version": "v1", "created": "Tue, 29 Sep 2009 04:25:43 GMT" }, { "version": "v2", "created": "Thu, 18 Feb 2010 09:04:42 GMT" } ]
2010-02-18T00:00:00
[ [ "Zhou", "Jinglong", "" ], [ "Rao", "Vijay S.", "" ], [ "Pawełczak", "Przemysław", "" ], [ "Wu", "Daniel", "" ], [ "Mohapatra", "Prasant", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.5268
Bikash Kumar Dey
Sagar Shenvi and Bikash Kumar Dey
A Simple Necessary and Sufficient Condition for the Double Unicast Problem
5 pages, 6 figures. Revised Version. Final manuscript for ICC 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a directed acyclic network where there are two source-terminal pairs and the terminals need to receive the symbols generated at the respective sources. Each source independently generates an i.i.d. random process over the same alphabet. Each edge in the network is error-free, delay-free, and can carry one symbol from the alphabet per use. We give a simple necessary and sufficient condition for being able to simultaneously satisfy the unicast requirements of the two source-terminal pairs at rate-pair $(1,1)$ using vector network coding. The condition is also sufficient for doing this using only "XOR" network coding and is much simpler compared to the necessary and sufficient conditions known from previous work. Our condition also yields a simple characterization of the capacity region of a double-unicast network which does not support the rate-pair $(1,1)$.
[ { "version": "v1", "created": "Tue, 29 Sep 2009 06:15:14 GMT" }, { "version": "v2", "created": "Thu, 1 Oct 2009 11:47:48 GMT" }, { "version": "v3", "created": "Thu, 4 Feb 2010 16:52:04 GMT" } ]
2010-02-04T00:00:00
[ [ "Shenvi", "Sagar", "" ], [ "Dey", "Bikash Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.5271
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Partial Komori fields and imperative Komori fields
10 pages
null
null
PRG0911
math.RA cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is concerned with the status of 1/0 and ways to deal with it. These matters are treated in the setting of Komori fields, also known as non-trivial cancellation meadows. Different viewpoints on the status of 1/0 exist in mathematics and theoretical computer science. We give a simple account of how mathematicians deal with 1/0 in which a customary convention among mathematicians plays a prominent part, and we make plausible that a convincing account, starting from the popular computer science viewpoint that 1/0 is undefined, by means of some logic of partial functions is not attainable.
[ { "version": "v1", "created": "Tue, 29 Sep 2009 06:10:03 GMT" } ]
2009-10-13T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.5278
Yngve Villanger
Fedor V. Fomin and Yngve Villanger
Finding Induced Subgraphs via Minimal Triangulations
14 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Potential maximal cliques and minimal separators are combinatorial objects which were introduced and studied in the realm of minimal triangulations problems including Minimum Fill-in and Treewidth. We discover unexpected applications of these notions to the field of moderate exponential algorithms. In particular, we show that given an n-vertex graph G together with its set of potential maximal cliques Pi_G, and an integer t, it is possible in time |Pi_G| * n^(O(t)) to find a maximum induced subgraph of treewidth t in G; and for a given graph F of treewidth t, to decide if G contains an induced subgraph isomorphic to F. Combined with an improved algorithm enumerating all potential maximal cliques in time O(1.734601^n), this yields that both problems are solvable in time 1.734601^n * n^(O(t)).
[ { "version": "v1", "created": "Tue, 29 Sep 2009 07:13:39 GMT" }, { "version": "v2", "created": "Tue, 22 Dec 2009 09:55:02 GMT" } ]
2009-12-22T00:00:00
[ [ "Fomin", "Fedor V.", "" ], [ "Villanger", "Yngve", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.5293
Haris Aziz
Haris Aziz, Oded Lachish, Mike Paterson and Rahul Savani
Wiretapping a hidden network
null
null
null
null
cs.GT cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of maximizing the probability of hitting a strategically chosen hidden virtual network by placing a wiretap on a single link of a communication network. This can be seen as a two-player win-lose (zero-sum) game that we call the wiretap game. The value of this game is the greatest probability that the wiretapper can secure for hitting the virtual network. The value is shown to equal the reciprocal of the strength of the underlying graph. We efficiently compute a unique partition of the edges of the graph, called the prime-partition, and find the set of pure strategies of the hider that are best responses against every maxmin strategy of the wiretapper. Using these special pure strategies of the hider, which we call omni-connected-spanning-subgraphs, we define a partial order on the elements of the prime-partition. From the partial order, we obtain a linear number of simple two-variable inequalities that define the maxmin-polytope, and a characterization of its extreme points. Our definition of the partial order allows us to find all equilibrium strategies of the wiretapper that minimize the number of pure best responses of the hider. Among these strategies, we efficiently compute the unique strategy that maximizes the least punishment that the hider incurs for playing a pure strategy that is not a best response. Finally, we show that this unique strategy is the nucleolus of the recently studied simple cooperative spanning connectivity game.
[ { "version": "v1", "created": "Tue, 29 Sep 2009 08:51:42 GMT" }, { "version": "v2", "created": "Sun, 4 Oct 2009 16:48:08 GMT" } ]
2009-10-04T00:00:00
[ [ "Aziz", "Haris", "" ], [ "Lachish", "Oded", "" ], [ "Paterson", "Mike", "" ], [ "Savani", "Rahul", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.5310
Doha Hamza Mrs.
Doha Hamza, Mohammed Nafie
Cognitive Power Control Under Correlated Fading and Primary-Link CSI
5 pages, 4 figures, submitted to ICC 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the cognitive power control problem of maximizing the secondary throughput under an outage probability constraint on a constant-power constant-rate primary link. We assume a temporally correlated primary channel with two types of feedback: perfect delayed channel state information (CSI) and one-bit automatic repeat request (ARQ). We use channel correlation to enhance the primary and secondary throughput via exploiting the CSI feedback to predict the future primary channel gain. We provide a numerical solution for the power control optimization problem under delayed CSI. In order to make the solution tractable under ARQ-CSI, we re-formulate the cognitive power control problem as the maximization of the instantaneous weighted sum of primary and secondary throughput. We propose a greedy ARQ-CSI algorithm that is shown to achieve an average throughput comparable to that attained under the delayed-CSI algorithm, which we solve optimally.
[ { "version": "v1", "created": "Tue, 29 Sep 2009 11:50:40 GMT" } ]
2009-09-30T00:00:00
[ [ "Hamza", "Doha", "" ], [ "Nafie", "Mohammed", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.5313
Srikanth Srinivasan
Vikraman Arvind and Srikanth Srinivasan
The Remote Point Problem, Small Bias Space, and Expanding Generator Sets
accepted to STACS 2010, conference version, 16 pages
null
null
null
cs.CC cs.DS
http://creativecommons.org/licenses/by/3.0/
Using $\epsilon$-bias spaces over $F_2$, we show that the Remote Point Problem (RPP), introduced by Alon et al [APY09], has an $NC^2$ algorithm (achieving the same parameters as [APY09]). We study a generalization of the Remote Point Problem to groups: we replace $F^n$ by $G^n$ for an arbitrary fixed group $G$. When $G$ is Abelian, we give an $NC^2$ algorithm for RPP, again using $\epsilon$-bias spaces. For nonabelian $G$, we give a deterministic polynomial-time algorithm for RPP. We also show the connection to construction of expanding generator sets for the group $G^n$. All our algorithms for the RPP achieve essentially the same parameters as [APY09].
[ { "version": "v1", "created": "Tue, 29 Sep 2009 11:21:20 GMT" }, { "version": "v2", "created": "Mon, 18 Jan 2010 09:39:36 GMT" }, { "version": "v3", "created": "Wed, 3 Feb 2010 08:31:44 GMT" } ]
2010-02-03T00:00:00
[ [ "Arvind", "Vikraman", "" ], [ "Srinivasan", "Srikanth", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.5365
Uri Nadav
Vahab Mirrokni, S. Muthukrishnan, Uri Nadav
Quasi-Proportional Mechanisms: Prior-free Revenue Maximization
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inspired by Internet ad auction applications, we study the problem of allocating a single item via an auction when bidders place very different values on the item. We formulate this as the problem of prior-free auction and focus on designing a simple mechanism that always allocates the item. Rather than designing sophisticated pricing methods like prior literature, we design better allocation methods. In particular, we propose quasi-proportional allocation methods in which the probability that an item is allocated to a bidder depends (quasi-proportionally) on the bids. We prove that corresponding games for both all-pay and winners-pay quasi-proportional mechanisms admit pure Nash equilibria and this equilibrium is unique. We also give an algorithm to compute this equilibrium in polynomial time. Further, we show that the revenue of the auctioneer is promisingly high compared to the ultimate, i.e., the highest value of any of the bidders, and show bounds on the revenue of equilibria both analytically, as well as using experiments for specific quasi-proportional functions. This is the first known revenue analysis for these natural mechanisms (including the special case of proportional mechanism which is common in network resource allocation problems).
[ { "version": "v1", "created": "Tue, 29 Sep 2009 15:33:27 GMT" } ]
2009-09-30T00:00:00
[ [ "Mirrokni", "Vahab", "" ], [ "Muthukrishnan", "S.", "" ], [ "Nadav", "Uri", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0909.5388
Erik Demaine
Nadia Benbernou, Erik D. Demaine, Martin L. Demaine, Aviv Ovadya
A Universal Crease Pattern for Folding Orthogonal Shapes
7 pages, 4 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a universal crease pattern--known in geometry as the tetrakis tiling and in origami as box pleating--that can fold into any object made up of unit cubes joined face-to-face (polycubes). More precisely, there is one universal finite crease pattern for each number n of unit cubes that need to be folded. This result contrasts previous universality results for origami, which require a different crease pattern for each target object, and confirms intuition in the origami community that box pleating is a powerful design technique.
[ { "version": "v1", "created": "Tue, 29 Sep 2009 19:32:57 GMT" } ]
2009-09-30T00:00:00
[ [ "Benbernou", "Nadia", "" ], [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Ovadya", "Aviv", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0909.5393
Kusum Lata
Kusum Lata, H S Jamadagni
Formal Verification of Full-Wave Rectifier: A Case Study
The IEEE 8th International Conference on ASIC (IEEE ASICON 2009), October 20-23 2009, Changsha, China
null
10.1109/ASICON.2009.5351239
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a case study of formal verification of full-wave rectifier for analog and mixed signal designs. We have used the Checkmate tool from CMU [1], which is a public domain formal verification tool for hybrid systems. Due to the restriction imposed by Checkmate it necessitates to make the changes in the Checkmate implementation to implement the complex and non-linear system. Full-wave rectifier has been implemented by using the Checkmate custom blocks and the Simulink blocks from MATLAB from Math works. After establishing the required changes in the Checkmate implementation we are able to efficiently verify the safety properties of the full-wave rectifier.
[ { "version": "v1", "created": "Tue, 29 Sep 2009 17:37:34 GMT" } ]
2016-11-17T00:00:00
[ [ "Lata", "Kusum", "" ], [ "Jamadagni", "H S", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.5413
Rio Yokota Dr.
Rio Yokota, L. A. Barba, Matthew G. Knepley
PetRBF--A parallel O(N) algorithm for radial basis function interpolation
Submitted to Computer Methods in Applied Mechanics and Engineering
Computer Methods in Applied Mechanics and Engineering, 199(25-28), pp. 1793-1804, 2010
10.1016/j.cma.2010.02.008
null
cs.MS cs.DC cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have developed a parallel algorithm for radial basis function (RBF) interpolation that exhibits O(N) complexity,requires O(N) storage, and scales excellently up to a thousand processes. The algorithm uses a GMRES iterative solver with a restricted additive Schwarz method (RASM) as a preconditioner and a fast matrix-vector algorithm. Previous fast RBF methods, --,achieving at most O(NlogN) complexity,--, were developed using multiquadric and polyharmonic basis functions. In contrast, the present method uses Gaussians with a small variance (a common choice in particle methods for fluid simulation, our main target application). The fast decay of the Gaussian basis function allows rapid convergence of the iterative solver even when the subdomains in the RASM are very small. The present method was implemented in parallel using the PETSc library (developer version). Numerical experiments demonstrate its capability in problems of RBF interpolation with more than 50 million data points, timing at 106 seconds (19 iterations for an error tolerance of 10^-15 on 1024 processors of a Blue Gene/L (700 MHz PowerPC processors). The parallel code is freely available in the open-source model.
[ { "version": "v1", "created": "Tue, 29 Sep 2009 19:27:51 GMT" } ]
2011-09-21T00:00:00
[ [ "Yokota", "Rio", "" ], [ "Barba", "L. A.", "" ], [ "Knepley", "Matthew G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0909.5417
Joey Wilson
Joey Wilson and Neal Patwari
Through-Wall Tracking Using Variance-Based Radio Tomography Networks
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new method for imaging, localizing, and tracking motion behind walls in real-time. The method takes advantage of the motion-induced variance of received signal strength measurements made in a wireless peer-to-peer network. Using a multipath channel model, we show that the signal strength on a wireless link is largely dependent on the power contained in multipath components that travel through space containing moving objects. A statistical model relating variance to spatial locations of movement is presented and used as a framework for the estimation of a motion image. From the motion image, the Kalman filter is applied to recursively track the coordinates of a moving target. Experimental results for a 34-node through-wall imaging and tracking system over a 780 square foot area are presented.
[ { "version": "v1", "created": "Tue, 29 Sep 2009 20:33:31 GMT" }, { "version": "v2", "created": "Thu, 1 Oct 2009 21:14:14 GMT" } ]
2009-10-02T00:00:00
[ [ "Wilson", "Joey", "" ], [ "Patwari", "Neal", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0909.5424
Chinmay Vaze
Chinmay S. Vaze and Mahesh K. Varanasi
The Degrees of Freedom Regions of MIMO Broadcast, Interference, and Cognitive Radio Channels with No CSIT
49 pages, 11 figures, under review, IEEE Trans. Inform. Th. Submitted Sept. 2009, Revised Jan. 2011
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The degrees of freedom (DoF) regions are characterized for the multiple-input multiple-output (MIMO) broadcast channel (BC), interference channels (IC) (including X and multi-hop interference channels) and the cognitive radio channel (CRC), when there is perfect and no channel state information at the receivers and the transmitter(s) (CSIR and CSIT), respectively. For the K-user MIMO BC, the exact characterization of the DoF region is obtained, which shows that a simple time-division-based transmission scheme is DoF-region optimal. Using the techniques developed for the MIMO BC, the corresponding problems for the two-user MIMO IC and the CRC are addressed. For both of these channels, inner and outer bounds to the DoF region are obtained and are seen to coincide for a vast majority of the relative numbers of antennas at the four terminals, thereby characterizing DoF regions for all but a few cases. Finally, the DoF regions of the $K$-user MIMO IC, the CRC, and X networks are derived for certain classes of these networks, including the one where all transmitters have an equal number of antennas and so do all receivers. The results of this paper are derived for distributions of fading channel matrices and additive noises that are more general than those considered in other simultaneous related works. The DoF regions with and without CSIT are compared and conditions on the relative numbers of antennas at the terminals under which a lack of CSIT does, or does not, result in the loss of DoF are identified, thereby providing, on the one hand, simple and robust communication schemes that don't require CSIT but have the same DoF performance as their previously found CSIT counterparts, and on the other hand, identifying situations where CSI feedback to transmitters would provide gains that are significant enough that even the DoF performance could be improved.
[ { "version": "v1", "created": "Tue, 29 Sep 2009 19:59:16 GMT" }, { "version": "v2", "created": "Mon, 19 Oct 2009 16:36:27 GMT" }, { "version": "v3", "created": "Sun, 23 Jan 2011 06:03:41 GMT" } ]
2015-03-13T00:00:00
[ [ "Vaze", "Chinmay S.", "" ], [ "Varanasi", "Mahesh K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.5450
Cihan Tepedelenlioglu
Cihan Tepedelenlioglu and Adarsh B. Narasimhamurthy
Robust Distributed Estimation over Multiple Access Channels with Constant Modulus Signaling
28 pages, 10 figures, submitted to IEEE Transactions on Signal Processing for consideration
null
10.1109/TSP.2010.2051432
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A distributed estimation scheme where the sensors transmit with constant modulus signals over a multiple access channel is considered. The proposed estimator is shown to be strongly consistent for any sensing noise distribution in the i.i.d. case both for a per-sensor power constraint, and a total power constraint. When the distributions of the sensing noise are not identical, a bound on the variances is shown to establish strong consistency. The estimator is shown to be asymptotically normal with a variance (AsV) that depends on the characteristic function of the sensing noise. Optimization of the AsV is considered with respect to a transmission phase parameter for a variety of noise distributions exhibiting differing levels of impulsive behavior. The robustness of the estimator to impulsive sensing noise distributions such as those with positive excess kurtosis, or those that do not have finite moments is shown. The proposed estimator is favorably compared with the amplify and forward scheme under an impulsive noise scenario. The effect of fading is shown to not affect the consistency of the estimator, but to scale the asymptotic variance by a constant fading penalty depending on the fading statistics. Simulations corroborate our analytical results.
[ { "version": "v1", "created": "Tue, 29 Sep 2009 21:35:28 GMT" } ]
2015-05-14T00:00:00
[ [ "Tepedelenlioglu", "Cihan", "" ], [ "Narasimhamurthy", "Adarsh B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.5457
Prateek Jain
Raghu Meka, Prateek Jain, Inderjit S. Dhillon
Guaranteed Rank Minimization via Singular Value Projection
An earlier version of this paper was submitted to NIPS-2009 on June 5, 2009
null
null
null
cs.LG cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Minimizing the rank of a matrix subject to affine constraints is a fundamental problem with many important applications in machine learning and statistics. In this paper we propose a simple and fast algorithm SVP (Singular Value Projection) for rank minimization with affine constraints (ARMP) and show that SVP recovers the minimum rank solution for affine constraints that satisfy the "restricted isometry property" and show robustness of our method to noise. Our results improve upon a recent breakthrough by Recht, Fazel and Parillo (RFP07) and Lee and Bresler (LB09) in three significant ways: 1) our method (SVP) is significantly simpler to analyze and easier to implement, 2) we give recovery guarantees under strictly weaker isometry assumptions 3) we give geometric convergence guarantees for SVP even in presense of noise and, as demonstrated empirically, SVP is significantly faster on real-world and synthetic problems. In addition, we address the practically important problem of low-rank matrix completion (MCP), which can be seen as a special case of ARMP. We empirically demonstrate that our algorithm recovers low-rank incoherent matrices from an almost optimal number of uniformly sampled entries. We make partial progress towards proving exact recovery and provide some intuition for the strong performance of SVP applied to matrix completion by showing a more restricted isometry property. Our algorithm outperforms existing methods, such as those of \cite{RFP07,CR08,CT09,CCS08,KOM09,LB09}, for ARMP and the matrix-completion problem by an order of magnitude and is also significantly more robust to noise.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 14:44:54 GMT" }, { "version": "v2", "created": "Mon, 19 Oct 2009 19:32:44 GMT" }, { "version": "v3", "created": "Mon, 19 Oct 2009 21:21:57 GMT" } ]
2009-10-20T00:00:00
[ [ "Meka", "Raghu", "" ], [ "Jain", "Prateek", "" ], [ "Dhillon", "Inderjit S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.5458
Sheng Xu
Robert Sheng Xu, Oleg Michailovich, Magdy Salama
Information tracking approach to segmentation of ultrasound imagery of prostate
27 pages, 7 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The size and geometry of the prostate are known to be pivotal quantities used by clinicians to assess the condition of the gland during prostate cancer screening. As an alternative to palpation, an increasing number of methods for estimation of the above-mentioned quantities are based on using imagery data of prostate. The necessity to process large volumes of such data creates a need for automatic segmentation tools which would allow the estimation to be carried out with maximum accuracy and efficiency. In particular, the use of transrectal ultrasound (TRUS) imaging in prostate cancer screening seems to be becoming a standard clinical practice due to the high benefit-to-cost ratio of this imaging modality. Unfortunately, the segmentation of TRUS images is still hampered by relatively low contrast and reduced SNR of the images, thereby requiring the segmentation algorithms to incorporate prior knowledge about the geometry of the gland. In this paper, a novel approach to the problem of segmenting the TRUS images is described. The proposed approach is based on the concept of distribution tracking, which provides a unified framework for modeling and fusing image-related and morphological features of the prostate. Moreover, the same framework allows the segmentation to be regularized via using a new type of "weak" shape priors, which minimally bias the estimation procedure, while rendering the latter stable and robust.
[ { "version": "v1", "created": "Tue, 29 Sep 2009 22:39:19 GMT" } ]
2009-10-01T00:00:00
[ [ "Xu", "Robert Sheng", "" ], [ "Michailovich", "Oleg", "" ], [ "Salama", "Magdy", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0909.5460
Elad Shaked
E. Shaked and O. Michailovich
Iterative Shrinkage Approach to Restoration of Optical Imagery
19 pages, 7 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of reconstruction of digital images from their degraded measurements is regarded as a problem of central importance in various fields of engineering and imaging sciences. In such cases, the degradation is typically caused by the resolution limitations of an imaging device in use and/or by the destructive influence of measurement noise. Specifically, when the noise obeys a Poisson probability law, standard approaches to the problem of image reconstruction are based on using fixed-point algorithms which follow the methodology first proposed by Richardson and Lucy. The practice of using these methods, however, shows that their convergence properties tend to deteriorate at relatively high noise levels. Accordingly, in the present paper, a novel method for de-noising and/or de-blurring of digital images corrupted by Poisson noise is introduced. The proposed method is derived under the assumption that the image of interest can be sparsely represented in the domain of a linear transform. Consequently, a shrinkage-based iterative procedure is proposed, which guarantees the solution to converge to the global maximizer of an associated maximum-a-posteriori criterion. It is shown in a series of both computer-simulated and real-life experiments that the proposed method outperforms a number of existing alternatives in terms of stability, precision, and computational efficiency.
[ { "version": "v1", "created": "Tue, 29 Sep 2009 22:33:10 GMT" }, { "version": "v2", "created": "Wed, 6 Jan 2010 17:00:21 GMT" } ]
2010-01-06T00:00:00
[ [ "Shaked", "E.", "" ], [ "Michailovich", "O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0909.5479
EPTCS
Evangelos Markakis (Athens University of Economics and Business), Ioannis Milis (Athens University of Economics and Business)
Proceedings Fourth Athens Colloquium on Algorithms and Complexity
null
EPTCS 4, 2009
10.4204/EPTCS.4
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
ACAC 2009 is organized by the Athens University of Economics and Business (AUEB) and it is the fourth in a series of meetings that aim to bring together researchers working on all areas of the theory of algorithms and computational complexity. These meetings are expected to serve as a lively forum for presenting results that are in a preliminary stage or have been recently presented in some major conference. For the first time this year all submitted papers were reviewed and ACAC also offered to the authors the choice of publishing their contribution (provided it has not been published anywhere else before) with the post-proceedings of EPTCS (Electronic Proceedings in Theoretical Computer Science).
[ { "version": "v1", "created": "Wed, 30 Sep 2009 02:05:28 GMT" } ]
2009-10-01T00:00:00
[ [ "Markakis", "Evangelos", "", "Athens University of Economics and Business" ], [ "Milis", "Ioannis", "", "Athens University of Economics and Business" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.5507
Cuizhu Shi
Cuizhu Shi and Aditya Ramamoorthy
Fast Algorithm for Finding Unicast Capacity of Linear Deterministic Wireless Relay Networks
27 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The deterministic channel model for wireless relay networks proposed by Avestimehr, Diggavi and Tse `07 has captured the broadcast and inference nature of wireless communications and has been widely used in approximating the capacity of wireless relay networks. The authors generalized the max-flow min-cut theorem to the linear deterministic wireless relay networks and characterized the unicast capacity of such deterministic network as the minimum rank of all the binary adjacency matrices describing source-destination cuts whose number grows exponentially with the size of the network. In this paper, we developed a fast algorithm for finding the unicast capacity of a linear deterministic wireless relay network by finding the maximum number of linearly independent paths using the idea of path augmentation. We developed a modified depth-first search algorithm tailored for the linear deterministic relay networks for finding linearly independent paths whose total number proved to equal the unicast capacity of the underlying network. The result of our algorithm suggests a capacity-achieving transmission strategy with one-bit length linear encoding at the relay nodes in the concerned linear deterministic wireless relay network. The correctness of our algorithm for universal cases is given by our proof in the paper. Moreover, our algorithm has a computational complexity bounded by $O(|{\cal{V}}_x|\cdot C^4+d\cdot |{\cal{V}}_x|\cdot C^3)$ which shows a significant improvement over the previous results for solving the same problem by Amaudruz and Fragouli (whose complexity is bounded by $O(M\cdot |{\cal{E}}|\cdot C^5)$ with $M\geq d$ and $|{\cal{E}}|\geq|{\cal{V}}_x|$) and by Yazdi and Savari (whose complexity is bounded by $O(L^8\cdot M^{12}\cdot h_0^3+L\cdot M^6\cdot C\cdot h_0^4)$ with $h_0\geq C$).
[ { "version": "v1", "created": "Wed, 30 Sep 2009 04:29:48 GMT" } ]
2009-10-01T00:00:00
[ [ "Shi", "Cuizhu", "" ], [ "Ramamoorthy", "Aditya", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.5521
Prabhu Manyem
Prabhu Manyem
Clique and Vertex Cover are solvable in polynomial time if the input structure is ordered and contains a successor predicate
The results are incorrect. If phi = phi_1 AND phi_2, and phi is a Horn formula, it does NOT mean that both phi_1 and phi_2 are Horn formulae. Furthermore, the cardinality constraint CANNOT be expressed as a universal Horn sentence in ESO (NOT even when the structure is ordered)
null
null
null
cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this manuscript, assuming that Graedel's 1991 results are correct (which implies that bounds on the solution values for optimization problems can be expressed in existential second order logic where the first order part is universal Horn), I will show that Clique and Vertex Cover can be solved in polynomial time if the input structure is ordered and contains a successor predicate. In the last section, we will argue about the validity of Graedel's 1991 results. Update: Manuscript withdrawn, because results are incorrect. If phi = phi_1 AND phi_2, and phi is a Horn formula, it does NOT mean that both phi_1 and phi_2 are Horn formulae. Furthermore, the cardinality constraint CANNOT be expressed as a universal Horn sentence in ESO (NOT even when the structure is ordered).
[ { "version": "v1", "created": "Wed, 30 Sep 2009 06:34:47 GMT" }, { "version": "v2", "created": "Sun, 20 Dec 2009 11:16:32 GMT" }, { "version": "v3", "created": "Sat, 2 Oct 2010 22:33:43 GMT" }, { "version": "v4", "created": "Sat, 25 Jun 2022 23:13:48 GMT" } ]
2022-06-28T00:00:00
[ [ "Manyem", "Prabhu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.5524
Alexandre Lung-Yut-Fong
Alexandre Lung-Yut-Fong (LTCI), C\'eline L\'evy-Leduc (LTCI), Olivier Capp\'e (LTCI)
Distributed detection/localization of change-points in high-dimensional network traffic data
Statistics and Computing (2011) 1-12
null
10.1007/s11222-011-9240-5
null
stat.AP cs.NI math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel approach for distributed statistical detection of change-points in high-volume network traffic. We consider more specifically the task of detecting and identifying the targets of Distributed Denial of Service (DDoS) attacks. The proposed algorithm, called DTopRank, performs distributed network anomaly detection by aggregating the partial information gathered in a set of network monitors. In order to address massive data while limiting the communication overhead within the network, the approach combines record filtering at the monitor level and a nonparametric rank test for doubly censored time series at the central decision site. The performance of the DTopRank algorithm is illustrated both on synthetic data as well as from a traffic trace provided by a major Internet service provider.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 06:37:21 GMT" }, { "version": "v2", "created": "Tue, 20 Sep 2011 16:58:16 GMT" } ]
2011-09-22T00:00:00
[ [ "Lung-Yut-Fong", "Alexandre", "", "LTCI" ], [ "Lévy-Leduc", "Céline", "", "LTCI" ], [ "Cappé", "Olivier", "", "LTCI" ] ]
[ { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0909.5530
Xiaokui Xiao
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke
Differential Privacy via Wavelet Transforms
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Privacy preserving data publishing has attracted considerable research interest in recent years. Among the existing solutions, {\em $\epsilon$-differential privacy} provides one of the strongest privacy guarantees. Existing data publishing methods that achieve $\epsilon$-differential privacy, however, offer little data utility. In particular, if the output dataset is used to answer count queries, the noise in the query answers can be proportional to the number of tuples in the data, which renders the results useless. In this paper, we develop a data publishing technique that ensures $\epsilon$-differential privacy while providing accurate answers for {\em range-count queries}, i.e., count queries where the predicate on each attribute is a range. The core of our solution is a framework that applies {\em wavelet transforms} on the data before adding noise to it. We present instantiations of the proposed framework for both ordinal and nominal data, and we provide a theoretical analysis on their privacy and utility guarantees. In an extensive experimental study on both real and synthetic data, we show the effectiveness and efficiency of our solution.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 07:16:38 GMT" } ]
2009-10-01T00:00:00
[ [ "Xiao", "Xiaokui", "" ], [ "Wang", "Guozhang", "" ], [ "Gehrke", "Johannes", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.5554
Jocelyne Troccaz
Michael Baumann (TIMC), Pierre Mozer, Vincent Daanen, Jocelyne Troccaz (TIMC)
Prostate Biopsy Assistance System with Gland Deformation Estimation for Enhanced Precision
This version of the paper integrates a correction concerning the local similarity measure w.r.t. the proceedings (this typing error could not be corrected before editing the proceedings)
12th International Conference on Medical Imaging and Computer Assisted Intervention, Londres : United Kingdom (2009)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computer-assisted prostate biopsies became a very active research area during the last years. Prostate tracking makes it possi- ble to overcome several drawbacks of the current standard transrectal ultrasound (TRUS) biopsy procedure, namely the insufficient targeting accuracy which may lead to a biopsy distribution of poor quality, the very approximate knowledge about the actual location of the sampled tissues which makes it difficult to implement focal therapy strategies based on biopsy results, and finally the difficulty to precisely reach non-ultrasound (US) targets stemming from different modalities, statistical atlases or previous biopsy series. The prostate tracking systems presented so far are limited to rigid transformation tracking. However, the gland can get considerably deformed during the intervention because of US probe pres- sure and patient movements. We propose to use 3D US combined with image-based elastic registration to estimate these deformations. A fast elastic registration algorithm that copes with the frequently occurring US shadows is presented. A patient cohort study was performed, which yielded a statistically significant in-vivo accuracy of 0.83+-0.54mm.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 09:41:31 GMT" } ]
2009-10-01T00:00:00
[ [ "Baumann", "Michael", "", "TIMC" ], [ "Mozer", "Pierre", "", "TIMC" ], [ "Daanen", "Vincent", "", "TIMC" ], [ "Troccaz", "Jocelyne", "", "TIMC" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0909.5583
Hamed Owladeghaffari O.Ghaffari
Hamed O.Ghaffari
Two-Phase Flow Complexity in Heterogeneous Media
This paper has been withdrawn by the author. A report /version 2- Due to copy right the manuscript is not available
null
null
null
cs.CE physics.flu-dyn
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this study, we investigate the appeared complexity of two-phase flow (air/water) in a heterogeneous soil where the supposed porous media is non-deformable media which is under the timedependent gas pressure. After obtaining of governing equations and considering the capillary pressuresaturation and permeability functions, the evolution of the model unknown parameters were obtained. In this way, using COMSOL (FEMLAB) and fluid flow/script Module, the role of heterogeneity in intrinsic permeability was analysed. Also, the evolution of relative permeability of wetting and non-wetting fluid, capillary pressure and other parameters were elicited. In the last part, a complex network approach to analysis of emerged patterns will be employed.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 11:53:18 GMT" }, { "version": "v2", "created": "Tue, 31 Aug 2010 17:00:19 GMT" } ]
2010-09-01T00:00:00
[ [ "Ghaffari", "Hamed O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "physics.flu-dyn", "description": "Turbulence, instabilities, incompressible/compressible flows, reacting flows. Aero/hydrodynamics, fluid-structure interactions, acoustics. Biological fluid dynamics, micro/nanofluidics, interfacial phenomena. Complex fluids, suspensions and granular flows, porous media flows. Geophysical flows, thermoconvective and stratified flows. Mathematical and computational methods for fluid dynamics, fluid flow models, experimental techniques.", "span": "(Fluid Dynamics)" } ]
0909.5649
Vitaly Osipov
Nikolaj Leischner, Vitaly Osipov, Peter Sanders
GPU sample sort
null
null
null
null
cs.DS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present the design of a sample sort algorithm for manycore GPUs. Despite being one of the most efficient comparison-based sorting algorithms for distributed memory architectures its performance on GPUs was previously unknown. For uniformly distributed keys our sample sort is at least 25% and on average 68% faster than the best comparison-based sorting algorithm, GPU Thrust merge sort, and on average more than 2 times faster than GPU quicksort. Moreover, for 64-bit integer keys it is at least 63% and on average 2 times faster than the highly optimized GPU Thrust radix sort that directly manipulates the binary representation of keys. Our implementation is robust to different distributions and entropy levels of keys and scales almost linearly with the input size. These results indicate that multi-way techniques in general and sample sort in particular achieve substantially better performance than two-way merge sort and quicksort.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 15:58:53 GMT" } ]
2009-10-01T00:00:00
[ [ "Leischner", "Nikolaj", "" ], [ "Osipov", "Vitaly", "" ], [ "Sanders", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0909.5653
John Fearnley
John Fearnley, Marcin Jurdzi\'nski, Rahul Savani
Linear Complementarity Algorithms for Infinite Games
null
null
10.1007/978-3-642-11266-9_32
null
cs.GT cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The performance of two pivoting algorithms, due to Lemke and Cottle and Dantzig, is studied on linear complementarity problems (LCPs) that arise from infinite games, such as parity, average-reward, and discounted games. The algorithms have not been previously studied in the context of infinite games, and they offer alternatives to the classical strategy-improvement algorithms. The two algorithms are described purely in terms of discounted games, thus bypassing the reduction from the games to LCPs, and hence facilitating a better understanding of the algorithms when applied to games. A family of parity games is given, on which both algorithms run in exponential time, indicating that in the worst case they perform no better for parity, average-reward, or discounted games than they do for general P-matrix LCPs.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 16:14:51 GMT" } ]
2020-01-16T00:00:00
[ [ "Fearnley", "John", "" ], [ "Jurdziński", "Marcin", "" ], [ "Savani", "Rahul", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.5654
Tamal Dey
Tamal K. Dey, Jian Sun, Yusu Wang
Approximating Loops in a Shortest Homology Basis from Point Data
null
null
null
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inference of topological and geometric attributes of a hidden manifold from its point data is a fundamental problem arising in many scientific studies and engineering applications. In this paper we present an algorithm to compute a set of loops from a point data that presumably sample a smooth manifold $M\subset \mathbb{R}^d$. These loops approximate a {\em shortest} basis of the one dimensional homology group $H_1(M)$ over coefficients in finite field $\mathbb{Z}_2$. Previous results addressed the issue of computing the rank of the homology groups from point data, but there is no result on approximating the shortest basis of a manifold from its point sample. In arriving our result, we also present a polynomial time algorithm for computing a shortest basis of $H_1(K)$ for any finite {\em simplicial complex} $K$ whose edges have non-negative weights.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 16:26:21 GMT" }, { "version": "v2", "created": "Wed, 2 Dec 2009 21:45:51 GMT" } ]
2009-12-02T00:00:00
[ [ "Dey", "Tamal K.", "" ], [ "Sun", "Jian", "" ], [ "Wang", "Yusu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.5656
Dragos Falie
D. Falie
Improvements of the 3D images captured with Time-of-Flight cameras
null
null
null
null
cs.CV cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
3D Time-of-Flight camera's images are affected by errors due to the diffuse (indirect) light and to the flare light. The presented method improves the 3D image reducing the distance's errors to dark surface objects. This is achieved by placing one or two contrast tags in the scene at different distances from the ToF camera. The white and black parts of the tags are situated at the same distance to the camera but the distances measured by the camera are different. This difference is used to compute a correction vector. The distance to black surfaces is corrected by subtracting this vector from the captured vector image.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 18:50:24 GMT" } ]
2009-10-01T00:00:00
[ [ "Falie", "D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0909.5669
Alexander Davydov A
Alexander A. Davydov, Massimo Giulietti, Stefano Marcugini and Fernanda Pambianco
Some combinatorial aspects of constructing bipartite-graph codes
27 pages
null
null
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose geometrical methods for constructing square 01-matrices with the same number n of units in every row and column, and such that any two rows of the matrix contain at most one unit in common. These matrices are equivalent to n-regular bipartite graphs without 4-cycles, and therefore can be used for the construction of efficient bipartite-graph codes such that both the classes of its vertices are associated with local constraints. We significantly extend the region of parameters m,n for which there exist an n-regular bipartite graph with 2m vertices and without 4-cycles. In that way we essentially increase the region of lengths and rates of the corresponding bipartite-graph codes. Many new matrices are either circulant or consist of circulant submatrices: this provides code parity-check matrices consisting of circulant submatrices, and hence quasi-cyclic bipartite-graph codes with simple implementation.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 17:21:18 GMT" } ]
2009-10-01T00:00:00
[ [ "Davydov", "Alexander A.", "" ], [ "Giulietti", "Massimo", "" ], [ "Marcugini", "Stefano", "" ], [ "Pambianco", "Fernanda", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.5677
Brendan Lucier
Brendan Lucier
Beyond Equilibria: Mechanisms for Repeated Combinatorial Auctions
16 pages, 0 figures
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the design of mechanisms in combinatorial auction domains. We focus on settings where the auction is repeated, motivated by auctions for licenses or advertising space. We consider models of agent behaviour in which they either apply common learning techniques to minimize the regret of their bidding strategies, or apply short-sighted best-response strategies. We ask: when can a black-box approximation algorithm for the base auction problem be converted into a mechanism that approximately preserves the original algorithm's approximation factor on average over many iterations? We present a general reduction for a broad class of algorithms when agents minimize external regret. We also present a new mechanism for the combinatorial auction problem that attains an $O(\sqrt{m})$ approximation on average when agents apply best-response dynamics.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 17:47:17 GMT" } ]
2009-10-01T00:00:00
[ [ "Lucier", "Brendan", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0909.5683
Samuel Kutin
Daniel M. Kane and Samuel A. Kutin
Quantum interpolation of polynomials
8 pages; version 2 updates references
null
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider quantum interpolation of polynomials. We imagine a quantum computer with black-box access to input/output pairs (x_i, f(x_i)), where f is a degree-d polynomial, and we wish to compute f(0). We give asymptotically tight quantum lower bounds for this problem, even in the case where 0 is among the possible values of x_i.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 18:06:54 GMT" }, { "version": "v2", "created": "Thu, 18 Mar 2010 15:27:14 GMT" } ]
2010-03-19T00:00:00
[ [ "Kane", "Daniel M.", "" ], [ "Kutin", "Samuel A.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.5684
Jan Draisma
Jan Draisma and Eyal Kushilevitz and Enav Weinreb
Partition Arguments in Multiparty Communication Complexity
extended journal version of paper accepted for ICALP 2009
Theoretical Computer Science 412(24), 2611-2622, 2011
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider the "Number in Hand" multiparty communication complexity model, where k players holding inputs x_1,...,x_k in {0,1}^n communicate to compute the value f(x_1,...,x_k) of a function f known to all of them. The main lower bound technique for the communication complexity of such problems is that of partition arguments: partition the k players into two disjoint sets of players and find a lower bound for the induced two-party communication complexity problem. In this paper, we study the power of partition arguments. Our two main results are very different in nature: (i) For randomized communication complexity, we show that partition arguments may yield bounds that are exponentially far from the true communication complexity. Specifically, we prove that there exists a 3-argument function f whose communication complexity is Omega(n), while partition arguments can only yield an Omega(log n) lower bound. The same holds for nondeterministic communication complexity. (ii) For deterministic communication complexity, we prove that finding significant gaps between the true communication complexity and the best lower bound that can be obtained via partition arguments, would imply progress on a generalized version of the "log-rank conjecture" in communication complexity. We conclude with two results on the multiparty "fooling set technique", another method for obtaining communication complexity lower bounds.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 18:18:04 GMT" } ]
2017-10-10T00:00:00
[ [ "Draisma", "Jan", "" ], [ "Kushilevitz", "Eyal", "" ], [ "Weinreb", "Enav", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.0013
Radu Grigore
Mikolas Janota, Joao Marques-Silva, Radu Grigore
Algorithms for finding dispensable variables
null
null
null
null
cs.DS cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This short note reviews briefly three algorithms for finding the set of dispensable variables of a boolean formula. The presentation is light on proofs and heavy on intuitions.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 20:10:03 GMT" } ]
2009-10-02T00:00:00
[ [ "Janota", "Mikolas", "" ], [ "Marques-Silva", "Joao", "" ], [ "Grigore", "Radu", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.0045
Bruno Grenet
Bruno Grenet
Acceptable Complexity Measures of Theorems
16 pages, presented at NKS Midwest Conference '08
Complex Systems 18:4 (2010) 403-425
null
null
cs.LO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 1931, G\"odel presented in K\"onigsberg his famous Incompleteness Theorem, stating that some true mathematical statements are unprovable. Yet, this result gives us no idea about those independent (that is, true and unprovable) statements, about their frequency, the reason they are unprovable, and so on. Calude and J\"urgensen proved in 2005 Chaitin's "heuristic principle" for an appropriate measure: the theorems of a finitely-specified theory cannot be significantly more complex than the theory itself. In this work, we investigate the existence of other measures, different from the original one, which satisfy this "heuristic principle". At this end, we introduce the definition of acceptable complexity measure of theorems.
[ { "version": "v1", "created": "Wed, 30 Sep 2009 22:25:37 GMT" } ]
2011-07-08T00:00:00
[ [ "Grenet", "Bruno", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.0097
Alexandre Vaniachine
A. Vaniachine (for the ATLAS Collaboration)
Scalable Database Access Technologies for ATLAS Distributed Computing
6 pages, 7 figures. To be published in the proceedings of DPF-2009, Detroit, MI, July 2009, eConf C090726
null
null
ANL-HEP-CP-09-085
physics.ins-det cs.DB cs.DC hep-ex
http://creativecommons.org/licenses/publicdomain/
ATLAS event data processing requires access to non-event data (detector conditions, calibrations, etc.) stored in relational databases. The database-resident data are crucial for the event data reconstruction processing steps and often required for user analysis. A main focus of ATLAS database operations is on the worldwide distribution of the Conditions DB data, which are necessary for every ATLAS data processing job. Since Conditions DB access is critical for operations with real data, we have developed the system where a different technology can be used as a redundant backup. Redundant database operations infrastructure fully satisfies the requirements of ATLAS reprocessing, which has been proven on a scale of one billion database queries during two reprocessing campaigns of 0.5 PB of single-beam and cosmics data on the Grid. To collect experience and provide input for a best choice of technologies, several promising options for efficient database access in user analysis were evaluated successfully. We present ATLAS experience with scalable database access technologies and describe our approach for prevention of database access bottlenecks in a Grid computing environment.
[ { "version": "v1", "created": "Thu, 1 Oct 2009 07:20:54 GMT" }, { "version": "v2", "created": "Fri, 2 Oct 2009 13:55:12 GMT" } ]
2019-08-13T00:00:00
[ [ "Vaniachine", "A.", "", "for the ATLAS Collaboration" ] ]
[ { "class": "Physics", "code": "physics.ins-det", "description": "Instrumentation and Detectors for research in natural science, including optical, molecular, atomic, nuclear and particle physics instrumentation and the associated electronics, services, infrastructure and control equipment. ", "span": "(Instrumentation and Detectors)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Physics", "code": "hep-ex", "description": "Description coming soon", "span": "(High Energy Physics - Experiment)" } ]
0910.0110
Patrick Briest
Patrick Briest and Sanjeev Khanna
Improved Hardness of Approximation for Stackelberg Shortest-Path Pricing
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the Stackelberg shortest-path pricing problem, which is defined as follows. Given a graph G with fixed-cost and pricable edges and two distinct vertices s and t, we may assign prices to the pricable edges. Based on the predefined fixed costs and our prices, a customer purchases a cheapest s-t-path in G and we receive payment equal to the sum of prices of pricable edges belonging to the path. Our goal is to find prices maximizing the payment received from the customer. While Stackelberg shortest-path pricing was known to be APX-hard before, we provide the first explicit approximation threshold and prove hardness of approximation within 2-o(1).
[ { "version": "v1", "created": "Thu, 1 Oct 2009 09:15:06 GMT" } ]
2009-10-02T00:00:00
[ [ "Briest", "Patrick", "" ], [ "Khanna", "Sanjeev", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.0112
Rasmus Pagh
Andrea Campagna and Rasmus Pagh
Finding Associations and Computing Similarity via Biased Pair Sampling
This is an extended version of a paper that appeared at the IEEE International Conference on Data Mining, 2009. The conference version is (c) 2009 IEEE
null
null
null
cs.DS cs.DB cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This version is ***superseded*** by a full version that can be found at http://www.itu.dk/people/pagh/papers/mining-jour.pdf, which contains stronger theoretical results and fixes a mistake in the reporting of experiments. Abstract: Sampling-based methods have previously been proposed for the problem of finding interesting associations in data, even for low-support items. While these methods do not guarantee precise results, they can be vastly more efficient than approaches that rely on exact counting. However, for many similarity measures no such methods have been known. In this paper we show how a wide variety of measures can be supported by a simple biased sampling method. The method also extends to find high-confidence association rules. We demonstrate theoretically that our method is superior to exact methods when the threshold for "interesting similarity/confidence" is above the average pairwise similarity/confidence, and the average support is not too low. Our method is particularly good when transactions contain many items. We confirm in experiments on standard association mining benchmarks that this gives a significant speedup on real data sets (sometimes much larger than the theoretical guarantees). Reductions in computation time of over an order of magnitude, and significant savings in space, are observed.
[ { "version": "v1", "created": "Thu, 1 Oct 2009 09:02:54 GMT" }, { "version": "v2", "created": "Wed, 17 Feb 2010 09:32:14 GMT" } ]
2010-02-17T00:00:00
[ [ "Campagna", "Andrea", "" ], [ "Pagh", "Rasmus", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0910.0144
Richard Clegg
Richard G. Clegg, Raul Landa, Miguel Rio
Criticisms of modelling packet traffic using long-range dependence
Presented at the PMECT 2009 workshop (part of ICCCN 2009) in San Francisco
null
10.1109/ICCCN.2009.5235309
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper criticises the notion that long-range dependence is an important contributor to the queuing behaviour of real Internet traffic. The idea is questioned in two different ways. Firstly, a class of models used to simulate Internet traffic is shown to have important theoretical flaws. It is shown that this behaviour is inconsistent with the behaviour of real traffic traces. Secondly, the notion that long-range correlations significantly affects the queuing performance of traffic is investigated by destroying those correlations in real traffic traces (by reordering). It is shown that the longer ranges of correlations are not important except in one case with an extremely high load.
[ { "version": "v1", "created": "Thu, 1 Oct 2009 11:46:24 GMT" } ]
2013-03-28T00:00:00
[ [ "Clegg", "Richard G.", "" ], [ "Landa", "Raul", "" ], [ "Rio", "Miguel", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0910.0179
Rdv Ijcsis
O. Said, S. Bahgat, M. Ghoniemy, Y. Elawdy
Analysis, Design and Simulation of a New System for Internet Multimedia Transmission Guarantee
10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 77-86, September 2009, USA
null
ISSN 1947 5500
cs.MM cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
QoS is a very important issue for multimedia communication systems. In this paper, a new system that reinstalls the relation between the QoS elements (RSVP, routing protocol, sender, and receiver) during the multimedia transmission is proposed, then an alternative path is created in case of original multimedia path failure. The suggested system considers the resulting problems that may be faced within and after the creation of rerouting path. Finally, the proposed system is simulated using OPNET 11.5 simulation package. Simulation results show that our proposed system outperforms the old one in terms of QoS parameters like packet loss and delay jitter.
[ { "version": "v1", "created": "Thu, 1 Oct 2009 14:03:51 GMT" } ]
2009-10-02T00:00:00
[ [ "Said", "O.", "" ], [ "Bahgat", "S.", "" ], [ "Ghoniemy", "M.", "" ], [ "Elawdy", "Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.0187
Ivan Voras
Ivan Voras, Mario Zagar
Web-enabling Cache Daemon for Complex Data
null
null
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most common basic techniques for improving the performance of web applications is caching frequently accessed data in fast data stores, colloquially known as cache daemons. In this paper we present a cache daemon suitable for storing complex data while maintaining fine-grained control over data storage, retrieval and expiry. Data manipulation in this cache daemon is performed via standard SQL statements so we call it SQLcached. It is a practical, usable solution already implemented in several large web sites.
[ { "version": "v1", "created": "Thu, 1 Oct 2009 14:25:50 GMT" } ]
2009-10-02T00:00:00
[ [ "Voras", "Ivan", "" ], [ "Zagar", "Mario", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.0211
Gianluca Argentini
Gianluca Argentini
Searching the (really) real general solution of 2D Laplace differential equation
None new, but re-view
null
null
null
math.AP cs.CE physics.flu-dyn
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is not a new result. Purpose of this work is to describe a method to search the analytical expression of the general real solution of the two-dimensional Laplace differential equation. This thing is not easy to find in scientific literature and, if present, often it is justified with the assertion that an arbitrary analytic complex function is a solution of Laplace equation, so introducing the condition of complex-differentiability which is not really necessary for the existence of a real solution. The question of the knowledge of real exact solutions to Laplace equation is of great importance in science and engineering.
[ { "version": "v1", "created": "Thu, 1 Oct 2009 16:14:28 GMT" } ]
2009-10-02T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
[ { "class": "Mathematics", "code": "math.AP", "description": "Existence and uniqueness, boundary conditions, linear and non-linear operators, stability, soliton theory, integrable PDE's, conservation laws, qualitative dynamics", "span": "(Analysis of PDEs)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "physics.flu-dyn", "description": "Turbulence, instabilities, incompressible/compressible flows, reacting flows. Aero/hydrodynamics, fluid-structure interactions, acoustics. Biological fluid dynamics, micro/nanofluidics, interfacial phenomena. Complex fluids, suspensions and granular flows, porous media flows. Geophysical flows, thermoconvective and stratified flows. Mathematical and computational methods for fluid dynamics, fluid flow models, experimental techniques.", "span": "(Fluid Dynamics)" } ]
0910.0227
Rdv Ijcsis
Renuka A., K. C. Shet
Hierarchical Approach for Key Management in Mobile Ad hoc Networks
9 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 87-95, September 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. The conventional security solutions to provide key management through accessing trusted authorities or centralized servers are infeasible for this new environment since mobile ad hoc networks are characterized by the absence of any infrastructure, frequent mobility, and wireless links. We propose a hierarchical group key management scheme that is hierarchical and fully distributed with no central authority and uses a simple rekeying procedure which is suitable for large and high mobility mobile ad hoc networks. The rekeying procedure requires only one round in our scheme and Chinese Remainder Theorem Diffie Hellman Group Diffie Hellmann and Burmester and Desmedt it is a constant 3 whereas in other schemes such as Distributed Logical Key Hierarchy and Distributed One Way Function Trees, it depends on the number of members. We reduce the energy consumption during communication of the keying materials by reducing the number of bits in the rekeying message. We show through analysis and simulations that our scheme has less computation, communication and energy consumption compared to the existing schemes.
[ { "version": "v1", "created": "Thu, 1 Oct 2009 18:56:57 GMT" } ]
2009-10-02T00:00:00
[ [ "A.", "Renuka", "" ], [ "Shet", "K. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0910.0239
Venkatesh Saligrama
V. Saligrama, M. Zhao
Compressed Blind De-convolution
null
null
null
null
cs.IT cs.LG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Suppose the signal x is realized by driving a k-sparse signal u through an arbitrary unknown stable discrete-linear time invariant system H. These types of processes arise naturally in Reflection Seismology. In this paper we are interested in several problems: (a) Blind-Deconvolution: Can we recover both the filter $H$ and the sparse signal $u$ from noisy measurements? (b) Compressive Sensing: Is x compressible in the conventional sense of compressed sensing? Namely, can x, u and H be reconstructed from a sparse set of measurements. We develop novel L1 minimization methods to solve both cases and establish sufficient conditions for exact recovery for the case when the unknown system H is auto-regressive (i.e. all pole) of a known order. In the compressed sensing/sampling setting it turns out that both H and x can be reconstructed from O(k log(n)) measurements under certain technical conditions on the support structure of u. Our main idea is to pass x through a linear time invariant system G and collect O(k log(n)) sequential measurements. The filter G is chosen suitably, namely, its associated Toeplitz matrix satisfies the RIP property. We develop a novel LP optimization algorithm and show that both the unknown filter H and the sparse input u can be reliably estimated.
[ { "version": "v1", "created": "Thu, 1 Oct 2009 19:49:36 GMT" }, { "version": "v2", "created": "Mon, 25 Jan 2010 15:40:48 GMT" } ]
2016-09-08T00:00:00
[ [ "Saligrama", "V.", "" ], [ "Zhao", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.0281
David Pritchard
Deeparnab Chakrabarty, Jochen Koenemann, David Pritchard
Hypergraphic LP Relaxations for Steiner Trees
Revised full version; a shorter version will appear at IPCO 2010.
null
10.1007/978-3-642-13036-6_29
null
cs.DM
http://creativecommons.org/licenses/by/3.0/
We investigate hypergraphic LP relaxations for the Steiner tree problem, primarily the partition LP relaxation introduced by Koenemann et al. [Math. Programming, 2009]. Specifically, we are interested in proving upper bounds on the integrality gap of this LP, and studying its relation to other linear relaxations. Our results are the following. Structural results: We extend the technique of uncrossing, usually applied to families of sets, to families of partitions. As a consequence we show that any basic feasible solution to the partition LP formulation has sparse support. Although the number of variables could be exponential, the number of positive variables is at most the number of terminals. Relations with other relaxations: We show the equivalence of the partition LP relaxation with other known hypergraphic relaxations. We also show that these hypergraphic relaxations are equivalent to the well studied bidirected cut relaxation, if the instance is quasibipartite. Integrality gap upper bounds: We show an upper bound of sqrt(3) ~ 1.729 on the integrality gap of these hypergraph relaxations in general graphs. In the special case of uniformly quasibipartite instances, we show an improved upper bound of 73/60 ~ 1.216. By our equivalence theorem, the latter result implies an improved upper bound for the bidirected cut relaxation as well.
[ { "version": "v1", "created": "Thu, 1 Oct 2009 21:57:06 GMT" }, { "version": "v2", "created": "Sun, 7 Mar 2010 01:21:59 GMT" } ]
2015-05-14T00:00:00
[ [ "Chakrabarty", "Deeparnab", "" ], [ "Koenemann", "Jochen", "" ], [ "Pritchard", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.0284
Randall Dougherty
Randall Dougherty, Chris Freiling, and Kenneth Zeger
Linear rank inequalities on five or more variables
Substantial improvements, including a stronger form of the second general construction of inequalities, many more six-variable inequalities, and further description of the computing methodology
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ranks of subspaces of vector spaces satisfy all linear inequalities satisfied by entropies (including the standard Shannon inequalities) and an additional inequality due to Ingleton. It is known that the Shannon and Ingleton inequalities generate all such linear rank inequalities on up to four variables, but it has been an open question whether additional inequalities hold for the case of five or more variables. Here we give a list of 24 inequalities which, together with the Shannon and Ingleton inequalities, generate all linear rank inequalities on five variables. We also give a partial list of linear rank inequalities on six variables and general results which produce such inequalities on an arbitrary number of variables; we prove that there are essentially new inequalities at each number of variables beyond four (a result also proved recently by Kinser).
[ { "version": "v1", "created": "Fri, 2 Oct 2009 18:05:31 GMT" }, { "version": "v2", "created": "Sat, 3 Oct 2009 01:04:00 GMT" }, { "version": "v3", "created": "Tue, 20 Jul 2010 00:34:05 GMT" } ]
2010-07-21T00:00:00
[ [ "Dougherty", "Randall", "" ], [ "Freiling", "Chris", "" ], [ "Zeger", "Kenneth", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.0286
Justin Smith
George B. Purdy, Justin W. Smith
On Finding Ordinary or Monochromatic Intersection Points
21 pages, 4 figures
null
null
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An algorithm is demonstrated that finds an ordinary intersection in an arrangement of $n$ lines in $\mathbb{R}^2$, not all parallel and not all passing through a common point, in time $O(n \log{n})$. The algorithm is then extended to find an ordinary intersection among an arrangement of hyperplanes in $\mathbb{R}^d$, no $d$ passing through a line and not all passing through the same point, again, in time $O(n \log{n})$. Two additional algorithms are provided that find an ordinary or monochromatic intersection, respectively, in an arrangement of pseudolines in time $O(n^2)$.
[ { "version": "v1", "created": "Thu, 1 Oct 2009 22:53:42 GMT" } ]
2009-10-05T00:00:00
[ [ "Purdy", "George B.", "" ], [ "Smith", "Justin W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.0287
Luigi Cimmino
Luigi Cimmino
Shor's Algorithm from the Mindset of Quantum Oracles
8 pages, report on deterministic quantum measuremet theory
null
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this work is to show a brand-new way of making deterministic Quantum Computing (short QC), in the sense of Theory of Calculability, by meaning of unitary evolution. We start from the original Shor's Algorithm to explain how the newest one works, at least compared to theory. We will give a new conceptual foundation of QC, resulting from a set of conventional and well known results of Calculability and Quantum Mechanics. In the practice, if that can be used in its general sense, we will show an inaccessible relativized process which let us able to obtain same results with the same outlay in the time resource as the Shor's one for factorizing a given number n. Then the QO-system will be a prototype way giving to the relativized calculus the possibility to put in to practice an oracle, kind of object having till now abstract nature. The basic physical tool of our theorization, we call Quantum State Selection, consists in the twin-combined measurement process through positive valued measure operator (POVM), needed to provide the quantum oracle's answer.
[ { "version": "v1", "created": "Thu, 1 Oct 2009 22:55:59 GMT" }, { "version": "v2", "created": "Sun, 3 Apr 2011 14:34:21 GMT" } ]
2011-04-05T00:00:00
[ [ "Cimmino", "Luigi", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.0316
Rdv Ijcsis
P. Ganeshkumar, K. Thyagarajah
An Analysis of Energy Consumption on ACK plus Rate Packet in Rate Based Transport Protocol
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 96-102, September 2009, USA
null
ISSN 1947 5500
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rate based transport protocol determines the rate of data transmission between the sender and receiver and then sends the data according to that rate. To notify the rate to the sender, the receiver sends ACKplusRate packet based on epoch timer expiry. In this paper, through detailed arguments and simulation it is shown that the transmission of ACKplusRate packet based on epoch timer expiry consumes more energy in network with low mobility. To overcome this problem, a new technique called Dynamic Rate Feedback (DRF) is proposed. DRF sends ACKplusRate whenever there is a change in rate of (plus or minus) 25 percent than the previous rate. Based on ns2 simulation DRF is compared with a reliable transport protocol for ad hoc network (ATP)
[ { "version": "v1", "created": "Fri, 2 Oct 2009 03:28:20 GMT" } ]
2009-10-05T00:00:00
[ [ "Ganeshkumar", "P.", "" ], [ "Thyagarajah", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0910.0317
Rdv Ijcsis
Abbas Karimi, Faraneh Zarafshan, Adznan.b. Jantan, A.R Ramli, M.Iqbal b.Saripan
A New Fuzzy Approach for Dynamic Load Balancing Algorithm
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 01-05, October 2009, USA
null
ISSN 1947 5500
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Load balancing is the process of improving the Performance of a parallel and distributed system through is distribution of load among the processors [1-2]. Most of the previous work in load balancing and distributed decision making in general, do not effectively take into account the uncertainty and inconsistency in state information but in fuzzy logic, we have advantage of using crisps inputs. In this paper, we present a new approach for implementing dynamic load balancing algorithm with fuzzy logic, which can face to uncertainty and inconsistency of previous algorithms, further more our algorithm shows better response time than round robin and randomize algorithm respectively 30.84 percent and 45.45 percent.
[ { "version": "v1", "created": "Fri, 2 Oct 2009 03:32:09 GMT" } ]
2009-10-05T00:00:00
[ [ "Karimi", "Abbas", "" ], [ "Zarafshan", "Faraneh", "" ], [ "Jantan", "Adznan. b.", "" ], [ "Ramli", "A. R", "" ], [ "Saripan", "M. Iqbal b.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0910.0320
Jialing Liu
Jialing Liu, Nicola Elia
Convergence of Fundamental Limitations in Feedback Communication, Estimation, and Feedback Control over Gaussian Channels
Submitted to Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we establish the connections of the fundamental limitations in feedback communication, estimation, and feedback control over Gaussian channels, from a unifying perspective for information, estimation, and control. The optimal feedback communication system over a Gaussian necessarily employs the Kalman filter (KF) algorithm, and hence can be transformed into an estimation system and a feedback control system over the same channel. This follows that the information rate of the communication system is alternatively given by the decay rate of the Cramer-Rao bound (CRB) of the estimation system and by the Bode integral (BI) of the control system. Furthermore, the optimal tradeoff between the channel input power and information rate in feedback communication is alternatively characterized by the optimal tradeoff between the (causal) one-step prediction mean-square error (MSE) and (anti-causal) smoothing MSE (of an appropriate form) in estimation, and by the optimal tradeoff between the regulated output variance with causal feedback and the disturbance rejection measure (BI or degree of anti-causality) in feedback control. All these optimal tradeoffs have an interpretation as the tradeoff between causality and anti-causality. Utilizing and motivated by these relations, we provide several new results regarding the feedback codes and information theoretic characterization of KF. Finally, the extension of the finite-horizon results to infinite horizon is briefly discussed under specific dimension assumptions (the asymptotic feedback capacity problem is left open in this paper).
[ { "version": "v1", "created": "Fri, 2 Oct 2009 03:54:58 GMT" } ]
2009-10-05T00:00:00
[ [ "Liu", "Jialing", "" ], [ "Elia", "Nicola", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.0349
Claudia Marinica
Claudia Marinica (LINA), Fabrice Guillet (LINA), Henri Briand (LINA)
Post-Processing of Discovered Association Rules Using Ontologies
null
The Second International Workshop on Domain Driven Data Mining (DDDM 2008) in IEEE International Conference of Data Mining, Pisa : Italie (2008)
10.1109/ICDMW.2008.87
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Data Mining, the usefulness of association rules is strongly limited by the huge amount of delivered rules. In this paper we propose a new approach to prune and filter discovered rules. Using Domain Ontologies, we strengthen the integration of user knowledge in the post-processing task. Furthermore, an interactive and iterative framework is designed to assist the user along the analyzing task. On the one hand, we represent user domain knowledge using a Domain Ontology over database. On the other hand, a novel technique is suggested to prune and to filter discovered rules. The proposed framework was applied successfully over the client database provided by Nantes Habitat.
[ { "version": "v1", "created": "Fri, 2 Oct 2009 08:40:01 GMT" } ]
2009-10-05T00:00:00
[ [ "Marinica", "Claudia", "", "LINA" ], [ "Guillet", "Fabrice", "", "LINA" ], [ "Briand", "Henri", "", "LINA" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0910.0366
Daniel Cederman
Daniel Cederman and Philippas Tsigas
Supporting Lock-Free Composition of Concurrent Data Objects
null
null
null
2009-10
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Lock-free data objects offer several advantages over their blocking counterparts, such as being immune to deadlocks and convoying and, more importantly, being highly concurrent. But they share a common disadvantage in that the operations they provide are difficult to compose into larger atomic operations while still guaranteeing lock-freedom. We present a lock-free methodology for composing highly concurrent linearizable objects together by unifying their linearization points. This makes it possible to relatively easily introduce atomic lock-free move operations to a wide range of concurrent objects. Experimental evaluation has shown that the operations originally supported by the data objects keep their performance behavior under our methodology.
[ { "version": "v1", "created": "Fri, 2 Oct 2009 10:08:12 GMT" } ]
2009-10-05T00:00:00
[ [ "Cederman", "Daniel", "" ], [ "Tsigas", "Philippas", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.0410
Benjamin Steinberg
Benjamin Steinberg
The averaging trick and the Cerny conjecture
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The results of several papers concerning the \v{C}ern\'y conjecture are deduced as consequences of a simple idea that I call the averaging trick. This idea is implicitly used in the literature, but no attempt was made to formalize the proof scheme axiomatically. Instead, authors axiomatized classes of automata to which it applies.
[ { "version": "v1", "created": "Fri, 2 Oct 2009 14:48:02 GMT" }, { "version": "v2", "created": "Fri, 19 Mar 2010 22:06:20 GMT" }, { "version": "v3", "created": "Sat, 8 May 2010 17:17:48 GMT" } ]
2010-05-11T00:00:00
[ [ "Steinberg", "Benjamin", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0910.0413
Yaniv Plan
Emmanuel J. Candes, Yaniv Plan
Accurate low-rank matrix recovery from a small number of linear measurements
8 pages, 1 table
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of recovering a lowrank matrix M from a small number of random linear measurements. A popular and useful example of this problem is matrix completion, in which the measurements reveal the values of a subset of the entries, and we wish to fill in the missing entries (this is the famous Netflix problem). When M is believed to have low rank, one would ideally try to recover M by finding the minimum-rank matrix that is consistent with the data; this is, however, problematic since this is a nonconvex problem that is, generally, intractable. Nuclear-norm minimization has been proposed as a tractable approach, and past papers have delved into the theoretical properties of nuclear-norm minimization algorithms, establishing conditions under which minimizing the nuclear norm yields the minimum rank solution. We review this spring of emerging literature and extend and refine previous theoretical results. Our focus is on providing error bounds when M is well approximated by a low-rank matrix, and when the measurements are corrupted with noise. We show that for a certain class of random linear measurements, nuclear-norm minimization provides stable recovery from a number of samples nearly at the theoretical lower limit, and enjoys order-optimal error bounds (with high probability).
[ { "version": "v1", "created": "Fri, 2 Oct 2009 14:52:00 GMT" } ]
2009-10-05T00:00:00
[ [ "Candes", "Emmanuel J.", "" ], [ "Plan", "Yaniv", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.0443
Danupon Nanongkai
Parinya Chalermsook, Bundit Laekhanukit, Danupon Nanongkai
Stackelberg Pricing is Hard to Approximate within $2-\epsilon$
null
null
null
null
cs.GT cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stackelberg Pricing Games is a two-level combinatorial pricing problem studied in the Economics, Operation Research, and Computer Science communities. In this paper, we consider the decade-old shortest path version of this problem which is the first and most studied problem in this family. The game is played on a graph (representing a network) consisting of {\em fixed cost} edges and {\em pricable} or {\em variable cost} edges. The fixed cost edges already have some fixed price (representing the competitor's prices). Our task is to choose prices for the variable cost edges. After that, a client will buy the cheapest path from a node $s$ to a node $t$, using any combination of fixed cost and variable cost edges. The goal is to maximize the revenue on variable cost edges. In this paper, we show that the problem is hard to approximate within $2-\epsilon$, improving the previous \APX-hardness result by Joret [to appear in {\em Networks}]. Our technique combines the existing ideas with a new insight into the price structure and its relation to the hardness of the instances.
[ { "version": "v1", "created": "Fri, 2 Oct 2009 19:54:54 GMT" } ]
2009-10-05T00:00:00
[ [ "Chalermsook", "Parinya", "" ], [ "Laekhanukit", "Bundit", "" ], [ "Nanongkai", "Danupon", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.0456
Kamiar Rahnama Rad
Kamiar Rahnama Rad
Sharp Sufficient Conditions on Exact Sparsity Pattern Recovery
submitted to IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider the $n$-dimensional vector $y=X\be+\e$, where $\be \in \R^p$ has only $k$ nonzero entries and $\e \in \R^n$ is a Gaussian noise. This can be viewed as a linear system with sparsity constraints, corrupted by noise. We find a non-asymptotic upper bound on the probability that the optimal decoder for $\beta$ declares a wrong sparsity pattern, given any generic perturbation matrix $X$. In the case when $X$ is randomly drawn from a Gaussian ensemble, we obtain asymptotically sharp sufficient conditions for exact recovery, which agree with the known necessary conditions previously established.
[ { "version": "v1", "created": "Fri, 2 Oct 2009 17:55:28 GMT" }, { "version": "v2", "created": "Mon, 5 Oct 2009 16:35:40 GMT" }, { "version": "v3", "created": "Tue, 13 Oct 2009 04:46:06 GMT" } ]
2009-10-13T00:00:00
[ [ "Rad", "Kamiar Rahnama", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.0460
Andreas Bj\"orklund
Andreas Bj\"orklund
Exact Covers via Determinants
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a k-uniform hypergraph on n vertices, partitioned in k equal parts such that every hyperedge includes one vertex from each part, the k-dimensional matching problem asks whether there is a disjoint collection of the hyperedges which covers all vertices. We show it can be solved by a randomized polynomial space algorithm in time O*(2^(n(k-2)/k)). The O*() notation hides factors polynomial in n and k. When we drop the partition constraint and permit arbitrary hyperedges of cardinality k, we obtain the exact cover by k-sets problem. We show it can be solved by a randomized polynomial space algorithm in time O*(c_k^n), where c_3=1.496, c_4=1.642, c_5=1.721, and provide a general bound for larger k. Both results substantially improve on the previous best algorithms for these problems, especially for small k, and follow from the new observation that Lovasz' perfect matching detection via determinants (1979) admits an embedding in the recently proposed inclusion-exclusion counting scheme for set covers, despite its inability to count the perfect matchings.
[ { "version": "v1", "created": "Fri, 2 Oct 2009 19:36:39 GMT" }, { "version": "v2", "created": "Sun, 3 Jan 2010 16:53:00 GMT" }, { "version": "v3", "created": "Wed, 3 Feb 2010 11:00:50 GMT" } ]
2010-02-03T00:00:00
[ [ "Björklund", "Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.0483
Christos Dimitrakakis
Christos Dimitrakakis, Aikaterini Mitrokotsa
Statistical Decision Making for Authentication and Intrusion Detection
13 pages, 2 figures, to be presented at ICMLA 2009
null
null
IAS-UVA-09-02
stat.ML cs.LG stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is scarce or non-existent. We review existing techniques for dealing with this problem and propose a novel alternative based on a principled statistical decision-making view point. We examine the technique on a toy problem and validate it on complex real-world data from an RFID based access control system. The results indicate that it can significantly outperform the classical world model approach. The method could be more generally useful in other decision-making scenarios where there is a lack of adversary data.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 19:43:40 GMT" } ]
2009-12-26T00:00:00
[ [ "Dimitrakakis", "Christos", "" ], [ "Mitrokotsa", "Aikaterini", "" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0910.0493
Patrizio Pelliccione
Antonio Bucchiarone, Davide Di Ruscio, Henry Muccini, and Patrizio Pelliccione
From Requirements to code: an Architecture-centric Approach for producing Quality Systems
Chapter of the book "Model-Driven Software Development: Integrating Quality Assurance". Idea Group Inc., Information Science Publishing, IRM Press. 2008
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When engineering complex and distributed software and hardware systems (increasingly used in many sectors, such as manufacturing, aerospace, transportation, communication, energy, and health-care), quality has become a big issue, since failures can have economics consequences and can also endanger human life. Model-based specifications of a component-based system permit to explicitly model the structure and behaviour of components and their integration. In particular Software Architectures (SA) has been advocated as an effective means to produce quality systems. In this chapter by combining different technologies and tools for analysis and development, we propose an architecture-centric model-driven approach to validate required properties and to generate the system code. Functional requirements are elicited and used for identifying expected properties the architecture shall express. The architectural compliance to the properties is formally demonstrated, and the produced architectural model is used to automatically generate the Java code. Suitable transformations assure that the code is conforming to both structural and behavioural SA constraints. This chapter describes the process and discusses how some existing tools and languages can be exploited to support the approach.
[ { "version": "v1", "created": "Fri, 2 Oct 2009 21:57:54 GMT" } ]
2009-10-06T00:00:00
[ [ "Bucchiarone", "Antonio", "" ], [ "Di Ruscio", "Davide", "" ], [ "Muccini", "Henry", "" ], [ "Pelliccione", "Patrizio", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0910.0504
Jos\'e A. Soto
Jos\'e Soto
Improved Analysis of a Max Cut Algorithm Based on Spectral Partitioning
9 pages, 2 figures. Final version
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Trevisan [SICOMP 2012] presented an algorithm for Max-Cut based on spectral partitioning techniques. This is the first algorithm for Max-Cut with an approximation guarantee strictly larger than 1/2 that is not based on semidefinite programming. Trevisan showed that its approximation ratio is of at least 0.531. In this paper we improve this bound up to 0.614247. We also define and extend this result for the more general Maximum Colored Cut problem.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 19:58:59 GMT" }, { "version": "v2", "created": "Tue, 2 Dec 2014 14:20:14 GMT" } ]
2014-12-03T00:00:00
[ [ "Soto", "José", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.0505
Imran Haque
Imran S. Haque and Vijay S. Pande
Hard Data on Soft Errors: A Large-Scale Assessment of Real-World Error Rates in GPGPU
10 pages, 5 figures. For associated code and binaries, see https://simtk.org/home/memtest . Poster version to be presented at Supercomputing 2009. Version 1 of submission contained erroneous analysis of transaction coalescing on GT200
null
null
null
cs.AR cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graphics processing units (GPUs) are gaining widespread use in computational chemistry and other scientific simulation contexts because of their huge performance advantages relative to conventional CPUs. However, the reliability of GPUs in error-intolerant applications is largely unproven. In particular, a lack of error checking and correcting (ECC) capability in the memory subsystems of graphics cards has been cited as a hindrance to the acceptance of GPUs as high-performance coprocessors, but the impact of this design has not been previously quantified. In this article we present MemtestG80, our software for assessing memory error rates on NVIDIA G80 and GT200-architecture-based graphics cards. Furthermore, we present the results of a large-scale assessment of GPU error rate, conducted by running MemtestG80 on over 20,000 hosts on the Folding@home distributed computing network. Our control experiments on consumer-grade and dedicated-GPGPU hardware in a controlled environment found no errors. However, our survey over cards on Folding@home finds that, in their installed environments, two-thirds of tested GPUs exhibit a detectable, pattern-sensitive rate of memory soft errors. We demonstrate that these errors persist after controlling for overclocking and environmental proxies for temperature, but depend strongly on board architecture.
[ { "version": "v1", "created": "Sat, 3 Oct 2009 02:04:22 GMT" }, { "version": "v2", "created": "Sat, 14 Nov 2009 04:14:30 GMT" } ]
2009-11-14T00:00:00
[ [ "Haque", "Imran S.", "" ], [ "Pande", "Vijay S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0910.0513
Ye Du
Ye Du
Ranking via Arrow-Debreu Equilibrium
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we establish a connection between ranking theory and general equilibrium theory. First of all, we show that the ranking vector of PageRank or Invariant method is precisely the equilibrium of a special Cobb-Douglas market. This gives a natural economic interpretation for the PageRank or Invariant method. Furthermore, we propose a new ranking method, the CES ranking, which is minimally fair, strictly monotone and invariant to reference intensity, but not uniform or weakly additive.
[ { "version": "v1", "created": "Sat, 3 Oct 2009 05:39:01 GMT" } ]
2009-10-06T00:00:00
[ [ "Du", "Ye", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0910.0537
Victor Gluzberg
Victor Gluzberg
A Note On Higher Order Grammar
7 pages in single-spaced pdf format
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Both syntax-phonology and syntax-semantics interfaces in Higher Order Grammar (HOG) are expressed as axiomatic theories in higher-order logic (HOL), i.e. a language is defined entirely in terms of provability in the single logical system. An important implication of this elegant architecture is that the meaning of a valid expression turns out to be represented not by a single, nor even by a few "discrete" terms (in case of ambiguity), but by a "continuous" set of logically equivalent terms. The note is devoted to precise formulation and proof of this observation.
[ { "version": "v1", "created": "Sat, 3 Oct 2009 12:26:47 GMT" } ]
2009-10-06T00:00:00
[ [ "Gluzberg", "Victor", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0910.0542
Om Patri
Om Prasad Patri, Amit Kumar Mishra
Pre-processing in AI based Prediction of QSARs
6 pages, 12 figures, In the Proceedings of the 12th International Conference on Information Technology, ICIT 2009, December 21-24 2009, Bhubaneswar, India
null
null
null
cs.AI cs.NE q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Machine learning, data mining and artificial intelligence (AI) based methods have been used to determine the relations between chemical structure and biological activity, called quantitative structure activity relationships (QSARs) for the compounds. Pre-processing of the dataset, which includes the mapping from a large number of molecular descriptors in the original high dimensional space to a small number of components in the lower dimensional space while retaining the features of the original data, is the first step in this process. A common practice is to use a mapping method for a dataset without prior analysis. This pre-analysis has been stressed in our work by applying it to two important classes of QSAR prediction problems: drug design (predicting anti-HIV-1 activity) and predictive toxicology (estimating hepatocarcinogenicity of chemicals). We apply one linear and two nonlinear mapping methods on each of the datasets. Based on this analysis, we conclude the nature of the inherent relationships between the elements of each dataset, and hence, the mapping method best suited for it. We also show that proper preprocessing can help us in choosing the right feature extraction tool as well as give an insight about the type of classifier pertinent for the given problem.
[ { "version": "v1", "created": "Sat, 3 Oct 2009 18:46:00 GMT" } ]
2009-10-06T00:00:00
[ [ "Patri", "Om Prasad", "" ], [ "Mishra", "Amit Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0910.0548
Lyubov Positselskaya
Lyubov N. Positselskaya
Noisy fighter-bomber duel
Equally detailed English and Russian versions, each 23 pages long. LaTeX 2e, with Babel for the Russian version
null
null
null
math.OC cs.GT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss a duel-type game in which Player I uses his resource continuously and Player II distributes it by discrete portions. Each player knows how much resources he and his opponent have at every moment of time. The solution of the game is given in an explicit form. Keywords: noisy duel, payoff, strategy, the value of a game, consumption of resource.
[ { "version": "v1", "created": "Sun, 4 Oct 2009 15:22:01 GMT" } ]
2009-10-06T00:00:00
[ [ "Positselskaya", "Lyubov N.", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0910.0553
Michel Goemans
Michel X. Goemans
Combining Approximation Algorithms for the Prize-Collecting TSP
5 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a 1.91457-approximation algorithm for the prize-collecting travelling salesman problem. This is obtained by combining a randomized variant of a rounding algorithm of Bienstock et al. and a primal-dual algorithm of Goemans and Williamson.
[ { "version": "v1", "created": "Sat, 3 Oct 2009 15:48:44 GMT" } ]
2009-10-06T00:00:00
[ [ "Goemans", "Michel X.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.0555
Syed Jafar
Syed A. Jafar
Exploiting Channel Correlations - Simple Interference Alignment Schemes with no CSIT
18 pages, 6 figures
IEEE Journal of Selected Topics in Signal Processing, Vol. 6, No. 3, June 2012
10.1109/GLOCOM.2010.5683592
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explore 5 network communication problems where the possibility of interference alignment, and consequently the total number of degrees of freedom (DoF) with channel uncertainty at the transmitters are unknown. These problems share the common property that in each case the best known outer bounds are essentially robust to channel uncertainty and represent the outcome with interference alignment, but the best inner bounds -- in some cases conjectured to be optimal -- predict a total collapse of DoF, thus indicating the infeasibility of interference alignment under channel uncertainty at transmitters. Our main contribution is to show that even with no knowledge of channel coefficient values at the transmitters, the knowledge of the channels' correlation structure can be exploited to achieve interference alignment. In each case, we show that under a staggered block fading model, the transmitters are able to align interference without the knowledge of channel coefficient values. The alignment schemes are based on linear beamforming -- which can be seen as a repetition code over a small number of symbols -- and involve delays of only a few coherence intervals.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 02:51:18 GMT" } ]
2016-11-18T00:00:00
[ [ "Jafar", "Syed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.0575
Gabriel Tucci
Gabriel H. Tucci and Maria V. Vega
A Note on Functional Averages over Gaussian Ensembles
Published in Journal of Probability and Statistics, Vol. 2013, Article ID 941058
null
null
null
math.PR cs.IT math.IT math.OA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we find a new formula for matrix averages over the Gaussian ensemble. Let ${\bf H}$ be an $n\times n$ Gaussian random matrix with complex, independent, and identically distributed entries of zero mean and unit variance. Given an $n\times n$ positive definite matrix ${\bf A}$, and a continuous function $f:\R^{+}\to\R$ such that $\int_{0}^{\infty}{e^{-\alpha t}|f(t)|^2\,dt}<\infty$ for every $\alpha>0$, we find a new formula for the expectation $\E[\mathrm{Tr}(f({\bf HAH^{*}}))]$. Taking $f(x)=\log(1+x)$ gives another formula for the capacity of the MIMO communication channel, and taking $f(x)=(1+x)^{-1}$ gives the MMSE achieved by a linear receiver.
[ { "version": "v1", "created": "Sat, 3 Oct 2009 22:25:09 GMT" }, { "version": "v2", "created": "Wed, 7 Oct 2009 01:57:00 GMT" }, { "version": "v3", "created": "Thu, 8 Oct 2009 18:06:32 GMT" }, { "version": "v4", "created": "Sat, 2 Oct 2010 14:09:37 GMT" }, { "version": "v5", "created": "Mon, 19 Sep 2011 12:07:10 GMT" }, { "version": "v6", "created": "Sat, 13 Jul 2013 03:02:31 GMT" } ]
2013-07-16T00:00:00
[ [ "Tucci", "Gabriel H.", "" ], [ "Vega", "Maria V.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OA", "description": "Algebras of operators on Hilbert space, C^*-algebras, von Neumann algebras, non-commutative geometry", "span": "(Operator Algebras)" } ]
0910.0582
Michael Lampis
Michael Lampis
Algorithmic Meta-Theorems for Graphs of Bounded Vertex Cover
In this version, the algorithmic results have been extended to a new graph width, called neighborhood diversity
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Possibly the most famous algorithmic meta-theorem is Courcelle's theorem, which states that all MSO-expressible graph properties are decidable in linear time for graphs of bounded treewidth. Unfortunately, the running time's dependence on the MSO formula describing the problem is in general a tower of exponentials of unbounded height, and there exist lower bounds proving that this cannot be improved even if we restrict ourselves to deciding FO logic on trees. In this paper we attempt to circumvent these lower bounds by focusing on a subclass of bounded treewidth graphs, the graphs of bounded vertex cover. By using a technique different from the standard decomposition and dynamic programming technique of treewidth we prove that in this case the running time implied by Courcelle's theorem can be improved dramatically, from non-elementary to doubly and singly exponential for MSO and FO logic respectively. Our technique relies on a new graph width measure we introduce, for which we show some additional results that may indicate that it is of independent interest. We also prove lower bound results which show that our upper bounds cannot be improved significantly, under widely believed complexity assumptions. Our work answers an open problem posed by Michael Fellows.
[ { "version": "v1", "created": "Sun, 4 Oct 2009 02:58:25 GMT" }, { "version": "v2", "created": "Wed, 4 Nov 2009 21:22:08 GMT" } ]
2009-11-05T00:00:00
[ [ "Lampis", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.0610
Ambuj Tewari
Sham M. Kakade, Shai Shalev-Shwartz, Ambuj Tewari
Regularization Techniques for Learning with Matrices
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is growing body of learning problems for which it is natural to organize the parameters into matrix, so as to appropriately regularize the parameters under some matrix norm (in order to impose some more sophisticated prior knowledge). This work describes and analyzes a systematic method for constructing such matrix-based, regularization methods. In particular, we focus on how the underlying statistical properties of a given problem can help us decide which regularization function is appropriate. Our methodology is based on the known duality fact: that a function is strongly convex with respect to some norm if and only if its conjugate function is strongly smooth with respect to the dual norm. This result has already been found to be a key component in deriving and analyzing several learning algorithms. We demonstrate the potential of this framework by deriving novel generalization and regret bounds for multi-task learning, multi-class learning, and kernel learning.
[ { "version": "v1", "created": "Sun, 4 Oct 2009 14:48:46 GMT" }, { "version": "v2", "created": "Sun, 17 Oct 2010 21:34:13 GMT" } ]
2010-10-19T00:00:00
[ [ "Kakade", "Sham M.", "" ], [ "Shalev-Shwartz", "Shai", "" ], [ "Tewari", "Ambuj", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0910.0626
Mugurel Ionut Andreica
Alexandru Costan, Corina Stratan, Eliana-Dina Tirsa, Mugurel Ionut Andreica, Valentin Cristea
Towards a Grid Platform for Scientific Workflows Management
null
Proc. of the 17th Intl. Conf. on Control Systems and Computer Science (CSCS), vol. 1, pp. 37-44, Bucharest, Romania, 26-29 May, 2009. (ISSN: 2066-4451)
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Workflow management systems allow the users to develop complex applications at a higher level, by orchestrating functional components without handling the implementation details. Although a wide range of workflow engines are developed in enterprise environments, the open source engines available for scientific applications lack some functionalities or are too difficult to use for non-specialists. Our purpose is to develop a workflow management platform for distributed systems, that will provide features like an intuitive way to describe workflows, efficient data handling mechanisms and flexible fault tolerance support. We introduce here an architectural model for the workflow platform, based on the ActiveBPEL workflow engine, which we propose to augment with an additional set of components.
[ { "version": "v1", "created": "Sun, 4 Oct 2009 18:28:16 GMT" } ]
2009-10-06T00:00:00
[ [ "Costan", "Alexandru", "" ], [ "Stratan", "Corina", "" ], [ "Tirsa", "Eliana-Dina", "" ], [ "Andreica", "Mugurel Ionut", "" ], [ "Cristea", "Valentin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.0641
Arnab Bhattacharyya
Arnab Bhattacharyya, Swastik Kopparty, Grant Schoenebeck, Madhu Sudan, David Zuckerman
Optimal Testing of Reed-Muller Codes
22 pages; introduction reformulated and some minor changes
null
null
null
math.CO cs.CC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of testing if a given function f : F_2^n -> F_2 is close to any degree d polynomial in n variables, also known as the Reed-Muller testing problem. The Gowers norm is based on a natural 2^{d+1}-query test for this property. Alon et al. [AKKLR05] rediscovered this test and showed that it accepts every degree d polynomial with probability 1, while it rejects functions that are Omega(1)-far with probability Omega(1/(d 2^{d})). We give an asymptotically optimal analysis of this test, and show that it rejects functions that are (even only) Omega(2^{-d})-far with Omega(1)-probability (so the rejection probability is a universal constant independent of d and n). This implies a tight relationship between the (d+1)st Gowers norm of a function and its maximal correlation with degree d polynomials, when the correlation is close to 1. Our proof works by induction on n and yields a new analysis of even the classical Blum-Luby-Rubinfeld [BLR93] linearity test, for the setting of functions mapping F_2^n to F_2. The optimality follows from a tighter analysis of counterexamples to the "inverse conjecture for the Gowers norm" constructed by [GT09,LMS08]. Our result has several implications. First, it shows that the Gowers norm test is tolerant, in that it also accepts close codewords. Second, it improves the parameters of an XOR lemma for polynomials given by Viola and Wigderson [VW07]. Third, it implies a "query hierarchy" result for property testing of affine-invariant properties. That is, for every function q(n), it gives an affine-invariant property that is testable with O(q(n))-queries, but not with o(q(n))-queries, complementing an analogous result of [GKNR09] for graph properties.
[ { "version": "v1", "created": "Sun, 4 Oct 2009 21:17:45 GMT" }, { "version": "v2", "created": "Fri, 9 Apr 2010 05:06:05 GMT" } ]
2010-04-12T00:00:00
[ [ "Bhattacharyya", "Arnab", "" ], [ "Kopparty", "Swastik", "" ], [ "Schoenebeck", "Grant", "" ], [ "Sudan", "Madhu", "" ], [ "Zuckerman", "David", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.0646
Gerard Briscoe Dr
Gerard Briscoe and Suzanne Sadedin
Digital Business Ecosystems: Natural Science Paradigms
8 pages, 5 Figures
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A primary motivation for research in Digital Ecosystems is the desire to exploit the self-organising properties of natural ecosystems. Ecosystems arc thought to be robust, scalable architectures that can automatically solve complex, dynamic problems. However, the biological processes that contribute to these properties have not been made explicit in Digital Ecosystem research. Here, we introduce how biological properties contribute to the self-organising features of natural ecosystems. These properties include populations of evolving agents, a complex dynamic environment, and spatial distributions which generate local interactions. The potential for exploiting these properties in artificial systems is then considered.
[ { "version": "v1", "created": "Sun, 4 Oct 2009 22:09:18 GMT" } ]
2009-10-06T00:00:00
[ [ "Briscoe", "Gerard", "" ], [ "Sadedin", "Suzanne", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0910.0650
Himanshu Tyagi
Himanshu Tyagi
Capacity Region of a State Dependent Degraded Broadcast Channel with Noncausal Transmitter CSI
This paper has been withdrawn due to a mistake in the previous version
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn due to a mistake in the previous version.
[ { "version": "v1", "created": "Sun, 4 Oct 2009 22:54:15 GMT" }, { "version": "v2", "created": "Tue, 8 Dec 2009 03:09:37 GMT" } ]
2009-12-08T00:00:00
[ [ "Tyagi", "Himanshu", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.0651
Benjamin Recht
Benjamin Recht
A Simpler Approach to Matrix Completion
13 pages. Fixed typos. Added references
null
null
null
cs.IT cs.NA math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides the best bounds to date on the number of randomly sampled entries required to reconstruct an unknown low rank matrix. These results improve on prior work by Candes and Recht, Candes and Tao, and Keshavan, Montanari, and Oh. The reconstruction is accomplished by minimizing the nuclear norm, or sum of the singular values, of the hidden matrix subject to agreement with the provided entries. If the underlying matrix satisfies a certain incoherence condition, then the number of entries required is equal to a quadratic logarithmic factor times the number of parameters in the singular value decomposition. The proof of this assertion is short, self contained, and uses very elementary analysis. The novel techniques herein are based on recent work in quantum information theory.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 17:48:42 GMT" }, { "version": "v2", "created": "Wed, 21 Oct 2009 16:23:52 GMT" } ]
2009-10-21T00:00:00
[ [ "Recht", "Benjamin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0910.0653
Himanshu Tyagi
Himanshu Tyagi and Prakash Narayan
The Gelfand-Pinsker Channel: Strong Converse and Upper Bound for the Reliability Function
4 pages, Presented at the ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a Gelfand-Pinsker discrete memoryless channel (DMC) model and provide a strong converse for its capacity. The strong converse is then used to obtain an upper bound on the reliability function. Instrumental in our proofs is a new technical lemma which provides an upper bound for the rate of codes with codewords that are conditionally typical over large message dependent subsets of a typical set of state sequences. This technical result is a nonstraightforward analog of a known result for a DMC without states that provides an upper bound on the rate of a good code with codewords of a fixed type (to be found in, for instance, the Csiszar-Korner book).
[ { "version": "v1", "created": "Sun, 4 Oct 2009 23:31:19 GMT" } ]
2009-10-06T00:00:00
[ [ "Tyagi", "Himanshu", "" ], [ "Narayan", "Prakash", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.0663
Fei Wei
Fei Wei, Huazhong Yang
Transmission line inspires a new distributed algorithm to solve linear system of circuit
This work was finished in Nov 2007. Recently we are preparing it for IEEE Trans. CAD. More info, see my web page at http://weifei00.googlepages.com
null
null
null
cs.CE cs.DC cs.MS cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transmission line, or wire, is always troublesome to integrated circuits designers, but it could be helpful to parallel computing researchers. This paper proposes the Virtual Transmission Method (VTM), which is a new distributed and stationary iterative algorithm to solve the linear system extracted from circuit. It tears the circuit by virtual transmission lines to achieve distributed computing. For the symmetric positive definite (SPD) linear system, VTM is proved to be convergent. For the unsymmetrical linear system, numerical experiments show that VTM is possible to achieve better convergence property than the traditional stationary algorithms. VTM could be accelerated by some preconditioning techniques, and the convergence speed of VTM is fast when its preconditioner is properly chosen.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 03:08:43 GMT" }, { "version": "v2", "created": "Wed, 25 Nov 2009 09:42:47 GMT" }, { "version": "v3", "created": "Mon, 26 Apr 2010 09:17:58 GMT" }, { "version": "v4", "created": "Mon, 28 Jun 2010 06:48:46 GMT" }, { "version": "v5", "created": "Tue, 7 Sep 2010 23:43:49 GMT" }, { "version": "v6", "created": "Sun, 31 Oct 2010 02:42:32 GMT" }, { "version": "v7", "created": "Thu, 9 Dec 2010 08:33:24 GMT" } ]
2010-12-10T00:00:00
[ [ "Wei", "Fei", "" ], [ "Yang", "Huazhong", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0910.0665
Laszlo Kish
Lazar L. Kish, Bruce Zhang, Laszlo B. Kish
Cracking the Liu key exchange protocol in its most secure state with Lorentzian spectra
Accepted for publication at November 18, 2009
Fluctuation and Noise Letters Vol. 9, No. 1 (2010) 37-45
10.1142/S0219477510000058
null
physics.data-an cs.CR quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have found a security risk in the Liu's cypher based on random signals and feedback, when it utilizes a large class of noises for communication in its most secure state, the steady state. For the vulnerability to exist, the noise must have a spectrum which can be transformed to white-like noise by linear filtering. For the cracking, we utilize the natural properties of power density spectra and autocorrelation functions. We introduce and demonstrate the method for Lorentzian spectra. Some of the implications of the results concern the transient operation during changing bits, where the modulation products of noise cannot be band-limited therefore the cypher is vulnerable. We propose the application of line filters to provide a proper spectral shape and to improve the security.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 03:39:29 GMT" }, { "version": "v2", "created": "Tue, 6 Oct 2009 18:25:40 GMT" }, { "version": "v3", "created": "Tue, 6 Oct 2009 20:04:17 GMT" }, { "version": "v4", "created": "Mon, 19 Oct 2009 16:28:22 GMT" }, { "version": "v5", "created": "Wed, 18 Nov 2009 16:08:32 GMT" } ]
2010-05-02T00:00:00
[ [ "Kish", "Lazar L.", "" ], [ "Zhang", "Bruce", "" ], [ "Kish", "Laszlo B.", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0910.0668
Ahmed Abdel-Gawad
Yuan Qi, Ahmed H. Abdel-Gawad and Thomas P. Minka
Variable sigma Gaussian processes: An expectation propagation perspective
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gaussian processes (GPs) provide a probabilistic nonparametric representation of functions in regression, classification, and other problems. Unfortunately, exact learning with GPs is intractable for large datasets. A variety of approximate GP methods have been proposed that essentially map the large dataset into a small set of basis points. The most advanced of these, the variable-sigma GP (VSGP) (Walder et al., 2008), allows each basis point to have its own length scale. However, VSGP was only derived for regression. We describe how VSGP can be applied to classification and other problems, by deriving it as an expectation propagation algorithm. In this view, sparse GP approximations correspond to a KL-projection of the true posterior onto a compact exponential family of GPs. VSGP constitutes one such family, and we show how to enlarge this family to get additional accuracy. In particular, we show that endowing each basis point with its own full covariance matrix provides a significant increase in approximation power.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 03:30:13 GMT" }, { "version": "v2", "created": "Wed, 7 Oct 2009 21:52:48 GMT" } ]
2010-02-23T00:00:00
[ [ "Qi", "Yuan", "" ], [ "Abdel-Gawad", "Ahmed H.", "" ], [ "Minka", "Thomas P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0910.0674
Gerard Briscoe Dr
G. Briscoe and P. De Wilde
Computing of Applied Digital Ecosystems
8 pages, 10 figures, ACM Management of Emergent Digital EcoSystems (MEDES) 2009
null
null
null
cs.NE cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A primary motivation for our research in digital ecosystems is the desire to exploit the self-organising properties of biological ecosystems. Ecosystems are thought to be robust, scalable architectures that can automatically solve complex, dynamic problems. However, the computing technologies that contribute to these properties have not been made explicit in digital ecosystems research. Here, we discuss how different computing technologies can contribute to providing the necessary self-organising features, including Multi-Agent Systems, Service-Oriented Architectures, and distributed evolutionary computing. The potential for exploiting these properties in digital ecosystems is considered, suggesting how several key features of biological ecosystems can be exploited in Digital Ecosystems, and discussing how mimicking these features may assist in developing robust, scalable self-organising architectures. An example architecture, the Digital Ecosystem, is considered in detail. The Digital Ecosystem is then measured experimentally through simulations, considering the self-organised diversity of its evolving agent populations relative to the user request behaviour.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 04:29:29 GMT" } ]
2009-10-06T00:00:00
[ [ "Briscoe", "G.", "" ], [ "De Wilde", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0910.0695
Gerard Henry Edmond Duchamp
L. Poinsot (LIPN), G. H. E. Duchamp (LIPN), S. Goodenough (LIPN), K. A. Penson (LPTL)
Statistics on Graphs, Exponential Formula and Combinatorial Physics
null
Journal of Nonlinear Systems and Applications 1, 1 (2010) 58-62
null
null
cs.DM cs.CE math.CO quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The concern of this paper is a famous combinatorial formula known under the name "exponential formula". It occurs quite naturally in many contexts (physics, mathematics, computer science). Roughly speaking, it expresses that the exponential generating function of a whole structure is equal to the exponential of those of connected substructures. Keeping this descriptive statement as a guideline, we develop a general framework to handle many different situations in which the exponential formula can be applied.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 08:44:47 GMT" }, { "version": "v2", "created": "Thu, 11 Feb 2010 07:24:04 GMT" } ]
2010-11-04T00:00:00
[ [ "Poinsot", "L.", "", "LIPN" ], [ "Duchamp", "G. H. E.", "", "LIPN" ], [ "Goodenough", "S.", "", "LIPN" ], [ "Penson", "K. A.", "", "LPTL" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0910.0703
Dmitry Lande
D.V. Lande A.A. Snarskii
Self-similarity properties in a queuing network model
5 pages, 5 figures
null
null
null
cs.NI cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper a model of subscriber telephone network based on the concept of cellular automata is elaborated. Some fractal properties inherent in the model are revealed that vary depending on parameters assigning its operation rules. The main advantage of the model in question is its compatibility with algorithmic methods - a finite set of formal rules, assigned on a finite set of elements (cells), allows precise realization in the form of algorithms.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 09:50:11 GMT" } ]
2009-10-06T00:00:00
[ [ "Snarskii", "D. V. Lande A. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.0708
Mugurel Ionut Andreica
Ciprian Mihai Dobre, Florin Pop, Alexandru Costan, Mugurel Ionut Andreica, Valentin Cristea
Robust Failure Detection Architecture for Large Scale Distributed Systems
null
Proc. of the 17th Intl. Conf. on Control Systems and Computer Science (CSCS), vol. 1, pp. 433-440, Bucharest, Romania, 26-29 May, 2009
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Failure detection is a fundamental building block for ensuring fault tolerance in large scale distributed systems. There are lots of approaches and implementations in failure detectors. Providing flexible failure detection in off-the-shelf distributed systems is difficult. In this paper we present an innovative solution to this problem. Our approach is based on adaptive, decentralized failure detectors, capable of working asynchronous and independent on the application flow. The proposed solution considers an architecture for the failure detectors, based on clustering, the use of a gossip-based algorithm for detection at local level and the use of a hierarchical structure among clusters of detectors along which traffic is channeled. The solution can scale to a large number of nodes, considers the QoS requirements of both applications and resources, and includes fault tolerance and system orchestration mechanisms, added in order to asses the reliability and availability of distributed systems.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 10:05:19 GMT" } ]
2009-10-06T00:00:00
[ [ "Dobre", "Ciprian Mihai", "" ], [ "Pop", "Florin", "" ], [ "Costan", "Alexandru", "" ], [ "Andreica", "Mugurel Ionut", "" ], [ "Cristea", "Valentin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.0733
Manar Mohaisen
Manar Mohaisen, KyungHi Chang
Co-Channel Interference Cancellation in OFDM Networks using Coordinated Symbol Repetition and Soft Decision MLE CCI Canceler
4 pages, 8 figures, IEEE International Conference on Signal Processing and Communications, 2007. ICSPC 2007
null
10.1109/ICSPC.2007.4728510
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new scheme of downlink co-channel interference (CCI) cancellation in OFDM cellular networks is introduced for users at the cell-edge. Coordinated symbol transmission between base stations (BS) is operated where the same symbol is transmitted from different BS on different sub-carriers. At the mobile station (MS) receiver, we introduce a soft decision maximum likelihood CCI canceler and a modified maximum ratio combining (M-MRC) to obtain an estimate of the transmitted symbols. Weights used in the combining method are derived from the channels coefficients between the cooperated BS and the MS. Simulations show that the proposed scheme works well under frequency-selective channels and frequency non-selective channels. A gain of 9 dB and 6 dB in SIR is obtained under multipath fading and flat-fading channels, respectively.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 11:38:36 GMT" } ]
2016-11-15T00:00:00
[ [ "Mohaisen", "Manar", "" ], [ "Chang", "KyungHi", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0910.0735
Erika De Francesco
Erika De Francesco, Salvatore Iiritano, Antonino Spagnolo, Marco Iannelli
A methodology for semi-automatic classification schema building
36 pages
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describe a methodology for semi-automatic classification schema definition (a classification schema is a taxonomy of categories useful for automatic document classification). The methodology is based on: (i) an extensional approach useful to create a typology starting from a document base, and (ii) an intensional approach to build the classification schema starting from the typology. The extensional approach uses clustering techniques to group together documents on the basis of a similarity measure, whereas the intensional approach uses different operations (aggregation, reduction, generalization specialization) to define classes. keywords: ontology, classification schema, fundamentum divisionis, cluster analysis classification task.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 11:44:54 GMT" } ]
2009-10-06T00:00:00
[ [ "De Francesco", "Erika", "" ], [ "Iiritano", "Salvatore", "" ], [ "Spagnolo", "Antonino", "" ], [ "Iannelli", "Marco", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0910.0747
Andrew Gacek
Andrew Gacek
A Framework for Specifying, Prototyping, and Reasoning about Computational Systems
PhD Thesis submitted September, 2009
null
null
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This thesis concerns the development of a framework that facilitates the design and analysis of formal systems. Specifically, this framework provides a specification language which supports the concise and direct description of formal systems, a mechanism for animating the specification language thereby producing prototypes of encoded systems, and a logic for proving properties of specifications and therefore of the systems they encode. A defining characteristic of the proposed framework is that it is based on two separate but closely intertwined logics: a specification logic that facilitates the description of computational structure and another logic that exploits the special characteristics of the specification logic to support reasoning about the computational behavior of systems that are described using it. Both logics embody a natural treatment of binding structure by using the lambda-calculus as a means for representing objects and by incorporating special mechanisms for working with such structure. By using this technique, they lift the treatment of binding from the object language into the domain of the relevant meta logic, thereby allowing the specification or analysis components to focus on the more essential logical aspects of the systems that are encoded. The primary contributions of these thesis are the development of a rich meta-logic called G with capabilities for sophisticated reasoning that includes induction and co-induction over high-level specifications of computations and with an associated cut-elimination result; an interactive reasoning system called Abella based on G; and several reasoning examples which demonstrate the expressiveness and naturalness of both G and Abella.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 12:36:17 GMT" }, { "version": "v2", "created": "Mon, 5 Oct 2009 20:06:19 GMT" } ]
2009-10-06T00:00:00
[ [ "Gacek", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0910.0750
Adrien Richard
Adrien Richard
Local negative circuits and fixed points in Boolean networks
19 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To each Boolean function F from {0,1}^n to itself and each point x in {0,1}^n, we associate the signed directed graph G_F(x) of order n that contains a positive (resp. negative) arc from j to i if the partial derivative of f_i with respect of x_j is positive (resp. negative) at point x. We then focus on the following open problem: Is the absence of a negative circuit in G_F(x) for all x in {0,1}^n a sufficient condition for F to have at least one fixed point? As main result, we settle this problem under the additional condition that, for all x in {0,1}^n, the out-degree of each vertex of G_F(x) is at most one.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 12:38:34 GMT" } ]
2009-10-06T00:00:00
[ [ "Richard", "Adrien", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.0767
Serena Bradde
M. Bailly-Bechet, S. Bradde, A. Braunstein, A. Flaxman, L. Foini, R. Zecchina
Clustering with shallow trees
11 pages, 7 figures
J. Stat. Mech. (2009) P12010
10.1088/1742-5468/2009/12/P12010
null
cond-mat.dis-nn cs.DS q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new method for hierarchical clustering based on the optimisation of a cost function over trees of limited depth, and we derive a message--passing method that allows to solve it efficiently. The method and algorithm can be interpreted as a natural interpolation between two well-known approaches, namely single linkage and the recently presented Affinity Propagation. We analyze with this general scheme three biological/medical structured datasets (human population based on genetic information, proteins based on sequences and verbal autopsies) and show that the interpolation technique provides new insight.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 14:13:25 GMT" }, { "version": "v2", "created": "Mon, 23 Nov 2009 15:44:29 GMT" } ]
2015-05-14T00:00:00
[ [ "Bailly-Bechet", "M.", "" ], [ "Bradde", "S.", "" ], [ "Braunstein", "A.", "" ], [ "Flaxman", "A.", "" ], [ "Foini", "L.", "" ], [ "Zecchina", "R.", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0910.0777
Brent Heeringa
Glencora Borradaile, Brent Heeringa, Gordon Wilfong
The Knapsack Problem with Neighbour Constraints
Full version of IWOCA 2011 paper
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a constrained version of the knapsack problem in which dependencies between items are given by the adjacencies of a graph. In the 1-neighbour knapsack problem, an item can be selected only if at least one of its neighbours is also selected. In the all-neighbours knapsack problem, an item can be selected only if all its neighbours are also selected. We give approximation algorithms and hardness results when the nodes have both uniform and arbitrary weight and profit functions, and when the dependency graph is directed and undirected.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 14:34:09 GMT" }, { "version": "v2", "created": "Fri, 26 Feb 2010 16:59:28 GMT" }, { "version": "v3", "created": "Mon, 11 Jul 2011 16:25:45 GMT" }, { "version": "v4", "created": "Tue, 27 Sep 2011 01:03:05 GMT" } ]
2011-09-28T00:00:00
[ [ "Borradaile", "Glencora", "" ], [ "Heeringa", "Brent", "" ], [ "Wilfong", "Gordon", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]