id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0910.0817
Rdv Ijcsis
D. Shanmugapriya, G. Padmavathi
A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 115-119, September 2009, USA
null
ISSn 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Biometrics technologies are gaining popularity today since they provide more reliable and efficient means of authentication and verification. Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done by observing the change in the typing pattern of the user. A comprehensive survey of the existing keystroke dynamics methods, metrics, different approaches are given in this study. This paper also discusses about the various security issues and challenges faced by keystroke dynamics.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 18:18:23 GMT" } ]
2009-10-06T00:00:00
[ [ "Shanmugapriya", "D.", "" ], [ "Padmavathi", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0910.0819
Rdv Ijcsis
Md. Ashraful Islam, Riaz Uddin Mondal, Md. Zahid Hasan
Performance Evaluation of Wimax Physical Layer under Adaptive Modulation Techniques and Communication Channels
4 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 111-114, September 2009, USA
null
ISSn 1947 5500
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wimax (Worldwide Interoperability for Microwave Access) is a promising technology which can offer high speed voice, video and data service up to the customer end. The aim of this paper is the performance evaluation of an Wimax system under different combinations of digital modulation (BPSK, QPSK, 4 QAM and 16 QAM) and different communication channels AWGN and fading channels (Rayleigh and Rician). And the Wimax system incorporates Reed Solomon (RS) encoder with Convolutional encoder with half and two third rated codes in FEC channel coding. The simulation results of estimated Bit Error Rate (BER) displays that the implementation of interleaved RS code (255, 239, 8) with two third rated Convolutional code under BPSK modulation technique is highly effective to combat in the Wimax communication system. To complete this performance analysis in Wimax based systems, a segment of audio signal is used for analysis. The transmitted audio message is found to have retrieved effectively under noisy situation.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 18:30:05 GMT" } ]
2009-10-06T00:00:00
[ [ "Islam", "Md. Ashraful", "" ], [ "Mondal", "Riaz Uddin", "" ], [ "Hasan", "Md. Zahid", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0910.0820
Rdv Ijcsis
Adhistya Erna Permanasari, Dayang Rohaya Awang Rambli, Dhanapal Durai Dominic
Prediction of Zoonosis Incidence in Human using Seasonal Auto Regressive Integrated Moving Average (SARIMA)
8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 103-110, September 2009, USA
null
ISSn 1947 5500
cs.LG q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Zoonosis refers to the transmission of infectious diseases from animal to human. The increasing number of zoonosis incidence makes the great losses to lives, including humans and animals, and also the impact in social economic. It motivates development of a system that can predict the future number of zoonosis occurrences in human. This paper analyses and presents the use of Seasonal Autoregressive Integrated Moving Average (SARIMA) method for developing a forecasting model that able to support and provide prediction number of zoonosis human incidence. The dataset for model development was collected on a time series data of human tuberculosis occurrences in United States which comprises of fourteen years of monthly data obtained from a study published by Centers for Disease Control and Prevention (CDC). Several trial models of SARIMA were compared to obtain the most appropriate model. Then, diagnostic tests were used to determine model validity. The result showed that the SARIMA(9,0,14)(12,1,24)12 is the fittest model. While in the measure of accuracy, the selected model achieved 0.062 of Theils U value. It implied that the model was highly accurate and a close fit. It was also indicated the capability of final model to closely represent and made prediction based on the tuberculosis historical dataset.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 18:36:11 GMT" }, { "version": "v2", "created": "Thu, 8 Oct 2009 11:05:26 GMT" } ]
2009-10-08T00:00:00
[ [ "Permanasari", "Adhistya Erna", "" ], [ "Rambli", "Dayang Rohaya Awang", "" ], [ "Dominic", "Dhanapal Durai", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0910.0827
Jamal Najim
Pascal Bianchi (LTCI), Merouane Debbah (Chaire Radio Flexible), Myl\`ene Ma\"ida (LM-Orsay), Jamal Najim (LTCI)
Performance of Statistical Tests for Single Source Detection using Random Matrix Theory
45 p. improved presentation; more proofs provided
null
null
null
math.PR cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a unified framework for the detection of a source with a sensor array in the context where the noise variance and the channel between the source and the sensors are unknown at the receiver. The Generalized Maximum Likelihood Test is studied and yields the analysis of the ratio between the maximum eigenvalue of the sampled covariance matrix and its normalized trace. Using recent results of random matrix theory, a practical way to evaluate the threshold and the $p$-value of the test is provided in the asymptotic regime where the number $K$ of sensors and the number $N$ of observations per sensor are large but have the same order of magnitude. The theoretical performance of the test is then analyzed in terms of Receiver Operating Characteristic (ROC) curve. It is in particular proved that both Type I and Type II error probabilities converge to zero exponentially as the dimensions increase at the same rate, and closed-form expressions are provided for the error exponents. These theoretical results rely on a precise description of the large deviations of the largest eigenvalue of spiked random matrix models, and establish that the presented test asymptotically outperforms the popular test based on the condition number of the sampled covariance matrix.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 19:01:02 GMT" }, { "version": "v2", "created": "Mon, 31 May 2010 08:49:46 GMT" } ]
2010-06-16T00:00:00
[ [ "Bianchi", "Pascal", "", "LTCI" ], [ "Debbah", "Merouane", "", "Chaire Radio Flexible" ], [ "Maïda", "Mylène", "", "LM-Orsay" ], [ "Najim", "Jamal", "", "LTCI" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0910.0832
Maria Potop-Butucaru
Anissa Lamani (LIP6), Maria Potop-Butucaru (LIP6, INRIA Rocquencourt), S\'ebastien Tixeuil (LIP6)
Optimal deterministic ring exploration with oblivious asynchronous robots
null
null
10.1007/978-3-642-13284-1_15
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of exploring an anonymous unoriented ring of size $n$ by $k$ identical, oblivious, asynchronous mobile robots, that are unable to communicate, yet have the ability to sense their environment and take decisions based on their local view. Previous works in this weak scenario prove that $k$ must not divide $n$ for a deterministic solution to exist. Also, it is known that the minimum number of robots (either deterministic or probabilistic) to explore a ring of size $n$ is 4. An upper bound of 17 robots holds in the deterministic case while 4 probabilistic robots are sufficient. In this paper, we close the complexity gap in the deterministic setting, by proving that no deterministic exploration is feasible with less than five robots whenever the size of the ring is even, and that five robots are sufficient for any $n$ that is coprime with five. Our protocol completes exploration in O(n) robot moves, which is also optimal.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 19:08:49 GMT" } ]
2015-05-14T00:00:00
[ [ "Lamani", "Anissa", "", "LIP6" ], [ "Potop-Butucaru", "Maria", "", "LIP6, INRIA Rocquencourt" ], [ "Tixeuil", "Sébastien", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.0868
Harsh Beohar
Harsh Beohar, Pieter Cuijpers, and Jos Baeten
Design of asynchronous supervisors
null
null
null
null
cs.LO
http://creativecommons.org/licenses/by-nc-sa/3.0/
One of the main drawbacks while implementing the interaction between a plant and a supervisor, synthesised by the supervisory control theory of \citeauthor{RW:1987}, is the inexact synchronisation. \citeauthor{balemiphdt} was the first to consider this problem, and the solutions given in his PhD thesis were in the domain of automata theory. Our goal is to address the issue of inexact synchronisation in a process algebra setting, because we get concepts like modularity and abstraction for free, which are useful to further analyze the synthesised system. In this paper, we propose four methods to check a closed loop system in an asynchronous setting such that it is branching bisimilar to the modified (asynchronous) closed loop system. We modify a given closed loop system by introducing buffers either in the plant models, the supervisor models, or the output channels of both supervisor and plant models, or in the input channels of both supervisor and plant models. A notion of desynchronisable closed loop system is introduced, which is a class of synchronous closed loop systems such that they are branching bisimilar to their corresponding asynchronous versions. Finally we study different case studies in an asynchronous setting and then try to summarise the observations (or conditions) which will be helpful in order to formulate a theory of desynchronisable closed loop systems.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 21:55:09 GMT" } ]
2009-10-07T00:00:00
[ [ "Beohar", "Harsh", "" ], [ "Cuijpers", "Pieter", "" ], [ "Baeten", "Jos", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.0880
Sergei Vassilvitskii
Arpita Ghosh, Preston McAfee, Kishore Papineni, Sergei Vassilvitskii
Bidding for Representative Allocations for Display Advertising
null
null
null
null
cs.MA cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Display advertising has traditionally been sold via guaranteed contracts -- a guaranteed contract is a deal between a publisher and an advertiser to allocate a certain number of impressions over a certain period, for a pre-specified price per impression. However, as spot markets for display ads, such as the RightMedia Exchange, have grown in prominence, the selection of advertisements to show on a given page is increasingly being chosen based on price, using an auction. As the number of participants in the exchange grows, the price of an impressions becomes a signal of its value. This correlation between price and value means that a seller implementing the contract through bidding should offer the contract buyer a range of prices, and not just the cheapest impressions necessary to fulfill its demand. Implementing a contract using a range of prices, is akin to creating a mutual fund of advertising impressions, and requires {\em randomized bidding}. We characterize what allocations can be implemented with randomized bidding, namely those where the desired share obtained at each price is a non-increasing function of price. In addition, we provide a full characterization of when a set of campaigns are compatible and how to implement them with randomized bidding strategies.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 22:53:01 GMT" } ]
2009-10-07T00:00:00
[ [ "Ghosh", "Arpita", "" ], [ "McAfee", "Preston", "" ], [ "Papineni", "Kishore", "" ], [ "Vassilvitskii", "Sergei", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0910.0881
Guanfeng Liang
Guanfeng Liang, Nitin Vaidya
When Watchdog Meets Coding
null
null
null
null
cs.CR cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we study the problem of misbehavior detection in wireless networks. A commonly adopted approach is to utilize the broadcasting nature of the wireless medium and have nodes monitor their neighborhood. We call such nodes the Watchdogs. In this paper, we first show that even if a watchdog can overhear all packet transmissions of a flow, any linear operation of the overheard packets can not eliminate miss-detection and is inefficient in terms of bandwidth. We propose a light-weigh misbehavior detection scheme which integrates the idea of watchdogs and error detection coding. We show that even if the watchdog can only observe a fraction of packets, by choosing the encoder properly, an attacker will be detected with high probability while achieving throughput arbitrarily close to optimal. Such properties reduce the incentive for the attacker to attack.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 22:30:21 GMT" }, { "version": "v2", "created": "Tue, 6 Oct 2009 22:31:30 GMT" } ]
2009-10-07T00:00:00
[ [ "Liang", "Guanfeng", "" ], [ "Vaidya", "Nitin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.0886
Sagar Shah
Sagar Shah, Yao Yu, Athina Petropulu
Step-Frequency Radar with Compressive Sampling (SFR-CS)
4 pages, 5 figures, conference
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Step-frequency radar (SFR) is a high resolution radar approach, where multiple pulses are transmitted at different frequencies, covering a wide spectrum. The obtained resolution directly depends on the total bandwidth used, or equivalently, the number of transmitted pulses. This paper proposes a novel SFR system, namely SFR with compressive sampling (SFRCS), that achieves the same resolution as a conventional SFR, while using significantly reduced bandwidth, or equivalently, transmitting significantly fewer pulses. This bandwidth reduction is accomplished by employing compressive sampling ideas and exploiting the sparseness of targets in the range velocity space.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 22:40:15 GMT" }, { "version": "v2", "created": "Sat, 27 Mar 2010 20:37:10 GMT" } ]
2015-03-13T00:00:00
[ [ "Shah", "Sagar", "" ], [ "Yu", "Yao", "" ], [ "Petropulu", "Athina", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.0887
Jamshid Abouei
Jamshid Abouei, Konstantinos N. Plataniotis, Subbarayan Pasupathy
Green Modulation in Proactive Wireless Sensor Networks
submitted to IEEE Transactions on Wireless Communications (25 pages)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to unique characteristics of sensor nodes, choosing energy-efficient modulation scheme with low-complexity implementation (refereed to as green modulation) is a critical factor in the physical layer of Wireless Sensor Networks (WSNs). This paper presents (to the best of our knowledge) the first in-depth analysis of energy efficiency of various modulation schemes using realistic models in IEEE 802.15.4 standard and present state-of-the art technology, to find the best scheme in a proactive WSN over Rayleigh and Rician flat-fading channel models with path-loss. For this purpose, we describe the system model according to a pre-determined time-based process in practical sensor nodes. The present analysis also includes the effect of bandwidth and active mode duration on energy efficiency of popular modulation designs in the pass-band and Ultra-WideBand (UWB) categories. Experimental results show that among various pass-band and UWB modulation schemes, Non-Coherent M-ary Frequency Shift Keying (NC-MFSK) with small order of $M$ and On-Off Keying (OOK) have significant energy saving compared to other schemes for short range scenarios, and could be considered as realistic candidates in WSNs. In addition, NC-MFSK and OOK have the advantage of less complexity and cost in implementation than the other schemes.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 23:35:39 GMT" } ]
2009-10-07T00:00:00
[ [ "Abouei", "Jamshid", "" ], [ "Plataniotis", "Konstantinos N.", "" ], [ "Pasupathy", "Subbarayan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.0899
Yi Cao
Yi Cao and Biao Chen
Interference Channels with One Cognitive Transmitter
33 pages, 9 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the problem of interference channels with one cognitive transmitter (ICOCT) where "cognitive" is defined from both the noncausal and causal perspectives. For the noncausal ICOCT, referred to as interference channels with degraded message sets (IC-DMS), we propose a new achievable rate region that generalizes existing achievable rate regions for IC-DMS. In the absence of the noncognitive transmitter, the proposed region coincides with Marton's region for the broadcast channel. Based on this result, the capacity region of a class of semi-deterministic IC-DMS is established. For the causal ICOCT, due to the complexity of the channel model, we focus primarily on the cognitive Z interference channel (ZIC), where the interference link from the cognitive transmitter to the primary receiver is assumed to be absent due to practical design considerations. Capacity bounds for such channels in different parameter regimes are obtained and the impact of such causal cognitive ability is carefully studied. In particular, depending on the channel parameters, the cognitive link may not be useful in terms of enlarging the capacity region. An optimal corner point of the capacity region is also established for the cognitive ZIC for a certain parameter regime.
[ { "version": "v1", "created": "Tue, 6 Oct 2009 00:54:47 GMT" } ]
2009-10-07T00:00:00
[ [ "Cao", "Yi", "" ], [ "Chen", "Biao", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.0902
Sajid Siddiqi
Sajid M. Siddiqi, Byron Boots, Geoffrey J. Gordon
Reduced-Rank Hidden Markov Models
Updated robot experiment figure, added details on KDE, fixed a couple of errors
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the Reduced-Rank Hidden Markov Model (RR-HMM), a generalization of HMMs that can model smooth state evolution as in Linear Dynamical Systems (LDSs) as well as non-log-concave predictive distributions as in continuous-observation HMMs. RR-HMMs assume an m-dimensional latent state and n discrete observations, with a transition matrix of rank k <= m. This implies the dynamics evolve in a k-dimensional subspace, while the shape of the set of predictive distributions is determined by m. Latent state belief is represented with a k-dimensional state vector and inference is carried out entirely in R^k, making RR-HMMs as computationally efficient as k-state HMMs yet more expressive. To learn RR-HMMs, we relax the assumptions of a recently proposed spectral learning algorithm for HMMs (Hsu, Kakade and Zhang 2009) and apply it to learn k-dimensional observable representations of rank-k RR-HMMs. The algorithm is consistent and free of local optima, and we extend its performance guarantees to cover the RR-HMM case. We show how this algorithm can be used in conjunction with a kernel density estimator to efficiently model high-dimensional multivariate continuous data. We also relax the assumption that single observations are sufficient to disambiguate state, and extend the algorithm accordingly. Experiments on synthetic data and a toy video, as well as on a difficult robot vision modeling problem, yield accurate models that compare favorably with standard alternatives in simulation quality and prediction capability.
[ { "version": "v1", "created": "Tue, 6 Oct 2009 06:00:47 GMT" }, { "version": "v2", "created": "Thu, 8 Oct 2009 07:52:37 GMT" }, { "version": "v3", "created": "Tue, 22 Dec 2009 23:31:57 GMT" } ]
2009-12-23T00:00:00
[ [ "Siddiqi", "Sajid M.", "" ], [ "Boots", "Byron", "" ], [ "Gordon", "Geoffrey J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.0906
Tom Leinster
Tom Leinster
A maximum entropy theorem with applications to the measurement of biodiversity
26 pages. v4: references added, and other minor edits
null
null
null
cs.IT math.IT q-bio.PE q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is a preliminary article stating and proving a new maximum entropy theorem. The entropies that we consider can be used as measures of biodiversity. In that context, the question is: for a given collection of species, which frequency distribution(s) maximize the diversity? The theorem provides the answer. The chief surprise is that although we are dealing with not just a single entropy, but a one-parameter family of entropies, there is a single distribution maximizing all of them simultaneously.
[ { "version": "v1", "created": "Tue, 6 Oct 2009 01:29:04 GMT" }, { "version": "v2", "created": "Mon, 16 Nov 2009 07:53:25 GMT" }, { "version": "v3", "created": "Mon, 12 Apr 2010 00:43:16 GMT" }, { "version": "v4", "created": "Thu, 13 Jan 2011 14:23:33 GMT" } ]
2011-01-14T00:00:00
[ [ "Leinster", "Tom", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0910.0916
Esteban Arcaute
Esteban Arcaute, Sergei Vassilvitskii
Social Networks and Stable Matchings in the Job Market
19 pages. A preliminary version will appear at the 5th International Workshop on Internet and Network Economics, WINE 2009
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For most people, social contacts play an integral part in finding a new job. As observed by Granovetter's seminal study, the proportion of jobs obtained through social contacts is usually large compared to those obtained through postings or agencies. At the same time, job markets are a natural example of two-sided matching markets. An important solution concept in such markets is that of stable matchings, and the use of the celebrated Gale-Shapley algorithm to compute them. So far, the literature has evolved separately, either focusing on the implications of information flowing through a social network, or on developing a mathematical theory of job markets through the use of two-sided matching techniques. In this paper we provide a model of the job market that brings both aspects of job markets together. To model the social scientists' observations, we assume that workers learn only about positions in firms through social contacts. Given that information structure, we study both static properties of what we call locally stable matchings (i.e., stable matchings subject to informational constraints given by a social network) and dynamic properties through a reinterpretation of Gale-Shapley's algorithm as myopic best response dynamics. We prove that, in general, the set of locally stable matching strictly contains that of stable matchings and it is in fact NP-complete to determine if they are identical. We also show that the lattice structure of stable matchings is in general absent. Finally, we focus on myopic best response dynamics inspired by the Gale-Shapley algorithm. We study the efficiency loss due to the informational constraints, providing both lower and upper bounds.
[ { "version": "v1", "created": "Tue, 6 Oct 2009 03:04:52 GMT" } ]
2009-10-07T00:00:00
[ [ "Arcaute", "Esteban", "" ], [ "Vassilvitskii", "Sergei", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0910.0918
Soummya Kar
S. Kar, B. Sinopoli, and J.M.F. Moura
A Random Dynamical Systems Approach to Filtering in Large-scale Networks
8 pages. Submitted to the American Control Conference, ACC 2010
null
null
null
cs.IT cs.MA math.IT math.OC math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper studies the problem of filtering a discrete-time linear system observed by a network of sensors. The sensors share a common communication medium to the estimator and transmission is bit and power budgeted. Under the assumption of conditional Gaussianity of the signal process at the estimator (which may be ensured by observation packet acknowledgements), the conditional prediction error covariance of the optimum mean-squared error filter is shown to evolve according to a random dynamical system (RDS) on the space of non-negative definite matrices. Our RDS formalism does not depend on the particular medium access protocol (randomized) and, under a minimal distributed observability assumption, we show that the sequence of random conditional prediction error covariance matrices converges in distribution to a unique invariant distribution (independent of the initial filter state), i.e., the conditional error process is shown to be ergodic. Under broad assumptions on the medium access protocol, we show that the conditional error covariance sequence satisfies a Markov-Feller property, leading to an explicit characterization of the support of its invariant measure. The methodology adopted in this work is sufficiently general to envision this application to sample path analysis of more general hybrid or switched systems, where existing analysis is mostly moment-based.
[ { "version": "v1", "created": "Tue, 6 Oct 2009 03:34:39 GMT" } ]
2009-10-07T00:00:00
[ [ "Kar", "S.", "" ], [ "Sinopoli", "B.", "" ], [ "Moura", "J. M. F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0910.0921
Sewoong Oh
Raghunandan H. Keshavan, Andrea Montanari, and Sewoong Oh
Low-rank Matrix Completion with Noisy Observations: a Quantitative Comparison
7 pages, 7 figures, 47th Allerton Conference on Communication Control and Computing, 2009, invited paper
null
null
null
cs.LG cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a problem of significant practical importance, namely, the reconstruction of a low-rank data matrix from a small subset of its entries. This problem appears in many areas such as collaborative filtering, computer vision and wireless sensor networks. In this paper, we focus on the matrix completion problem in the case when the observed samples are corrupted by noise. We compare the performance of three state-of-the-art matrix completion algorithms (OptSpace, ADMiRA and FPCA) on a single simulation platform and present numerical results. We show that in practice these efficient algorithms can be used to reconstruct real data matrices, as well as randomly generated matrices, accurately.
[ { "version": "v1", "created": "Tue, 6 Oct 2009 04:41:05 GMT" }, { "version": "v2", "created": "Tue, 3 Nov 2009 23:56:31 GMT" } ]
2009-11-04T00:00:00
[ [ "Keshavan", "Raghunandan H.", "" ], [ "Montanari", "Andrea", "" ], [ "Oh", "Sewoong", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0910.0928
EPTCS
Ji\v{r}\'i Barnat (Masaryk University), Lubo\v{s} Brim (Masaryk University), Ivana \v{C}ern\'a (Masaryk University), Sven Dra\v{z}an (Masaryk University), Jana Fabrikov\'a (Masaryk University), Jan L\'an\'ik (Masaryk University), David \v{S}afr\'anek (Masaryk University), Hongwu Ma (University of Edinburgh)
BioDiVinE: A Framework for Parallel Analysis of Biological Models
null
EPTCS 6, 2009, pp. 31-45
10.4204/EPTCS.6.3
null
cs.CE cs.DC q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper a novel tool BioDiVinEfor parallel analysis of biological models is presented. The tool allows analysis of biological models specified in terms of a set of chemical reactions. Chemical reactions are transformed into a system of multi-affine differential equations. BioDiVinE employs techniques for finite discrete abstraction of the continuous state space. At that level, parallel analysis algorithms based on model checking are provided. In the paper, the key tool features are described and their application is demonstrated by means of a case study.
[ { "version": "v1", "created": "Tue, 6 Oct 2009 06:25:34 GMT" } ]
2009-10-07T00:00:00
[ [ "Barnat", "Jiří", "", "Masaryk University" ], [ "Brim", "Luboš", "", "Masaryk\n University" ], [ "Černá", "Ivana", "", "Masaryk University" ], [ "Dražan", "Sven", "", "Masaryk\n University" ], [ "Fabriková", "Jana", "", "Masaryk University" ], [ "Láník", "Jan", "", "Masaryk\n University" ], [ "Šafránek", "David", "", "Masaryk University" ], [ "Ma", "Hongwu", "", "University\n of Edinburgh" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0910.0983
Tomas Skopal
Tomas Skopal, Jakub Lokoc
On Metric Skyline Processing by PM-tree
null
null
null
null
cs.DB cs.DL cs.MM cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The task of similarity search in multimedia databases is usually accomplished by range or k nearest neighbor queries. However, the expressing power of these "single-example" queries fails when the user's delicate query intent is not available as a single example. Recently, the well-known skyline operator was reused in metric similarity search as a "multi-example" query type. When applied on a multi-dimensional database (i.e., on a multi-attribute table), the traditional skyline operator selects all database objects that are not dominated by other objects. The metric skyline query adopts the skyline operator such that the multiple attributes are represented by distances (similarities) to multiple query examples. Hence, we can view the metric skyline as a set of representative database objects which are as similar to all the examples as possible and, simultaneously, are semantically distinct. In this paper we propose a technique of processing the metric skyline query by use of PM-tree, while we show that our technique significantly outperforms the original M-tree based implementation in both time and space costs. In experiments we also evaluate the partial metric skyline processing, where only a controlled number of skyline objects is retrieved.
[ { "version": "v1", "created": "Tue, 6 Oct 2009 12:09:52 GMT" } ]
2009-10-07T00:00:00
[ [ "Skopal", "Tomas", "" ], [ "Lokoc", "Jakub", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0910.0996
Ernie Cohen
Ernie Cohen
Pessimistic Testing
2 pages, 3 refrences
null
null
null
cs.SE cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new approach to testing conformance to a nondeterministic specification, in which testing proceeds only as long as increased test coverage is guaranteed.
[ { "version": "v1", "created": "Tue, 6 Oct 2009 13:58:09 GMT" } ]
2009-10-07T00:00:00
[ [ "Cohen", "Ernie", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0910.1014
Pierrick Tranouez
Pierrick Tranouez (LITIS), Antoine Dutot (LITIS)
Building upon Fast Multipole Methods to Detect and Model Organizations
null
DCDIS Series B: Applications & Algorithms 16, 4 (2009) 489 - 500
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many models in natural and social sciences are comprised of sets of inter-acting entities whose intensity of interaction decreases with distance. This often leads to structures of interest in these models composed of dense packs of entities. Fast Multipole Methods are a family of methods developed to help with the calculation of a number of computable models such as described above. We propose a method that builds upon FMM to detect and model the dense structures of these systems.
[ { "version": "v1", "created": "Tue, 6 Oct 2009 14:19:56 GMT" }, { "version": "v2", "created": "Thu, 8 Oct 2009 08:35:15 GMT" } ]
2009-10-08T00:00:00
[ [ "Tranouez", "Pierrick", "", "LITIS" ], [ "Dutot", "Antoine", "", "LITIS" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.1020
Emmanuel Polonowski
Tristan Crolard and Emmanuel Polonowski
A Formally Specified Type System and Operational Semantics for Higher-Order Procedural Variables
null
null
null
TR-LACL-2009-3
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We formally specified the type system and operational semantics of LOOPw with Ott and Isabelle/HOL proof assistant. Moreover, both the type system and the semantics of LOOPw have been tested using Isabelle/HOL program extraction facility for inductively defined relations. In particular, the program that computes the Ackermann function type checks and behaves as expected. The main difference (apart from the choice of an Ada-like concrete syntax) with LOOPw comes from the treatment of parameter passing. Indeed, since Ott does not currently fully support alpha-conversion, we rephrased the operational semantics with explicit aliasing in order to implement the out parameter passing mode.
[ { "version": "v1", "created": "Tue, 6 Oct 2009 14:36:18 GMT" } ]
2009-10-07T00:00:00
[ [ "Crolard", "Tristan", "" ], [ "Polonowski", "Emmanuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.1026
Pierrick Tranouez
Eric Daud\'e (IDEES), Pierrick Tranouez (LITIS), Patrice Langlois (IDEES)
A multiagent urban traffic simulation. Part II: dealing with the extraordinary
null
ICCSA 2009, France (2009)
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Probabilistic Risk Management, risk is characterized by two quantities: the magnitude (or severity) of the adverse consequences that can potentially result from the given activity or action, and by the likelihood of occurrence of the given adverse consequences. But a risk seldom exists in isolation: chain of consequences must be examined, as the outcome of one risk can increase the likelihood of other risks. Systemic theory must complement classic PRM. Indeed these chains are composed of many different elements, all of which may have a critical importance at many different levels. Furthermore, when urban catastrophes are envisioned, space and time constraints are key determinants of the workings and dynamics of these chains of catastrophes: models must include a correct spatial topology of the studied risk. Finally, literature insists on the importance small events can have on the risk on a greater scale: urban risks management models belong to self-organized criticality theory. We chose multiagent systems to incorporate this property in our model: the behavior of an agent can transform the dynamics of important groups of them.
[ { "version": "v1", "created": "Tue, 6 Oct 2009 14:41:57 GMT" } ]
2009-10-07T00:00:00
[ [ "Daudé", "Eric", "", "IDEES" ], [ "Tranouez", "Pierrick", "", "LITIS" ], [ "Langlois", "Patrice", "", "IDEES" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.1028
Ernie Cohen
Ernie Cohen
Weak Kleene Algebra is Sound and (Possibly) Complete for Simulation
12 pages, 9 references
null
null
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the axioms of Weak Kleene Algebra (WKA) are sound and complete for the theory of regular expressions modulo simulation equivalence, assuming their completeness for monodic trees (as conjectured by Takai and Furusawa).
[ { "version": "v1", "created": "Tue, 6 Oct 2009 14:45:15 GMT" } ]
2009-10-07T00:00:00
[ [ "Cohen", "Ernie", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0910.1059
Nicolas Catusse
Nicolas Catusse, Victor Chepoi, Yann Vax\`es
Embedding into the rectilinear plane in optimal O*(n^2)
12 pages, 13 figures
Theoretical Computer Science Volume 412, Issue 22 (2011), Pages 2425-2433
10.1016/j.tcs.2011.01.038
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an optimal O*(n^2) time algorithm for deciding if a metric space (X,d) on n points can be isometrically embedded into the plane endowed with the l_1-metric. It improves the O*(n^2 log^2 n) time algorithm of J. Edmonds (2008). Together with some ingredients introduced by J. Edmonds, our algorithm uses the concept of tight span and the injectivity of the l_1-plane. A different O*(n^2) time algorithm was recently proposed by D. Eppstein (2009).
[ { "version": "v1", "created": "Tue, 6 Oct 2009 17:25:59 GMT" } ]
2011-07-08T00:00:00
[ [ "Catusse", "Nicolas", "" ], [ "Chepoi", "Victor", "" ], [ "Vaxès", "Yann", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.1121
Pascal Vontobel
Alexandros G. Dimakis, Pascal O. Vontobel
LP Decoding meets LP Decoding: A Connection between Channel Coding and Compressed Sensing
Appeared in the Proceedings of the 47th Allerton Conference on Communications, Control, and Computing, Allerton House, Monticello, Illinois, USA, Sep. 30 - Oct. 2, 2009. This version of the paper contains all the proofs that were omitted in the official version due to space limitations
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is a tale of two linear programming decoders, namely channel coding linear programming decoding (CC-LPD) and compressed sensing linear programming decoding (CS-LPD). So far, they have evolved quite independently. The aim of the present paper is to show that there is a tight connection between, on the one hand, CS-LPD based on a zero-one measurement matrix over the reals and, on the other hand, CC-LPD of the binary linear code that is obtained by viewing this measurement matrix as a binary parity-check matrix. This connection allows one to translate performance guarantees from one setup to the other.
[ { "version": "v1", "created": "Tue, 6 Oct 2009 21:54:44 GMT" } ]
2009-10-08T00:00:00
[ [ "Dimakis", "Alexandros G.", "" ], [ "Vontobel", "Pascal O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1123
Arvind Yedla
Arvind Yedla, Henry D. Pfister, Krishna R. Narayanan
Can Iterative Decoding for Erasure Correlated Sources be Universal?
8 pages, to appear in Allerton '09
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider a few iterative decoding schemes for the joint source-channel coding of correlated sources. Specifically, we consider the joint source-channel coding of two erasure correlated sources with transmission over different erasure channels. Our main interest is in determining whether or not various code ensembles can achieve the capacity region universally over varying channel conditions. We consider two ensembles in the class of low-density generator-matrix (LDGM) codes known as Luby-Transform (LT) codes and one ensemble of low-density parity-check (LDPC) codes. We analyze them using density evolution and show that optimized LT codes can achieve the extremal symmetric point of the capacity region. We also show that LT codes are not universal under iterative decoding for this problem because they cannot simultaneously achieve the extremal symmetric point and a corner point of the capacity region. The sub-universality of iterative decoding is characterized by studying the density evolution for LT codes.
[ { "version": "v1", "created": "Tue, 6 Oct 2009 22:10:56 GMT" } ]
2009-10-08T00:00:00
[ [ "Yedla", "Arvind", "" ], [ "Pfister", "Henry D.", "" ], [ "Narayanan", "Krishna R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1145
Jun Li
Jun Li, Marwan H. Azmi, Robert. Malaney, and Jinhong Yuan
Design of network-coding based multi-edge type LDPC codes for multi-source relaying systems
6 pages, 8figure. conference
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate a multi-source LDPC scheme for a Gaussian relay system, where M sources communicate with the destination under the help of a single relay (M-1-1 system). Since various distributed LDPC schemes in the cooperative single-source system, e.g. bilayer LDPC and bilayer multi-edge type LDPC (BMET-LDPC), have been designed to approach the Shannon limit, these schemes can be applied to the $M-1-1$ system by the relay serving each source in a round-robin fashion. However, such a direct application is not optimal due to the lack of potential joint processing gain. In this paper, we propose a network coded multi-edge type LDPC (NCMET-LDPC) scheme for the multi-source scenario. Through an EXIT analysis, we conclude that the NCMET-LDPC scheme achieves higher extrinsic mutual information, relative to a separate application of BMET-LDPC to each source. Our new NCMET-LDPC scheme thus achieves a higher threshold relative to existing schemes.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 01:29:45 GMT" } ]
2009-10-08T00:00:00
[ [ "Li", "Jun", "" ], [ "Azmi", "Marwan H.", "" ], [ "Malaney", "Robert.", "" ], [ "Yuan", "Jinhong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1151
Rahul Urgaonkar
Rahul Urgaonkar, Michael J. Neely
Delay-Limited Cooperative Communication with Reliability Constraints in Wireless Networks
13 pages, 4 figures
null
null
null
cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate optimal resource allocation for delay-limited cooperative communication in time varying wireless networks. Motivated by real-time applications that have stringent delay constraints, we develop a dynamic cooperation strategy that makes optimal use of network resources to achieve a target outage probability (reliability) for each user subject to average power constraints. Using the technique of Lyapunov optimization, we first present a general framework to solve this problem and then derive quasi-closed form solutions for several cooperative protocols proposed in the literature. Unlike earlier works, our scheme does not require prior knowledge of the statistical description of the packet arrival, channel state and node mobility processes and can be implemented in an online fashion.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 03:34:33 GMT" } ]
2009-10-08T00:00:00
[ [ "Urgaonkar", "Rahul", "" ], [ "Neely", "Michael J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0910.1191
Elchanan Mossel
Mark Braverman and Elchanan Mossel
Sorting from Noisy Information
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies problems of inferring order given noisy information. In these problems there is an unknown order (permutation) $\pi$ on $n$ elements denoted by $1,...,n$. We assume that information is generated in a way correlated with $\pi$. The goal is to find a maximum likelihood $\pi^*$ given the information observed. We will consider two different types of observations: noisy comparisons and noisy orders. The data in Noisy orders are permutations given from an exponential distribution correlated with \pi (this is also called the Mallow's model). The data in Noisy Comparisons is a signal given for each pair of elements which is correlated with their true ordering. In this paper we present polynomial time algorithms for solving both problems with high probability. As part of our proof we show that for both models the maximum likelihood solution $\pi^{\ast}$ is close to the original permutation $\pi$. Our results are of interest in applications to ranking, such as ranking in sports, or ranking of search items based on comparisons by experts.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 09:14:54 GMT" } ]
2009-10-08T00:00:00
[ [ "Braverman", "Mark", "" ], [ "Mossel", "Elchanan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.1217
EPTCS
Bogdan Aman, Gabriel Ciobanu
Mutual Mobile Membranes with Timers
null
EPTCS 6, 2009, pp. 1-15
10.4204/EPTCS.6.1
null
cs.FL q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A feature of current membrane systems is the fact that objects and membranes are persistent. However, this is not true in the real world. In fact, cells and intracellular proteins have a well-defined lifetime. Inspired from these biological facts, we define a model of systems of mobile membranes in which each membrane and each object has a timer representing their lifetime. We show that systems of mutual mobile membranes with and without timers have the same computational power. An encoding of timed safe mobile ambients into systems of mutual mobile membranes with timers offers a relationship between two formalisms used in describing biological systems.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 11:15:13 GMT" } ]
2009-10-08T00:00:00
[ [ "Aman", "Bogdan", "" ], [ "Ciobanu", "Gabriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0910.1219
EPTCS
Roberto Barbuti (University of Pisa), Giulio Caravagna (University of Pisa), Paolo Milazzo (University of Pisa), Andrea Maggiolo-Schettini (University of Pisa)
On the Interpretation of Delays in Delay Stochastic Simulation of Biological Systems
null
EPTCS 6, 2009, pp. 17-29
10.4204/EPTCS.6.2
null
q-bio.QM cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Delays in biological systems may be used to model events for which the underlying dynamics cannot be precisely observed. Mathematical modeling of biological systems with delays is usually based on Delay Differential Equations (DDEs), a kind of differential equations in which the derivative of the unknown function at a certain time is given in terms of the values of the function at previous times. In the literature, delay stochastic simulation algorithms have been proposed. These algorithms follow a "delay as duration" approach, namely they are based on an interpretation of a delay as the elapsing time between the start and the termination of a chemical reaction. This interpretation is not suitable for some classes of biological systems in which species involved in a delayed interaction can be involved at the same time in other interactions. We show on a DDE model of tumor growth that the delay as duration approach for stochastic simulation is not precise, and we propose a simulation algorithm based on a ``purely delayed'' interpretation of delays which provides better results on the considered model.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 11:25:03 GMT" } ]
2009-10-08T00:00:00
[ [ "Barbuti", "Roberto", "", "University of Pisa" ], [ "Caravagna", "Giulio", "", "University of\n Pisa" ], [ "Milazzo", "Paolo", "", "University of Pisa" ], [ "Maggiolo-Schettini", "Andrea", "", "University of Pisa" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0910.1238
Yves Deville
Quang Dung Pham, Yves Deville, Pascal Van Hentenryck
A Local Search Modeling for Constrained Optimum Paths Problems (Extended Abstract)
null
EPTCS 5, 2009, pp. 5-11
10.4204/EPTCS.5.1
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constrained Optimum Path (COP) problems appear in many real-life applications, especially on communication networks. Some of these problems have been considered and solved by specific techniques which are usually difficult to extend. In this paper, we introduce a novel local search modeling for solving some COPs by local search. The modeling features the compositionality, modularity, reuse and strengthens the benefits of Constrained-Based Local Search. We also apply the modeling to the edge-disjoint paths problem (EDP). We show that side constraints can easily be added in the model. Computational results show the significance of the approach.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 12:36:40 GMT" } ]
2009-10-08T00:00:00
[ [ "Pham", "Quang Dung", "" ], [ "Deville", "Yves", "" ], [ "Van Hentenryck", "Pascal", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.1239
Yves Deville
Farshid Hassani Bijarbooneh, Pierre Flener, Justin Pearson
Dynamic Demand-Capacity Balancing for Air Traffic Management Using Constraint-Based Local Search: First Results
null
EPTCS 5, 2009, pp. 27-40
10.4204/EPTCS.5.3
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using constraint-based local search, we effectively model and efficiently solve the problem of balancing the traffic demands on portions of the European airspace while ensuring that their capacity constraints are satisfied. The traffic demand of a portion of airspace is the hourly number of flights planned to enter it, and its capacity is the upper bound on this number under which air-traffic controllers can work. Currently, the only form of demand-capacity balancing we allow is ground holding, that is the changing of the take-off times of not yet airborne flights. Experiments with projected European flight plans of the year 2030 show that already this first form of demand-capacity balancing is feasible without incurring too much total delay and that it can lead to a significantly better demand-capacity balance.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 12:50:34 GMT" } ]
2009-10-08T00:00:00
[ [ "Bijarbooneh", "Farshid Hassani", "" ], [ "Flener", "Pierre", "" ], [ "Pearson", "Justin", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.1244
Yves Deville
David Pereira, In\^es Lynce, Steven Prestwich
On Improving Local Search for Unsatisfiability
null
EPTCS 5, 2009, pp. 41-53
10.4204/EPTCS.5.4
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stochastic local search (SLS) has been an active field of research in the last few years, with new techniques and procedures being developed at an astonishing rate. SLS has been traditionally associated with satisfiability solving, that is, finding a solution for a given problem instance, as its intrinsic nature does not address unsatisfiable problems. Unsatisfiable instances were therefore commonly solved using backtrack search solvers. For this reason, in the late 90s Selman, Kautz and McAllester proposed a challenge to use local search instead to prove unsatisfiability. More recently, two SLS solvers - Ranger and Gunsat - have been developed, which are able to prove unsatisfiability albeit being SLS solvers. In this paper, we first compare Ranger with Gunsat and then propose to improve Ranger performance using some of Gunsat's techniques, namely unit propagation look-ahead and extended resolution.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 16:08:44 GMT" } ]
2009-10-08T00:00:00
[ [ "Pereira", "David", "" ], [ "Lynce", "Inês", "" ], [ "Prestwich", "Steven", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.1247
Yves Deville
Gilles Audenard, Jean-Marie Lagniez, Bertrand Mazure, Lakhdar Sa\"is
Integrating Conflict Driven Clause Learning to Local Search
null
EPTCS 5, 2009, pp. 55-68
10.4204/EPTCS.5.5
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article introduces SatHyS (SAT HYbrid Solver), a novel hybrid approach for propositional satisfiability. It combines local search and conflict driven clause learning (CDCL) scheme. Each time the local search part reaches a local minimum, the CDCL is launched. For SAT problems it behaves like a tabu list, whereas for UNSAT ones, the CDCL part tries to focus on minimum unsatisfiable sub-formula (MUS). Experimental results show good performances on many classes of SAT instances from the last SAT competitions.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 16:06:29 GMT" } ]
2009-10-08T00:00:00
[ [ "Audenard", "Gilles", "" ], [ "Lagniez", "Jean-Marie", "" ], [ "Mazure", "Bertrand", "" ], [ "Saïs", "Lakhdar", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.1253
Yves Deville
Fang He, Rong Qu
A Constraint-directed Local Search Approach to Nurse Rostering Problems
null
EPTCS 5, 2009, pp. 69-80
10.4204/EPTCS.5.6
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate the hybridization of constraint programming and local search techniques within a large neighbourhood search scheme for solving highly constrained nurse rostering problems. As identified by the research, a crucial part of the large neighbourhood search is the selection of the fragment (neighbourhood, i.e. the set of variables), to be relaxed and re-optimized iteratively. The success of the large neighbourhood search depends on the adequacy of this identified neighbourhood with regard to the problematic part of the solution assignment and the choice of the neighbourhood size. We investigate three strategies to choose the fragment of different sizes within the large neighbourhood search scheme. The first two strategies are tailored concerning the problem properties. The third strategy is more general, using the information of the cost from the soft constraint violations and their propagation as the indicator to choose the variables added into the fragment. The three strategies are analyzed and compared upon a benchmark nurse rostering problem. Promising results demonstrate the possibility of future work in the hybrid approach.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 13:17:36 GMT" } ]
2009-10-08T00:00:00
[ [ "He", "Fang", "" ], [ "Qu", "Rong", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.1255
Yves Deville
Marie Pelleau, Pascal Van Hentenryck, Charlotte Truchet
Sonet Network Design Problems
null
EPTCS 5, 2009, pp. 81-95
10.4204/EPTCS.5.7
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new method and a constraint-based objective function to solve two problems related to the design of optical telecommunication networks, namely the Synchronous Optical Network Ring Assignment Problem (SRAP) and the Intra-ring Synchronous Optical Network Design Problem (IDP). These network topology problems can be represented as a graph partitioning with capacity constraints as shown in previous works. We present here a new objective function and a new local search algorithm to solve these problems. Experiments conducted in Comet allow us to compare our method to previous ones and show that we obtain better results.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 13:22:22 GMT" } ]
2009-10-08T00:00:00
[ [ "Pelleau", "Marie", "" ], [ "Van Hentenryck", "Pascal", "" ], [ "Truchet", "Charlotte", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.1264
Yves Deville
Salvator Abreu, Daniel Diaz, Philippe Codognet
Parallel local search for solving Constraint Problems on the Cell Broadband Engine (Preliminary Results)
null
EPTCS 5, 2009, pp. 97-111
10.4204/EPTCS.5.8
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explore the use of the Cell Broadband Engine (Cell/BE for short) for combinatorial optimization applications: we present a parallel version of a constraint-based local search algorithm that has been implemented on a multiprocessor BladeCenter machine with twin Cell/BE processors (total of 16 SPUs per blade). This algorithm was chosen because it fits very well the Cell/BE architecture and requires neither shared memory nor communication between processors, while retaining a compact memory footprint. We study the performance on several large optimization benchmarks and show that this achieves mostly linear time speedups, even sometimes super-linear. This is possible because the parallel implementation might explore simultaneously different parts of the search space and therefore converge faster towards the best sub-space and thus towards a solution. Besides getting speedups, the resulting times exhibit a much smaller variance, which benefits applications where a timely reply is critical.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 13:44:11 GMT" } ]
2009-10-08T00:00:00
[ [ "Abreu", "Salvator", "" ], [ "Diaz", "Daniel", "" ], [ "Codognet", "Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.1266
Yves Deville
Jun He, Pierre Flener, Justin Pearson
Toward an automaton Constraint for Local Search
null
EPTCS 5, 2009, pp. 13-25
10.4204/EPTCS.5.2
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explore the idea of using finite automata to implement new constraints for local search (this is already a successful technique in constraint-based global search). We show how it is possible to maintain incrementally the violations of a constraint and its decision variables from an automaton that describes a ground checker for that constraint. We establish the practicality of our approach idea on real-life personnel rostering problems, and show that it is competitive with the approach of [Pralong, 2007].
[ { "version": "v1", "created": "Wed, 7 Oct 2009 13:49:26 GMT" } ]
2009-10-08T00:00:00
[ [ "He", "Jun", "" ], [ "Flener", "Pierre", "" ], [ "Pearson", "Justin", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.1268
Olivier Finkel
Olivier Finkel (ELM)
The Complexity of Infinite Computations In Models of Set Theory
null
Logical Methods in Computer Science, Volume 5, Issue 4 (December 21, 2009) lmcs:1205
10.2168/LMCS-5(4:4)2009
null
cs.LO cs.CC math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove the following surprising result: there exist a 1-counter B\"uchi automaton and a 2-tape B\"uchi automaton such that the \omega-language of the first and the infinitary rational relation of the second in one model of ZFC are \pi_2^0-sets, while in a different model of ZFC both are analytic but non Borel sets. This shows that the topological complexity of an \omega-language accepted by a 1-counter B\"uchi automaton or of an infinitary rational relation accepted by a 2-tape B\"uchi automaton is not determined by the axiomatic system ZFC. We show that a similar result holds for the class of languages of infinite pictures which are recognized by B\"uchi tiling systems. We infer from the proof of the above results an improvement of the lower bound of some decision problems recently studied by the author.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 14:03:53 GMT" }, { "version": "v2", "created": "Tue, 13 Oct 2009 18:58:05 GMT" }, { "version": "v3", "created": "Mon, 19 Oct 2009 18:39:54 GMT" }, { "version": "v4", "created": "Mon, 21 Dec 2009 14:08:27 GMT" }, { "version": "v5", "created": "Wed, 23 Dec 2009 20:10:04 GMT" } ]
2015-07-01T00:00:00
[ [ "Finkel", "Olivier", "", "ELM" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0910.1273
Fabien Moutarde
Taoufik Bdiri (CAOR), Fabien Moutarde (CAOR), Nicolas Bourdis (CAOR), Bruno Steux (CAOR)
Adaboost with "Keypoint Presence Features" for Real-Time Vehicle Visual Detection
null
16th World Congress on Intelligent Transport Systems (ITSwc'2009), Su\`ede (2009)
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present promising results for real-time vehicle visual detection, obtained with adaBoost using new original ?keypoints presence features?. These weak-classifiers produce a boolean response based on presence or absence in the tested image of a ?keypoint? (~ a SURF interest point) with a descriptor sufficiently similar (i.e. within a given distance) to a reference descriptor characterizing the feature. A first experiment was conducted on a public image dataset containing lateral-viewed cars, yielding 95% recall with 95% precision on test set. Moreover, analysis of the positions of adaBoost-selected keypoints show that they correspond to a specific part of the object category (such as ?wheel? or ?side skirt?) and thus have a ?semantic? meaning.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 14:26:01 GMT" } ]
2009-10-08T00:00:00
[ [ "Bdiri", "Taoufik", "", "CAOR" ], [ "Moutarde", "Fabien", "", "CAOR" ], [ "Bourdis", "Nicolas", "", "CAOR" ], [ "Steux", "Bruno", "", "CAOR" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0910.1293
Fabien Moutarde
Bogdan Stanciulescu (CAOR), Amaury Breheret (CAOR), Fabien Moutarde (CAOR)
Introducing New AdaBoost Features for Real-Time Vehicle Detection
null
COGIS'07 conference on COGnitive systems with Interactive Sensors, Stanford, Palo Alto : United States (2007)
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper shows how to improve the real-time object detection in complex robotics applications, by exploring new visual features as AdaBoost weak classifiers. These new features are symmetric Haar filters (enforcing global horizontal and vertical symmetry) and N-connexity control points. Experimental evaluation on a car database show that the latter appear to provide the best results for the vehicle-detection problem.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 15:42:03 GMT" } ]
2009-10-08T00:00:00
[ [ "Stanciulescu", "Bogdan", "", "CAOR" ], [ "Breheret", "Amaury", "", "CAOR" ], [ "Moutarde", "Fabien", "", "CAOR" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0910.1294
Fabien Moutarde
Taoufik Bdiri (CAOR), Fabien Moutarde (CAOR), Bruno Steux (CAOR)
Visual object categorization with new keypoint-based adaBoost features
null
IEEE Symposium on Intelligent Vehicles (IV'2009), XiAn : China (2009)
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present promising results for visual object categorization, obtained with adaBoost using new original ?keypoints-based features?. These weak-classifiers produce a boolean response based on presence or absence in the tested image of a ?keypoint? (a kind of SURF interest point) with a descriptor sufficiently similar (i.e. within a given distance) to a reference descriptor characterizing the feature. A first experiment was conducted on a public image dataset containing lateral-viewed cars, yielding 95% recall with 95% precision on test set. Preliminary tests on a small subset of a pedestrians database also gives promising 97% recall with 92 % precision, which shows the generality of our new family of features. Moreover, analysis of the positions of adaBoost-selected keypoints show that they correspond to a specific part of the object category (such as ?wheel? or ?side skirt? in the case of lateral-cars) and thus have a ?semantic? meaning. We also made a first test on video for detecting vehicles from adaBoostselected keypoints filtered in real-time from all detected keypoints.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 15:42:30 GMT" } ]
2009-10-08T00:00:00
[ [ "Bdiri", "Taoufik", "", "CAOR" ], [ "Moutarde", "Fabien", "", "CAOR" ], [ "Steux", "Bruno", "", "CAOR" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0910.1295
Fabien Moutarde
Fabien Moutarde (CAOR), Alexandre Bargeton (CAOR), Anne Herbin, Lowik Chanussot
Modular Traffic Sign Recognition applied to on-vehicle real-time visual detection of American and European speed limit signs
null
14th World congress on Intelligent Transportation Systems (ITS'2007), Beijing : China (2007)
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new modular traffic signs recognition system, successfully applied to both American and European speed limit signs. Our sign detection step is based only on shape-detection (rectangles or circles). This enables it to work on grayscale images, contrary to most European competitors, which eases robustness to illumination conditions (notably night operation). Speed sign candidates are classified (or rejected) by segmenting potential digits inside them (which is rather original and has several advantages), and then applying a neural digit recognition. The global detection rate is ~90% for both (standard) U.S. and E.U. speed signs, with a misclassification rate <1%, and no validated false alarm in >150 minutes of video. The system processes in real-time ~20 frames/s on a standard high-end laptop.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 15:43:01 GMT" } ]
2009-10-08T00:00:00
[ [ "Moutarde", "Fabien", "", "CAOR" ], [ "Bargeton", "Alexandre", "", "CAOR" ], [ "Herbin", "Anne", "" ], [ "Chanussot", "Lowik", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0910.1300
Mehdi Torbatian
Mehdi Torbatian, Mohamed Oussama Damen
D-MG Tradeoff of DF and AF Relaying Protocols over Asynchronous PAM Cooperative Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The diversity multiplexing tradeoff of a general two-hop asynchronous cooperative network is examined for various relaying protocols such as non-orthogonal selection decode-and-forward (NSDF), orthogonal selection decode-and-forward (OSDF), non-orthogonal amplify-and-forward (NAF), and orthogonal amplify-and-forward (OAF). The transmitter nodes are assumed to send pulse amplitude modulation (PAM) signals asynchronously, in which information symbols are linearly modulated by a shaping waveform to be sent to the destination. We consider two different cases with respect to the length of the shaping waveforms in the time domain. In the theoretical case where the shaping waveforms with infinite time support are used, it is shown that asynchronism does not affect the DMT performance of the system and the same DMT as that of the corresponding synchronous network is obtained for all the aforementioned protocols. In the practical case where finite length shaping waveforms are used, it is shown that better diversity gains can be achieved at the expense of bandwidth expansion. In the decode-and-forward (DF) type protocols, the asynchronous network provides better diversity gains than those of the corresponding synchronous network throughout the range of the multiplexing gain. In the amplify-and-forward (AF) type protocols, the asynchronous network provides the same DMT as that of the corresponding synchronous counterpart under the OAF protocol; however, a better diversity gain is achieved under the NAF protocol throughout the range of the multiplexing gain. In particular, in the single relay asynchronous network, the NAF protocol provides the same DMT as that of the 2 {\times} 1 multiple-input single-output (MISO) channel.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 15:55:41 GMT" }, { "version": "v2", "created": "Fri, 18 Feb 2011 20:33:00 GMT" } ]
2011-02-21T00:00:00
[ [ "Torbatian", "Mehdi", "" ], [ "Damen", "Mohamed Oussama", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1335
Wei Mao
Wei Mao, Babak Hassibi
Violating the Ingleton Inequality with Finite Groups
17 pages, 1 figure. Presented at Allerton 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well known that there is a one-to-one correspondence between the entropy vector of a collection of n random variables and a certain group-characterizable vector obtained from a finite group and n of its subgroups. However, if one restricts attention to abelian groups then not all entropy vectors can be obtained. This is an explanation for the fact shown by Dougherty et al that linear network codes cannot achieve capacity in general network coding problems (since linear network codes form an abelian group). All abelian group-characterizable vectors, and by fiat all entropy vectors generated by linear network codes, satisfy a linear inequality called the Ingleton inequality. In this paper, we study the problem of finding nonabelian finite groups that yield characterizable vectors which violate the Ingleton inequality. Using a refined computer search, we find the symmetric group S_5 to be the smallest group that violates the Ingleton inequality. Careful study of the structure of this group, and its subgroups, reveals that it belongs to the Ingleton-violating family PGL(2,p) with primes p > 3, i.e., the projective group of 2 by 2 nonsingular matrices with entries in F_p. This family of groups is therefore a good candidate for constructing network codes more powerful than linear network codes.
[ { "version": "v1", "created": "Wed, 7 Oct 2009 19:11:38 GMT" } ]
2009-10-08T00:00:00
[ [ "Mao", "Wei", "" ], [ "Hassibi", "Babak", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1387
Tobias Jacobs
Tobias Jacobs
Simpler Proofs by Symbolic Perturbation
This work introduces a fairly novel model for combinatorial problems and algorithms. The author believes that the result is successfully applicable to the analyes of a very broad class of algorithms. He would be happy to receive feedback from the readers
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In analyses of algorithms, a substantial amount of effort has often to be spent on the discussion of special cases. For example, when the analysis considers the cases X<Y and X>Y separately, one might have to be especially careful about what happens when X=Y. On the other hand, experience tells us that when a yet unregarded special case of this kind is discovered, one nearly always finds a way to handle it. This is typically done by modifying the analysis and/or the algorithm very slightly. In this article we substantiate this observation theoretically. We concentrate on deterministic algorithms for weighted combinatorial optimization problems. A problem instance of this kind is defined by its structure and a vector of weights. The concept of a null case is introduced as set of problem instances whose weight vectors constitute a nowhere open set (or null set) in the space of all possible weight configurations. An algorithm is called robust if any null case can be disregarded in the analysis of both its solution quality and resource requirements. We show that achieving robustness is only a matter of breaking ties the right way. More specifically, we show that the concept of symbolic perturbation known from the area of geometric algorithms guarantees that no surprises will happen in null cases. We argue that for a huge class of combinatorial optimization algorithms it is easy to verify that they implicitly use symbolic perturbation for breaking ties and thus can be analyzed under the assumption that some arbitrary null case never occurs. Finally, we prove that there exists a symbolic perturbation tie breaking policy for any algorithm.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 02:23:15 GMT" }, { "version": "v2", "created": "Wed, 4 Nov 2009 09:00:16 GMT" } ]
2009-11-04T00:00:00
[ [ "Jacobs", "Tobias", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.1392
Tsung-Hsi Tsai
Wei-Mei Chen, Hsien-Kuei Hwang, Tsung-Hsi Tsai
Simple, efficient maxima-finding algorithms for multidimensional samples
null
null
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
New algorithms are devised for finding the maxima of multidimensional point samples, one of the very first problems studied in computational geometry. The algorithms are very simple and easily coded and modified for practical needs. The expected complexity of some measures related to the performance of the algorithms is analyzed. We also compare the efficiency of the algorithms with a few major ones used in practice, and apply our algorithms to find the maximal layers and the longest common subsequences of multiple sequences.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 02:53:58 GMT" } ]
2009-10-09T00:00:00
[ [ "Chen", "Wei-Mei", "" ], [ "Hwang", "Hsien-Kuei", "" ], [ "Tsai", "Tsung-Hsi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0910.1403
Ping Li
Ping Li
On the Sample Complexity of Compressed Counting
null
null
null
null
cs.DS cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed Counting (CC), based on maximally skewed stable random projections, was recently proposed for estimating the p-th frequency moments of data streams. The case p->1 is extremely useful for estimating Shannon entropy of data streams. In this study, we provide a very simple algorithm based on the sample minimum estimator and prove a much improved sample complexity bound, compared to prior results.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 04:40:46 GMT" } ]
2009-10-09T00:00:00
[ [ "Li", "Ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1404
EPTCS
Yves Deville, Christine Solnon
Proceedings 6th International Workshop on Local Search Techniques in Constraint Satisfaction
null
EPTCS 5, 2009
10.4204/EPTCS.5
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LSCS is a satellite workshop of the international conference on principles and practice of Constraint Programming (CP), since 2004. It is devoted to local search techniques in constraint satisfaction, and focuses on all aspects of local search techniques, including: design and implementation of new algorithms, hybrid stochastic-systematic search, reactive search optimization, adaptive search, modeling for local-search, global constraints, flexibility and robustness, learning methods, and specific applications.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 06:27:26 GMT" } ]
2009-10-09T00:00:00
[ [ "Deville", "Yves", "" ], [ "Solnon", "Christine", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.1406
EPTCS
Luca Bortolussi (University of Trieste), Alberto Policriti (University of Udine)
Hybrid Semantics of Stochastic Programs with Dynamic Reconfiguration
null
EPTCS 6, 2009, pp. 63-76
10.4204/EPTCS.6.5
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We begin by reviewing a technique to approximate the dynamics of stochastic programs --written in a stochastic process algebra-- by a hybrid system, suitable to capture a mixed discrete/continuous evolution. In a nutshell, the discrete dynamics is kept stochastic while the continuous evolution is given in terms of ODEs, and the overall technique, therefore, naturally associates a Piecewise Deterministic Markov Process with a stochastic program. The specific contribution in this work consists in an increase of the flexibility of the translation scheme, obtained by allowing a dynamic reconfiguration of the degree of discreteness/continuity of the semantics. We also discuss the relationships of this approach with other hybrid simulation strategies for biochemical systems.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 06:33:01 GMT" } ]
2009-10-09T00:00:00
[ [ "Bortolussi", "Luca", "", "University of Trieste" ], [ "Policriti", "Alberto", "", "University\n of Udine" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.1407
Yeow-Khiang Chia
Yeow-Khiang Chia and Abbas El Gamal
3-Receiver Broadcast Channels with Common and Confidential Messages
Revised version
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper establishes inner bounds on the secrecy capacity regions for the general 3-receiver broadcast channel with one common and one confidential message sets. We consider two setups. The first is when the confidential message is to be sent to two receivers and kept secret from the third receiver. Achievability is established using indirect decoding, Wyner wiretap channel coding, and the new idea of generating secrecy from a publicly available superposition codebook. The inner bound is shown to be tight for a class of reversely degraded broadcast channels and when both legitimate receivers are less noisy than the third receiver. The second setup investigated in this paper is when the confidential message is to be sent to one receiver and kept secret from the other two receivers. Achievability in this case follows from Wyner wiretap channel coding and indirect decoding. This inner bound is also shown to be tight for several special cases.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 05:00:38 GMT" }, { "version": "v2", "created": "Wed, 28 Oct 2009 21:45:13 GMT" }, { "version": "v3", "created": "Sat, 7 Nov 2009 01:08:31 GMT" }, { "version": "v4", "created": "Sat, 18 Jun 2011 22:56:09 GMT" } ]
2011-06-21T00:00:00
[ [ "Chia", "Yeow-Khiang", "" ], [ "Gamal", "Abbas El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1409
James Lee
James R. Lee, Anastasios Sidiropoulos
Pathwidth, trees, and random embeddings
21 pages
null
null
null
math.MG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that, for every $k=1,2,...,$ every shortest-path metric on a graph of pathwidth $k$ embeds into a distribution over random trees with distortion at most $c$ for some $c=c(k)$. A well-known conjecture of Gupta, Newman, Rabinovich, and Sinclair states that for every minor-closed family of graphs $F$, there is a constant $c(F)$ such that the multi-commodity max-flow/min-cut gap for every flow instance on a graph from $F$ is at most $c(F)$. The preceding embedding theorem is used to prove this conjecture whenever the family $F$ does not contain all trees.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 05:06:48 GMT" }, { "version": "v2", "created": "Mon, 29 Aug 2011 23:37:27 GMT" }, { "version": "v3", "created": "Sat, 6 Oct 2012 01:08:02 GMT" } ]
2012-10-09T00:00:00
[ [ "Lee", "James R.", "" ], [ "Sidiropoulos", "Anastasios", "" ] ]
[ { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.1410
EPTCS
Laurence Loewe, Stuart Moodie, Jane Hillston
Quantifying the implicit process flow abstraction in SBGN-PD diagrams with Bio-PEPA
null
EPTCS 6, 2009, pp. 93-107
10.4204/EPTCS.6.7
null
cs.PL cs.CE q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a long time biologists have used visual representations of biochemical networks to gain a quick overview of important structural properties. Recently SBGN, the Systems Biology Graphical Notation, has been developed to standardise the way in which such graphical maps are drawn in order to facilitate the exchange of information. Its qualitative Process Diagrams (SBGN-PD) are based on an implicit Process Flow Abstraction (PFA) that can also be used to construct quantitative representations, which can be used for automated analyses of the system. Here we explicitly describe the PFA that underpins SBGN-PD and define attributes for SBGN-PD glyphs that make it possible to capture the quantitative details of a biochemical reaction network. We implemented SBGNtext2BioPEPA, a tool that demonstrates how such quantitative details can be used to automatically generate working Bio-PEPA code from a textual representation of SBGN-PD that we developed. Bio-PEPA is a process algebra that was designed for implementing quantitative models of concurrent biochemical reaction systems. We use this approach to compute the expected delay between input and output using deterministic and stochastic simulations of the MAPK signal transduction cascade. The scheme developed here is general and can be easily adapted to other output formalisms.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 05:10:21 GMT" } ]
2009-10-09T00:00:00
[ [ "Loewe", "Laurence", "" ], [ "Moodie", "Stuart", "" ], [ "Hillston", "Jane", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0910.1412
EPTCS
Heike Siebert
Dynamical and Structural Modularity of Discrete Regulatory Networks
null
EPTCS 6, 2009, pp. 109-124
10.4204/EPTCS.6.8
null
cs.DM cs.CE q-bio.MN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A biological regulatory network can be modeled as a discrete function that contains all available information on network component interactions. From this function we can derive a graph representation of the network structure as well as of the dynamics of the system. In this paper we introduce a method to identify modules of the network that allow us to construct the behavior of the given function from the dynamics of the modules. Here, it proves useful to distinguish between dynamical and structural modules, and to define network modules combining aspects of both. As a key concept we establish the notion of symbolic steady state, which basically represents a set of states where the behavior of the given function is in some sense predictable, and which gives rise to suitable network modules. We apply the method to a regulatory network involved in T helper cell differentiation.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 05:19:04 GMT" } ]
2009-10-09T00:00:00
[ [ "Siebert", "Heike", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" } ]
0910.1415
EPTCS
Daniela Besozzi, Paolo Cazzaniga, Matteo Dugo, Dario Pescini, Giancarlo Mauri
A study on the combined interplay between stochastic fluctuations and the number of flagella in bacterial chemotaxis
null
EPTCS 6, 2009, pp. 47-62
10.4204/EPTCS.6.4
null
q-bio.MN cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The chemotactic pathway allows bacteria to respond and adapt to environmental changes, by tuning the tumbling and running motions that are due to clockwise and counterclockwise rotations of their flagella. The pathway is tightly regulated by feedback mechanisms governed by the phosphorylation and methylation of several proteins. In this paper, we present a detailed mechanistic model for chemotaxis, that considers all of its transmembrane and cytoplasmic components, and their mutual interactions. Stochastic simulations of the dynamics of a pivotal protein, CheYp, are performed by means of tau leaping algorithm. This approach is then used to investigate the interplay between the stochastic fluctuations of CheYp amount and the number of cellular flagella. Our results suggest that the combination of these factors might represent a relevant component for chemotaxis. Moreover, we study the pathway under various conditions, such as different methylation levels and ligand amounts, in order to test its adaptation response. Some issues for future work are finally discussed.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 05:31:06 GMT" } ]
2009-10-09T00:00:00
[ [ "Besozzi", "Daniela", "" ], [ "Cazzaniga", "Paolo", "" ], [ "Dugo", "Matteo", "" ], [ "Pescini", "Dario", "" ], [ "Mauri", "Giancarlo", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0910.1416
Sk Sarif Hassan s
Sk. Sarif Hassan, Pabitra Pal Choudhury, Amita Pal, R. L. Brahmachary and Arunava Goswami
Use of L-system mathematics for making new subfamily members of olfactory receptor full length genes, OR1D2, OR1D4 and OR1D5
null
null
null
null
cs.OH cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ligands for only two human olfactory receptors are known. One of them, OR1D2, binds to Bourgeonal [Malnic B, Godfrey P-A, Buck L-B (2004) The human olfactory receptor gene family. Proc. Natl. Acad. Sci U. S. A. 101: 2584-2589 and Erratum in: Proc Natl Acad Sci U. S. A. (2004) 101: 7205]. OR1D2, OR1D4 and OR1D5 are three full length olfactory receptors present in an olfactory locus in human genome. These receptors are more than 80% identical in DNA sequences and have 108 base pair mismatches among them. We have used L-system mathematics and have been able to show a closely related subfamily of OR1D2, OR1D4 and OR1D5.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 05:37:39 GMT" }, { "version": "v2", "created": "Thu, 25 Feb 2010 09:33:00 GMT" } ]
2010-02-25T00:00:00
[ [ "Hassan", "Sk. Sarif", "" ], [ "Choudhury", "Pabitra Pal", "" ], [ "Pal", "Amita", "" ], [ "Brahmachary", "R. L.", "" ], [ "Goswami", "Arunava", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0910.1418
Angelo Troina
Mario Coppo (Dipartimento di Informatica, Universit\'a di Torino), Ferruccio Damiani (Dipartimento di Informatica, Universit\'a di Torino), Elena Grassi (Molecular Biotechnology Center, Dipartimento di Genetica, Biologia e Biochimica and Dipartimento di Informatica, Universit\'a di Torino), Mike Guether (Dipartimento di Biologia Vegetale, Universit\`a di Torino), Angelo Troina (Dipartimento di Informatica, Universit\'a di Torino)
Modelling an Ammonium Transporter with SCLS
null
EPTCS 6, 2009, pp. 77-92
10.4204/EPTCS.6.6
null
q-bio.QM cs.CE q-bio.CB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Stochastic Calculus of Looping Sequences (SCLS) is a recently proposed modelling language for the representation and simulation of biological systems behaviour. It has been designed with the aim of combining the simplicity of notation of rewrite systems with the advantage of compositionality. It also allows a rather simple and accurate description of biological membranes and their interactions with the environment. In this work we apply SCLS to model a newly discovered ammonium transporter. This transporter is believed to play a fundamental role for plant mineral acquisition, which takes place in the arbuscular mycorrhiza, the most wide-spread plant-fungus symbiosis on earth. Due to its potential application in agriculture this kind of symbiosis is one of the main focuses of the BioBITs project. In our experiments the passage of NH3 / NH4+ from the fungus to the plant has been dissected in known and hypothetical mechanisms; with the model so far we have been able to simulate the behaviour of the system under different conditions. Our simulations confirmed some of the latest experimental results about the LjAMT2;2 transporter. The initial simulation results of the modelling of the symbiosis process are promising and indicate new directions for biological investigations.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 19:48:20 GMT" }, { "version": "v2", "created": "Fri, 14 May 2010 11:30:46 GMT" } ]
2015-03-13T00:00:00
[ [ "Coppo", "Mario", "", "Dipartimento di Informatica, Universitá di Torino" ], [ "Damiani", "Ferruccio", "", "Dipartimento di Informatica, Universitá di Torino" ], [ "Grassi", "Elena", "", "Molecular Biotechnology Center, Dipartimento di Genetica,\n Biologia e Biochimica and Dipartimento di Informatica, Universitá di\n Torino" ], [ "Guether", "Mike", "", "Dipartimento di Biologia Vegetale, Università di\n Torino" ], [ "Troina", "Angelo", "", "Dipartimento di Informatica, Universitá di Torino" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Quantitative Biology", "code": "q-bio.CB", "description": "Cell-cell signaling and interaction; morphogenesis and development; apoptosis; bacterial conjugation; viral-host interaction; immunology", "span": "(Cell Behavior)" } ]
0910.1427
Maurice Jansen
Maurice Jansen and Jayalal Sarma M.N
Balancing Bounded Treewidth Circuits
null
null
10.1007/978-3-642-13182-0_21
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Algorithmic tools for graphs of small treewidth are used to address questions in complexity theory. For both arithmetic and Boolean circuits, it is shown that any circuit of size $n^{O(1)}$ and treewidth $O(\log^i n)$ can be simulated by a circuit of width $O(\log^{i+1} n)$ and size $n^c$, where $c = O(1)$, if $i=0$, and $c=O(\log \log n)$ otherwise. For our main construction, we prove that multiplicatively disjoint arithmetic circuits of size $n^{O(1)}$ and treewidth $k$ can be simulated by bounded fan-in arithmetic formulas of depth $O(k^2\log n)$. From this we derive the analogous statement for syntactically multilinear arithmetic circuits, which strengthens a theorem of Mahajan and Rao. As another application, we derive that constant width arithmetic circuits of size $n^{O(1)}$ can be balanced to depth $O(\log n)$, provided certain restrictions are made on the use of iterated multiplication. Also from our main construction, we derive that Boolean bounded fan-in circuits of size $n^{O(1)}$ and treewidth $k$ can be simulated by bounded fan-in formulas of depth $O(k^2\log n)$. This strengthens in the non-uniform setting the known inclusion that $SC^0 \subseteq NC^1$. Finally, we apply our construction to show that {\sc reachability} for directed graphs of bounded treewidth is in $LogDCFL$.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 06:56:50 GMT" } ]
2015-05-14T00:00:00
[ [ "Jansen", "Maurice", "" ], [ "N", "Jayalal Sarma M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.1433
Jean Dezert
Albena Tchamova (IPP BAS), Jean Dezert (ONERA), Florentin Smarandache (UNM)
Tracking object's type changes with fuzzy based fusion rule
null
First International Conference on Modelling and Development of Intelligent Systems, Sibiu : Romania (2009)
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper the behavior of three combinational rules for temporal/sequential attribute data fusion for target type estimation are analyzed. The comparative analysis is based on: Dempster's fusion rule proposed in Dempster-Shafer Theory; Proportional Conflict Redistribution rule no. 5 (PCR5), proposed in Dezert-Smarandache Theory and one alternative class fusion rule, connecting the combination rules for information fusion with particular fuzzy operators, focusing on the t-norm based Conjunctive rule as an analog of the ordinary conjunctive rule and t-conorm based Disjunctive rule as an analog of the ordinary disjunctive rule. The way how different t-conorms and t-norms functions within TCN fusion rule influence over target type estimation performance is studied and estimated.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 07:53:27 GMT" } ]
2009-10-09T00:00:00
[ [ "Tchamova", "Albena", "", "IPP BAS" ], [ "Dezert", "Jean", "", "ONERA" ], [ "Smarandache", "Florentin", "", "UNM" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.1443
Maurice Jansen
Maurice Jansen
Weakening Assumptions for Deterministic Subexponential Time Non-Singular Matrix Completion
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In (Kabanets, Impagliazzo, 2004) it is shown how to decide the circuit polynomial identity testing problem (CPIT) in deterministic subexponential time, assuming hardness of some explicit multilinear polynomial family for arithmetical circuits. In this paper, a special case of CPIT is considered, namely low-degree non-singular matrix completion (NSMC). For this subclass of problems it is shown how to obtain the same deterministic time bound, using a weaker assumption in terms of determinantal complexity. Hardness-randomness tradeoffs will also be shown in the converse direction, in an effort to make progress on Valiant's VP versus VNP problem. To separate VP and VNP, it is known to be sufficient to prove that the determinantal complexity of the m-by-m permanent is $m^{\omega(\log m)}$. In this paper it is shown, for an appropriate notion of explicitness, that the existence of an explicit multilinear polynomial family with determinantal complexity m^{\omega(\log m)}$ is equivalent to the existence of an efficiently computable generator $G_n$ for multilinear NSMC with seed length $O(n^{1/\sqrt{\log n}})$. The latter is a combinatorial object that provides an efficient deterministic black-box algorithm for NSMC. ``Multilinear NSMC'' indicates that $G_n$ only has to work for matrices $M(x)$ of $poly(n)$ size in $n$ variables, for which $det(M(x))$ is a multilinear polynomial.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 08:44:29 GMT" } ]
2009-10-09T00:00:00
[ [ "Jansen", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.1463
Alexandros Dimakis
Morten Hansen and Babak Hassibi and Alexandros G. Dimakis and Weiyu Xu
Near-Optimal Detection in MIMO Systems using Gibbs Sampling
To appear in Globecom 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study a Markov Chain Monte Carlo (MCMC) Gibbs sampler for solving the integer least-squares problem. In digital communication the problem is equivalent to performing Maximum Likelihood (ML) detection in Multiple-Input Multiple-Output (MIMO) systems. While the use of MCMC methods for such problems has already been proposed, our method is novel in that we optimize the "temperature" parameter so that in steady state, i.e. after the Markov chain has mixed, there is only polynomially (rather than exponentially) small probability of encountering the optimal solution. More precisely, we obtain the largest value of the temperature parameter for this to occur, since the higher the temperature, the faster the mixing. This is in contrast to simulated annealing techniques where, rather than being held fixed, the temperature parameter is tended to zero. Simulations suggest that the resulting Gibbs sampler provides a computationally efficient way of achieving approximative ML detection in MIMO systems having a huge number of transmit and receive dimensions. In fact, they further suggest that the Markov chain is rapidly mixing. Thus, it has been observed that even in cases were ML detection using, e.g. sphere decoding becomes infeasible, the Gibbs sampler can still offer a near-optimal solution using much less computations.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 10:57:03 GMT" } ]
2009-10-09T00:00:00
[ [ "Hansen", "Morten", "" ], [ "Hassibi", "Babak", "" ], [ "Dimakis", "Alexandros G.", "" ], [ "Xu", "Weiyu", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1468
Rdv Ijcsis
P. Jayarekha, T. R. GopalaKrishnan Nair
Prefetching of VoD Programs Based On ART1 Requesting Clustering
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 128-134, September 2009, USA
null
ISSN 1947 5500
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a novel approach to group users according to the VoD user request pattern. We cluster the user requests based on ART1 neural network algorithm. The knowledge extracted from the cluster is used to prefetch the multimedia object from each cluster before the users request. We have developed an algorithm to cluster users according to the users request patterns based on ART1 neural network algorithm that offers an unsupervised clustering. This approach adapts to changes in user request patterns over period without losing previous information. Each cluster is represented as prototype vector by generalizing the most frequently used URLs that are accessed by all the cluster members. The simulation results of our proposed clustering and prefetching algorithm, shows enormous increase in the performance of streaming server. Our algorithm helps the servers agent to learn user preferences and discover the information about the corresponding sources and other similar interested individuals.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 11:21:21 GMT" } ]
2009-10-09T00:00:00
[ [ "Jayarekha", "P.", "" ], [ "Nair", "T. R. GopalaKrishnan", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0910.1471
Rdv Ijcsis
M Dakshayini, T R GopalaKrishnan Nair
Prefix based Chaining Scheme for Streaming Popular Videos using Proxy servers in VoD
9 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 135-143, September 2009, USA
null
ISSN 1947 5500
cs.MM cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Streaming high quality videos consumes significantly large amount of network resources. In this context request to service delay, network traffic, congestion and server overloading are the main parameters to be considered in video streaming over the internet that effect the quality of service (QoS). In this paper, we propose an efficient architecture as a cluster of proxy servers and clients that uses a peer to peer (P2P) approach to cooperatively stream the video using chaining technique. We consider the following two key issues in the proposed architecture (1) Prefix caching technique to accommodate more number of videos close to client (2) Cooperative client and proxy chaining to achieve the network efficiency. Our simulation results shows that the proposed approach yields a prefix caching close to the optimal solution minimizing WAN bandwidth usage on server-proxy path by utilizing the proxy-client and client-client path bandwidth, which is much cheaper than the expensive server proxy path bandwidth, server load, and client rejection ratio significantly using chaining.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 11:26:01 GMT" } ]
2009-10-09T00:00:00
[ [ "Dakshayini", "M", "" ], [ "Nair", "T R GopalaKrishnan", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.1475
Rdv Ijcsis
Annapurna P Patil, Narmada Sambaturu, Krittaya Chunhaviriyakul
Convergence Time Evaluation of Algorithms in MANETs
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 144-149, September 2009, USA
null
ISSN 1947 5500
cs.DS cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since the advent of wireless communication, the need for mobile ad hoc networks has been growing exponentially. This has opened up a Pandoras Box of algorithms for dealing with mobile ad hoc networks, or MANETs, as they are generally referred to. Most attempts made at evaluating these algorithms so far have focused on parameters such as throughput, packet delivery ratio, overhead etc. An analysis of the convergence times of these algorithms is still an open issue. The work carried out fills this gap by evaluating the algorithms on the basis of convergence time. Algorithms for MANETs can be classified into three categories: reactive, proactive, and hybrid protocols. In this project, we compare the convergence times of representative algorithms in each category, namely Ad hoc On Demand Distance Vector (AODV) reactive, Destination Sequence Distance Vector protocol (DSDV) proactive, and Temporally Ordered Routing Algorithm (TORA) hybrid. The algorithm performances are compared by simulating them in ns2. Tcl is used to conduct the simulations, while perl is used to extract data from the simulation output and calculate convergence time. The design of the experiments carried on is documented using Unified modeling Language. Also, a user interface is created using perl, which enables the user to either run a desired simulation and measure convergence time, or measure the convergence time of a simulation that has been run earlier.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 11:33:37 GMT" } ]
2009-10-09T00:00:00
[ [ "Patil", "Annapurna P", "" ], [ "Sambaturu", "Narmada", "" ], [ "Chunhaviriyakul", "Krittaya", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.1484
Alain Lecomte
Alain Lecomte (INRIA Futurs, SFLTAMP), Myriam Quatrini (IML)
Ludics and its Applications to natural Language Semantics
null
Lecture Notes in Artificial Intelligence LNAI, 5514 (2009) pp 242--255
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Proofs, in Ludics, have an interpretation provided by their counter-proofs, that is the objects they interact with. We follow the same idea by proposing that sentence meanings are given by the counter-meanings they are opposed to in a dialectical interaction. The conception is at the intersection of a proof-theoretic and a game-theoretic accounts of semantics, but it enlarges them by allowing to deal with possibly infinite processes.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 12:21:22 GMT" } ]
2009-10-09T00:00:00
[ [ "Lecomte", "Alain", "", "INRIA Futurs, SFLTAMP" ], [ "Quatrini", "Myriam", "", "IML" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0910.1494
Apostolos Syropoulos
Apostolos Syropoulos
Some Thoughts on Hypercomputation
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hypercomputation is a relatively new branch of computer science that emerged from the idea that the Church--Turing Thesis, which is supposed to describe what is computable and what is noncomputable, cannot possible be true. Because of its apparent validity, the Church--Turing Thesis has been used to investigate the possible limits of intelligence of any imaginable life form, and, consequently, the limits of information processing, since living beings are, among others, information processors. However, in the light of hypercomputation, which seems to be feasibly in our universe, one cannot impose arbitrary limits to what intelligence can achieve unless there are specific physical laws that prohibit the realization of something. In addition, hypercomputation allows us to ponder about aspects of communication between intelligent beings that have not been considered before
[ { "version": "v1", "created": "Thu, 8 Oct 2009 12:53:50 GMT" } ]
2009-10-12T00:00:00
[ [ "Syropoulos", "Apostolos", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0910.1495
Ping Li
Ping Li
Estimating Entropy of Data Streams Using Compressed Counting
null
null
null
null
cs.DS cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Shannon entropy is a widely used summary statistic, for example, network traffic measurement, anomaly detection, neural computations, spike trains, etc. This study focuses on estimating Shannon entropy of data streams. It is known that Shannon entropy can be approximated by Reenyi entropy or Tsallis entropy, which are both functions of the p-th frequency moments and approach Shannon entropy as p->1. Compressed Counting (CC) is a new method for approximating the p-th frequency moments of data streams. Our contributions include: 1) We prove that Renyi entropy is (much) better than Tsallis entropy for approximating Shannon entropy. 2) We propose the optimal quantile estimator for CC, which considerably improves the previous estimators. 3) Our experiments demonstrate that CC is indeed highly effective approximating the moments and entropies. We also demonstrate the crucial importance of utilizing the variance-bias trade-off.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 12:54:36 GMT" } ]
2009-10-09T00:00:00
[ [ "Li", "Ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0910.1511
Aylin Yener
Xiang He, Aylin Yener
Cooperation with an Untrusted Relay: A Secrecy Perspective
IEEE Transactions on Information Theory, submitted October 2008, revised October 2009. This is the revised version
null
10.1109/TIT.2010.2050958
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario, an interesting question is whether the relay node should be deployed at all. That is, whether cooperation with an untrusted relay node can ever be beneficial. We first provide an achievable secrecy rate for the general untrusted relay channel, and proceed to investigate this question for two types of relay networks with orthogonal components. For the first model, there is an orthogonal link from the source to the relay. For the second model, there is an orthogonal link from the relay to the destination. For the first model, we find the equivocation capacity region and show that answer is negative. In contrast, for the second model, we find that the answer is positive. Specifically, we show by means of the achievable secrecy rate based on compress-and-forward, that, by asking the untrusted relay node to relay information, we can achieve a higher secrecy rate than just treating the relay as an eavesdropper. For a special class of the second model, where the relay is not interfering itself, we derive an upper bound for the secrecy rate using an argument whose net effect is to separate the eavesdropper from the relay. The merit of the new upper bound is demonstrated on two channels that belong to this special class. The Gaussian case of the second model mentioned above benefits from this approach in that the new upper bound improves the previously known bounds. For the Cover-Kim deterministic relay channel, the new upper bound finds the secrecy capacity when the source-destination link is not worse than the source-relay link, by matching with the achievable rate we present.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 13:59:55 GMT" } ]
2016-11-15T00:00:00
[ [ "He", "Xiang", "" ], [ "Yener", "Aylin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1528
Jeffrey Shallit
Thomas Ang, Jeffrey Shallit
Length of the Shortest Word in the Intersection of Regular Languages
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note, we give a construction that provides a tight lower bound of mn-1 for the length of the shortest word in the intersection of two regular languages with state complexities m and n.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 15:16:48 GMT" } ]
2009-10-09T00:00:00
[ [ "Ang", "Thomas", "" ], [ "Shallit", "Jeffrey", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0910.1532
Yi Cao
Yi Cao and Biao Chen
Capacity Bounds for Two-Hop Interference Networks
8 pages, 5 figures, presented in Allerton Conference'09
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers a two-hop interference network, where two users transmit independent messages to their respective receivers with the help of two relay nodes. The transmitters do not have direct links to the receivers; instead, two relay nodes serve as intermediaries between the transmitters and receivers. Each hop, one from the transmitters to the relays and the other from the relays to the receivers, is modeled as a Gaussian interference channel, thus the network is essentially a cascade of two interference channels. For this network, achievable symmetric rates for different parameter regimes under decode-and- forward relaying and amplify-and-forward relaying are proposed and the corresponding coding schemes are carefully studied. Numerical results are also provided.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 15:29:57 GMT" } ]
2009-10-09T00:00:00
[ [ "Cao", "Yi", "" ], [ "Chen", "Biao", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1536
Manas Patra
Manas K. Patra and Samuel L. Braunstein
An algebraic framework for information theory: Classical Information
35 pages. Typo corrected in the abstract
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work proposes a complete algebraic model for classical information theory. As a precursor the essential probabilistic concepts have been defined and analyzed in the algebraic setting. Examples from probability and information theory demonstrate that in addition to theoretical insights provided by the algebraic model one obtains new computational and anlytical tools. Several important theorems of classical probahility and information theory are formulated and proved in the algebraic framework.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 16:23:10 GMT" }, { "version": "v2", "created": "Mon, 12 Oct 2009 17:44:24 GMT" } ]
2009-10-12T00:00:00
[ [ "Patra", "Manas K.", "" ], [ "Braunstein", "Samuel L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1585
Aaron D. Jaggard
Aaron D. Jaggard, Michael Schapira, and Rebecca N. Wright
Distributed Computing with Adaptive Heuristics
36 pages, four figures. Expands both technical results and discussion of v1. Revised version will appear in the proceedings of Innovations in Computer Science 2011
null
null
null
cs.DC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We use ideas from distributed computing to study dynamic environments in which computational nodes, or decision makers, follow adaptive heuristics (Hart 2005), i.e., simple and unsophisticated rules of behavior, e.g., repeatedly "best replying" to others' actions, and minimizing "regret", that have been extensively studied in game theory and economics. We explore when convergence of such simple dynamics to an equilibrium is guaranteed in asynchronous computational environments, where nodes can act at any time. Our research agenda, distributed computing with adaptive heuristics, lies on the borderline of computer science (including distributed computing and learning) and game theory (including game dynamics and adaptive heuristics). We exhibit a general non-termination result for a broad class of heuristics with bounded recall---that is, simple rules of behavior that depend only on recent history of interaction between nodes. We consider implications of our result across a wide variety of interesting and timely applications: game theory, circuit design, social networks, routing and congestion control. We also study the computational and communication complexity of asynchronous dynamics and present some basic observations regarding the effects of asynchrony on no-regret dynamics. We believe that our work opens a new avenue for research in both distributed computing and game theory.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 22:39:39 GMT" }, { "version": "v2", "created": "Tue, 12 Oct 2010 19:35:08 GMT" } ]
2010-10-13T00:00:00
[ [ "Jaggard", "Aaron D.", "" ], [ "Schapira", "Michael", "" ], [ "Wright", "Rebecca N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0910.1605
EPTCS
Ralph-Johan Back ({\AA}bo Akademi University, Finland), Ion Petre ({\AA}bo Akademi University, Finland), Erik de Vink (Eindhoven University of Technology, the Netherlands)
Proceedings Second International Workshop on Computational Models for Cell Processes
null
EPTCS 6, 2009
10.4204/EPTCS.6
null
cs.CE cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The second international workshop on Computational Models for Cell Processes (ComProc 2009) took place on November 3, 2009 at the Eindhoven University of Technology, in conjunction with Formal Methods 2009. The workshop was jointly organized with the EC-MOAN project. This volume contains the final versions of all contributions accepted for presentation at the workshop.
[ { "version": "v1", "created": "Thu, 8 Oct 2009 20:15:51 GMT" }, { "version": "v2", "created": "Thu, 22 Oct 2009 02:29:16 GMT" } ]
2016-08-14T00:00:00
[ [ "Back", "Ralph-Johan", "", "Åbo Akademi University, Finland" ], [ "Petre", "Ion", "", "Åbo Akademi University, Finland" ], [ "de Vink", "Erik", "", "Eindhoven University of\n Technology, the Netherlands" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.1623
Wei Lu
Wei Lu, Namrata Vaswani
Modified Basis Pursuit Denoising(MODIFIED-BPDN) for Noisy Compressive Sensing with Partially Known Support
5 pages, 3 figures, submitted ICASSP 2010
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
In this work, we study the problem of reconstructing a sparse signal from a limited number of linear 'incoherent' noisy measurements, when a part of its support is known. The known part of the support may be available from prior knowledge or from the previous time instant (in applications requiring recursive reconstruction of a time sequence of sparse signals, e.g. dynamic MRI). We study a modification of Basis Pursuit Denoising (BPDN) and bound its reconstruction error. A key feature of our work is that the bounds that we obtain are computable. Hence, we are able to use Monte Carlo to study their average behavior as the size of the unknown support increases. We also demonstrate that when the unknown support size is small, modified-BPDN bounds are much tighter than those for BPDN, and hold under much weaker sufficient conditions (require fewer measurements).
[ { "version": "v1", "created": "Thu, 8 Oct 2009 22:00:19 GMT" } ]
2009-10-12T00:00:00
[ [ "Lu", "Wei", "" ], [ "Vaswani", "Namrata", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1639
Goochul Chung
G. Chung, S. Vishwanath, and C. S. Hwang
On the Fundamental Limits of Interweaved Cognitive Radios
7 pages, 3 figures, IEEE Radio and Wireless Symposium, 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the problem of channel sensing in cognitive radios. The system model considered is a set of N parallel (dis-similar) channels, where each channel at any given time is either available or occupied by a legitimate user. The cognitive radio is permitted to sense channels to determine each of their states as available or occupied. The end goal of this paper is to select the best L channels to sense at any given time. Using a convex relaxation approach, this paper formulates and approximately solves this optimal selection problem. Finally, the solution obtained to the relaxed optimization problem is translated into a practical algorithm.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 00:55:37 GMT" } ]
2009-10-12T00:00:00
[ [ "Chung", "G.", "" ], [ "Vishwanath", "S.", "" ], [ "Hwang", "C. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1643
Iris Reinbacher
Hee-Kap Ahn, Sang Won Bae, Erik D. Demaine, Martin L. Demaine, Sang-Sub Kim, Matias Korman, Iris Reinbacher, Wanbin Son
Covering Points by Disjoint Boxes with Outliers
updated version: - changed problem from 'cover exactly n-k points' to 'cover at least n-k points' to avoid having non-feasible solutions. Results are unchanged. - added Proof to Lemma 11, clarified some sections - corrected typos and small errors - updated affiliations of two authors
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a set of n points in the plane, we consider the axis--aligned (p,k)-Box Covering problem: Find p axis-aligned, pairwise-disjoint boxes that together contain n-k points. In this paper, we consider the boxes to be either squares or rectangles, and we want to minimize the area of the largest box. For general p we show that the problem is NP-hard for both squares and rectangles. For a small, fixed number p, we give algorithms that find the solution in the following running times: For squares we have O(n+k log k) time for p=1, and O(n log n+k^p log^p k time for p = 2,3. For rectangles we get O(n + k^3) for p = 1 and O(n log n+k^{2+p} log^{p-1} k) time for p = 2,3. In all cases, our algorithms use O(n) space.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 02:31:23 GMT" }, { "version": "v2", "created": "Tue, 27 Jul 2010 03:38:43 GMT" } ]
2010-07-28T00:00:00
[ [ "Ahn", "Hee-Kap", "" ], [ "Bae", "Sang Won", "" ], [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Kim", "Sang-Sub", "" ], [ "Korman", "Matias", "" ], [ "Reinbacher", "Iris", "" ], [ "Son", "Wanbin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.1650
Dingyin Xia
Dingyin Xia, Fei Wu, Xuqing Zhang, Yueting Zhuang
Local and global approaches of affinity propagation clustering for large scale data
9 pages
J Zhejiang Univ Sci A 2008 9(10):1373-1381
10.1631/jzus.A0720058
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently a new clustering algorithm called 'affinity propagation' (AP) has been proposed, which efficiently clustered sparsely related data by passing messages between data points. However, we want to cluster large scale data where the similarities are not sparse in many cases. This paper presents two variants of AP for grouping large scale data with a dense similarity matrix. The local approach is partition affinity propagation (PAP) and the global method is landmark affinity propagation (LAP). PAP passes messages in the subsets of data first and then merges them as the number of initial step of iterations; it can effectively reduce the number of iterations of clustering. LAP passes messages between the landmark data points first and then clusters non-landmark data points; it is a large global approximation method to speed up clustering. Experiments are conducted on many datasets, such as random data points, manifold subspaces, images of faces and Chinese calligraphy, and the results demonstrate that the two approaches are feasible and practicable.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 04:55:41 GMT" } ]
2009-10-12T00:00:00
[ [ "Xia", "Dingyin", "" ], [ "Wu", "Fei", "" ], [ "Zhang", "Xuqing", "" ], [ "Zhuang", "Yueting", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0910.1688
Zuleita Ka Ming Ho
Zuleita Ka Ming Ho and David Gesbert
Balancing Egoism and Altruism on MIMO Interference Channel
version 4: 10 pages, journal paper, fixed typo, additional remarks and figures for explanation and illustration
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper considers the so-called multiple-input-multiple-output interference channel (MIMO-IC) which has relevance in applications such as multi-cell coordination in cellular networks as well as spectrum sharing in cognitive radio networks among others. We consider a beamforming design framework based on striking a compromise between beamforming gain at the intended receiver (Egoism) and the mitigation of interference created towards other receivers (Altruism). Combining egoistic and altruistic beamforming has been shown previously in several papers to be instrumental to optimizing the rates in a multiple-input-single-output interference channel MISO-IC (i.e. where receivers have no interference canceling capability). Here, by using the framework of Bayesian games, we shed more light on these game-theoretic concepts in the more general context of MIMO channels and more particularly when coordinating parties only have channel state information (CSI) of channels that they can measure directly. This allows us to derive distributed beamforming techniques. We draw parallels with existing work on the MIMO-IC, including rate-optimizing and interference-alignment precoding techniques, showing how such techniques may be improved or re-interpreted through a common prism based on balancing egoistic and altruistic beamforming. Our analysis and simulations currently limited to single stream transmission per user attest the improvements over known interference alignment based methods in terms of sum rate performance in the case of so-called asymmetric networks.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 09:07:24 GMT" }, { "version": "v2", "created": "Tue, 1 Jun 2010 12:13:29 GMT" }, { "version": "v3", "created": "Wed, 2 Jun 2010 08:09:35 GMT" }, { "version": "v4", "created": "Thu, 7 Oct 2010 17:47:58 GMT" } ]
2010-10-08T00:00:00
[ [ "Ho", "Zuleita Ka Ming", "" ], [ "Gesbert", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1690
Christian Attiogbe
Christian Attiogbe (LINA)
Tool-Assisted Multi-Facet Analysis of Formal Specifications (Using Alelier-B and ProB)
null
IASTED Conf. on Software Engineering (SE'2006), Innsbruck : Austria (2006)
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tool-assisted analysis of software systems and convenient guides to practise the formal methods are still motivating challenges. This article addresses these challenges. We ex periment on analysing a formal specification from multiple aspects. The B method and the Atelier-B tool are used for formal specifications, for safety property analysis and for refinements. The ProB tool is used to supplement the study with model checking; it helps to discover errors and there fore to improve the former specifications.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 09:19:51 GMT" } ]
2016-11-25T00:00:00
[ [ "Attiogbe", "Christian", "", "LINA" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0910.1691
Dominik Janzing
Dominik Janzing and Bastian Steudel
Justifying additive-noise-model based causal discovery via algorithmic information theory
17 pages, 1 Figure
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A recent method for causal discovery is in many cases able to infer whether X causes Y or Y causes X for just two observed variables X and Y. It is based on the observation that there exist (non-Gaussian) joint distributions P(X,Y) for which Y may be written as a function of X up to an additive noise term that is independent of X and no such model exists from Y to X. Whenever this is the case, one prefers the causal model X--> Y. Here we justify this method by showing that the causal hypothesis Y--> X is unlikely because it requires a specific tuning between P(Y) and P(X|Y) to generate a distribution that admits an additive noise model from X to Y. To quantify the amount of tuning required we derive lower bounds on the algorithmic information shared by P(Y) and P(X|Y). This way, our justification is consistent with recent approaches for using algorithmic information theory for causal reasoning. We extend this principle to the case where P(X,Y) almost admits an additive noise model. Our results suggest that the above conclusion is more reliable if the complexity of P(Y) is high.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 09:52:37 GMT" } ]
2009-10-12T00:00:00
[ [ "Janzing", "Dominik", "" ], [ "Steudel", "Bastian", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1719
Federico Calzolari
Federico Calzolari
High availability using virtualization
PhD Thesis in Information Technology Engineering: Electronics, Computer Science, Telecommunications, pp. 94, University of Pisa [Italy]
null
null
null
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High availability has always been one of the main problems for a data center. Till now high availability was achieved by host per host redundancy, a highly expensive method in terms of hardware and human costs. A new approach to the problem can be offered by virtualization. Using virtualization, it is possible to achieve a redundancy system for all the services running on a data center. This new approach to high availability allows to share the running virtual machines over the servers up and running, by exploiting the features of the virtualization layer: start, stop and move virtual machines between physical hosts. The system (3RC) is based on a finite state machine with hysteresis, providing the possibility to restart each virtual machine over any physical host, or reinstall it from scratch. A complete infrastructure has been developed to install operating system and middleware in a few minutes. To virtualize the main servers of a data center, a new procedure has been developed to migrate physical to virtual hosts. The whole Grid data center SNS-PISA is running at the moment in virtual environment under the high availability system. As extension of the 3RC architecture, several storage solutions have been tested to store and centralize all the virtual disks, from NAS to SAN, to grant data safety and access from everywhere. Exploiting virtualization and ability to automatically reinstall a host, we provide a sort of host on-demand, where the action on a virtual machine is performed only when a disaster occurs.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 12:04:13 GMT" } ]
2009-10-12T00:00:00
[ [ "Calzolari", "Federico", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0910.1757
Laurent Tapie
Laurent Tapie (LURPA), Kwamiwi Mawussi (LURPA)
Decomposition of forging die for high speed machining
null
IDMME - Virtual Concept 2008, Beijing : China (2008)
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today's forging die manufacturing process must be adapted to several evolutions in machining process generation: CAD/CAM models, CAM software solutions and High Speed Machining (HSM). In this context, the adequacy between die shape and HSM process is in the core of machining preparation and process planning approaches. This paper deals with an original approach of machining preparation integrating this adequacy in the main tasks carried out. In this approach, the design of the machining process is based on two levels of decomposition of the geometrical model of a given die with respect to HSM cutting conditions (cutting speed and feed rate) and technological constrains (tool selection, features accessibility). This decomposition assists machining assistant to generate an HSM process. The result of this decomposition is the identification of machining features.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 14:33:17 GMT" } ]
2009-10-12T00:00:00
[ [ "Tapie", "Laurent", "", "LURPA" ], [ "Mawussi", "Kwamiwi", "", "LURPA" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0910.1758
Laurent Tapie
Laurent Tapie (LURPA), Kwamiwi Mawussi (LURPA), Bernard Anselmetti (LURPA)
Circular tests for HSM machine tools: Bore machining application
null
International Journal of Machine Tools & Manufacture 47 (2007) 805-819
10.1016/j.ijmachtools.2006.06.021
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today's High-Speed Machining (HSM) machine tool combines productivity and part quality. The difficulty inherent in HSM operations lies in understanding the impact of machine tool behaviour on machining time and part quality. Analysis of some of the relevant ISO standards (230-1998, 10791-1998) and a complementary protocol for better understanding HSM technology are presented in the first part of this paper. These ISO standards are devoted to the procedures implemented in order to study the behavior of machine tool. As these procedures do not integrate HSM technology, the need for HSM machine tool tests becomes critical to improving the trade-off between machining time and part quality. A new protocol for analysing the HSM technology impact during circular interpolation is presented in the second part of the paper. This protocol which allows evaluating kinematic machine tool behaviour during circular interpolation was designed from tests without machining. These tests are discussed and their results analysed in the paper. During the circular interpolation, axis capacities (such as acceleration or Jerk) related to certain setting parameters of the numerical control unit have a significant impact on the value of the feed rate. Consequently, a kinematic model for a circular-interpolated trajectory was developed on the basis of these parameters. Moreover, the link between part accuracy and kinematic machine tool behaviour was established. The kinematic model was ultimately validated on a bore machining simulation.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 14:33:48 GMT" } ]
2009-10-12T00:00:00
[ [ "Tapie", "Laurent", "", "LURPA" ], [ "Mawussi", "Kwamiwi", "", "LURPA" ], [ "Anselmetti", "Bernard", "", "LURPA" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0910.1760
Laurent Tapie
Laurent Tapie (LURPA), Kwamiwi Mawussi (LURPA), Bernard Anselmetti (LURPA)
Machining strategy choice: performance VIEWER
null
Advances in Integrated Design and Manufacturing in Mechanical Engineering II (2007) 343
null
Adv-2007-343
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays high speed machining (HSM) machine tool combines productivity and part quality. So mould and die maker invested in HSM. Die and mould features are more and more complex shaped. Thus, it is difficult to choose the best machining strategy according to part shape. Geometrical analysis of machining features is not sufficient to make an optimal choice. Some research show that security, technical, functional and economical constrains must be taken into account to elaborate a machining strategy. During complex shape machining, production system limits induce feed rate decreases, thus loss of productivity, in some part areas. In this paper we propose to analyse these areas by estimating tool path quality. First we perform experiments on HSM machine tool to determine trajectory impact on machine tool behaviour. Then, we extract critical criteria and establish models of performance loss. Our work is focused on machine tool kinematical performance and numerical controller unit calculation capacity. We implement these models on Esprit CAM Software. During machining trajectory creation, critical part areas can be visualised and analysed. Parameters, such as, segment or arc lengths, nature of discontinuities encountered are used to analyse critical part areas. According to this visualisation, process development engineer should validate or modify the trajectory.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 14:36:41 GMT" } ]
2009-10-12T00:00:00
[ [ "Tapie", "Laurent", "", "LURPA" ], [ "Mawussi", "Kwamiwi", "", "LURPA" ], [ "Anselmetti", "Bernard", "", "LURPA" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0910.1761
Laurent Tapie
Laurent Tapie (LURPA), Kwamiwi Mawussi (LURPA), Bernard Anselmetti (LURPA)
Decomposition of forging dies for machining planning
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper will provide a method to decompose forging dies for machining planning in the case of high speed machining finishing operations. This method lies on a machining feature approach model presented in the following paper. The two main decomposition phases, called Basic Machining Features Extraction and Process Planning Generation, are presented. These two decomposition phases integrates machining resources models and expert machining knowledge to provide an outstanding process planning.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 14:37:04 GMT" } ]
2009-10-12T00:00:00
[ [ "Tapie", "Laurent", "", "LURPA" ], [ "Mawussi", "Kwamiwi", "", "LURPA" ], [ "Anselmetti", "Bernard", "", "LURPA" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0910.1762
Laurent Tapie
Kwamiwi Mawussi (LURPA), Laurent Tapie (LURPA)
D\'efinition d'une pi\`ece test pour la caract\'erisation d'une machine UGV
null
1er Conrg\`es International Conception et Mod\'elisation des Syst\`emes M\'ecaniques, CMSM\'05, Tunisie (2005)
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In several fields like aeronautics, die and automotive, the machining of the parts is done more and more on high speed machines tools. Today, the offer for purchasing these machine tools is very wide. This situation poses the problem of the judicious and objective choice meeting industrial needs that must be necessary well expressed. The choice remains difficult insofar as the technical data provided to the customers by the manufacturers of machine tools are insufficient as well quantitatively as qualitatively. In this paper we present a protocol for the characterization of machines tools in order to direct the choice. The protocol is based on the one hand on no-load complementary tests to those recommended by the standards ISO 230 and ISO 10791 and on the other hand on the tests in load on a part test. In the first part, we present the industrial needs as well as an analysis of the technical data of machine tools. The second part is devoted to the study of the standards, the description of the protocol and the presentation of the results.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 14:37:27 GMT" } ]
2009-10-12T00:00:00
[ [ "Mawussi", "Kwamiwi", "", "LURPA" ], [ "Tapie", "Laurent", "", "LURPA" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0910.1763
Sylvie Putot
Eric Goubault and Sylvie Putot
A zonotopic framework for functional abstractions
23 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article formalizes an abstraction of input/output relations, based on parameterized zonotopes, which we call affine sets. We describe the abstract transfer functions and prove their correctness, which allows the generation of accurate numerical invariants. Other applications range from compositional reasoning to proofs of user-defined complex invariants and test case generation.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 14:43:30 GMT" } ]
2009-10-12T00:00:00
[ [ "Goubault", "Eric", "" ], [ "Putot", "Sylvie", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.1787
Jaeweon Kim
Jaeweon Kim and Jeffrey G. Andrews
Sensitive White Space Detection with Spectral Covariance Sensing
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a novel, highly effective spectrum sensing algorithm for cognitive radio and whitespace applications. The proposed spectral covariance sensing (SCS) algorithm exploits the different statistical correlations of the received signal and noise in the frequency domain. Test statistics are computed from the covariance matrix of a partial spectrogram and compared with a decision threshold to determine whether a primary signal or arbitrary type is present or not. This detector is analyzed theoretically and verified through realistic open-source simulations using actual digital television signals captured in the US. Compared to the state of the art in the literature, SCS improves sensitivity by 3 dB for the same dwell time, which is a very significant improvement for this application. Further, it is shown that SCS is highly robust to noise uncertainty, whereas many other spectrum sensors are not.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 16:50:41 GMT" }, { "version": "v2", "created": "Fri, 19 Feb 2010 02:03:18 GMT" }, { "version": "v3", "created": "Wed, 5 May 2010 20:08:33 GMT" } ]
2010-05-07T00:00:00
[ [ "Kim", "Jaeweon", "" ], [ "Andrews", "Jeffrey G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.1800
Cyril Furtlehner
Cyril Furtlehner, Michele Sebag and Xiangliang Zhang
Scaling Analysis of Affinity Propagation
28 pages, 14 figures, Inria research report
Phys. Rev. E 81,066102 (2010)
10.1103/PhysRevE.81.066102
7046
cs.AI cond-mat.stat-mech
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze and exploit some scaling properties of the Affinity Propagation (AP) clustering algorithm proposed by Frey and Dueck (2007). First we observe that a divide and conquer strategy, used on a large data set hierarchically reduces the complexity ${\cal O}(N^2)$ to ${\cal O}(N^{(h+2)/(h+1)})$, for a data-set of size $N$ and a depth $h$ of the hierarchical strategy. For a data-set embedded in a $d$-dimensional space, we show that this is obtained without notably damaging the precision except in dimension $d=2$. In fact, for $d$ larger than 2 the relative loss in precision scales like $N^{(2-d)/(h+1)d}$. Finally, under some conditions we observe that there is a value $s^*$ of the penalty coefficient, a free parameter used to fix the number of clusters, which separates a fragmentation phase (for $s<s^*$) from a coalescent one (for $s>s^*$) of the underlying hidden cluster structure. At this precise point holds a self-similarity property which can be exploited by the hierarchical strategy to actually locate its position. From this observation, a strategy based on \AP can be defined to find out how many clusters are present in a given dataset.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 17:43:35 GMT" } ]
2013-05-29T00:00:00
[ [ "Furtlehner", "Cyril", "" ], [ "Sebag", "Michele", "" ], [ "Zhang", "Xiangliang", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" } ]
0910.1808
Chinh Hoang
Elaine M. Eschen, Chinh T. Hoang, Jeremy P. Spinrad, R. Sritharan
Finding a sun in building-free graphs
3 figures
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deciding whether an arbitrary graph contains a sun was recently shown to be NP-complete. We show that whether a building-free graph contains a sun can be decided in O(min$\{m{n^3}, m^{1.5}n^2\}$) time and, if a sun exists, it can be found in the same time bound. The class of building-free graphs contains many interesting classes of perfect graphs such as Meyniel graphs which, in turn, contains classes such as hhd-free graphs, i-triangulated graphs, and parity graphs. Moreover, there are imperfect graphs that are building-free. The class of building-free graphs generalizes several classes of graphs for which an efficient test for the presence of a sun is known. We also present a vertex elimination scheme for the class of (building, gem)-free graphs. The class of (building, gem)-free graphs is a generalization of the class of distance hereditary graphs and a restriction of the class of (building, sun)-free graphs.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 18:11:18 GMT" } ]
2009-10-12T00:00:00
[ [ "Eschen", "Elaine M.", "" ], [ "Hoang", "Chinh T.", "" ], [ "Spinrad", "Jeremy P.", "" ], [ "Sritharan", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.1838
N Vunka Jungum
Manoj Kumar Singh
Password Based a Generalize Robust Security System Design Using Neural Network
International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp1-9, September 2009
M.K Singh, "Password Based A Generalize Robust Security System Design Using Neural Network", International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp1-9, September 2009
null
null
cs.CR cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Among the various means of available resource protection including biometrics, password based system is most simple, user friendly, cost effective and commonly used. But this method having high sensitivity with attacks. Most of the advanced methods for authentication based on password encrypt the contents of password before storing or transmitting in physical domain. But all conventional cryptographic based encryption methods are having its own limitations, generally either in terms of complexity or in terms of efficiency. Multi-application usability of password today forcing users to have a proper memory aids. Which itself degrades the level of security. In this paper a method to exploit the artificial neural network to develop the more secure means of authentication, which is more efficient in providing the authentication, at the same time simple in design, has given. Apart from protection, a step toward perfect security has taken by adding the feature of intruder detection along with the protection system. This is possible by analysis of several logical parameters associated with the user activities. A new method of designing the security system centrally based on neural network with intrusion detection capability to handles the challenges available with present solutions, for any kind of resource has presented.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 20:01:36 GMT" } ]
2009-10-13T00:00:00
[ [ "Singh", "Manoj Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0910.1844
N Vunka Jungum
Pascal Fallavollita
3D/2D Registration of Mapping Catheter Images for Arrhythmia Interventional Assistance
International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp10-19, September 2009
P. Fallavollita, " 3D/2D Registration of Mapping Catheter Images for Arrhythmia Interventional Assistance", International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp10-19, September 2009"
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Radiofrequency (RF) catheter ablation has transformed treatment for tachyarrhythmias and has become first-line therapy for some tachycardias. The precise localization of the arrhythmogenic site and the positioning of the RF catheter over that site are problematic: they can impair the efficiency of the procedure and are time consuming (several hours). Electroanatomic mapping technologies are available that enable the display of the cardiac chambers and the relative position of ablation lesions. However, these are expensive and use custom-made catheters. The proposed methodology makes use of standard catheters and inexpensive technology in order to create a 3D volume of the heart chamber affected by the arrhythmia. Further, we propose a novel method that uses a priori 3D information of the mapping catheter in order to estimate the 3D locations of multiple electrodes across single view C-arm images. The monoplane algorithm is tested for feasibility on computer simulations and initial canine data.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 20:07:11 GMT" } ]
2009-10-13T00:00:00
[ [ "Fallavollita", "Pascal", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0910.1845
N Vunka Jungum
Mandhapati P. Raju
Parallel Computation of Finite Element Navier-Stokes codes using MUMPS Solver
"International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp20-24, September 2009"
M. P. Raju," Parallel Computation of Finite Element Navier-Stokes codes using MUMPS Solver",International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp20-24, September 2009"
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The study deals with the parallelization of 2D and 3D finite element based Navier-Stokes codes using direct solvers. Development of sparse direct solvers using multifrontal solvers has significantly reduced the computational time of direct solution methods. Although limited by its stringent memory requirements, multifrontal solvers can be computationally efficient. First the performance of MUltifrontal Massively Parallel Solver (MUMPS) is evaluated for both 2D and 3D codes in terms of memory requirements and CPU times. The scalability of both Newton and modified Newton algorithms is tested.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 20:11:36 GMT" } ]
2009-10-13T00:00:00
[ [ "Raju", "Mandhapati P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0910.1849
N Vunka Jungum
Sanjay Silakari, Mahesh Motwani and Manish Maheshwari
Color Image Clustering using Block Truncation Algorithm
" International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp31-35, September 2009"
S. Silakari, M. Motwani and M. Maheshwari," Color Image Clustering using Block Truncation Algorithm", International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp31-35, September 2009
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the advancement in image capturing device, the image data been generated at high volume. If images are analyzed properly, they can reveal useful information to the human users. Content based image retrieval address the problem of retrieving images relevant to the user needs from image databases on the basis of low-level visual features that can be derived from the images. Grouping images into meaningful categories to reveal useful information is a challenging and important problem. Clustering is a data mining technique to group a set of unsupervised data based on the conceptual clustering principal: maximizing the intraclass similarity and minimizing the interclass similarity. Proposed framework focuses on color as feature. Color Moment and Block Truncation Coding (BTC) are used to extract features for image dataset. Experimental study using K-Means clustering algorithm is conducted to group the image dataset into various clusters.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 20:21:23 GMT" } ]
2009-10-13T00:00:00
[ [ "Silakari", "Sanjay", "" ], [ "Motwani", "Mahesh", "" ], [ "Maheshwari", "Manish", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0910.1852
N Vunka Jungum
Mohammad Ali Jabraeil Jamali and Ahmad Khademzadeh
DAMQ-Based Schemes for Efficiently Using the Buffer Spaces of a NoC Router
" International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp36-41, September 2009"
M. A. J. Jamali and A. Khademzadeh, " DAMQ-Based Schemes for Efficiently Using the Buffer Spaces of a NoC Router", International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp36-41, September 2009
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present high performance dynamically allocated multi-queue (DAMQ) buffer schemes for fault tolerance systems on chip applications that require an interconnection network. Two or four virtual channels shared the same buffer space. On the message switching layer, we make improvement to boost system performance when there are faults involved in the components communication. The proposed schemes are when a node or a physical channel is deemed as faulty, the previous hop node will terminate the buffer occupancy of messages destined to the failed link. The buffer usage decisions are made at switching layer without interactions with higher abstract layer, thus buffer space will be released to messages destined to other healthy nodes quickly. Therefore, the buffer space will be efficiently used in case fault occurs at some nodes.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 20:24:57 GMT" } ]
2009-10-13T00:00:00
[ [ "Jamali", "Mohammad Ali Jabraeil", "" ], [ "Khademzadeh", "Ahmad", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0910.1857
N Vunka Jungum
Ahmad Shukri Mohd Noor and Md Yazid Md Saman
Distributed Object Medical Imaging Model
" International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp42-48, September 2009"
A.S.M. Noor and Y.Saman, "Distributed Object Medical Imaging Model", International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp42-48, September 2009
null
null
cs.SE cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Digital medical informatics and images are commonly used in hospitals today,. Because of the interrelatedness of the radiology department and other departments, especially the intensive care unit and emergency department, the transmission and sharing of medical images has become a critical issue. Our research group has developed a Java-based Distributed Object Medical Imaging Model(DOMIM) to facilitate the rapid development and deployment of medical imaging applications in a distributed environment that can be shared and used by related departments and mobile physiciansDOMIM is a unique suite of multimedia telemedicine applications developed for the use by medical related organizations. The applications support realtime patients' data, image files, audio and video diagnosis annotation exchanges. The DOMIM enables joint collaboration between radiologists and physicians while they are at distant geographical locations. The DOMIM environment consists of heterogeneous, autonomous, and legacy resources. The Common Object Request Broker Architecture (CORBA), Java Database Connectivity (JDBC), and Java language provide the capability to combine the DOMIM resources into an integrated, interoperable, and scalable system. The underneath technology, including IDL ORB, Event Service, IIOP JDBC/ODBC, legacy system wrapping and Java implementation are explored. This paper explores a distributed collaborative CORBA/JDBC based framework that will enhance medical information management requirements and development. It encompasses a new paradigm for the delivery of health services that requires process reengineering, cultural changes, as well as organizational changes
[ { "version": "v1", "created": "Fri, 9 Oct 2009 20:42:48 GMT" } ]
2009-10-13T00:00:00
[ [ "Noor", "Ahmad Shukri Mohd", "" ], [ "Saman", "Md Yazid Md", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0910.1862
Alexander A. Sherstov
Alexander A. Sherstov
The intersection of two halfspaces has high threshold degree
Full version of the FOCS'09 paper
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The threshold degree of a Boolean function f:{0,1}^n->{-1,+1} is the least degree of a real polynomial p such that f(x)=sgn p(x). We construct two halfspaces on {0,1}^n whose intersection has threshold degree Theta(sqrt n), an exponential improvement on previous lower bounds. This solves an open problem due to Klivans (2002) and rules out the use of perceptron-based techniques for PAC learning the intersection of two halfspaces, a central unresolved challenge in computational learning. We also prove that the intersection of two majority functions has threshold degree Omega(log n), which is tight and settles a conjecture of O'Donnell and Servedio (2003). Our proof consists of two parts. First, we show that for any nonconstant Boolean functions f and g, the intersection f(x)^g(y) has threshold degree O(d) if and only if ||f-F||_infty + ||g-G||_infty < 1 for some rational functions F, G of degree O(d). Second, we settle the least degree required for approximating a halfspace and a majority function to any given accuracy by rational functions. Our technique further allows us to make progress on Aaronson's challenge (2008) and contribute strong direct product theorems for polynomial representations of composed Boolean functions of the form F(f_1,...,f_n). In particular, we give an improved lower bound on the approximate degree of the AND-OR tree.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 16:14:48 GMT" } ]
2016-09-08T00:00:00
[ [ "Sherstov", "Alexander A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.1863
Ender Ayanoglu
Ender Ayanoglu, Erik G. Larsson, Eleftherios Karipidis
Computational Complexity of Decoding Orthogonal Space-Time Block Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The computational complexity of optimum decoding for an orthogonal space-time block code G satisfying the orthogonality property that the Hermitian transpose of G multiplied by G is equal to a constant c times the sum of the squared symbols of the code times an identity matrix, where c is a positive integer is quantified. Four equivalent techniques of optimum decoding which have the same computational complexity are specified. Modifications to the basic formulation in special cases are calculated and illustrated by means of examples. This paper corrects and extends [1],[2], and unifies them with the results from the literature. In addition, a number of results from the literature are extended to the case c > 1.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 21:20:24 GMT" } ]
2009-10-13T00:00:00
[ [ "Ayanoglu", "Ender", "" ], [ "Larsson", "Erik G.", "" ], [ "Karipidis", "Eleftherios", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1865
N Vunka Jungum
Yee Ming Chen and Bo-Yuan Wang
Towards Participatory Design of Multi-agent Approach to Transport Demands
"International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 1, pp10-15, September 2009"
Y. M. Chen and B. Wang, "Towards Participatory Design of Multi-agent Approach to Transport Demands ", International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 1, pp10-15, September 2009
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The design of multi-agent based simulations (MABS) is up to now mainly done in laboratories and based on designers' understanding of the activities to be simulated. Domain experts have little chance to directly validate agent behaviors. To fill this gap, we are investigating participatory methods of design, which allow users to participate in the design the pickup and delivery problem (PDP) in the taxi planning problem. In this paper, we present a participatory process for designing new socio-technical architectures to afford the taxi dispatch for this transportation system. The proposed dispatch architecture attempts to increase passenger satisfaction more globally, by concurrently dispatching multiple taxis to the same number of passengers in the same geographical region, and vis-avis human driver and dispatcher satisfaction.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 21:27:36 GMT" } ]
2009-10-13T00:00:00
[ [ "Chen", "Yee Ming", "" ], [ "Wang", "Bo-Yuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]