id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0909.5097
|
Barnaby Martin
|
Barnaby Martin (Durham University, UK.), Manuel Bodirsky (CNRS/LIX,
Ecole Polytechnique, France), Martin Hils (Equipe de Logique Mathematique,
Universite Paris Diderot - Paris 7, France)
|
On the Scope of the Universal-Algebraic Approach to Constraint
Satisfaction
|
Extended abstract appeared at 25th Symposium on Logic in Computer
Science (LICS 2010). This version will appear in the LMCS special issue
associated with LICS 2010
|
Logical Methods in Computer Science, Volume 8, Issue 3 (September
12, 2012) lmcs:674
|
10.2168/LMCS-8(3:13)2012
| null |
cs.LO cs.AI cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The universal-algebraic approach has proved a powerful tool in the study of
the complexity of CSPs. This approach has previously been applied to the study
of CSPs with finite or (infinite) omega-categorical templates, and relies on
two facts. The first is that in finite or omega-categorical structures A, a
relation is primitive positive definable if and only if it is preserved by the
polymorphisms of A. The second is that every finite or omega-categorical
structure is homomorphically equivalent to a core structure. In this paper, we
present generalizations of these facts to infinite structures that are not
necessarily omega-categorical. (This abstract has been severely curtailed by
the space constraints of arXiv -- please read the full abstract in the
article.) Finally, we present applications of our general results to the
description and analysis of the complexity of CSPs. In particular, we give
general hardness criteria based on the absence of polymorphisms that depend on
more than one argument, and we present a polymorphism-based description of
those CSPs that are first-order definable (and therefore can be solved in
polynomial time).
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 13:56:20 GMT"
},
{
"version": "v2",
"created": "Tue, 4 May 2010 16:02:00 GMT"
},
{
"version": "v3",
"created": "Fri, 28 Jan 2011 17:27:54 GMT"
},
{
"version": "v4",
"created": "Sat, 12 Nov 2011 19:04:55 GMT"
},
{
"version": "v5",
"created": "Tue, 11 Sep 2012 08:10:16 GMT"
},
{
"version": "v6",
"created": "Mon, 18 Mar 2013 13:25:19 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"Martin",
"Barnaby",
"",
"Durham University, UK."
],
[
"Bodirsky",
"Manuel",
"",
"CNRS/LIX,\n Ecole Polytechnique, France"
],
[
"Hils",
"Martin",
"",
"Equipe de Logique Mathematique,\n Universite Paris Diderot - Paris 7, France"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.5099
|
Nina Narodytska
|
George Katsirelos, Nina Narodytska, Toby Walsh
|
Breaking Generator Symmetry
| null | null | null | null |
cs.AI cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dealing with large numbers of symmetries is often problematic. One solution
is to focus on just symmetries that generate the symmetry group. Whilst there
are special cases where breaking just the symmetries in a generating set is
complete, there are also cases where no irredundant generating set eliminates
all symmetry. However, focusing on just generators improves tractability. We
prove that it is polynomial in the size of the generating set to eliminate all
symmetric solutions, but NP-hard to prune all symmetric values. Our proof
considers row and column symmetry, a common type of symmetry in matrix models
where breaking just generator symmetries is very effective. We show that
propagating a conjunction of lexicographical ordering constraints on the rows
and columns of a matrix of decision variables is NP-hard.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 14:15:07 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Katsirelos",
"George",
""
],
[
"Narodytska",
"Nina",
""
],
[
"Walsh",
"Toby",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.5119
|
Marios Kountouris
|
Jeffrey G. Andrews, Steven Weber, Marios Kountouris, Martin Haenggi
|
Random Access Transport Capacity
|
Submitted to IEEE Trans. on Wireless Communications, Sept. 2009
| null |
10.1109/TWC.2010.06.091432
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop a new metric for quantifying end-to-end throughput in multihop
wireless networks, which we term random access transport capacity, since the
interference model presumes uncoordinated transmissions. The metric quantifies
the average maximum rate of successful end-to-end transmissions, multiplied by
the communication distance, and normalized by the network area. We show that a
simple upper bound on this quantity is computable in closed-form in terms of
key network parameters when the number of retransmissions is not restricted and
the hops are assumed to be equally spaced on a line between the source and
destination. We also derive the optimum number of hops and optimal per hop
success probability and show that our result follows the well-known square root
scaling law while providing exact expressions for the preconstants as well.
Numerical results demonstrate that the upper bound is accurate for the purpose
of determining the optimal hop count and success (or outage) probability.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 16:34:00 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Andrews",
"Jeffrey G.",
""
],
[
"Weber",
"Steven",
""
],
[
"Kountouris",
"Marios",
""
],
[
"Haenggi",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.5120
|
George Amariucai
|
George Amariucai and Shuangqing Wei
|
Feedback-Based Collaborative Secrecy Encoding over Binary Symmetric
Channels
|
Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we propose a feedback scheme for transmitting secret messages
between two legitimate parties, over an eavesdropped communication link.
Relative to Wyner's traditional encoding scheme \cite{wyner1}, our
feedback-based encoding often yields larger rate-equivocation regions and
achievable secrecy rates. More importantly, by exploiting the channel
randomness inherent in the feedback channels, our scheme achieves a strictly
positive secrecy rate even when the eavesdropper's channel is less noisy than
the legitimate receiver's channel. All channels are modeled as binary and
symmetric (BSC). We demonstrate the versatility of our feedback-based encoding
method by using it in three different configurations: the stand-alone
configuration, the mixed configuration (when it combines with Wyner's scheme
\cite{wyner1}), and the reversed configuration. Depending on the channel
conditions, significant improvements over Wyner's secrecy capacity can be
observed in all configurations.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 15:45:18 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Amariucai",
"George",
""
],
[
"Wei",
"Shuangqing",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.5146
|
Hagai Cohen
|
Hagai Cohen and Ely Porat
|
Fast Set Intersection and Two Patterns Matching
|
9 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present a new problem, the fast set intersection problem,
which is to preprocess a collection of sets in order to efficiently report the
intersection of any two sets in the collection. In addition we suggest new
solutions for the two-dimensional substring indexing problem and the document
listing problem for two patterns by reduction to the fast set intersection
problem.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 17:13:56 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Jan 2010 19:45:57 GMT"
},
{
"version": "v3",
"created": "Thu, 11 Mar 2010 17:07:48 GMT"
}
] | 2010-03-12T00:00:00 |
[
[
"Cohen",
"Hagai",
""
],
[
"Porat",
"Ely",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.5166
|
Rdv Ijcsis
|
Neelu Khare, Neeru Adlakha, K. R. Pardasani
|
An Algorithm for Mining Multidimensional Fuzzy Association Rules
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 72-76, September 2009, USA
| null |
ISSN 1947 5500
|
cs.IR cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multidimensional association rule mining searches for interesting
relationship among the values from different dimensions or attributes in a
relational database. In this method the correlation is among set of dimensions
i.e., the items forming a rule come from different dimensions. Therefore each
dimension should be partitioned at the fuzzy set level. This paper proposes a
new algorithm for generating multidimensional association rules by utilizing
fuzzy sets. A database consisting of fuzzy transactions, the Apriory property
is employed to prune the useless candidates, itemsets.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 18:44:30 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Khare",
"Neelu",
""
],
[
"Adlakha",
"Neeru",
""
],
[
"Pardasani",
"K. R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.5175
|
Raghu Meka
|
Prahladh Harsha, Adam Klivans, Raghu Meka
|
Bounding the Sensitivity of Polynomial Threshold Functions
|
Fixed an important flaw. Some proofs are simplified from last version
|
Theory of Computing, 10(1):1-26, 2013
|
10.4086/toc.2014.v010a001
| null |
cs.CC cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give the first non-trivial upper bounds on the average sensitivity and
noise sensitivity of polynomial threshold functions. More specifically, for a
Boolean function f on n variables equal to the sign of a real, multivariate
polynomial of total degree d we prove
1) The average sensitivity of f is at most O(n^{1-1/(4d+6)}) (we also give a
combinatorial proof of the bound O(n^{1-1/2^d}).
2) The noise sensitivity of f with noise rate \delta is at most
O(\delta^{1/(4d+6)}).
Previously, only bounds for the linear case were known. Along the way we show
new structural theorems about random restrictions of polynomial threshold
functions obtained via hypercontractivity. These structural results may be of
independent interest as they provide a generic template for transforming
problems related to polynomial threshold functions defined on the Boolean
hypercube to polynomial threshold functions defined in Gaussian space.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 19:55:46 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Sep 2009 02:35:36 GMT"
},
{
"version": "v3",
"created": "Wed, 30 Sep 2009 05:34:34 GMT"
},
{
"version": "v4",
"created": "Mon, 9 Nov 2009 23:23:19 GMT"
}
] | 2014-03-28T00:00:00 |
[
[
"Harsha",
"Prahladh",
""
],
[
"Klivans",
"Adam",
""
],
[
"Meka",
"Raghu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0909.5177
|
Godwin Shen
|
Godwin Shen and Antonio Ortega
|
Transform-based Distributed Data Gathering
| null | null |
10.1109/TSP.2010.2047640
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A general class of unidirectional transforms is presented that can be
computed in a distributed manner along an arbitrary routing tree. Additionally,
we provide a set of conditions under which these transforms are invertible.
These transforms can be computed as data is routed towards the collection (or
sink) node in the tree and exploit data correlation between nodes in the tree.
Moreover, when used in wireless sensor networks, these transforms can also
leverage data received at nodes via broadcast wireless communications. Various
constructions of unidirectional transforms are also provided for use in data
gathering in wireless sensor networks. New wavelet transforms are also proposed
which provide significant improvements over existing unidirectional transforms.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 19:57:13 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Sep 2009 21:22:24 GMT"
},
{
"version": "v3",
"created": "Wed, 27 Jan 2010 07:38:33 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Shen",
"Godwin",
""
],
[
"Ortega",
"Antonio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0909.5179
|
Moshe Mishali
|
Moshe Mishali and Yonina C. Eldar
|
Expected RIP: Conditioning of The Modulated Wideband Converter
|
5 pages, 2 figures, to appear ITW'09
| null | null |
CCIT Report #736 July-09, EE Pub No. 1693, EE Dept., Technion -
Israel Institute of Technology
|
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The sensing matrix of a compressive system impacts the stability of the
associated sparse recovery problem. In this paper, we study the sensing matrix
of the modulated wideband converter, a recently proposed system for sub-Nyquist
sampling of analog sparse signals. Attempting to quantify the conditioning of
the converter sensing matrix with existing approaches leads to unreasonable
rate requirements, due to the relatively small size of this matrix. We propose
a new conditioning criterion, named the expected restricted isometry property,
and derive theoretical guarantees for the converter to satisfy this property.
We then show that applying these conditions to popular binary sequences, such
as maximal codes or Gold codes, leads to practical rate requirements.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 19:58:59 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Mishali",
"Moshe",
""
],
[
"Eldar",
"Yonina C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.5216
|
Vincent Tan
|
Vincent Y. F. Tan, Animashree Anandkumar and Alan S. Willsky
|
Learning Gaussian Tree Models: Analysis of Error Exponents and Extremal
Structures
|
Submitted to Transactions on Signal Processing
|
IEEE Transactions on Signal Processing, May 2010, Volume: 58
Issue:5, pages 2701 - 2714
|
10.1109/TSP.2010.2042478
| null |
stat.ML cs.IT math.IT math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of learning tree-structured Gaussian graphical models from
independent and identically distributed (i.i.d.) samples is considered. The
influence of the tree structure and the parameters of the Gaussian distribution
on the learning rate as the number of samples increases is discussed.
Specifically, the error exponent corresponding to the event that the estimated
tree structure differs from the actual unknown tree structure of the
distribution is analyzed. Finding the error exponent reduces to a least-squares
problem in the very noisy learning regime. In this regime, it is shown that the
extremal tree structure that minimizes the error exponent is the star for any
fixed set of correlation coefficients on the edges of the tree. If the
magnitudes of all the correlation coefficients are less than 0.63, it is also
shown that the tree structure that maximizes the error exponent is the Markov
chain. In other words, the star and the chain graphs represent the hardest and
the easiest structures to learn in the class of tree-structured Gaussian
graphical models. This result can also be intuitively explained by correlation
decay: pairs of nodes which are far apart, in terms of graph distance, are
unlikely to be mistaken as edges by the maximum-likelihood estimator in the
asymptotic regime.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 20:49:32 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Jan 2010 02:26:58 GMT"
}
] | 2010-05-06T00:00:00 |
[
[
"Tan",
"Vincent Y. F.",
""
],
[
"Anandkumar",
"Animashree",
""
],
[
"Willsky",
"Alan S.",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0909.5224
|
Charilaos Efthymiou
|
Charilaos Efthymiou
|
Deterministic counting of graph colourings using sequences of subgraphs
| null |
Combinator. Probab. Comp. 29 (2020) 555-586
|
10.1017/S0963548320000255
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we propose a deterministic algorithm for approximately counting
the $k$-colourings of sparse random graphs $G(n,d/n)$. In particular, our
algorithm computes in polynomial time a $(1\pm n^{-\Omega(1)})$approximation of
the logarithm of the number of $k$-colourings of $G(n,d/n)$ for $k\geq
(2+\epsilon) d$ with high probability over the graph instances.
Our algorithm is related to the algorithms of A. Bandyopadhyay et al. in SODA
'06, and A. Montanari et al. in SODA '06, i.e. it uses {\em spatial correlation
decay} to compute {\em deterministically} marginals of {\em Gibbs
distribution}. We develop a scheme whose accuracy depends on {\em
non-reconstruction} of the colourings of $G(n,d/n)$, rather than {\em
uniqueness} that are required in previous works. This leaves open the
possibility for our schema to be sufficiently accurate even for $k<d$.
The set up for establishing correlation decay is as follows: Given
$G(n,d/n)$, we alter the graph structure in some specific region $\Lambda$ of
the graph by deleting edges between vertices of $\Lambda$. Then we show that
the effect of this change on the marginals of Gibbs distribution, diminishes as
we move away from $\Lambda$. Our approach is novel and suggests a new context
for the study of deterministic counting algorithms.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 21:41:07 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Apr 2010 16:22:15 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Dec 2010 16:12:51 GMT"
},
{
"version": "v4",
"created": "Tue, 11 Jun 2013 19:20:40 GMT"
}
] | 2020-08-12T00:00:00 |
[
[
"Efthymiou",
"Charilaos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.5263
|
Przemyslaw Pawelczak
|
Jinglong Zhou, Vijay S. Rao, Przemys{\l}aw Pawe{\l}czak, Daniel Wu,
and Prasant Mohapatra
|
Practical Rate and Route Adaptation with Efficient Link Quality
Estimation for IEEE 802.11b/g Multi-Hop Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Accurate and fast packet delivery rate (PDR) estimation, used in evaluating
wireless link quality, is a prerequisite to increase the performance of mobile,
multi-hop and multi-rate wireless ad hoc networks. Unfortunately, contemporary
PDR estimation methods, i.e. beacon-based packet counting in Estimated
Transmission Time and Expected Transmission Count metrics, have unsatisfactory
performance. Therefore, in this paper we propose a novel PDR estimation method
based on SNR profiles. We classify all possible link quality estimation methods
and compare them analytically against our design. Results show that it leads to
a more efficient link quality estimation. Further investigations with the
prototype implementation of our method in IEEE 802.11b/g testbeds reveal that
the accuracy of PDR estimation in mobile scenarios can be improved up to 50% in
comparison to generic packet-based PDR. Experiments with the same prototype on
link and routing layers for different measurement scenarios show that it leads
to a better rate adaptation and route selection in the form of end-to-end
throughput increase compared to traditional packet counting methods.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 04:25:43 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Feb 2010 09:04:42 GMT"
}
] | 2010-02-18T00:00:00 |
[
[
"Zhou",
"Jinglong",
""
],
[
"Rao",
"Vijay S.",
""
],
[
"Pawełczak",
"Przemysław",
""
],
[
"Wu",
"Daniel",
""
],
[
"Mohapatra",
"Prasant",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.5268
|
Bikash Kumar Dey
|
Sagar Shenvi and Bikash Kumar Dey
|
A Simple Necessary and Sufficient Condition for the Double Unicast
Problem
|
5 pages, 6 figures. Revised Version. Final manuscript for ICC 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a directed acyclic network where there are two source-terminal
pairs and the terminals need to receive the symbols generated at the respective
sources. Each source independently generates an i.i.d. random process over the
same alphabet. Each edge in the network is error-free, delay-free, and can
carry one symbol from the alphabet per use. We give a simple necessary and
sufficient condition for being able to simultaneously satisfy the unicast
requirements of the two source-terminal pairs at rate-pair $(1,1)$ using vector
network coding. The condition is also sufficient for doing this using only
"XOR" network coding and is much simpler compared to the necessary and
sufficient conditions known from previous work. Our condition also yields a
simple characterization of the capacity region of a double-unicast network
which does not support the rate-pair $(1,1)$.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 06:15:14 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Oct 2009 11:47:48 GMT"
},
{
"version": "v3",
"created": "Thu, 4 Feb 2010 16:52:04 GMT"
}
] | 2010-02-04T00:00:00 |
[
[
"Shenvi",
"Sagar",
""
],
[
"Dey",
"Bikash Kumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.5271
|
Kees Middelburg
|
J. A. Bergstra, C. A. Middelburg
|
Partial Komori fields and imperative Komori fields
|
10 pages
| null | null |
PRG0911
|
math.RA cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is concerned with the status of 1/0 and ways to deal with it.
These matters are treated in the setting of Komori fields, also known as
non-trivial cancellation meadows. Different viewpoints on the status of 1/0
exist in mathematics and theoretical computer science. We give a simple account
of how mathematicians deal with 1/0 in which a customary convention among
mathematicians plays a prominent part, and we make plausible that a convincing
account, starting from the popular computer science viewpoint that 1/0 is
undefined, by means of some logic of partial functions is not attainable.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 06:10:03 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.5278
|
Yngve Villanger
|
Fedor V. Fomin and Yngve Villanger
|
Finding Induced Subgraphs via Minimal Triangulations
|
14 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Potential maximal cliques and minimal separators are combinatorial objects
which were introduced and studied in the realm of minimal triangulations
problems including Minimum Fill-in and Treewidth. We discover unexpected
applications of these notions to the field of moderate exponential algorithms.
In particular, we show that given an n-vertex graph G together with its set of
potential maximal cliques Pi_G, and an integer t, it is possible in time |Pi_G|
* n^(O(t)) to find a maximum induced subgraph of treewidth t in G; and for a
given graph F of treewidth t, to decide if G contains an induced subgraph
isomorphic to F. Combined with an improved algorithm enumerating all potential
maximal cliques in time O(1.734601^n), this yields that both problems are
solvable in time 1.734601^n * n^(O(t)).
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 07:13:39 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Dec 2009 09:55:02 GMT"
}
] | 2009-12-22T00:00:00 |
[
[
"Fomin",
"Fedor V.",
""
],
[
"Villanger",
"Yngve",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.5293
|
Haris Aziz
|
Haris Aziz, Oded Lachish, Mike Paterson and Rahul Savani
|
Wiretapping a hidden network
| null | null | null | null |
cs.GT cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of maximizing the probability of hitting a
strategically chosen hidden virtual network by placing a wiretap on a single
link of a communication network. This can be seen as a two-player win-lose
(zero-sum) game that we call the wiretap game. The value of this game is the
greatest probability that the wiretapper can secure for hitting the virtual
network. The value is shown to equal the reciprocal of the strength of the
underlying graph.
We efficiently compute a unique partition of the edges of the graph, called
the prime-partition, and find the set of pure strategies of the hider that are
best responses against every maxmin strategy of the wiretapper. Using these
special pure strategies of the hider, which we call
omni-connected-spanning-subgraphs, we define a partial order on the elements of
the prime-partition. From the partial order, we obtain a linear number of
simple two-variable inequalities that define the maxmin-polytope, and a
characterization of its extreme points.
Our definition of the partial order allows us to find all equilibrium
strategies of the wiretapper that minimize the number of pure best responses of
the hider. Among these strategies, we efficiently compute the unique strategy
that maximizes the least punishment that the hider incurs for playing a pure
strategy that is not a best response. Finally, we show that this unique
strategy is the nucleolus of the recently studied simple cooperative spanning
connectivity game.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 08:51:42 GMT"
},
{
"version": "v2",
"created": "Sun, 4 Oct 2009 16:48:08 GMT"
}
] | 2009-10-04T00:00:00 |
[
[
"Aziz",
"Haris",
""
],
[
"Lachish",
"Oded",
""
],
[
"Paterson",
"Mike",
""
],
[
"Savani",
"Rahul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.5310
|
Doha Hamza Mrs.
|
Doha Hamza, Mohammed Nafie
|
Cognitive Power Control Under Correlated Fading and Primary-Link CSI
|
5 pages, 4 figures, submitted to ICC 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the cognitive power control problem of maximizing the secondary
throughput under an outage probability constraint on a constant-power
constant-rate primary link. We assume a temporally correlated primary channel
with two types of feedback: perfect delayed channel state information (CSI) and
one-bit automatic repeat request (ARQ). We use channel correlation to enhance
the primary and secondary throughput via exploiting the CSI feedback to predict
the future primary channel gain. We provide a numerical solution for the power
control optimization problem under delayed CSI. In order to make the solution
tractable under ARQ-CSI, we re-formulate the cognitive power control problem as
the maximization of the instantaneous weighted sum of primary and secondary
throughput. We propose a greedy ARQ-CSI algorithm that is shown to achieve an
average throughput comparable to that attained under the delayed-CSI algorithm,
which we solve optimally.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 11:50:40 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Hamza",
"Doha",
""
],
[
"Nafie",
"Mohammed",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.5313
|
Srikanth Srinivasan
|
Vikraman Arvind and Srikanth Srinivasan
|
The Remote Point Problem, Small Bias Space, and Expanding Generator Sets
|
accepted to STACS 2010, conference version, 16 pages
| null | null | null |
cs.CC cs.DS
|
http://creativecommons.org/licenses/by/3.0/
|
Using $\epsilon$-bias spaces over $F_2$, we show that the Remote Point
Problem (RPP), introduced by Alon et al [APY09], has an $NC^2$ algorithm
(achieving the same parameters as [APY09]). We study a generalization of the
Remote Point Problem to groups: we replace $F^n$ by $G^n$ for an arbitrary
fixed group $G$. When $G$ is Abelian, we give an $NC^2$ algorithm for RPP,
again using $\epsilon$-bias spaces. For nonabelian $G$, we give a deterministic
polynomial-time algorithm for RPP. We also show the connection to construction
of expanding generator sets for the group $G^n$. All our algorithms for the RPP
achieve essentially the same parameters as [APY09].
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 11:21:20 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Jan 2010 09:39:36 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Feb 2010 08:31:44 GMT"
}
] | 2010-02-03T00:00:00 |
[
[
"Arvind",
"Vikraman",
""
],
[
"Srinivasan",
"Srikanth",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.5365
|
Uri Nadav
|
Vahab Mirrokni, S. Muthukrishnan, Uri Nadav
|
Quasi-Proportional Mechanisms: Prior-free Revenue Maximization
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Inspired by Internet ad auction applications, we study the problem of
allocating a single item via an auction when bidders place very different
values on the item. We formulate this as the problem of prior-free auction and
focus on designing a simple mechanism that always allocates the item. Rather
than designing sophisticated pricing methods like prior literature, we design
better allocation methods. In particular, we propose quasi-proportional
allocation methods in which the probability that an item is allocated to a
bidder depends (quasi-proportionally) on the bids.
We prove that corresponding games for both all-pay and winners-pay
quasi-proportional mechanisms admit pure Nash equilibria and this equilibrium
is unique. We also give an algorithm to compute this equilibrium in polynomial
time. Further, we show that the revenue of the auctioneer is promisingly high
compared to the ultimate, i.e., the highest value of any of the bidders, and
show bounds on the revenue of equilibria both analytically, as well as using
experiments for specific quasi-proportional functions. This is the first known
revenue analysis for these natural mechanisms (including the special case of
proportional mechanism which is common in network resource allocation
problems).
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 15:33:27 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Mirrokni",
"Vahab",
""
],
[
"Muthukrishnan",
"S.",
""
],
[
"Nadav",
"Uri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0909.5388
|
Erik Demaine
|
Nadia Benbernou, Erik D. Demaine, Martin L. Demaine, Aviv Ovadya
|
A Universal Crease Pattern for Folding Orthogonal Shapes
|
7 pages, 4 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a universal crease pattern--known in geometry as the tetrakis
tiling and in origami as box pleating--that can fold into any object made up of
unit cubes joined face-to-face (polycubes). More precisely, there is one
universal finite crease pattern for each number n of unit cubes that need to be
folded. This result contrasts previous universality results for origami, which
require a different crease pattern for each target object, and confirms
intuition in the origami community that box pleating is a powerful design
technique.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 19:32:57 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Benbernou",
"Nadia",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Ovadya",
"Aviv",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0909.5393
|
Kusum Lata
|
Kusum Lata, H S Jamadagni
|
Formal Verification of Full-Wave Rectifier: A Case Study
|
The IEEE 8th International Conference on ASIC (IEEE ASICON 2009),
October 20-23 2009, Changsha, China
| null |
10.1109/ASICON.2009.5351239
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a case study of formal verification of full-wave rectifier for
analog and mixed signal designs. We have used the Checkmate tool from CMU [1],
which is a public domain formal verification tool for hybrid systems. Due to
the restriction imposed by Checkmate it necessitates to make the changes in the
Checkmate implementation to implement the complex and non-linear system.
Full-wave rectifier has been implemented by using the Checkmate custom blocks
and the Simulink blocks from MATLAB from Math works. After establishing the
required changes in the Checkmate implementation we are able to efficiently
verify the safety properties of the full-wave rectifier.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 17:37:34 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Lata",
"Kusum",
""
],
[
"Jamadagni",
"H S",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.5413
|
Rio Yokota Dr.
|
Rio Yokota, L. A. Barba, Matthew G. Knepley
|
PetRBF--A parallel O(N) algorithm for radial basis function
interpolation
|
Submitted to Computer Methods in Applied Mechanics and Engineering
|
Computer Methods in Applied Mechanics and Engineering, 199(25-28),
pp. 1793-1804, 2010
|
10.1016/j.cma.2010.02.008
| null |
cs.MS cs.DC cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We have developed a parallel algorithm for radial basis function (RBF)
interpolation that exhibits O(N) complexity,requires O(N) storage, and scales
excellently up to a thousand processes. The algorithm uses a GMRES iterative
solver with a restricted additive Schwarz method (RASM) as a preconditioner and
a fast matrix-vector algorithm. Previous fast RBF methods, --,achieving at most
O(NlogN) complexity,--, were developed using multiquadric and polyharmonic
basis functions. In contrast, the present method uses Gaussians with a small
variance (a common choice in particle methods for fluid simulation, our main
target application). The fast decay of the Gaussian basis function allows rapid
convergence of the iterative solver even when the subdomains in the RASM are
very small. The present method was implemented in parallel using the PETSc
library (developer version). Numerical experiments demonstrate its capability
in problems of RBF interpolation with more than 50 million data points, timing
at 106 seconds (19 iterations for an error tolerance of 10^-15 on 1024
processors of a Blue Gene/L (700 MHz PowerPC processors). The parallel code is
freely available in the open-source model.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 19:27:51 GMT"
}
] | 2011-09-21T00:00:00 |
[
[
"Yokota",
"Rio",
""
],
[
"Barba",
"L. A.",
""
],
[
"Knepley",
"Matthew G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0909.5417
|
Joey Wilson
|
Joey Wilson and Neal Patwari
|
Through-Wall Tracking Using Variance-Based Radio Tomography Networks
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a new method for imaging, localizing, and tracking motion
behind walls in real-time. The method takes advantage of the motion-induced
variance of received signal strength measurements made in a wireless
peer-to-peer network. Using a multipath channel model, we show that the signal
strength on a wireless link is largely dependent on the power contained in
multipath components that travel through space containing moving objects. A
statistical model relating variance to spatial locations of movement is
presented and used as a framework for the estimation of a motion image. From
the motion image, the Kalman filter is applied to recursively track the
coordinates of a moving target. Experimental results for a 34-node through-wall
imaging and tracking system over a 780 square foot area are presented.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 20:33:31 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Oct 2009 21:14:14 GMT"
}
] | 2009-10-02T00:00:00 |
[
[
"Wilson",
"Joey",
""
],
[
"Patwari",
"Neal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0909.5424
|
Chinmay Vaze
|
Chinmay S. Vaze and Mahesh K. Varanasi
|
The Degrees of Freedom Regions of MIMO Broadcast, Interference, and
Cognitive Radio Channels with No CSIT
|
49 pages, 11 figures, under review, IEEE Trans. Inform. Th. Submitted
Sept. 2009, Revised Jan. 2011
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The degrees of freedom (DoF) regions are characterized for the multiple-input
multiple-output (MIMO) broadcast channel (BC), interference channels (IC)
(including X and multi-hop interference channels) and the cognitive radio
channel (CRC), when there is perfect and no channel state information at the
receivers and the transmitter(s) (CSIR and CSIT), respectively. For the K-user
MIMO BC, the exact characterization of the DoF region is obtained, which shows
that a simple time-division-based transmission scheme is DoF-region optimal.
Using the techniques developed for the MIMO BC, the corresponding problems for
the two-user MIMO IC and the CRC are addressed. For both of these channels,
inner and outer bounds to the DoF region are obtained and are seen to coincide
for a vast majority of the relative numbers of antennas at the four terminals,
thereby characterizing DoF regions for all but a few cases. Finally, the DoF
regions of the $K$-user MIMO IC, the CRC, and X networks are derived for
certain classes of these networks, including the one where all transmitters
have an equal number of antennas and so do all receivers. The results of this
paper are derived for distributions of fading channel matrices and additive
noises that are more general than those considered in other simultaneous
related works. The DoF regions with and without CSIT are compared and
conditions on the relative numbers of antennas at the terminals under which a
lack of CSIT does, or does not, result in the loss of DoF are identified,
thereby providing, on the one hand, simple and robust communication schemes
that don't require CSIT but have the same DoF performance as their previously
found CSIT counterparts, and on the other hand, identifying situations where
CSI feedback to transmitters would provide gains that are significant enough
that even the DoF performance could be improved.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 19:59:16 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Oct 2009 16:36:27 GMT"
},
{
"version": "v3",
"created": "Sun, 23 Jan 2011 06:03:41 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Vaze",
"Chinmay S.",
""
],
[
"Varanasi",
"Mahesh K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.5450
|
Cihan Tepedelenlioglu
|
Cihan Tepedelenlioglu and Adarsh B. Narasimhamurthy
|
Robust Distributed Estimation over Multiple Access Channels with
Constant Modulus Signaling
|
28 pages, 10 figures, submitted to IEEE Transactions on Signal
Processing for consideration
| null |
10.1109/TSP.2010.2051432
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A distributed estimation scheme where the sensors transmit with constant
modulus signals over a multiple access channel is considered. The proposed
estimator is shown to be strongly consistent for any sensing noise distribution
in the i.i.d. case both for a per-sensor power constraint, and a total power
constraint. When the distributions of the sensing noise are not identical, a
bound on the variances is shown to establish strong consistency. The estimator
is shown to be asymptotically normal with a variance (AsV) that depends on the
characteristic function of the sensing noise. Optimization of the AsV is
considered with respect to a transmission phase parameter for a variety of
noise distributions exhibiting differing levels of impulsive behavior. The
robustness of the estimator to impulsive sensing noise distributions such as
those with positive excess kurtosis, or those that do not have finite moments
is shown. The proposed estimator is favorably compared with the amplify and
forward scheme under an impulsive noise scenario. The effect of fading is shown
to not affect the consistency of the estimator, but to scale the asymptotic
variance by a constant fading penalty depending on the fading statistics.
Simulations corroborate our analytical results.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 21:35:28 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Tepedelenlioglu",
"Cihan",
""
],
[
"Narasimhamurthy",
"Adarsh B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.5457
|
Prateek Jain
|
Raghu Meka, Prateek Jain, Inderjit S. Dhillon
|
Guaranteed Rank Minimization via Singular Value Projection
|
An earlier version of this paper was submitted to NIPS-2009 on June
5, 2009
| null | null | null |
cs.LG cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Minimizing the rank of a matrix subject to affine constraints is a
fundamental problem with many important applications in machine learning and
statistics. In this paper we propose a simple and fast algorithm SVP (Singular
Value Projection) for rank minimization with affine constraints (ARMP) and show
that SVP recovers the minimum rank solution for affine constraints that satisfy
the "restricted isometry property" and show robustness of our method to noise.
Our results improve upon a recent breakthrough by Recht, Fazel and Parillo
(RFP07) and Lee and Bresler (LB09) in three significant ways:
1) our method (SVP) is significantly simpler to analyze and easier to
implement,
2) we give recovery guarantees under strictly weaker isometry assumptions
3) we give geometric convergence guarantees for SVP even in presense of noise
and, as demonstrated empirically, SVP is significantly faster on real-world and
synthetic problems.
In addition, we address the practically important problem of low-rank matrix
completion (MCP), which can be seen as a special case of ARMP. We empirically
demonstrate that our algorithm recovers low-rank incoherent matrices from an
almost optimal number of uniformly sampled entries. We make partial progress
towards proving exact recovery and provide some intuition for the strong
performance of SVP applied to matrix completion by showing a more restricted
isometry property. Our algorithm outperforms existing methods, such as those of
\cite{RFP07,CR08,CT09,CCS08,KOM09,LB09}, for ARMP and the matrix-completion
problem by an order of magnitude and is also significantly more robust to
noise.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 14:44:54 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Oct 2009 19:32:44 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Oct 2009 21:21:57 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Meka",
"Raghu",
""
],
[
"Jain",
"Prateek",
""
],
[
"Dhillon",
"Inderjit S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.5458
|
Sheng Xu
|
Robert Sheng Xu, Oleg Michailovich, Magdy Salama
|
Information tracking approach to segmentation of ultrasound imagery of
prostate
|
27 pages, 7 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The size and geometry of the prostate are known to be pivotal quantities used
by clinicians to assess the condition of the gland during prostate cancer
screening. As an alternative to palpation, an increasing number of methods for
estimation of the above-mentioned quantities are based on using imagery data of
prostate. The necessity to process large volumes of such data creates a need
for automatic segmentation tools which would allow the estimation to be carried
out with maximum accuracy and efficiency. In particular, the use of transrectal
ultrasound (TRUS) imaging in prostate cancer screening seems to be becoming a
standard clinical practice due to the high benefit-to-cost ratio of this
imaging modality. Unfortunately, the segmentation of TRUS images is still
hampered by relatively low contrast and reduced SNR of the images, thereby
requiring the segmentation algorithms to incorporate prior knowledge about the
geometry of the gland. In this paper, a novel approach to the problem of
segmenting the TRUS images is described. The proposed approach is based on the
concept of distribution tracking, which provides a unified framework for
modeling and fusing image-related and morphological features of the prostate.
Moreover, the same framework allows the segmentation to be regularized via
using a new type of "weak" shape priors, which minimally bias the estimation
procedure, while rendering the latter stable and robust.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 22:39:19 GMT"
}
] | 2009-10-01T00:00:00 |
[
[
"Xu",
"Robert Sheng",
""
],
[
"Michailovich",
"Oleg",
""
],
[
"Salama",
"Magdy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0909.5460
|
Elad Shaked
|
E. Shaked and O. Michailovich
|
Iterative Shrinkage Approach to Restoration of Optical Imagery
|
19 pages, 7 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of reconstruction of digital images from their degraded
measurements is regarded as a problem of central importance in various fields
of engineering and imaging sciences. In such cases, the degradation is
typically caused by the resolution limitations of an imaging device in use
and/or by the destructive influence of measurement noise. Specifically, when
the noise obeys a Poisson probability law, standard approaches to the problem
of image reconstruction are based on using fixed-point algorithms which follow
the methodology first proposed by Richardson and Lucy. The practice of using
these methods, however, shows that their convergence properties tend to
deteriorate at relatively high noise levels. Accordingly, in the present paper,
a novel method for de-noising and/or de-blurring of digital images corrupted by
Poisson noise is introduced. The proposed method is derived under the
assumption that the image of interest can be sparsely represented in the domain
of a linear transform. Consequently, a shrinkage-based iterative procedure is
proposed, which guarantees the solution to converge to the global maximizer of
an associated maximum-a-posteriori criterion. It is shown in a series of both
computer-simulated and real-life experiments that the proposed method
outperforms a number of existing alternatives in terms of stability, precision,
and computational efficiency.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2009 22:33:10 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Jan 2010 17:00:21 GMT"
}
] | 2010-01-06T00:00:00 |
[
[
"Shaked",
"E.",
""
],
[
"Michailovich",
"O.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0909.5479
|
EPTCS
|
Evangelos Markakis (Athens University of Economics and Business),
Ioannis Milis (Athens University of Economics and Business)
|
Proceedings Fourth Athens Colloquium on Algorithms and Complexity
| null |
EPTCS 4, 2009
|
10.4204/EPTCS.4
| null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
ACAC 2009 is organized by the Athens University of Economics and Business
(AUEB) and it is the fourth in a series of meetings that aim to bring together
researchers working on all areas of the theory of algorithms and computational
complexity. These meetings are expected to serve as a lively forum for
presenting results that are in a preliminary stage or have been recently
presented in some major conference. For the first time this year all submitted
papers were reviewed and ACAC also offered to the authors the choice of
publishing their contribution (provided it has not been published anywhere else
before) with the post-proceedings of EPTCS (Electronic Proceedings in
Theoretical Computer Science).
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 02:05:28 GMT"
}
] | 2009-10-01T00:00:00 |
[
[
"Markakis",
"Evangelos",
"",
"Athens University of Economics and Business"
],
[
"Milis",
"Ioannis",
"",
"Athens University of Economics and Business"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.5507
|
Cuizhu Shi
|
Cuizhu Shi and Aditya Ramamoorthy
|
Fast Algorithm for Finding Unicast Capacity of Linear Deterministic
Wireless Relay Networks
|
27 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The deterministic channel model for wireless relay networks proposed by
Avestimehr, Diggavi and Tse `07 has captured the broadcast and inference nature
of wireless communications and has been widely used in approximating the
capacity of wireless relay networks. The authors generalized the max-flow
min-cut theorem to the linear deterministic wireless relay networks and
characterized the unicast capacity of such deterministic network as the minimum
rank of all the binary adjacency matrices describing source-destination cuts
whose number grows exponentially with the size of the network. In this paper,
we developed a fast algorithm for finding the unicast capacity of a linear
deterministic wireless relay network by finding the maximum number of linearly
independent paths using the idea of path augmentation. We developed a modified
depth-first search algorithm tailored for the linear deterministic relay
networks for finding linearly independent paths whose total number proved to
equal the unicast capacity of the underlying network. The result of our
algorithm suggests a capacity-achieving transmission strategy with one-bit
length linear encoding at the relay nodes in the concerned linear deterministic
wireless relay network. The correctness of our algorithm for universal cases is
given by our proof in the paper. Moreover, our algorithm has a computational
complexity bounded by $O(|{\cal{V}}_x|\cdot C^4+d\cdot |{\cal{V}}_x|\cdot C^3)$
which shows a significant improvement over the previous results for solving the
same problem by Amaudruz and Fragouli (whose complexity is bounded by $O(M\cdot
|{\cal{E}}|\cdot C^5)$ with $M\geq d$ and $|{\cal{E}}|\geq|{\cal{V}}_x|$) and
by Yazdi and Savari (whose complexity is bounded by $O(L^8\cdot M^{12}\cdot
h_0^3+L\cdot M^6\cdot C\cdot h_0^4)$ with $h_0\geq C$).
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 04:29:48 GMT"
}
] | 2009-10-01T00:00:00 |
[
[
"Shi",
"Cuizhu",
""
],
[
"Ramamoorthy",
"Aditya",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.5521
|
Prabhu Manyem
|
Prabhu Manyem
|
Clique and Vertex Cover are solvable in polynomial time if the input
structure is ordered and contains a successor predicate
|
The results are incorrect. If phi = phi_1 AND phi_2, and phi is a
Horn formula, it does NOT mean that both phi_1 and phi_2 are Horn formulae.
Furthermore, the cardinality constraint CANNOT be expressed as a universal
Horn sentence in ESO (NOT even when the structure is ordered)
| null | null | null |
cs.CC cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this manuscript, assuming that Graedel's 1991 results are correct (which
implies that bounds on the solution values for optimization problems can be
expressed in existential second order logic where the first order part is
universal Horn), I will show that Clique and Vertex Cover can be solved in
polynomial time if the input structure is ordered and contains a successor
predicate. In the last section, we will argue about the validity of Graedel's
1991 results. Update: Manuscript withdrawn, because results are incorrect. If
phi = phi_1 AND phi_2, and phi is a Horn formula, it does NOT mean that both
phi_1 and phi_2 are Horn formulae. Furthermore, the cardinality constraint
CANNOT be expressed as a universal Horn sentence in ESO (NOT even when the
structure is ordered).
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 06:34:47 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Dec 2009 11:16:32 GMT"
},
{
"version": "v3",
"created": "Sat, 2 Oct 2010 22:33:43 GMT"
},
{
"version": "v4",
"created": "Sat, 25 Jun 2022 23:13:48 GMT"
}
] | 2022-06-28T00:00:00 |
[
[
"Manyem",
"Prabhu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.5524
|
Alexandre Lung-Yut-Fong
|
Alexandre Lung-Yut-Fong (LTCI), C\'eline L\'evy-Leduc (LTCI), Olivier
Capp\'e (LTCI)
|
Distributed detection/localization of change-points in high-dimensional
network traffic data
|
Statistics and Computing (2011) 1-12
| null |
10.1007/s11222-011-9240-5
| null |
stat.AP cs.NI math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a novel approach for distributed statistical detection of
change-points in high-volume network traffic. We consider more specifically the
task of detecting and identifying the targets of Distributed Denial of Service
(DDoS) attacks. The proposed algorithm, called DTopRank, performs distributed
network anomaly detection by aggregating the partial information gathered in a
set of network monitors. In order to address massive data while limiting the
communication overhead within the network, the approach combines record
filtering at the monitor level and a nonparametric rank test for doubly
censored time series at the central decision site. The performance of the
DTopRank algorithm is illustrated both on synthetic data as well as from a
traffic trace provided by a major Internet service provider.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 06:37:21 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Sep 2011 16:58:16 GMT"
}
] | 2011-09-22T00:00:00 |
[
[
"Lung-Yut-Fong",
"Alexandre",
"",
"LTCI"
],
[
"Lévy-Leduc",
"Céline",
"",
"LTCI"
],
[
"Cappé",
"Olivier",
"",
"LTCI"
]
] |
[
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0909.5530
|
Xiaokui Xiao
|
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke
|
Differential Privacy via Wavelet Transforms
| null | null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Privacy preserving data publishing has attracted considerable research
interest in recent years. Among the existing solutions, {\em
$\epsilon$-differential privacy} provides one of the strongest privacy
guarantees. Existing data publishing methods that achieve
$\epsilon$-differential privacy, however, offer little data utility. In
particular, if the output dataset is used to answer count queries, the noise in
the query answers can be proportional to the number of tuples in the data,
which renders the results useless.
In this paper, we develop a data publishing technique that ensures
$\epsilon$-differential privacy while providing accurate answers for {\em
range-count queries}, i.e., count queries where the predicate on each attribute
is a range. The core of our solution is a framework that applies {\em wavelet
transforms} on the data before adding noise to it. We present instantiations of
the proposed framework for both ordinal and nominal data, and we provide a
theoretical analysis on their privacy and utility guarantees. In an extensive
experimental study on both real and synthetic data, we show the effectiveness
and efficiency of our solution.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 07:16:38 GMT"
}
] | 2009-10-01T00:00:00 |
[
[
"Xiao",
"Xiaokui",
""
],
[
"Wang",
"Guozhang",
""
],
[
"Gehrke",
"Johannes",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.5554
|
Jocelyne Troccaz
|
Michael Baumann (TIMC), Pierre Mozer, Vincent Daanen, Jocelyne Troccaz
(TIMC)
|
Prostate Biopsy Assistance System with Gland Deformation Estimation for
Enhanced Precision
|
This version of the paper integrates a correction concerning the
local similarity measure w.r.t. the proceedings (this typing error could not
be corrected before editing the proceedings)
|
12th International Conference on Medical Imaging and Computer
Assisted Intervention, Londres : United Kingdom (2009)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Computer-assisted prostate biopsies became a very active research area during
the last years. Prostate tracking makes it possi- ble to overcome several
drawbacks of the current standard transrectal ultrasound (TRUS) biopsy
procedure, namely the insufficient targeting accuracy which may lead to a
biopsy distribution of poor quality, the very approximate knowledge about the
actual location of the sampled tissues which makes it difficult to implement
focal therapy strategies based on biopsy results, and finally the difficulty to
precisely reach non-ultrasound (US) targets stemming from different modalities,
statistical atlases or previous biopsy series. The prostate tracking systems
presented so far are limited to rigid transformation tracking. However, the
gland can get considerably deformed during the intervention because of US probe
pres- sure and patient movements. We propose to use 3D US combined with
image-based elastic registration to estimate these deformations. A fast elastic
registration algorithm that copes with the frequently occurring US shadows is
presented. A patient cohort study was performed, which yielded a statistically
significant in-vivo accuracy of 0.83+-0.54mm.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 09:41:31 GMT"
}
] | 2009-10-01T00:00:00 |
[
[
"Baumann",
"Michael",
"",
"TIMC"
],
[
"Mozer",
"Pierre",
"",
"TIMC"
],
[
"Daanen",
"Vincent",
"",
"TIMC"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0909.5583
|
Hamed Owladeghaffari O.Ghaffari
|
Hamed O.Ghaffari
|
Two-Phase Flow Complexity in Heterogeneous Media
|
This paper has been withdrawn by the author. A report /version 2- Due
to copy right the manuscript is not available
| null | null | null |
cs.CE physics.flu-dyn
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this study, we investigate the appeared complexity of two-phase flow
(air/water) in a heterogeneous soil where the supposed porous media is
non-deformable media which is under the timedependent gas pressure. After
obtaining of governing equations and considering the capillary
pressuresaturation and permeability functions, the evolution of the model
unknown parameters were obtained. In this way, using COMSOL (FEMLAB) and fluid
flow/script Module, the role of heterogeneity in intrinsic permeability was
analysed. Also, the evolution of relative permeability of wetting and
non-wetting fluid, capillary pressure and other parameters were elicited. In
the last part, a complex network approach to analysis of emerged patterns will
be employed.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 11:53:18 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Aug 2010 17:00:19 GMT"
}
] | 2010-09-01T00:00:00 |
[
[
"Ghaffari",
"Hamed O.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "physics.flu-dyn",
"description": "Turbulence, instabilities, incompressible/compressible flows, reacting flows. Aero/hydrodynamics, fluid-structure interactions, acoustics. Biological fluid dynamics, micro/nanofluidics, interfacial phenomena. Complex fluids, suspensions and granular flows, porous media flows. Geophysical flows, thermoconvective and stratified flows. Mathematical and computational methods for fluid dynamics, fluid flow models, experimental techniques.",
"span": "(Fluid Dynamics)"
}
] |
0909.5649
|
Vitaly Osipov
|
Nikolaj Leischner, Vitaly Osipov, Peter Sanders
|
GPU sample sort
| null | null | null | null |
cs.DS cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present the design of a sample sort algorithm for manycore
GPUs. Despite being one of the most efficient comparison-based sorting
algorithms for distributed memory architectures its performance on GPUs was
previously unknown. For uniformly distributed keys our sample sort is at least
25% and on average 68% faster than the best comparison-based sorting algorithm,
GPU Thrust merge sort, and on average more than 2 times faster than GPU
quicksort. Moreover, for 64-bit integer keys it is at least 63% and on average
2 times faster than the highly optimized GPU Thrust radix sort that directly
manipulates the binary representation of keys. Our implementation is robust to
different distributions and entropy levels of keys and scales almost linearly
with the input size. These results indicate that multi-way techniques in
general and sample sort in particular achieve substantially better performance
than two-way merge sort and quicksort.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 15:58:53 GMT"
}
] | 2009-10-01T00:00:00 |
[
[
"Leischner",
"Nikolaj",
""
],
[
"Osipov",
"Vitaly",
""
],
[
"Sanders",
"Peter",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0909.5653
|
John Fearnley
|
John Fearnley, Marcin Jurdzi\'nski, Rahul Savani
|
Linear Complementarity Algorithms for Infinite Games
| null | null |
10.1007/978-3-642-11266-9_32
| null |
cs.GT cs.CC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The performance of two pivoting algorithms, due to Lemke and Cottle and
Dantzig, is studied on linear complementarity problems (LCPs) that arise from
infinite games, such as parity, average-reward, and discounted games. The
algorithms have not been previously studied in the context of infinite games,
and they offer alternatives to the classical strategy-improvement algorithms.
The two algorithms are described purely in terms of discounted games, thus
bypassing the reduction from the games to LCPs, and hence facilitating a better
understanding of the algorithms when applied to games. A family of parity games
is given, on which both algorithms run in exponential time, indicating that in
the worst case they perform no better for parity, average-reward, or discounted
games than they do for general P-matrix LCPs.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 16:14:51 GMT"
}
] | 2020-01-16T00:00:00 |
[
[
"Fearnley",
"John",
""
],
[
"Jurdziński",
"Marcin",
""
],
[
"Savani",
"Rahul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.5654
|
Tamal Dey
|
Tamal K. Dey, Jian Sun, Yusu Wang
|
Approximating Loops in a Shortest Homology Basis from Point Data
| null | null | null | null |
cs.CG cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Inference of topological and geometric attributes of a hidden manifold from
its point data is a fundamental problem arising in many scientific studies and
engineering applications. In this paper we present an algorithm to compute a
set of loops from a point data that presumably sample a smooth manifold
$M\subset \mathbb{R}^d$. These loops approximate a {\em shortest} basis of the
one dimensional homology group $H_1(M)$ over coefficients in finite field
$\mathbb{Z}_2$. Previous results addressed the issue of computing the rank of
the homology groups from point data, but there is no result on approximating
the shortest basis of a manifold from its point sample. In arriving our result,
we also present a polynomial time algorithm for computing a shortest basis of
$H_1(K)$ for any finite {\em simplicial complex} $K$ whose edges have
non-negative weights.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 16:26:21 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Dec 2009 21:45:51 GMT"
}
] | 2009-12-02T00:00:00 |
[
[
"Dey",
"Tamal K.",
""
],
[
"Sun",
"Jian",
""
],
[
"Wang",
"Yusu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.5656
|
Dragos Falie
|
D. Falie
|
Improvements of the 3D images captured with Time-of-Flight cameras
| null | null | null | null |
cs.CV cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
3D Time-of-Flight camera's images are affected by errors due to the diffuse
(indirect) light and to the flare light. The presented method improves the 3D
image reducing the distance's errors to dark surface objects. This is achieved
by placing one or two contrast tags in the scene at different distances from
the ToF camera. The white and black parts of the tags are situated at the same
distance to the camera but the distances measured by the camera are different.
This difference is used to compute a correction vector. The distance to black
surfaces is corrected by subtracting this vector from the captured vector
image.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 18:50:24 GMT"
}
] | 2009-10-01T00:00:00 |
[
[
"Falie",
"D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0909.5669
|
Alexander Davydov A
|
Alexander A. Davydov, Massimo Giulietti, Stefano Marcugini and
Fernanda Pambianco
|
Some combinatorial aspects of constructing bipartite-graph codes
|
27 pages
| null | null | null |
math.CO cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose geometrical methods for constructing square 01-matrices with the
same number n of units in every row and column, and such that any two rows of
the matrix contain at most one unit in common. These matrices are equivalent to
n-regular bipartite graphs without 4-cycles, and therefore can be used for the
construction of efficient bipartite-graph codes such that both the classes of
its vertices are associated with local constraints. We significantly extend the
region of parameters m,n for which there exist an n-regular bipartite graph
with 2m vertices and without 4-cycles. In that way we essentially increase the
region of lengths and rates of the corresponding bipartite-graph codes. Many
new matrices are either circulant or consist of circulant submatrices: this
provides code parity-check matrices consisting of circulant submatrices, and
hence quasi-cyclic bipartite-graph codes with simple implementation.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 17:21:18 GMT"
}
] | 2009-10-01T00:00:00 |
[
[
"Davydov",
"Alexander A.",
""
],
[
"Giulietti",
"Massimo",
""
],
[
"Marcugini",
"Stefano",
""
],
[
"Pambianco",
"Fernanda",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.5677
|
Brendan Lucier
|
Brendan Lucier
|
Beyond Equilibria: Mechanisms for Repeated Combinatorial Auctions
|
16 pages, 0 figures
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the design of mechanisms in combinatorial auction domains. We focus
on settings where the auction is repeated, motivated by auctions for licenses
or advertising space. We consider models of agent behaviour in which they
either apply common learning techniques to minimize the regret of their bidding
strategies, or apply short-sighted best-response strategies. We ask: when can a
black-box approximation algorithm for the base auction problem be converted
into a mechanism that approximately preserves the original algorithm's
approximation factor on average over many iterations? We present a general
reduction for a broad class of algorithms when agents minimize external regret.
We also present a new mechanism for the combinatorial auction problem that
attains an $O(\sqrt{m})$ approximation on average when agents apply
best-response dynamics.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 17:47:17 GMT"
}
] | 2009-10-01T00:00:00 |
[
[
"Lucier",
"Brendan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0909.5683
|
Samuel Kutin
|
Daniel M. Kane and Samuel A. Kutin
|
Quantum interpolation of polynomials
|
8 pages; version 2 updates references
| null | null | null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider quantum interpolation of polynomials. We imagine a quantum
computer with black-box access to input/output pairs (x_i, f(x_i)), where f is
a degree-d polynomial, and we wish to compute f(0). We give asymptotically
tight quantum lower bounds for this problem, even in the case where 0 is among
the possible values of x_i.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 18:06:54 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Mar 2010 15:27:14 GMT"
}
] | 2010-03-19T00:00:00 |
[
[
"Kane",
"Daniel M.",
""
],
[
"Kutin",
"Samuel A.",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.5684
|
Jan Draisma
|
Jan Draisma and Eyal Kushilevitz and Enav Weinreb
|
Partition Arguments in Multiparty Communication Complexity
|
extended journal version of paper accepted for ICALP 2009
|
Theoretical Computer Science 412(24), 2611-2622, 2011
| null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Consider the "Number in Hand" multiparty communication complexity model,
where k players holding inputs x_1,...,x_k in {0,1}^n communicate to compute
the value f(x_1,...,x_k) of a function f known to all of them. The main lower
bound technique for the communication complexity of such problems is that of
partition arguments: partition the k players into two disjoint sets of players
and find a lower bound for the induced two-party communication complexity
problem.
In this paper, we study the power of partition arguments. Our two main
results are very different in nature: (i) For randomized communication
complexity, we show that partition arguments may yield bounds that are
exponentially far from the true communication complexity. Specifically, we
prove that there exists a 3-argument function f whose communication complexity
is Omega(n), while partition arguments can only yield an Omega(log n) lower
bound. The same holds for nondeterministic communication complexity. (ii) For
deterministic communication complexity, we prove that finding significant gaps
between the true communication complexity and the best lower bound that can be
obtained via partition arguments, would imply progress on a generalized version
of the "log-rank conjecture" in communication complexity.
We conclude with two results on the multiparty "fooling set technique",
another method for obtaining communication complexity lower bounds.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 18:18:04 GMT"
}
] | 2017-10-10T00:00:00 |
[
[
"Draisma",
"Jan",
""
],
[
"Kushilevitz",
"Eyal",
""
],
[
"Weinreb",
"Enav",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.0013
|
Radu Grigore
|
Mikolas Janota, Joao Marques-Silva, Radu Grigore
|
Algorithms for finding dispensable variables
| null | null | null | null |
cs.DS cs.AI cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This short note reviews briefly three algorithms for finding the set of
dispensable variables of a boolean formula. The presentation is light on proofs
and heavy on intuitions.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 20:10:03 GMT"
}
] | 2009-10-02T00:00:00 |
[
[
"Janota",
"Mikolas",
""
],
[
"Marques-Silva",
"Joao",
""
],
[
"Grigore",
"Radu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.0045
|
Bruno Grenet
|
Bruno Grenet
|
Acceptable Complexity Measures of Theorems
|
16 pages, presented at NKS Midwest Conference '08
|
Complex Systems 18:4 (2010) 403-425
| null | null |
cs.LO cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In 1931, G\"odel presented in K\"onigsberg his famous Incompleteness Theorem,
stating that some true mathematical statements are unprovable. Yet, this result
gives us no idea about those independent (that is, true and unprovable)
statements, about their frequency, the reason they are unprovable, and so on.
Calude and J\"urgensen proved in 2005 Chaitin's "heuristic principle" for an
appropriate measure: the theorems of a finitely-specified theory cannot be
significantly more complex than the theory itself. In this work, we investigate
the existence of other measures, different from the original one, which satisfy
this "heuristic principle". At this end, we introduce the definition of
acceptable complexity measure of theorems.
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 22:25:37 GMT"
}
] | 2011-07-08T00:00:00 |
[
[
"Grenet",
"Bruno",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.0097
|
Alexandre Vaniachine
|
A. Vaniachine (for the ATLAS Collaboration)
|
Scalable Database Access Technologies for ATLAS Distributed Computing
|
6 pages, 7 figures. To be published in the proceedings of DPF-2009,
Detroit, MI, July 2009, eConf C090726
| null | null |
ANL-HEP-CP-09-085
|
physics.ins-det cs.DB cs.DC hep-ex
|
http://creativecommons.org/licenses/publicdomain/
|
ATLAS event data processing requires access to non-event data (detector
conditions, calibrations, etc.) stored in relational databases. The
database-resident data are crucial for the event data reconstruction processing
steps and often required for user analysis. A main focus of ATLAS database
operations is on the worldwide distribution of the Conditions DB data, which
are necessary for every ATLAS data processing job. Since Conditions DB access
is critical for operations with real data, we have developed the system where a
different technology can be used as a redundant backup. Redundant database
operations infrastructure fully satisfies the requirements of ATLAS
reprocessing, which has been proven on a scale of one billion database queries
during two reprocessing campaigns of 0.5 PB of single-beam and cosmics data on
the Grid. To collect experience and provide input for a best choice of
technologies, several promising options for efficient database access in user
analysis were evaluated successfully. We present ATLAS experience with scalable
database access technologies and describe our approach for prevention of
database access bottlenecks in a Grid computing environment.
|
[
{
"version": "v1",
"created": "Thu, 1 Oct 2009 07:20:54 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Oct 2009 13:55:12 GMT"
}
] | 2019-08-13T00:00:00 |
[
[
"Vaniachine",
"A.",
"",
"for the ATLAS Collaboration"
]
] |
[
{
"class": "Physics",
"code": "physics.ins-det",
"description": "Instrumentation and Detectors for research in natural science, including optical, molecular, atomic, nuclear and particle physics instrumentation and the associated electronics, services, infrastructure and control equipment. ",
"span": "(Instrumentation and Detectors)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Physics",
"code": "hep-ex",
"description": "Description coming soon",
"span": "(High Energy Physics - Experiment)"
}
] |
0910.0110
|
Patrick Briest
|
Patrick Briest and Sanjeev Khanna
|
Improved Hardness of Approximation for Stackelberg Shortest-Path Pricing
| null | null | null | null |
cs.DS cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the Stackelberg shortest-path pricing problem, which is defined
as follows. Given a graph G with fixed-cost and pricable edges and two distinct
vertices s and t, we may assign prices to the pricable edges. Based on the
predefined fixed costs and our prices, a customer purchases a cheapest s-t-path
in G and we receive payment equal to the sum of prices of pricable edges
belonging to the path. Our goal is to find prices maximizing the payment
received from the customer. While Stackelberg shortest-path pricing was known
to be APX-hard before, we provide the first explicit approximation threshold
and prove hardness of approximation within 2-o(1).
|
[
{
"version": "v1",
"created": "Thu, 1 Oct 2009 09:15:06 GMT"
}
] | 2009-10-02T00:00:00 |
[
[
"Briest",
"Patrick",
""
],
[
"Khanna",
"Sanjeev",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.0112
|
Rasmus Pagh
|
Andrea Campagna and Rasmus Pagh
|
Finding Associations and Computing Similarity via Biased Pair Sampling
|
This is an extended version of a paper that appeared at the IEEE
International Conference on Data Mining, 2009. The conference version is (c)
2009 IEEE
| null | null | null |
cs.DS cs.DB cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This version is ***superseded*** by a full version that can be found at
http://www.itu.dk/people/pagh/papers/mining-jour.pdf, which contains stronger
theoretical results and fixes a mistake in the reporting of experiments.
Abstract: Sampling-based methods have previously been proposed for the
problem of finding interesting associations in data, even for low-support
items. While these methods do not guarantee precise results, they can be vastly
more efficient than approaches that rely on exact counting. However, for many
similarity measures no such methods have been known. In this paper we show how
a wide variety of measures can be supported by a simple biased sampling method.
The method also extends to find high-confidence association rules. We
demonstrate theoretically that our method is superior to exact methods when the
threshold for "interesting similarity/confidence" is above the average pairwise
similarity/confidence, and the average support is not too low. Our method is
particularly good when transactions contain many items. We confirm in
experiments on standard association mining benchmarks that this gives a
significant speedup on real data sets (sometimes much larger than the
theoretical guarantees). Reductions in computation time of over an order of
magnitude, and significant savings in space, are observed.
|
[
{
"version": "v1",
"created": "Thu, 1 Oct 2009 09:02:54 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Feb 2010 09:32:14 GMT"
}
] | 2010-02-17T00:00:00 |
[
[
"Campagna",
"Andrea",
""
],
[
"Pagh",
"Rasmus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0910.0144
|
Richard Clegg
|
Richard G. Clegg, Raul Landa, Miguel Rio
|
Criticisms of modelling packet traffic using long-range dependence
|
Presented at the PMECT 2009 workshop (part of ICCCN 2009) in San
Francisco
| null |
10.1109/ICCCN.2009.5235309
| null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper criticises the notion that long-range dependence is an important
contributor to the queuing behaviour of real Internet traffic. The idea is
questioned in two different ways. Firstly, a class of models used to simulate
Internet traffic is shown to have important theoretical flaws. It is shown that
this behaviour is inconsistent with the behaviour of real traffic traces.
Secondly, the notion that long-range correlations significantly affects the
queuing performance of traffic is investigated by destroying those correlations
in real traffic traces (by reordering). It is shown that the longer ranges of
correlations are not important except in one case with an extremely high load.
|
[
{
"version": "v1",
"created": "Thu, 1 Oct 2009 11:46:24 GMT"
}
] | 2013-03-28T00:00:00 |
[
[
"Clegg",
"Richard G.",
""
],
[
"Landa",
"Raul",
""
],
[
"Rio",
"Miguel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0910.0179
|
Rdv Ijcsis
|
O. Said, S. Bahgat, M. Ghoniemy, Y. Elawdy
|
Analysis, Design and Simulation of a New System for Internet Multimedia
Transmission Guarantee
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 77-86, September 2009, USA
| null |
ISSN 1947 5500
|
cs.MM cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
QoS is a very important issue for multimedia communication systems. In this
paper, a new system that reinstalls the relation between the QoS elements
(RSVP, routing protocol, sender, and receiver) during the multimedia
transmission is proposed, then an alternative path is created in case of
original multimedia path failure. The suggested system considers the resulting
problems that may be faced within and after the creation of rerouting path.
Finally, the proposed system is simulated using OPNET 11.5 simulation package.
Simulation results show that our proposed system outperforms the old one in
terms of QoS parameters like packet loss and delay jitter.
|
[
{
"version": "v1",
"created": "Thu, 1 Oct 2009 14:03:51 GMT"
}
] | 2009-10-02T00:00:00 |
[
[
"Said",
"O.",
""
],
[
"Bahgat",
"S.",
""
],
[
"Ghoniemy",
"M.",
""
],
[
"Elawdy",
"Y.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.0187
|
Ivan Voras
|
Ivan Voras, Mario Zagar
|
Web-enabling Cache Daemon for Complex Data
| null | null | null | null |
cs.DC cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the most common basic techniques for improving the performance of web
applications is caching frequently accessed data in fast data stores,
colloquially known as cache daemons. In this paper we present a cache daemon
suitable for storing complex data while maintaining fine-grained control over
data storage, retrieval and expiry. Data manipulation in this cache daemon is
performed via standard SQL statements so we call it SQLcached. It is a
practical, usable solution already implemented in several large web sites.
|
[
{
"version": "v1",
"created": "Thu, 1 Oct 2009 14:25:50 GMT"
}
] | 2009-10-02T00:00:00 |
[
[
"Voras",
"Ivan",
""
],
[
"Zagar",
"Mario",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.0211
|
Gianluca Argentini
|
Gianluca Argentini
|
Searching the (really) real general solution of 2D Laplace differential
equation
|
None new, but re-view
| null | null | null |
math.AP cs.CE physics.flu-dyn
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This is not a new result. Purpose of this work is to describe a method to
search the analytical expression of the general real solution of the
two-dimensional Laplace differential equation. This thing is not easy to find
in scientific literature and, if present, often it is justified with the
assertion that an arbitrary analytic complex function is a solution of Laplace
equation, so introducing the condition of complex-differentiability which is
not really necessary for the existence of a real solution. The question of the
knowledge of real exact solutions to Laplace equation is of great importance in
science and engineering.
|
[
{
"version": "v1",
"created": "Thu, 1 Oct 2009 16:14:28 GMT"
}
] | 2009-10-02T00:00:00 |
[
[
"Argentini",
"Gianluca",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.AP",
"description": "Existence and uniqueness, boundary conditions, linear and non-linear operators, stability, soliton theory, integrable PDE's, conservation laws, qualitative dynamics",
"span": "(Analysis of PDEs)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "physics.flu-dyn",
"description": "Turbulence, instabilities, incompressible/compressible flows, reacting flows. Aero/hydrodynamics, fluid-structure interactions, acoustics. Biological fluid dynamics, micro/nanofluidics, interfacial phenomena. Complex fluids, suspensions and granular flows, porous media flows. Geophysical flows, thermoconvective and stratified flows. Mathematical and computational methods for fluid dynamics, fluid flow models, experimental techniques.",
"span": "(Fluid Dynamics)"
}
] |
0910.0227
|
Rdv Ijcsis
|
Renuka A., K. C. Shet
|
Hierarchical Approach for Key Management in Mobile Ad hoc Networks
|
9 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 87-95, September 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes or
terminals which communicate with each other by forming a multi-hop radio
network and maintaining connectivity in a decentralized manner. The
conventional security solutions to provide key management through accessing
trusted authorities or centralized servers are infeasible for this new
environment since mobile ad hoc networks are characterized by the absence of
any infrastructure, frequent mobility, and wireless links. We propose a
hierarchical group key management scheme that is hierarchical and fully
distributed with no central authority and uses a simple rekeying procedure
which is suitable for large and high mobility mobile ad hoc networks. The
rekeying procedure requires only one round in our scheme and Chinese Remainder
Theorem Diffie Hellman Group Diffie Hellmann and Burmester and Desmedt it is a
constant 3 whereas in other schemes such as Distributed Logical Key Hierarchy
and Distributed One Way Function Trees, it depends on the number of members. We
reduce the energy consumption during communication of the keying materials by
reducing the number of bits in the rekeying message. We show through analysis
and simulations that our scheme has less computation, communication and energy
consumption compared to the existing schemes.
|
[
{
"version": "v1",
"created": "Thu, 1 Oct 2009 18:56:57 GMT"
}
] | 2009-10-02T00:00:00 |
[
[
"A.",
"Renuka",
""
],
[
"Shet",
"K. C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0910.0239
|
Venkatesh Saligrama
|
V. Saligrama, M. Zhao
|
Compressed Blind De-convolution
| null | null | null | null |
cs.IT cs.LG math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Suppose the signal x is realized by driving a k-sparse signal u through an
arbitrary unknown stable discrete-linear time invariant system H. These types
of processes arise naturally in Reflection Seismology. In this paper we are
interested in several problems: (a) Blind-Deconvolution: Can we recover both
the filter $H$ and the sparse signal $u$ from noisy measurements? (b)
Compressive Sensing: Is x compressible in the conventional sense of compressed
sensing? Namely, can x, u and H be reconstructed from a sparse set of
measurements. We develop novel L1 minimization methods to solve both cases and
establish sufficient conditions for exact recovery for the case when the
unknown system H is auto-regressive (i.e. all pole) of a known order. In the
compressed sensing/sampling setting it turns out that both H and x can be
reconstructed from O(k log(n)) measurements under certain technical conditions
on the support structure of u. Our main idea is to pass x through a linear time
invariant system G and collect O(k log(n)) sequential measurements. The filter
G is chosen suitably, namely, its associated Toeplitz matrix satisfies the RIP
property. We develop a novel LP optimization algorithm and show that both the
unknown filter H and the sparse input u can be reliably estimated.
|
[
{
"version": "v1",
"created": "Thu, 1 Oct 2009 19:49:36 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Jan 2010 15:40:48 GMT"
}
] | 2016-09-08T00:00:00 |
[
[
"Saligrama",
"V.",
""
],
[
"Zhao",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.0281
|
David Pritchard
|
Deeparnab Chakrabarty, Jochen Koenemann, David Pritchard
|
Hypergraphic LP Relaxations for Steiner Trees
|
Revised full version; a shorter version will appear at IPCO 2010.
| null |
10.1007/978-3-642-13036-6_29
| null |
cs.DM
|
http://creativecommons.org/licenses/by/3.0/
|
We investigate hypergraphic LP relaxations for the Steiner tree problem,
primarily the partition LP relaxation introduced by Koenemann et al. [Math.
Programming, 2009]. Specifically, we are interested in proving upper bounds on
the integrality gap of this LP, and studying its relation to other linear
relaxations. Our results are the following. Structural results: We extend the
technique of uncrossing, usually applied to families of sets, to families of
partitions. As a consequence we show that any basic feasible solution to the
partition LP formulation has sparse support. Although the number of variables
could be exponential, the number of positive variables is at most the number of
terminals. Relations with other relaxations: We show the equivalence of the
partition LP relaxation with other known hypergraphic relaxations. We also show
that these hypergraphic relaxations are equivalent to the well studied
bidirected cut relaxation, if the instance is quasibipartite. Integrality gap
upper bounds: We show an upper bound of sqrt(3) ~ 1.729 on the integrality gap
of these hypergraph relaxations in general graphs. In the special case of
uniformly quasibipartite instances, we show an improved upper bound of 73/60 ~
1.216. By our equivalence theorem, the latter result implies an improved upper
bound for the bidirected cut relaxation as well.
|
[
{
"version": "v1",
"created": "Thu, 1 Oct 2009 21:57:06 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Mar 2010 01:21:59 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Chakrabarty",
"Deeparnab",
""
],
[
"Koenemann",
"Jochen",
""
],
[
"Pritchard",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.0284
|
Randall Dougherty
|
Randall Dougherty, Chris Freiling, and Kenneth Zeger
|
Linear rank inequalities on five or more variables
|
Substantial improvements, including a stronger form of the second
general construction of inequalities, many more six-variable inequalities,
and further description of the computing methodology
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ranks of subspaces of vector spaces satisfy all linear inequalities satisfied
by entropies (including the standard Shannon inequalities) and an additional
inequality due to Ingleton. It is known that the Shannon and Ingleton
inequalities generate all such linear rank inequalities on up to four
variables, but it has been an open question whether additional inequalities
hold for the case of five or more variables. Here we give a list of 24
inequalities which, together with the Shannon and Ingleton inequalities,
generate all linear rank inequalities on five variables. We also give a partial
list of linear rank inequalities on six variables and general results which
produce such inequalities on an arbitrary number of variables; we prove that
there are essentially new inequalities at each number of variables beyond four
(a result also proved recently by Kinser).
|
[
{
"version": "v1",
"created": "Fri, 2 Oct 2009 18:05:31 GMT"
},
{
"version": "v2",
"created": "Sat, 3 Oct 2009 01:04:00 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Jul 2010 00:34:05 GMT"
}
] | 2010-07-21T00:00:00 |
[
[
"Dougherty",
"Randall",
""
],
[
"Freiling",
"Chris",
""
],
[
"Zeger",
"Kenneth",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.0286
|
Justin Smith
|
George B. Purdy, Justin W. Smith
|
On Finding Ordinary or Monochromatic Intersection Points
|
21 pages, 4 figures
| null | null | null |
cs.CG cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An algorithm is demonstrated that finds an ordinary intersection in an
arrangement of $n$ lines in $\mathbb{R}^2$, not all parallel and not all
passing through a common point, in time $O(n \log{n})$. The algorithm is then
extended to find an ordinary intersection among an arrangement of hyperplanes
in $\mathbb{R}^d$, no $d$ passing through a line and not all passing through
the same point, again, in time $O(n \log{n})$.
Two additional algorithms are provided that find an ordinary or monochromatic
intersection, respectively, in an arrangement of pseudolines in time $O(n^2)$.
|
[
{
"version": "v1",
"created": "Thu, 1 Oct 2009 22:53:42 GMT"
}
] | 2009-10-05T00:00:00 |
[
[
"Purdy",
"George B.",
""
],
[
"Smith",
"Justin W.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.0287
|
Luigi Cimmino
|
Luigi Cimmino
|
Shor's Algorithm from the Mindset of Quantum Oracles
|
8 pages, report on deterministic quantum measuremet theory
| null | null | null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The aim of this work is to show a brand-new way of making deterministic
Quantum Computing (short QC), in the sense of Theory of Calculability, by
meaning of unitary evolution. We start from the original Shor's Algorithm to
explain how the newest one works, at least compared to theory. We will give a
new conceptual foundation of QC, resulting from a set of conventional and well
known results of Calculability and Quantum Mechanics. In the practice, if that
can be used in its general sense, we will show an inaccessible relativized
process which let us able to obtain same results with the same outlay in the
time resource as the Shor's one for factorizing a given number n. Then the
QO-system will be a prototype way giving to the relativized calculus the
possibility to put in to practice an oracle, kind of object having till now
abstract nature. The basic physical tool of our theorization, we call Quantum
State Selection, consists in the twin-combined measurement process through
positive valued measure operator (POVM), needed to provide the quantum oracle's
answer.
|
[
{
"version": "v1",
"created": "Thu, 1 Oct 2009 22:55:59 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Apr 2011 14:34:21 GMT"
}
] | 2011-04-05T00:00:00 |
[
[
"Cimmino",
"Luigi",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.0316
|
Rdv Ijcsis
|
P. Ganeshkumar, K. Thyagarajah
|
An Analysis of Energy Consumption on ACK plus Rate Packet in Rate Based
Transport Protocol
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 96-102, September 2009, USA
| null |
ISSN 1947 5500
|
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Rate based transport protocol determines the rate of data transmission
between the sender and receiver and then sends the data according to that rate.
To notify the rate to the sender, the receiver sends ACKplusRate packet based
on epoch timer expiry. In this paper, through detailed arguments and simulation
it is shown that the transmission of ACKplusRate packet based on epoch timer
expiry consumes more energy in network with low mobility. To overcome this
problem, a new technique called Dynamic Rate Feedback (DRF) is proposed. DRF
sends ACKplusRate whenever there is a change in rate of (plus or minus) 25
percent than the previous rate. Based on ns2 simulation DRF is compared with a
reliable transport protocol for ad hoc network (ATP)
|
[
{
"version": "v1",
"created": "Fri, 2 Oct 2009 03:28:20 GMT"
}
] | 2009-10-05T00:00:00 |
[
[
"Ganeshkumar",
"P.",
""
],
[
"Thyagarajah",
"K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0910.0317
|
Rdv Ijcsis
|
Abbas Karimi, Faraneh Zarafshan, Adznan.b. Jantan, A.R Ramli, M.Iqbal
b.Saripan
|
A New Fuzzy Approach for Dynamic Load Balancing Algorithm
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 01-05, October 2009, USA
| null |
ISSN 1947 5500
|
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Load balancing is the process of improving the Performance of a parallel and
distributed system through is distribution of load among the processors [1-2].
Most of the previous work in load balancing and distributed decision making in
general, do not effectively take into account the uncertainty and inconsistency
in state information but in fuzzy logic, we have advantage of using crisps
inputs. In this paper, we present a new approach for implementing dynamic load
balancing algorithm with fuzzy logic, which can face to uncertainty and
inconsistency of previous algorithms, further more our algorithm shows better
response time than round robin and randomize algorithm respectively 30.84
percent and 45.45 percent.
|
[
{
"version": "v1",
"created": "Fri, 2 Oct 2009 03:32:09 GMT"
}
] | 2009-10-05T00:00:00 |
[
[
"Karimi",
"Abbas",
""
],
[
"Zarafshan",
"Faraneh",
""
],
[
"Jantan",
"Adznan. b.",
""
],
[
"Ramli",
"A. R",
""
],
[
"Saripan",
"M. Iqbal b.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0910.0320
|
Jialing Liu
|
Jialing Liu, Nicola Elia
|
Convergence of Fundamental Limitations in Feedback Communication,
Estimation, and Feedback Control over Gaussian Channels
|
Submitted to Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we establish the connections of the fundamental limitations in
feedback communication, estimation, and feedback control over Gaussian
channels, from a unifying perspective for information, estimation, and control.
The optimal feedback communication system over a Gaussian necessarily employs
the Kalman filter (KF) algorithm, and hence can be transformed into an
estimation system and a feedback control system over the same channel. This
follows that the information rate of the communication system is alternatively
given by the decay rate of the Cramer-Rao bound (CRB) of the estimation system
and by the Bode integral (BI) of the control system. Furthermore, the optimal
tradeoff between the channel input power and information rate in feedback
communication is alternatively characterized by the optimal tradeoff between
the (causal) one-step prediction mean-square error (MSE) and (anti-causal)
smoothing MSE (of an appropriate form) in estimation, and by the optimal
tradeoff between the regulated output variance with causal feedback and the
disturbance rejection measure (BI or degree of anti-causality) in feedback
control. All these optimal tradeoffs have an interpretation as the tradeoff
between causality and anti-causality. Utilizing and motivated by these
relations, we provide several new results regarding the feedback codes and
information theoretic characterization of KF. Finally, the extension of the
finite-horizon results to infinite horizon is briefly discussed under specific
dimension assumptions (the asymptotic feedback capacity problem is left open in
this paper).
|
[
{
"version": "v1",
"created": "Fri, 2 Oct 2009 03:54:58 GMT"
}
] | 2009-10-05T00:00:00 |
[
[
"Liu",
"Jialing",
""
],
[
"Elia",
"Nicola",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.0349
|
Claudia Marinica
|
Claudia Marinica (LINA), Fabrice Guillet (LINA), Henri Briand (LINA)
|
Post-Processing of Discovered Association Rules Using Ontologies
| null |
The Second International Workshop on Domain Driven Data Mining
(DDDM 2008) in IEEE International Conference of Data Mining, Pisa : Italie
(2008)
|
10.1109/ICDMW.2008.87
| null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In Data Mining, the usefulness of association rules is strongly limited by
the huge amount of delivered rules. In this paper we propose a new approach to
prune and filter discovered rules. Using Domain Ontologies, we strengthen the
integration of user knowledge in the post-processing task. Furthermore, an
interactive and iterative framework is designed to assist the user along the
analyzing task. On the one hand, we represent user domain knowledge using a
Domain Ontology over database. On the other hand, a novel technique is
suggested to prune and to filter discovered rules. The proposed framework was
applied successfully over the client database provided by Nantes Habitat.
|
[
{
"version": "v1",
"created": "Fri, 2 Oct 2009 08:40:01 GMT"
}
] | 2009-10-05T00:00:00 |
[
[
"Marinica",
"Claudia",
"",
"LINA"
],
[
"Guillet",
"Fabrice",
"",
"LINA"
],
[
"Briand",
"Henri",
"",
"LINA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0910.0366
|
Daniel Cederman
|
Daniel Cederman and Philippas Tsigas
|
Supporting Lock-Free Composition of Concurrent Data Objects
| null | null | null |
2009-10
|
cs.DC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Lock-free data objects offer several advantages over their blocking
counterparts, such as being immune to deadlocks and convoying and, more
importantly, being highly concurrent. But they share a common disadvantage in
that the operations they provide are difficult to compose into larger atomic
operations while still guaranteeing lock-freedom. We present a lock-free
methodology for composing highly concurrent linearizable objects together by
unifying their linearization points. This makes it possible to relatively
easily introduce atomic lock-free move operations to a wide range of concurrent
objects. Experimental evaluation has shown that the operations originally
supported by the data objects keep their performance behavior under our
methodology.
|
[
{
"version": "v1",
"created": "Fri, 2 Oct 2009 10:08:12 GMT"
}
] | 2009-10-05T00:00:00 |
[
[
"Cederman",
"Daniel",
""
],
[
"Tsigas",
"Philippas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.0410
|
Benjamin Steinberg
|
Benjamin Steinberg
|
The averaging trick and the Cerny conjecture
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The results of several papers concerning the \v{C}ern\'y conjecture are
deduced as consequences of a simple idea that I call the averaging trick. This
idea is implicitly used in the literature, but no attempt was made to formalize
the proof scheme axiomatically. Instead, authors axiomatized classes of
automata to which it applies.
|
[
{
"version": "v1",
"created": "Fri, 2 Oct 2009 14:48:02 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Mar 2010 22:06:20 GMT"
},
{
"version": "v3",
"created": "Sat, 8 May 2010 17:17:48 GMT"
}
] | 2010-05-11T00:00:00 |
[
[
"Steinberg",
"Benjamin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0910.0413
|
Yaniv Plan
|
Emmanuel J. Candes, Yaniv Plan
|
Accurate low-rank matrix recovery from a small number of linear
measurements
|
8 pages, 1 table
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of recovering a lowrank matrix M from a small number
of random linear measurements. A popular and useful example of this problem is
matrix completion, in which the measurements reveal the values of a subset of
the entries, and we wish to fill in the missing entries (this is the famous
Netflix problem). When M is believed to have low rank, one would ideally try to
recover M by finding the minimum-rank matrix that is consistent with the data;
this is, however, problematic since this is a nonconvex problem that is,
generally, intractable.
Nuclear-norm minimization has been proposed as a tractable approach, and past
papers have delved into the theoretical properties of nuclear-norm minimization
algorithms, establishing conditions under which minimizing the nuclear norm
yields the minimum rank solution. We review this spring of emerging literature
and extend and refine previous theoretical results. Our focus is on providing
error bounds when M is well approximated by a low-rank matrix, and when the
measurements are corrupted with noise. We show that for a certain class of
random linear measurements, nuclear-norm minimization provides stable recovery
from a number of samples nearly at the theoretical lower limit, and enjoys
order-optimal error bounds (with high probability).
|
[
{
"version": "v1",
"created": "Fri, 2 Oct 2009 14:52:00 GMT"
}
] | 2009-10-05T00:00:00 |
[
[
"Candes",
"Emmanuel J.",
""
],
[
"Plan",
"Yaniv",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.0443
|
Danupon Nanongkai
|
Parinya Chalermsook, Bundit Laekhanukit, Danupon Nanongkai
|
Stackelberg Pricing is Hard to Approximate within $2-\epsilon$
| null | null | null | null |
cs.GT cs.CC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Stackelberg Pricing Games is a two-level combinatorial pricing problem
studied in the Economics, Operation Research, and Computer Science communities.
In this paper, we consider the decade-old shortest path version of this problem
which is the first and most studied problem in this family.
The game is played on a graph (representing a network) consisting of {\em
fixed cost} edges and {\em pricable} or {\em variable cost} edges. The fixed
cost edges already have some fixed price (representing the competitor's
prices). Our task is to choose prices for the variable cost edges. After that,
a client will buy the cheapest path from a node $s$ to a node $t$, using any
combination of fixed cost and variable cost edges. The goal is to maximize the
revenue on variable cost edges.
In this paper, we show that the problem is hard to approximate within
$2-\epsilon$, improving the previous \APX-hardness result by Joret [to appear
in {\em Networks}]. Our technique combines the existing ideas with a new
insight into the price structure and its relation to the hardness of the
instances.
|
[
{
"version": "v1",
"created": "Fri, 2 Oct 2009 19:54:54 GMT"
}
] | 2009-10-05T00:00:00 |
[
[
"Chalermsook",
"Parinya",
""
],
[
"Laekhanukit",
"Bundit",
""
],
[
"Nanongkai",
"Danupon",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.0456
|
Kamiar Rahnama Rad
|
Kamiar Rahnama Rad
|
Sharp Sufficient Conditions on Exact Sparsity Pattern Recovery
|
submitted to IEEE Trans. on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Consider the $n$-dimensional vector $y=X\be+\e$, where $\be \in \R^p$ has
only $k$ nonzero entries and $\e \in \R^n$ is a Gaussian noise. This can be
viewed as a linear system with sparsity constraints, corrupted by noise. We
find a non-asymptotic upper bound on the probability that the optimal decoder
for $\beta$ declares a wrong sparsity pattern, given any generic perturbation
matrix $X$. In the case when $X$ is randomly drawn from a Gaussian ensemble, we
obtain asymptotically sharp sufficient conditions for exact recovery, which
agree with the known necessary conditions previously established.
|
[
{
"version": "v1",
"created": "Fri, 2 Oct 2009 17:55:28 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Oct 2009 16:35:40 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Oct 2009 04:46:06 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Rad",
"Kamiar Rahnama",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.0460
|
Andreas Bj\"orklund
|
Andreas Bj\"orklund
|
Exact Covers via Determinants
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a k-uniform hypergraph on n vertices, partitioned in k equal parts such
that every hyperedge includes one vertex from each part, the k-dimensional
matching problem asks whether there is a disjoint collection of the hyperedges
which covers all vertices. We show it can be solved by a randomized polynomial
space algorithm in time O*(2^(n(k-2)/k)). The O*() notation hides factors
polynomial in n and k.
When we drop the partition constraint and permit arbitrary hyperedges of
cardinality k, we obtain the exact cover by k-sets problem. We show it can be
solved by a randomized polynomial space algorithm in time O*(c_k^n), where
c_3=1.496, c_4=1.642, c_5=1.721, and provide a general bound for larger k.
Both results substantially improve on the previous best algorithms for these
problems, especially for small k, and follow from the new observation that
Lovasz' perfect matching detection via determinants (1979) admits an embedding
in the recently proposed inclusion-exclusion counting scheme for set covers,
despite its inability to count the perfect matchings.
|
[
{
"version": "v1",
"created": "Fri, 2 Oct 2009 19:36:39 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Jan 2010 16:53:00 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Feb 2010 11:00:50 GMT"
}
] | 2010-02-03T00:00:00 |
[
[
"Björklund",
"Andreas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.0483
|
Christos Dimitrakakis
|
Christos Dimitrakakis, Aikaterini Mitrokotsa
|
Statistical Decision Making for Authentication and Intrusion Detection
|
13 pages, 2 figures, to be presented at ICMLA 2009
| null | null |
IAS-UVA-09-02
|
stat.ML cs.LG stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
User authentication and intrusion detection differ from standard
classification problems in that while we have data generated from legitimate
users, impostor or intrusion data is scarce or non-existent. We review existing
techniques for dealing with this problem and propose a novel alternative based
on a principled statistical decision-making view point. We examine the
technique on a toy problem and validate it on complex real-world data from an
RFID based access control system. The results indicate that it can
significantly outperform the classical world model approach. The method could
be more generally useful in other decision-making scenarios where there is a
lack of adversary data.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 19:43:40 GMT"
}
] | 2009-12-26T00:00:00 |
[
[
"Dimitrakakis",
"Christos",
""
],
[
"Mitrokotsa",
"Aikaterini",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0910.0493
|
Patrizio Pelliccione
|
Antonio Bucchiarone, Davide Di Ruscio, Henry Muccini, and Patrizio
Pelliccione
|
From Requirements to code: an Architecture-centric Approach for
producing Quality Systems
|
Chapter of the book "Model-Driven Software Development: Integrating
Quality Assurance". Idea Group Inc., Information Science Publishing, IRM
Press. 2008
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When engineering complex and distributed software and hardware systems
(increasingly used in many sectors, such as manufacturing, aerospace,
transportation, communication, energy, and health-care), quality has become a
big issue, since failures can have economics consequences and can also endanger
human life. Model-based specifications of a component-based system permit to
explicitly model the structure and behaviour of components and their
integration. In particular Software Architectures (SA) has been advocated as an
effective means to produce quality systems. In this chapter by combining
different technologies and tools for analysis and development, we propose an
architecture-centric model-driven approach to validate required properties and
to generate the system code. Functional requirements are elicited and used for
identifying expected properties the architecture shall express. The
architectural compliance to the properties is formally demonstrated, and the
produced architectural model is used to automatically generate the Java code.
Suitable transformations assure that the code is conforming to both structural
and behavioural SA constraints. This chapter describes the process and
discusses how some existing tools and languages can be exploited to support the
approach.
|
[
{
"version": "v1",
"created": "Fri, 2 Oct 2009 21:57:54 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Bucchiarone",
"Antonio",
""
],
[
"Di Ruscio",
"Davide",
""
],
[
"Muccini",
"Henry",
""
],
[
"Pelliccione",
"Patrizio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0910.0504
|
Jos\'e A. Soto
|
Jos\'e Soto
|
Improved Analysis of a Max Cut Algorithm Based on Spectral Partitioning
|
9 pages, 2 figures. Final version
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Trevisan [SICOMP 2012] presented an algorithm for Max-Cut based on spectral
partitioning techniques. This is the first algorithm for Max-Cut with an
approximation guarantee strictly larger than 1/2 that is not based on
semidefinite programming. Trevisan showed that its approximation ratio is of at
least 0.531. In this paper we improve this bound up to 0.614247. We also define
and extend this result for the more general Maximum Colored Cut problem.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 19:58:59 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Dec 2014 14:20:14 GMT"
}
] | 2014-12-03T00:00:00 |
[
[
"Soto",
"José",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.0505
|
Imran Haque
|
Imran S. Haque and Vijay S. Pande
|
Hard Data on Soft Errors: A Large-Scale Assessment of Real-World Error
Rates in GPGPU
|
10 pages, 5 figures. For associated code and binaries, see
https://simtk.org/home/memtest . Poster version to be presented at
Supercomputing 2009. Version 1 of submission contained erroneous analysis of
transaction coalescing on GT200
| null | null | null |
cs.AR cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Graphics processing units (GPUs) are gaining widespread use in computational
chemistry and other scientific simulation contexts because of their huge
performance advantages relative to conventional CPUs. However, the reliability
of GPUs in error-intolerant applications is largely unproven. In particular, a
lack of error checking and correcting (ECC) capability in the memory subsystems
of graphics cards has been cited as a hindrance to the acceptance of GPUs as
high-performance coprocessors, but the impact of this design has not been
previously quantified.
In this article we present MemtestG80, our software for assessing memory
error rates on NVIDIA G80 and GT200-architecture-based graphics cards.
Furthermore, we present the results of a large-scale assessment of GPU error
rate, conducted by running MemtestG80 on over 20,000 hosts on the Folding@home
distributed computing network. Our control experiments on consumer-grade and
dedicated-GPGPU hardware in a controlled environment found no errors. However,
our survey over cards on Folding@home finds that, in their installed
environments, two-thirds of tested GPUs exhibit a detectable, pattern-sensitive
rate of memory soft errors. We demonstrate that these errors persist after
controlling for overclocking and environmental proxies for temperature, but
depend strongly on board architecture.
|
[
{
"version": "v1",
"created": "Sat, 3 Oct 2009 02:04:22 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Nov 2009 04:14:30 GMT"
}
] | 2009-11-14T00:00:00 |
[
[
"Haque",
"Imran S.",
""
],
[
"Pande",
"Vijay S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0910.0513
|
Ye Du
|
Ye Du
|
Ranking via Arrow-Debreu Equilibrium
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we establish a connection between ranking theory and general
equilibrium theory. First of all, we show that the ranking vector of PageRank
or Invariant method is precisely the equilibrium of a special Cobb-Douglas
market. This gives a natural economic interpretation for the PageRank or
Invariant method. Furthermore, we propose a new ranking method, the CES
ranking, which is minimally fair, strictly monotone and invariant to reference
intensity, but not uniform or weakly additive.
|
[
{
"version": "v1",
"created": "Sat, 3 Oct 2009 05:39:01 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Du",
"Ye",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0910.0537
|
Victor Gluzberg
|
Victor Gluzberg
|
A Note On Higher Order Grammar
|
7 pages in single-spaced pdf format
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Both syntax-phonology and syntax-semantics interfaces in Higher Order Grammar
(HOG) are expressed as axiomatic theories in higher-order logic (HOL), i.e. a
language is defined entirely in terms of provability in the single logical
system. An important implication of this elegant architecture is that the
meaning of a valid expression turns out to be represented not by a single, nor
even by a few "discrete" terms (in case of ambiguity), but by a "continuous"
set of logically equivalent terms. The note is devoted to precise formulation
and proof of this observation.
|
[
{
"version": "v1",
"created": "Sat, 3 Oct 2009 12:26:47 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Gluzberg",
"Victor",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0910.0542
|
Om Patri
|
Om Prasad Patri, Amit Kumar Mishra
|
Pre-processing in AI based Prediction of QSARs
|
6 pages, 12 figures, In the Proceedings of the 12th International
Conference on Information Technology, ICIT 2009, December 21-24 2009,
Bhubaneswar, India
| null | null | null |
cs.AI cs.NE q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Machine learning, data mining and artificial intelligence (AI) based methods
have been used to determine the relations between chemical structure and
biological activity, called quantitative structure activity relationships
(QSARs) for the compounds. Pre-processing of the dataset, which includes the
mapping from a large number of molecular descriptors in the original high
dimensional space to a small number of components in the lower dimensional
space while retaining the features of the original data, is the first step in
this process. A common practice is to use a mapping method for a dataset
without prior analysis. This pre-analysis has been stressed in our work by
applying it to two important classes of QSAR prediction problems: drug design
(predicting anti-HIV-1 activity) and predictive toxicology (estimating
hepatocarcinogenicity of chemicals). We apply one linear and two nonlinear
mapping methods on each of the datasets. Based on this analysis, we conclude
the nature of the inherent relationships between the elements of each dataset,
and hence, the mapping method best suited for it. We also show that proper
preprocessing can help us in choosing the right feature extraction tool as well
as give an insight about the type of classifier pertinent for the given
problem.
|
[
{
"version": "v1",
"created": "Sat, 3 Oct 2009 18:46:00 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Patri",
"Om Prasad",
""
],
[
"Mishra",
"Amit Kumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0910.0548
|
Lyubov Positselskaya
|
Lyubov N. Positselskaya
|
Noisy fighter-bomber duel
|
Equally detailed English and Russian versions, each 23 pages long.
LaTeX 2e, with Babel for the Russian version
| null | null | null |
math.OC cs.GT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We discuss a duel-type game in which Player I uses his resource continuously
and Player II distributes it by discrete portions. Each player knows how much
resources he and his opponent have at every moment of time. The solution of the
game is given in an explicit form.
Keywords: noisy duel, payoff, strategy, the value of a game, consumption of
resource.
|
[
{
"version": "v1",
"created": "Sun, 4 Oct 2009 15:22:01 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Positselskaya",
"Lyubov N.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0910.0553
|
Michel Goemans
|
Michel X. Goemans
|
Combining Approximation Algorithms for the Prize-Collecting TSP
|
5 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a 1.91457-approximation algorithm for the prize-collecting
travelling salesman problem. This is obtained by combining a randomized variant
of a rounding algorithm of Bienstock et al. and a primal-dual algorithm of
Goemans and Williamson.
|
[
{
"version": "v1",
"created": "Sat, 3 Oct 2009 15:48:44 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Goemans",
"Michel X.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.0555
|
Syed Jafar
|
Syed A. Jafar
|
Exploiting Channel Correlations - Simple Interference Alignment Schemes
with no CSIT
|
18 pages, 6 figures
|
IEEE Journal of Selected Topics in Signal Processing, Vol. 6, No.
3, June 2012
|
10.1109/GLOCOM.2010.5683592
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We explore 5 network communication problems where the possibility of
interference alignment, and consequently the total number of degrees of freedom
(DoF) with channel uncertainty at the transmitters are unknown. These problems
share the common property that in each case the best known outer bounds are
essentially robust to channel uncertainty and represent the outcome with
interference alignment, but the best inner bounds -- in some cases conjectured
to be optimal -- predict a total collapse of DoF, thus indicating the
infeasibility of interference alignment under channel uncertainty at
transmitters. Our main contribution is to show that even with no knowledge of
channel coefficient values at the transmitters, the knowledge of the channels'
correlation structure can be exploited to achieve interference alignment. In
each case, we show that under a staggered block fading model, the transmitters
are able to align interference without the knowledge of channel coefficient
values. The alignment schemes are based on linear beamforming -- which can be
seen as a repetition code over a small number of symbols -- and involve delays
of only a few coherence intervals.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 02:51:18 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Jafar",
"Syed A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.0575
|
Gabriel Tucci
|
Gabriel H. Tucci and Maria V. Vega
|
A Note on Functional Averages over Gaussian Ensembles
|
Published in Journal of Probability and Statistics, Vol. 2013,
Article ID 941058
| null | null | null |
math.PR cs.IT math.IT math.OA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work we find a new formula for matrix averages over the Gaussian
ensemble. Let ${\bf H}$ be an $n\times n$ Gaussian random matrix with complex,
independent, and identically distributed entries of zero mean and unit
variance. Given an $n\times n$ positive definite matrix ${\bf A}$, and a
continuous function $f:\R^{+}\to\R$ such that $\int_{0}^{\infty}{e^{-\alpha
t}|f(t)|^2\,dt}<\infty$ for every $\alpha>0$, we find a new formula for the
expectation $\E[\mathrm{Tr}(f({\bf HAH^{*}}))]$. Taking $f(x)=\log(1+x)$ gives
another formula for the capacity of the MIMO communication channel, and taking
$f(x)=(1+x)^{-1}$ gives the MMSE achieved by a linear receiver.
|
[
{
"version": "v1",
"created": "Sat, 3 Oct 2009 22:25:09 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Oct 2009 01:57:00 GMT"
},
{
"version": "v3",
"created": "Thu, 8 Oct 2009 18:06:32 GMT"
},
{
"version": "v4",
"created": "Sat, 2 Oct 2010 14:09:37 GMT"
},
{
"version": "v5",
"created": "Mon, 19 Sep 2011 12:07:10 GMT"
},
{
"version": "v6",
"created": "Sat, 13 Jul 2013 03:02:31 GMT"
}
] | 2013-07-16T00:00:00 |
[
[
"Tucci",
"Gabriel H.",
""
],
[
"Vega",
"Maria V.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OA",
"description": "Algebras of operators on Hilbert space, C^*-algebras, von Neumann algebras, non-commutative geometry",
"span": "(Operator Algebras)"
}
] |
0910.0582
|
Michael Lampis
|
Michael Lampis
|
Algorithmic Meta-Theorems for Graphs of Bounded Vertex Cover
|
In this version, the algorithmic results have been extended to a new
graph width, called neighborhood diversity
| null | null | null |
cs.DS cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Possibly the most famous algorithmic meta-theorem is Courcelle's theorem,
which states that all MSO-expressible graph properties are decidable in linear
time for graphs of bounded treewidth. Unfortunately, the running time's
dependence on the MSO formula describing the problem is in general a tower of
exponentials of unbounded height, and there exist lower bounds proving that
this cannot be improved even if we restrict ourselves to deciding FO logic on
trees.
In this paper we attempt to circumvent these lower bounds by focusing on a
subclass of bounded treewidth graphs, the graphs of bounded vertex cover. By
using a technique different from the standard decomposition and dynamic
programming technique of treewidth we prove that in this case the running time
implied by Courcelle's theorem can be improved dramatically, from
non-elementary to doubly and singly exponential for MSO and FO logic
respectively. Our technique relies on a new graph width measure we introduce,
for which we show some additional results that may indicate that it is of
independent interest. We also prove lower bound results which show that our
upper bounds cannot be improved significantly, under widely believed complexity
assumptions. Our work answers an open problem posed by Michael Fellows.
|
[
{
"version": "v1",
"created": "Sun, 4 Oct 2009 02:58:25 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Nov 2009 21:22:08 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Lampis",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.0610
|
Ambuj Tewari
|
Sham M. Kakade, Shai Shalev-Shwartz, Ambuj Tewari
|
Regularization Techniques for Learning with Matrices
| null | null | null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There is growing body of learning problems for which it is natural to
organize the parameters into matrix, so as to appropriately regularize the
parameters under some matrix norm (in order to impose some more sophisticated
prior knowledge). This work describes and analyzes a systematic method for
constructing such matrix-based, regularization methods. In particular, we focus
on how the underlying statistical properties of a given problem can help us
decide which regularization function is appropriate.
Our methodology is based on the known duality fact: that a function is
strongly convex with respect to some norm if and only if its conjugate function
is strongly smooth with respect to the dual norm. This result has already been
found to be a key component in deriving and analyzing several learning
algorithms. We demonstrate the potential of this framework by deriving novel
generalization and regret bounds for multi-task learning, multi-class learning,
and kernel learning.
|
[
{
"version": "v1",
"created": "Sun, 4 Oct 2009 14:48:46 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Oct 2010 21:34:13 GMT"
}
] | 2010-10-19T00:00:00 |
[
[
"Kakade",
"Sham M.",
""
],
[
"Shalev-Shwartz",
"Shai",
""
],
[
"Tewari",
"Ambuj",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0910.0626
|
Mugurel Ionut Andreica
|
Alexandru Costan, Corina Stratan, Eliana-Dina Tirsa, Mugurel Ionut
Andreica, Valentin Cristea
|
Towards a Grid Platform for Scientific Workflows Management
| null |
Proc. of the 17th Intl. Conf. on Control Systems and Computer
Science (CSCS), vol. 1, pp. 37-44, Bucharest, Romania, 26-29 May, 2009.
(ISSN: 2066-4451)
| null | null |
cs.DC cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Workflow management systems allow the users to develop complex applications
at a higher level, by orchestrating functional components without handling the
implementation details. Although a wide range of workflow engines are developed
in enterprise environments, the open source engines available for scientific
applications lack some functionalities or are too difficult to use for
non-specialists. Our purpose is to develop a workflow management platform for
distributed systems, that will provide features like an intuitive way to
describe workflows, efficient data handling mechanisms and flexible fault
tolerance support. We introduce here an architectural model for the workflow
platform, based on the ActiveBPEL workflow engine, which we propose to augment
with an additional set of components.
|
[
{
"version": "v1",
"created": "Sun, 4 Oct 2009 18:28:16 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Costan",
"Alexandru",
""
],
[
"Stratan",
"Corina",
""
],
[
"Tirsa",
"Eliana-Dina",
""
],
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Cristea",
"Valentin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.0641
|
Arnab Bhattacharyya
|
Arnab Bhattacharyya, Swastik Kopparty, Grant Schoenebeck, Madhu Sudan,
David Zuckerman
|
Optimal Testing of Reed-Muller Codes
|
22 pages; introduction reformulated and some minor changes
| null | null | null |
math.CO cs.CC cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of testing if a given function f : F_2^n -> F_2 is
close to any degree d polynomial in n variables, also known as the Reed-Muller
testing problem. The Gowers norm is based on a natural 2^{d+1}-query test for
this property. Alon et al. [AKKLR05] rediscovered this test and showed that it
accepts every degree d polynomial with probability 1, while it rejects
functions that are Omega(1)-far with probability Omega(1/(d 2^{d})). We give an
asymptotically optimal analysis of this test, and show that it rejects
functions that are (even only) Omega(2^{-d})-far with Omega(1)-probability (so
the rejection probability is a universal constant independent of d and n). This
implies a tight relationship between the (d+1)st Gowers norm of a function and
its maximal correlation with degree d polynomials, when the correlation is
close to 1. Our proof works by induction on n and yields a new analysis of even
the classical Blum-Luby-Rubinfeld [BLR93] linearity test, for the setting of
functions mapping F_2^n to F_2. The optimality follows from a tighter analysis
of counterexamples to the "inverse conjecture for the Gowers norm" constructed
by [GT09,LMS08]. Our result has several implications. First, it shows that the
Gowers norm test is tolerant, in that it also accepts close codewords. Second,
it improves the parameters of an XOR lemma for polynomials given by Viola and
Wigderson [VW07]. Third, it implies a "query hierarchy" result for property
testing of affine-invariant properties. That is, for every function q(n), it
gives an affine-invariant property that is testable with O(q(n))-queries, but
not with o(q(n))-queries, complementing an analogous result of [GKNR09] for
graph properties.
|
[
{
"version": "v1",
"created": "Sun, 4 Oct 2009 21:17:45 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Apr 2010 05:06:05 GMT"
}
] | 2010-04-12T00:00:00 |
[
[
"Bhattacharyya",
"Arnab",
""
],
[
"Kopparty",
"Swastik",
""
],
[
"Schoenebeck",
"Grant",
""
],
[
"Sudan",
"Madhu",
""
],
[
"Zuckerman",
"David",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.0646
|
Gerard Briscoe Dr
|
Gerard Briscoe and Suzanne Sadedin
|
Digital Business Ecosystems: Natural Science Paradigms
|
8 pages, 5 Figures
| null | null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A primary motivation for research in Digital Ecosystems is the desire to
exploit the self-organising properties of natural ecosystems. Ecosystems arc
thought to be robust, scalable architectures that can automatically solve
complex, dynamic problems. However, the biological processes that contribute to
these properties have not been made explicit in Digital Ecosystem research.
Here, we introduce how biological properties contribute to the self-organising
features of natural ecosystems. These properties include populations of
evolving agents, a complex dynamic environment, and spatial distributions which
generate local interactions. The potential for exploiting these properties in
artificial systems is then considered.
|
[
{
"version": "v1",
"created": "Sun, 4 Oct 2009 22:09:18 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Briscoe",
"Gerard",
""
],
[
"Sadedin",
"Suzanne",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0910.0650
|
Himanshu Tyagi
|
Himanshu Tyagi
|
Capacity Region of a State Dependent Degraded Broadcast Channel with
Noncausal Transmitter CSI
|
This paper has been withdrawn due to a mistake in the previous
version
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper has been withdrawn due to a mistake in the previous version.
|
[
{
"version": "v1",
"created": "Sun, 4 Oct 2009 22:54:15 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Dec 2009 03:09:37 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Tyagi",
"Himanshu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.0651
|
Benjamin Recht
|
Benjamin Recht
|
A Simpler Approach to Matrix Completion
|
13 pages. Fixed typos. Added references
| null | null | null |
cs.IT cs.NA math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper provides the best bounds to date on the number of randomly sampled
entries required to reconstruct an unknown low rank matrix. These results
improve on prior work by Candes and Recht, Candes and Tao, and Keshavan,
Montanari, and Oh. The reconstruction is accomplished by minimizing the nuclear
norm, or sum of the singular values, of the hidden matrix subject to agreement
with the provided entries. If the underlying matrix satisfies a certain
incoherence condition, then the number of entries required is equal to a
quadratic logarithmic factor times the number of parameters in the singular
value decomposition. The proof of this assertion is short, self contained, and
uses very elementary analysis. The novel techniques herein are based on recent
work in quantum information theory.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 17:48:42 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Oct 2009 16:23:52 GMT"
}
] | 2009-10-21T00:00:00 |
[
[
"Recht",
"Benjamin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0910.0653
|
Himanshu Tyagi
|
Himanshu Tyagi and Prakash Narayan
|
The Gelfand-Pinsker Channel: Strong Converse and Upper Bound for the
Reliability Function
|
4 pages, Presented at the ISIT 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a Gelfand-Pinsker discrete memoryless channel (DMC) model and
provide a strong converse for its capacity. The strong converse is then used to
obtain an upper bound on the reliability function. Instrumental in our proofs
is a new technical lemma which provides an upper bound for the rate of codes
with codewords that are conditionally typical over large message dependent
subsets of a typical set of state sequences. This technical result is a
nonstraightforward analog of a known result for a DMC without states that
provides an upper bound on the rate of a good code with codewords of a fixed
type (to be found in, for instance, the Csiszar-Korner book).
|
[
{
"version": "v1",
"created": "Sun, 4 Oct 2009 23:31:19 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Tyagi",
"Himanshu",
""
],
[
"Narayan",
"Prakash",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.0663
|
Fei Wei
|
Fei Wei, Huazhong Yang
|
Transmission line inspires a new distributed algorithm to solve linear
system of circuit
|
This work was finished in Nov 2007. Recently we are preparing it for
IEEE Trans. CAD. More info, see my web page at
http://weifei00.googlepages.com
| null | null | null |
cs.CE cs.DC cs.MS cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Transmission line, or wire, is always troublesome to integrated circuits
designers, but it could be helpful to parallel computing researchers. This
paper proposes the Virtual Transmission Method (VTM), which is a new
distributed and stationary iterative algorithm to solve the linear system
extracted from circuit. It tears the circuit by virtual transmission lines to
achieve distributed computing. For the symmetric positive definite (SPD) linear
system, VTM is proved to be convergent. For the unsymmetrical linear system,
numerical experiments show that VTM is possible to achieve better convergence
property than the traditional stationary algorithms. VTM could be accelerated
by some preconditioning techniques, and the convergence speed of VTM is fast
when its preconditioner is properly chosen.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 03:08:43 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Nov 2009 09:42:47 GMT"
},
{
"version": "v3",
"created": "Mon, 26 Apr 2010 09:17:58 GMT"
},
{
"version": "v4",
"created": "Mon, 28 Jun 2010 06:48:46 GMT"
},
{
"version": "v5",
"created": "Tue, 7 Sep 2010 23:43:49 GMT"
},
{
"version": "v6",
"created": "Sun, 31 Oct 2010 02:42:32 GMT"
},
{
"version": "v7",
"created": "Thu, 9 Dec 2010 08:33:24 GMT"
}
] | 2010-12-10T00:00:00 |
[
[
"Wei",
"Fei",
""
],
[
"Yang",
"Huazhong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0910.0665
|
Laszlo Kish
|
Lazar L. Kish, Bruce Zhang, Laszlo B. Kish
|
Cracking the Liu key exchange protocol in its most secure state with
Lorentzian spectra
|
Accepted for publication at November 18, 2009
|
Fluctuation and Noise Letters Vol. 9, No. 1 (2010) 37-45
|
10.1142/S0219477510000058
| null |
physics.data-an cs.CR quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We have found a security risk in the Liu's cypher based on random signals and
feedback, when it utilizes a large class of noises for communication in its
most secure state, the steady state. For the vulnerability to exist, the noise
must have a spectrum which can be transformed to white-like noise by linear
filtering. For the cracking, we utilize the natural properties of power density
spectra and autocorrelation functions. We introduce and demonstrate the method
for Lorentzian spectra. Some of the implications of the results concern the
transient operation during changing bits, where the modulation products of
noise cannot be band-limited therefore the cypher is vulnerable. We propose the
application of line filters to provide a proper spectral shape and to improve
the security.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 03:39:29 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Oct 2009 18:25:40 GMT"
},
{
"version": "v3",
"created": "Tue, 6 Oct 2009 20:04:17 GMT"
},
{
"version": "v4",
"created": "Mon, 19 Oct 2009 16:28:22 GMT"
},
{
"version": "v5",
"created": "Wed, 18 Nov 2009 16:08:32 GMT"
}
] | 2010-05-02T00:00:00 |
[
[
"Kish",
"Lazar L.",
""
],
[
"Zhang",
"Bruce",
""
],
[
"Kish",
"Laszlo B.",
""
]
] |
[
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0910.0668
|
Ahmed Abdel-Gawad
|
Yuan Qi, Ahmed H. Abdel-Gawad and Thomas P. Minka
|
Variable sigma Gaussian processes: An expectation propagation
perspective
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Gaussian processes (GPs) provide a probabilistic nonparametric representation
of functions in regression, classification, and other problems. Unfortunately,
exact learning with GPs is intractable for large datasets. A variety of
approximate GP methods have been proposed that essentially map the large
dataset into a small set of basis points. The most advanced of these, the
variable-sigma GP (VSGP) (Walder et al., 2008), allows each basis point to have
its own length scale. However, VSGP was only derived for regression. We
describe how VSGP can be applied to classification and other problems, by
deriving it as an expectation propagation algorithm. In this view, sparse GP
approximations correspond to a KL-projection of the true posterior onto a
compact exponential family of GPs. VSGP constitutes one such family, and we
show how to enlarge this family to get additional accuracy. In particular, we
show that endowing each basis point with its own full covariance matrix
provides a significant increase in approximation power.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 03:30:13 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Oct 2009 21:52:48 GMT"
}
] | 2010-02-23T00:00:00 |
[
[
"Qi",
"Yuan",
""
],
[
"Abdel-Gawad",
"Ahmed H.",
""
],
[
"Minka",
"Thomas P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0910.0674
|
Gerard Briscoe Dr
|
G. Briscoe and P. De Wilde
|
Computing of Applied Digital Ecosystems
|
8 pages, 10 figures, ACM Management of Emergent Digital EcoSystems
(MEDES) 2009
| null | null | null |
cs.NE cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A primary motivation for our research in digital ecosystems is the desire to
exploit the self-organising properties of biological ecosystems. Ecosystems are
thought to be robust, scalable architectures that can automatically solve
complex, dynamic problems. However, the computing technologies that contribute
to these properties have not been made explicit in digital ecosystems research.
Here, we discuss how different computing technologies can contribute to
providing the necessary self-organising features, including Multi-Agent
Systems, Service-Oriented Architectures, and distributed evolutionary
computing. The potential for exploiting these properties in digital ecosystems
is considered, suggesting how several key features of biological ecosystems can
be exploited in Digital Ecosystems, and discussing how mimicking these features
may assist in developing robust, scalable self-organising architectures. An
example architecture, the Digital Ecosystem, is considered in detail. The
Digital Ecosystem is then measured experimentally through simulations,
considering the self-organised diversity of its evolving agent populations
relative to the user request behaviour.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 04:29:29 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Briscoe",
"G.",
""
],
[
"De Wilde",
"P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0910.0695
|
Gerard Henry Edmond Duchamp
|
L. Poinsot (LIPN), G. H. E. Duchamp (LIPN), S. Goodenough (LIPN), K.
A. Penson (LPTL)
|
Statistics on Graphs, Exponential Formula and Combinatorial Physics
| null |
Journal of Nonlinear Systems and Applications 1, 1 (2010) 58-62
| null | null |
cs.DM cs.CE math.CO quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The concern of this paper is a famous combinatorial formula known under the
name "exponential formula". It occurs quite naturally in many contexts
(physics, mathematics, computer science). Roughly speaking, it expresses that
the exponential generating function of a whole structure is equal to the
exponential of those of connected substructures. Keeping this descriptive
statement as a guideline, we develop a general framework to handle many
different situations in which the exponential formula can be applied.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 08:44:47 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Feb 2010 07:24:04 GMT"
}
] | 2010-11-04T00:00:00 |
[
[
"Poinsot",
"L.",
"",
"LIPN"
],
[
"Duchamp",
"G. H. E.",
"",
"LIPN"
],
[
"Goodenough",
"S.",
"",
"LIPN"
],
[
"Penson",
"K. A.",
"",
"LPTL"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0910.0703
|
Dmitry Lande
|
D.V. Lande A.A. Snarskii
|
Self-similarity properties in a queuing network model
|
5 pages, 5 figures
| null | null | null |
cs.NI cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper a model of subscriber telephone network based on the concept of
cellular automata is elaborated. Some fractal properties inherent in the model
are revealed that vary depending on parameters assigning its operation rules.
The main advantage of the model in question is its compatibility with
algorithmic methods - a finite set of formal rules, assigned on a finite set of
elements (cells), allows precise realization in the form of algorithms.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 09:50:11 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Snarskii",
"D. V. Lande A. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.0708
|
Mugurel Ionut Andreica
|
Ciprian Mihai Dobre, Florin Pop, Alexandru Costan, Mugurel Ionut
Andreica, Valentin Cristea
|
Robust Failure Detection Architecture for Large Scale Distributed
Systems
| null |
Proc. of the 17th Intl. Conf. on Control Systems and Computer
Science (CSCS), vol. 1, pp. 433-440, Bucharest, Romania, 26-29 May, 2009
| null | null |
cs.DC cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Failure detection is a fundamental building block for ensuring fault
tolerance in large scale distributed systems. There are lots of approaches and
implementations in failure detectors. Providing flexible failure detection in
off-the-shelf distributed systems is difficult. In this paper we present an
innovative solution to this problem. Our approach is based on adaptive,
decentralized failure detectors, capable of working asynchronous and
independent on the application flow. The proposed solution considers an
architecture for the failure detectors, based on clustering, the use of a
gossip-based algorithm for detection at local level and the use of a
hierarchical structure among clusters of detectors along which traffic is
channeled. The solution can scale to a large number of nodes, considers the QoS
requirements of both applications and resources, and includes fault tolerance
and system orchestration mechanisms, added in order to asses the reliability
and availability of distributed systems.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 10:05:19 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Dobre",
"Ciprian Mihai",
""
],
[
"Pop",
"Florin",
""
],
[
"Costan",
"Alexandru",
""
],
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Cristea",
"Valentin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.0733
|
Manar Mohaisen
|
Manar Mohaisen, KyungHi Chang
|
Co-Channel Interference Cancellation in OFDM Networks using Coordinated
Symbol Repetition and Soft Decision MLE CCI Canceler
|
4 pages, 8 figures, IEEE International Conference on Signal
Processing and Communications, 2007. ICSPC 2007
| null |
10.1109/ICSPC.2007.4728510
| null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a new scheme of downlink co-channel interference (CCI)
cancellation in OFDM cellular networks is introduced for users at the
cell-edge. Coordinated symbol transmission between base stations (BS) is
operated where the same symbol is transmitted from different BS on different
sub-carriers. At the mobile station (MS) receiver, we introduce a soft decision
maximum likelihood CCI canceler and a modified maximum ratio combining (M-MRC)
to obtain an estimate of the transmitted symbols. Weights used in the combining
method are derived from the channels coefficients between the cooperated BS and
the MS. Simulations show that the proposed scheme works well under
frequency-selective channels and frequency non-selective channels. A gain of 9
dB and 6 dB in SIR is obtained under multipath fading and flat-fading channels,
respectively.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 11:38:36 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Mohaisen",
"Manar",
""
],
[
"Chang",
"KyungHi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0910.0735
|
Erika De Francesco
|
Erika De Francesco, Salvatore Iiritano, Antonino Spagnolo, Marco
Iannelli
|
A methodology for semi-automatic classification schema building
|
36 pages
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describe a methodology for semi-automatic classification schema
definition (a classification schema is a taxonomy of categories useful for
automatic document classification). The methodology is based on: (i) an
extensional approach useful to create a typology starting from a document base,
and (ii) an intensional approach to build the classification schema starting
from the typology. The extensional approach uses clustering techniques to group
together documents on the basis of a similarity measure, whereas the
intensional approach uses different operations (aggregation, reduction,
generalization specialization) to define classes. keywords: ontology,
classification schema, fundamentum divisionis, cluster analysis classification
task.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 11:44:54 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"De Francesco",
"Erika",
""
],
[
"Iiritano",
"Salvatore",
""
],
[
"Spagnolo",
"Antonino",
""
],
[
"Iannelli",
"Marco",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0910.0747
|
Andrew Gacek
|
Andrew Gacek
|
A Framework for Specifying, Prototyping, and Reasoning about
Computational Systems
|
PhD Thesis submitted September, 2009
| null | null | null |
cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This thesis concerns the development of a framework that facilitates the
design and analysis of formal systems. Specifically, this framework provides a
specification language which supports the concise and direct description of
formal systems, a mechanism for animating the specification language thereby
producing prototypes of encoded systems, and a logic for proving properties of
specifications and therefore of the systems they encode. A defining
characteristic of the proposed framework is that it is based on two separate
but closely intertwined logics: a specification logic that facilitates the
description of computational structure and another logic that exploits the
special characteristics of the specification logic to support reasoning about
the computational behavior of systems that are described using it. Both logics
embody a natural treatment of binding structure by using the lambda-calculus as
a means for representing objects and by incorporating special mechanisms for
working with such structure. By using this technique, they lift the treatment
of binding from the object language into the domain of the relevant meta logic,
thereby allowing the specification or analysis components to focus on the more
essential logical aspects of the systems that are encoded. The primary
contributions of these thesis are the development of a rich meta-logic called G
with capabilities for sophisticated reasoning that includes induction and
co-induction over high-level specifications of computations and with an
associated cut-elimination result; an interactive reasoning system called
Abella based on G; and several reasoning examples which demonstrate the
expressiveness and naturalness of both G and Abella.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 12:36:17 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Oct 2009 20:06:19 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Gacek",
"Andrew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0910.0750
|
Adrien Richard
|
Adrien Richard
|
Local negative circuits and fixed points in Boolean networks
|
19 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To each Boolean function F from {0,1}^n to itself and each point x in
{0,1}^n, we associate the signed directed graph G_F(x) of order n that contains
a positive (resp. negative) arc from j to i if the partial derivative of f_i
with respect of x_j is positive (resp. negative) at point x. We then focus on
the following open problem: Is the absence of a negative circuit in G_F(x) for
all x in {0,1}^n a sufficient condition for F to have at least one fixed point?
As main result, we settle this problem under the additional condition that, for
all x in {0,1}^n, the out-degree of each vertex of G_F(x) is at most one.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 12:38:34 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Richard",
"Adrien",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.0767
|
Serena Bradde
|
M. Bailly-Bechet, S. Bradde, A. Braunstein, A. Flaxman, L. Foini, R.
Zecchina
|
Clustering with shallow trees
|
11 pages, 7 figures
|
J. Stat. Mech. (2009) P12010
|
10.1088/1742-5468/2009/12/P12010
| null |
cond-mat.dis-nn cs.DS q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new method for hierarchical clustering based on the optimisation
of a cost function over trees of limited depth, and we derive a
message--passing method that allows to solve it efficiently. The method and
algorithm can be interpreted as a natural interpolation between two well-known
approaches, namely single linkage and the recently presented Affinity
Propagation. We analyze with this general scheme three biological/medical
structured datasets (human population based on genetic information, proteins
based on sequences and verbal autopsies) and show that the interpolation
technique provides new insight.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 14:13:25 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Nov 2009 15:44:29 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Bailly-Bechet",
"M.",
""
],
[
"Bradde",
"S.",
""
],
[
"Braunstein",
"A.",
""
],
[
"Flaxman",
"A.",
""
],
[
"Foini",
"L.",
""
],
[
"Zecchina",
"R.",
""
]
] |
[
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0910.0777
|
Brent Heeringa
|
Glencora Borradaile, Brent Heeringa, Gordon Wilfong
|
The Knapsack Problem with Neighbour Constraints
|
Full version of IWOCA 2011 paper
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study a constrained version of the knapsack problem in which dependencies
between items are given by the adjacencies of a graph. In the 1-neighbour
knapsack problem, an item can be selected only if at least one of its
neighbours is also selected. In the all-neighbours knapsack problem, an item
can be selected only if all its neighbours are also selected. We give
approximation algorithms and hardness results when the nodes have both uniform
and arbitrary weight and profit functions, and when the dependency graph is
directed and undirected.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 14:34:09 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Feb 2010 16:59:28 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Jul 2011 16:25:45 GMT"
},
{
"version": "v4",
"created": "Tue, 27 Sep 2011 01:03:05 GMT"
}
] | 2011-09-28T00:00:00 |
[
[
"Borradaile",
"Glencora",
""
],
[
"Heeringa",
"Brent",
""
],
[
"Wilfong",
"Gordon",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.