id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0910.0817
|
Rdv Ijcsis
|
D. Shanmugapriya, G. Padmavathi
|
A Survey of Biometric keystroke Dynamics: Approaches, Security and
Challenges
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 115-119, September 2009, USA
| null |
ISSn 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Biometrics technologies are gaining popularity today since they provide more
reliable and efficient means of authentication and verification. Keystroke
Dynamics is one of the famous biometric technologies, which will try to
identify the authenticity of a user when the user is working via a keyboard.
The authentication process is done by observing the change in the typing
pattern of the user. A comprehensive survey of the existing keystroke dynamics
methods, metrics, different approaches are given in this study. This paper also
discusses about the various security issues and challenges faced by keystroke
dynamics.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 18:18:23 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Shanmugapriya",
"D.",
""
],
[
"Padmavathi",
"G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0910.0819
|
Rdv Ijcsis
|
Md. Ashraful Islam, Riaz Uddin Mondal, Md. Zahid Hasan
|
Performance Evaluation of Wimax Physical Layer under Adaptive Modulation
Techniques and Communication Channels
|
4 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 111-114, September 2009, USA
| null |
ISSn 1947 5500
|
cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wimax (Worldwide Interoperability for Microwave Access) is a promising
technology which can offer high speed voice, video and data service up to the
customer end. The aim of this paper is the performance evaluation of an Wimax
system under different combinations of digital modulation (BPSK, QPSK, 4 QAM
and 16 QAM) and different communication channels AWGN and fading channels
(Rayleigh and Rician). And the Wimax system incorporates Reed Solomon (RS)
encoder with Convolutional encoder with half and two third rated codes in FEC
channel coding. The simulation results of estimated Bit Error Rate (BER)
displays that the implementation of interleaved RS code (255, 239, 8) with two
third rated Convolutional code under BPSK modulation technique is highly
effective to combat in the Wimax communication system. To complete this
performance analysis in Wimax based systems, a segment of audio signal is used
for analysis. The transmitted audio message is found to have retrieved
effectively under noisy situation.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 18:30:05 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Islam",
"Md. Ashraful",
""
],
[
"Mondal",
"Riaz Uddin",
""
],
[
"Hasan",
"Md. Zahid",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0910.0820
|
Rdv Ijcsis
|
Adhistya Erna Permanasari, Dayang Rohaya Awang Rambli, Dhanapal Durai
Dominic
|
Prediction of Zoonosis Incidence in Human using Seasonal Auto Regressive
Integrated Moving Average (SARIMA)
|
8 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 103-110, September 2009, USA
| null |
ISSn 1947 5500
|
cs.LG q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Zoonosis refers to the transmission of infectious diseases from animal to
human. The increasing number of zoonosis incidence makes the great losses to
lives, including humans and animals, and also the impact in social economic. It
motivates development of a system that can predict the future number of
zoonosis occurrences in human. This paper analyses and presents the use of
Seasonal Autoregressive Integrated Moving Average (SARIMA) method for
developing a forecasting model that able to support and provide prediction
number of zoonosis human incidence. The dataset for model development was
collected on a time series data of human tuberculosis occurrences in United
States which comprises of fourteen years of monthly data obtained from a study
published by Centers for Disease Control and Prevention (CDC). Several trial
models of SARIMA were compared to obtain the most appropriate model. Then,
diagnostic tests were used to determine model validity. The result showed that
the SARIMA(9,0,14)(12,1,24)12 is the fittest model. While in the measure of
accuracy, the selected model achieved 0.062 of Theils U value. It implied that
the model was highly accurate and a close fit. It was also indicated the
capability of final model to closely represent and made prediction based on the
tuberculosis historical dataset.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 18:36:11 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Oct 2009 11:05:26 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Permanasari",
"Adhistya Erna",
""
],
[
"Rambli",
"Dayang Rohaya Awang",
""
],
[
"Dominic",
"Dhanapal Durai",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0910.0827
|
Jamal Najim
|
Pascal Bianchi (LTCI), Merouane Debbah (Chaire Radio Flexible),
Myl\`ene Ma\"ida (LM-Orsay), Jamal Najim (LTCI)
|
Performance of Statistical Tests for Single Source Detection using
Random Matrix Theory
|
45 p. improved presentation; more proofs provided
| null | null | null |
math.PR cs.IT math.IT math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a unified framework for the detection of a source with
a sensor array in the context where the noise variance and the channel between
the source and the sensors are unknown at the receiver. The Generalized Maximum
Likelihood Test is studied and yields the analysis of the ratio between the
maximum eigenvalue of the sampled covariance matrix and its normalized trace.
Using recent results of random matrix theory, a practical way to evaluate the
threshold and the $p$-value of the test is provided in the asymptotic regime
where the number $K$ of sensors and the number $N$ of observations per sensor
are large but have the same order of magnitude. The theoretical performance of
the test is then analyzed in terms of Receiver Operating Characteristic (ROC)
curve. It is in particular proved that both Type I and Type II error
probabilities converge to zero exponentially as the dimensions increase at the
same rate, and closed-form expressions are provided for the error exponents.
These theoretical results rely on a precise description of the large deviations
of the largest eigenvalue of spiked random matrix models, and establish that
the presented test asymptotically outperforms the popular test based on the
condition number of the sampled covariance matrix.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 19:01:02 GMT"
},
{
"version": "v2",
"created": "Mon, 31 May 2010 08:49:46 GMT"
}
] | 2010-06-16T00:00:00 |
[
[
"Bianchi",
"Pascal",
"",
"LTCI"
],
[
"Debbah",
"Merouane",
"",
"Chaire Radio Flexible"
],
[
"Maïda",
"Mylène",
"",
"LM-Orsay"
],
[
"Najim",
"Jamal",
"",
"LTCI"
]
] |
[
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0910.0832
|
Maria Potop-Butucaru
|
Anissa Lamani (LIP6), Maria Potop-Butucaru (LIP6, INRIA Rocquencourt),
S\'ebastien Tixeuil (LIP6)
|
Optimal deterministic ring exploration with oblivious asynchronous
robots
| null | null |
10.1007/978-3-642-13284-1_15
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of exploring an anonymous unoriented ring of size $n$
by $k$ identical, oblivious, asynchronous mobile robots, that are unable to
communicate, yet have the ability to sense their environment and take decisions
based on their local view. Previous works in this weak scenario prove that $k$
must not divide $n$ for a deterministic solution to exist. Also, it is known
that the minimum number of robots (either deterministic or probabilistic) to
explore a ring of size $n$ is 4. An upper bound of 17 robots holds in the
deterministic case while 4 probabilistic robots are sufficient. In this paper,
we close the complexity gap in the deterministic setting, by proving that no
deterministic exploration is feasible with less than five robots whenever the
size of the ring is even, and that five robots are sufficient for any $n$ that
is coprime with five. Our protocol completes exploration in O(n) robot moves,
which is also optimal.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 19:08:49 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Lamani",
"Anissa",
"",
"LIP6"
],
[
"Potop-Butucaru",
"Maria",
"",
"LIP6, INRIA Rocquencourt"
],
[
"Tixeuil",
"Sébastien",
"",
"LIP6"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.0868
|
Harsh Beohar
|
Harsh Beohar, Pieter Cuijpers, and Jos Baeten
|
Design of asynchronous supervisors
| null | null | null | null |
cs.LO
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
One of the main drawbacks while implementing the interaction between a plant
and a supervisor, synthesised by the supervisory control theory of
\citeauthor{RW:1987}, is the inexact synchronisation. \citeauthor{balemiphdt}
was the first to consider this problem, and the solutions given in his PhD
thesis were in the domain of automata theory. Our goal is to address the issue
of inexact synchronisation in a process algebra setting, because we get
concepts like modularity and abstraction for free, which are useful to further
analyze the synthesised system. In this paper, we propose four methods to check
a closed loop system in an asynchronous setting such that it is branching
bisimilar to the modified (asynchronous) closed loop system. We modify a given
closed loop system by introducing buffers either in the plant models, the
supervisor models, or the output channels of both supervisor and plant models,
or in the input channels of both supervisor and plant models. A notion of
desynchronisable closed loop system is introduced, which is a class of
synchronous closed loop systems such that they are branching bisimilar to their
corresponding asynchronous versions. Finally we study different case studies in
an asynchronous setting and then try to summarise the observations (or
conditions) which will be helpful in order to formulate a theory of
desynchronisable closed loop systems.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 21:55:09 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Beohar",
"Harsh",
""
],
[
"Cuijpers",
"Pieter",
""
],
[
"Baeten",
"Jos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.0880
|
Sergei Vassilvitskii
|
Arpita Ghosh, Preston McAfee, Kishore Papineni, Sergei Vassilvitskii
|
Bidding for Representative Allocations for Display Advertising
| null | null | null | null |
cs.MA cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Display advertising has traditionally been sold via guaranteed contracts -- a
guaranteed contract is a deal between a publisher and an advertiser to allocate
a certain number of impressions over a certain period, for a pre-specified
price per impression. However, as spot markets for display ads, such as the
RightMedia Exchange, have grown in prominence, the selection of advertisements
to show on a given page is increasingly being chosen based on price, using an
auction. As the number of participants in the exchange grows, the price of an
impressions becomes a signal of its value. This correlation between price and
value means that a seller implementing the contract through bidding should
offer the contract buyer a range of prices, and not just the cheapest
impressions necessary to fulfill its demand.
Implementing a contract using a range of prices, is akin to creating a mutual
fund of advertising impressions, and requires {\em randomized bidding}. We
characterize what allocations can be implemented with randomized bidding,
namely those where the desired share obtained at each price is a non-increasing
function of price. In addition, we provide a full characterization of when a
set of campaigns are compatible and how to implement them with randomized
bidding strategies.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 22:53:01 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Ghosh",
"Arpita",
""
],
[
"McAfee",
"Preston",
""
],
[
"Papineni",
"Kishore",
""
],
[
"Vassilvitskii",
"Sergei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0910.0881
|
Guanfeng Liang
|
Guanfeng Liang, Nitin Vaidya
|
When Watchdog Meets Coding
| null | null | null | null |
cs.CR cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work we study the problem of misbehavior detection in wireless
networks. A commonly adopted approach is to utilize the broadcasting nature of
the wireless medium and have nodes monitor their neighborhood. We call such
nodes the Watchdogs. In this paper, we first show that even if a watchdog can
overhear all packet transmissions of a flow, any linear operation of the
overheard packets can not eliminate miss-detection and is inefficient in terms
of bandwidth. We propose a light-weigh misbehavior detection scheme which
integrates the idea of watchdogs and error detection coding. We show that even
if the watchdog can only observe a fraction of packets, by choosing the encoder
properly, an attacker will be detected with high probability while achieving
throughput arbitrarily close to optimal. Such properties reduce the incentive
for the attacker to attack.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 22:30:21 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Oct 2009 22:31:30 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Liang",
"Guanfeng",
""
],
[
"Vaidya",
"Nitin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.0886
|
Sagar Shah
|
Sagar Shah, Yao Yu, Athina Petropulu
|
Step-Frequency Radar with Compressive Sampling (SFR-CS)
|
4 pages, 5 figures, conference
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Step-frequency radar (SFR) is a high resolution radar approach, where
multiple pulses are transmitted at different frequencies, covering a wide
spectrum. The obtained resolution directly depends on the total bandwidth used,
or equivalently, the number of transmitted pulses. This paper proposes a novel
SFR system, namely SFR with compressive sampling (SFRCS), that achieves the
same resolution as a conventional SFR, while using significantly reduced
bandwidth, or equivalently, transmitting significantly fewer pulses. This
bandwidth reduction is accomplished by employing compressive sampling ideas and
exploiting the sparseness of targets in the range velocity space.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 22:40:15 GMT"
},
{
"version": "v2",
"created": "Sat, 27 Mar 2010 20:37:10 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Shah",
"Sagar",
""
],
[
"Yu",
"Yao",
""
],
[
"Petropulu",
"Athina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.0887
|
Jamshid Abouei
|
Jamshid Abouei, Konstantinos N. Plataniotis, Subbarayan Pasupathy
|
Green Modulation in Proactive Wireless Sensor Networks
|
submitted to IEEE Transactions on Wireless Communications (25 pages)
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to unique characteristics of sensor nodes, choosing energy-efficient
modulation scheme with low-complexity implementation (refereed to as green
modulation) is a critical factor in the physical layer of Wireless Sensor
Networks (WSNs). This paper presents (to the best of our knowledge) the first
in-depth analysis of energy efficiency of various modulation schemes using
realistic models in IEEE 802.15.4 standard and present state-of-the art
technology, to find the best scheme in a proactive WSN over Rayleigh and Rician
flat-fading channel models with path-loss. For this purpose, we describe the
system model according to a pre-determined time-based process in practical
sensor nodes. The present analysis also includes the effect of bandwidth and
active mode duration on energy efficiency of popular modulation designs in the
pass-band and Ultra-WideBand (UWB) categories. Experimental results show that
among various pass-band and UWB modulation schemes, Non-Coherent M-ary
Frequency Shift Keying (NC-MFSK) with small order of $M$ and On-Off Keying
(OOK) have significant energy saving compared to other schemes for short range
scenarios, and could be considered as realistic candidates in WSNs. In
addition, NC-MFSK and OOK have the advantage of less complexity and cost in
implementation than the other schemes.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 23:35:39 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Abouei",
"Jamshid",
""
],
[
"Plataniotis",
"Konstantinos N.",
""
],
[
"Pasupathy",
"Subbarayan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.0899
|
Yi Cao
|
Yi Cao and Biao Chen
|
Interference Channels with One Cognitive Transmitter
|
33 pages, 9 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies the problem of interference channels with one cognitive
transmitter (ICOCT) where "cognitive" is defined from both the noncausal and
causal perspectives. For the noncausal ICOCT, referred to as interference
channels with degraded message sets (IC-DMS), we propose a new achievable rate
region that generalizes existing achievable rate regions for IC-DMS. In the
absence of the noncognitive transmitter, the proposed region coincides with
Marton's region for the broadcast channel. Based on this result, the capacity
region of a class of semi-deterministic IC-DMS is established. For the causal
ICOCT, due to the complexity of the channel model, we focus primarily on the
cognitive Z interference channel (ZIC), where the interference link from the
cognitive transmitter to the primary receiver is assumed to be absent due to
practical design considerations. Capacity bounds for such channels in different
parameter regimes are obtained and the impact of such causal cognitive ability
is carefully studied. In particular, depending on the channel parameters, the
cognitive link may not be useful in terms of enlarging the capacity region. An
optimal corner point of the capacity region is also established for the
cognitive ZIC for a certain parameter regime.
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 00:54:47 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Cao",
"Yi",
""
],
[
"Chen",
"Biao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.0902
|
Sajid Siddiqi
|
Sajid M. Siddiqi, Byron Boots, Geoffrey J. Gordon
|
Reduced-Rank Hidden Markov Models
|
Updated robot experiment figure, added details on KDE, fixed a couple
of errors
| null | null | null |
cs.LG cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the Reduced-Rank Hidden Markov Model (RR-HMM), a generalization
of HMMs that can model smooth state evolution as in Linear Dynamical Systems
(LDSs) as well as non-log-concave predictive distributions as in
continuous-observation HMMs. RR-HMMs assume an m-dimensional latent state and n
discrete observations, with a transition matrix of rank k <= m. This implies
the dynamics evolve in a k-dimensional subspace, while the shape of the set of
predictive distributions is determined by m. Latent state belief is represented
with a k-dimensional state vector and inference is carried out entirely in R^k,
making RR-HMMs as computationally efficient as k-state HMMs yet more
expressive. To learn RR-HMMs, we relax the assumptions of a recently proposed
spectral learning algorithm for HMMs (Hsu, Kakade and Zhang 2009) and apply it
to learn k-dimensional observable representations of rank-k RR-HMMs. The
algorithm is consistent and free of local optima, and we extend its performance
guarantees to cover the RR-HMM case. We show how this algorithm can be used in
conjunction with a kernel density estimator to efficiently model
high-dimensional multivariate continuous data. We also relax the assumption
that single observations are sufficient to disambiguate state, and extend the
algorithm accordingly. Experiments on synthetic data and a toy video, as well
as on a difficult robot vision modeling problem, yield accurate models that
compare favorably with standard alternatives in simulation quality and
prediction capability.
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 06:00:47 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Oct 2009 07:52:37 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Dec 2009 23:31:57 GMT"
}
] | 2009-12-23T00:00:00 |
[
[
"Siddiqi",
"Sajid M.",
""
],
[
"Boots",
"Byron",
""
],
[
"Gordon",
"Geoffrey J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.0906
|
Tom Leinster
|
Tom Leinster
|
A maximum entropy theorem with applications to the measurement of
biodiversity
|
26 pages. v4: references added, and other minor edits
| null | null | null |
cs.IT math.IT q-bio.PE q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This is a preliminary article stating and proving a new maximum entropy
theorem. The entropies that we consider can be used as measures of
biodiversity. In that context, the question is: for a given collection of
species, which frequency distribution(s) maximize the diversity? The theorem
provides the answer. The chief surprise is that although we are dealing with
not just a single entropy, but a one-parameter family of entropies, there is a
single distribution maximizing all of them simultaneously.
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 01:29:04 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Nov 2009 07:53:25 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Apr 2010 00:43:16 GMT"
},
{
"version": "v4",
"created": "Thu, 13 Jan 2011 14:23:33 GMT"
}
] | 2011-01-14T00:00:00 |
[
[
"Leinster",
"Tom",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0910.0916
|
Esteban Arcaute
|
Esteban Arcaute, Sergei Vassilvitskii
|
Social Networks and Stable Matchings in the Job Market
|
19 pages. A preliminary version will appear at the 5th International
Workshop on Internet and Network Economics, WINE 2009
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For most people, social contacts play an integral part in finding a new job.
As observed by Granovetter's seminal study, the proportion of jobs obtained
through social contacts is usually large compared to those obtained through
postings or agencies. At the same time, job markets are a natural example of
two-sided matching markets. An important solution concept in such markets is
that of stable matchings, and the use of the celebrated Gale-Shapley algorithm
to compute them. So far, the literature has evolved separately, either focusing
on the implications of information flowing through a social network, or on
developing a mathematical theory of job markets through the use of two-sided
matching techniques.
In this paper we provide a model of the job market that brings both aspects
of job markets together. To model the social scientists' observations, we
assume that workers learn only about positions in firms through social
contacts. Given that information structure, we study both static properties of
what we call locally stable matchings (i.e., stable matchings subject to
informational constraints given by a social network) and dynamic properties
through a reinterpretation of Gale-Shapley's algorithm as myopic best response
dynamics.
We prove that, in general, the set of locally stable matching strictly
contains that of stable matchings and it is in fact NP-complete to determine if
they are identical. We also show that the lattice structure of stable matchings
is in general absent. Finally, we focus on myopic best response dynamics
inspired by the Gale-Shapley algorithm. We study the efficiency loss due to the
informational constraints, providing both lower and upper bounds.
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 03:04:52 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Arcaute",
"Esteban",
""
],
[
"Vassilvitskii",
"Sergei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0910.0918
|
Soummya Kar
|
S. Kar, B. Sinopoli, and J.M.F. Moura
|
A Random Dynamical Systems Approach to Filtering in Large-scale Networks
|
8 pages. Submitted to the American Control Conference, ACC 2010
| null | null | null |
cs.IT cs.MA math.IT math.OC math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper studies the problem of filtering a discrete-time linear system
observed by a network of sensors. The sensors share a common communication
medium to the estimator and transmission is bit and power budgeted. Under the
assumption of conditional Gaussianity of the signal process at the estimator
(which may be ensured by observation packet acknowledgements), the conditional
prediction error covariance of the optimum mean-squared error filter is shown
to evolve according to a random dynamical system (RDS) on the space of
non-negative definite matrices. Our RDS formalism does not depend on the
particular medium access protocol (randomized) and, under a minimal distributed
observability assumption, we show that the sequence of random conditional
prediction error covariance matrices converges in distribution to a unique
invariant distribution (independent of the initial filter state), i.e., the
conditional error process is shown to be ergodic. Under broad assumptions on
the medium access protocol, we show that the conditional error covariance
sequence satisfies a Markov-Feller property, leading to an explicit
characterization of the support of its invariant measure. The methodology
adopted in this work is sufficiently general to envision this application to
sample path analysis of more general hybrid or switched systems, where existing
analysis is mostly moment-based.
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 03:34:39 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Kar",
"S.",
""
],
[
"Sinopoli",
"B.",
""
],
[
"Moura",
"J. M. F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0910.0921
|
Sewoong Oh
|
Raghunandan H. Keshavan, Andrea Montanari, and Sewoong Oh
|
Low-rank Matrix Completion with Noisy Observations: a Quantitative
Comparison
|
7 pages, 7 figures, 47th Allerton Conference on Communication Control
and Computing, 2009, invited paper
| null | null | null |
cs.LG cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a problem of significant practical importance, namely, the
reconstruction of a low-rank data matrix from a small subset of its entries.
This problem appears in many areas such as collaborative filtering, computer
vision and wireless sensor networks. In this paper, we focus on the matrix
completion problem in the case when the observed samples are corrupted by
noise. We compare the performance of three state-of-the-art matrix completion
algorithms (OptSpace, ADMiRA and FPCA) on a single simulation platform and
present numerical results. We show that in practice these efficient algorithms
can be used to reconstruct real data matrices, as well as randomly generated
matrices, accurately.
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 04:41:05 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Nov 2009 23:56:31 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Keshavan",
"Raghunandan H.",
""
],
[
"Montanari",
"Andrea",
""
],
[
"Oh",
"Sewoong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0910.0928
|
EPTCS
|
Ji\v{r}\'i Barnat (Masaryk University), Lubo\v{s} Brim (Masaryk
University), Ivana \v{C}ern\'a (Masaryk University), Sven Dra\v{z}an (Masaryk
University), Jana Fabrikov\'a (Masaryk University), Jan L\'an\'ik (Masaryk
University), David \v{S}afr\'anek (Masaryk University), Hongwu Ma (University
of Edinburgh)
|
BioDiVinE: A Framework for Parallel Analysis of Biological Models
| null |
EPTCS 6, 2009, pp. 31-45
|
10.4204/EPTCS.6.3
| null |
cs.CE cs.DC q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper a novel tool BioDiVinEfor parallel analysis of biological
models is presented. The tool allows analysis of biological models specified in
terms of a set of chemical reactions. Chemical reactions are transformed into a
system of multi-affine differential equations. BioDiVinE employs techniques for
finite discrete abstraction of the continuous state space. At that level,
parallel analysis algorithms based on model checking are provided. In the
paper, the key tool features are described and their application is
demonstrated by means of a case study.
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 06:25:34 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Barnat",
"Jiří",
"",
"Masaryk University"
],
[
"Brim",
"Luboš",
"",
"Masaryk\n University"
],
[
"Černá",
"Ivana",
"",
"Masaryk University"
],
[
"Dražan",
"Sven",
"",
"Masaryk\n University"
],
[
"Fabriková",
"Jana",
"",
"Masaryk University"
],
[
"Láník",
"Jan",
"",
"Masaryk\n University"
],
[
"Šafránek",
"David",
"",
"Masaryk University"
],
[
"Ma",
"Hongwu",
"",
"University\n of Edinburgh"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0910.0983
|
Tomas Skopal
|
Tomas Skopal, Jakub Lokoc
|
On Metric Skyline Processing by PM-tree
| null | null | null | null |
cs.DB cs.DL cs.MM cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The task of similarity search in multimedia databases is usually accomplished
by range or k nearest neighbor queries. However, the expressing power of these
"single-example" queries fails when the user's delicate query intent is not
available as a single example. Recently, the well-known skyline operator was
reused in metric similarity search as a "multi-example" query type. When
applied on a multi-dimensional database (i.e., on a multi-attribute table), the
traditional skyline operator selects all database objects that are not
dominated by other objects. The metric skyline query adopts the skyline
operator such that the multiple attributes are represented by distances
(similarities) to multiple query examples. Hence, we can view the metric
skyline as a set of representative database objects which are as similar to all
the examples as possible and, simultaneously, are semantically distinct. In
this paper we propose a technique of processing the metric skyline query by use
of PM-tree, while we show that our technique significantly outperforms the
original M-tree based implementation in both time and space costs. In
experiments we also evaluate the partial metric skyline processing, where only
a controlled number of skyline objects is retrieved.
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 12:09:52 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Skopal",
"Tomas",
""
],
[
"Lokoc",
"Jakub",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0910.0996
|
Ernie Cohen
|
Ernie Cohen
|
Pessimistic Testing
|
2 pages, 3 refrences
| null | null | null |
cs.SE cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new approach to testing conformance to a nondeterministic
specification, in which testing proceeds only as long as increased test
coverage is guaranteed.
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 13:58:09 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Cohen",
"Ernie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0910.1014
|
Pierrick Tranouez
|
Pierrick Tranouez (LITIS), Antoine Dutot (LITIS)
|
Building upon Fast Multipole Methods to Detect and Model Organizations
| null |
DCDIS Series B: Applications & Algorithms 16, 4 (2009) 489 - 500
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many models in natural and social sciences are comprised of sets of
inter-acting entities whose intensity of interaction decreases with distance.
This often leads to structures of interest in these models composed of dense
packs of entities. Fast Multipole Methods are a family of methods developed to
help with the calculation of a number of computable models such as described
above. We propose a method that builds upon FMM to detect and model the dense
structures of these systems.
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 14:19:56 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Oct 2009 08:35:15 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Tranouez",
"Pierrick",
"",
"LITIS"
],
[
"Dutot",
"Antoine",
"",
"LITIS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.1020
|
Emmanuel Polonowski
|
Tristan Crolard and Emmanuel Polonowski
|
A Formally Specified Type System and Operational Semantics for
Higher-Order Procedural Variables
| null | null | null |
TR-LACL-2009-3
|
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We formally specified the type system and operational semantics of LOOPw with
Ott and Isabelle/HOL proof assistant. Moreover, both the type system and the
semantics of LOOPw have been tested using Isabelle/HOL program extraction
facility for inductively defined relations. In particular, the program that
computes the Ackermann function type checks and behaves as expected. The main
difference (apart from the choice of an Ada-like concrete syntax) with LOOPw
comes from the treatment of parameter passing. Indeed, since Ott does not
currently fully support alpha-conversion, we rephrased the operational
semantics with explicit aliasing in order to implement the out parameter
passing mode.
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 14:36:18 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Crolard",
"Tristan",
""
],
[
"Polonowski",
"Emmanuel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.1026
|
Pierrick Tranouez
|
Eric Daud\'e (IDEES), Pierrick Tranouez (LITIS), Patrice Langlois
(IDEES)
|
A multiagent urban traffic simulation. Part II: dealing with the
extraordinary
| null |
ICCSA 2009, France (2009)
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In Probabilistic Risk Management, risk is characterized by two quantities:
the magnitude (or severity) of the adverse consequences that can potentially
result from the given activity or action, and by the likelihood of occurrence
of the given adverse consequences. But a risk seldom exists in isolation: chain
of consequences must be examined, as the outcome of one risk can increase the
likelihood of other risks. Systemic theory must complement classic PRM. Indeed
these chains are composed of many different elements, all of which may have a
critical importance at many different levels. Furthermore, when urban
catastrophes are envisioned, space and time constraints are key determinants of
the workings and dynamics of these chains of catastrophes: models must include
a correct spatial topology of the studied risk. Finally, literature insists on
the importance small events can have on the risk on a greater scale: urban
risks management models belong to self-organized criticality theory. We chose
multiagent systems to incorporate this property in our model: the behavior of
an agent can transform the dynamics of important groups of them.
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 14:41:57 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Daudé",
"Eric",
"",
"IDEES"
],
[
"Tranouez",
"Pierrick",
"",
"LITIS"
],
[
"Langlois",
"Patrice",
"",
"IDEES"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.1028
|
Ernie Cohen
|
Ernie Cohen
|
Weak Kleene Algebra is Sound and (Possibly) Complete for Simulation
|
12 pages, 9 references
| null | null | null |
cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that the axioms of Weak Kleene Algebra (WKA) are sound and complete
for the theory of regular expressions modulo simulation equivalence, assuming
their completeness for monodic trees (as conjectured by Takai and Furusawa).
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 14:45:15 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Cohen",
"Ernie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0910.1059
|
Nicolas Catusse
|
Nicolas Catusse, Victor Chepoi, Yann Vax\`es
|
Embedding into the rectilinear plane in optimal O*(n^2)
|
12 pages, 13 figures
|
Theoretical Computer Science Volume 412, Issue 22 (2011), Pages
2425-2433
|
10.1016/j.tcs.2011.01.038
| null |
cs.CG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an optimal O*(n^2) time algorithm for deciding if a metric space
(X,d) on n points can be isometrically embedded into the plane endowed with the
l_1-metric. It improves the O*(n^2 log^2 n) time algorithm of J. Edmonds
(2008). Together with some ingredients introduced by J. Edmonds, our algorithm
uses the concept of tight span and the injectivity of the l_1-plane. A
different O*(n^2) time algorithm was recently proposed by D. Eppstein (2009).
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 17:25:59 GMT"
}
] | 2011-07-08T00:00:00 |
[
[
"Catusse",
"Nicolas",
""
],
[
"Chepoi",
"Victor",
""
],
[
"Vaxès",
"Yann",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.1121
|
Pascal Vontobel
|
Alexandros G. Dimakis, Pascal O. Vontobel
|
LP Decoding meets LP Decoding: A Connection between Channel Coding and
Compressed Sensing
|
Appeared in the Proceedings of the 47th Allerton Conference on
Communications, Control, and Computing, Allerton House, Monticello, Illinois,
USA, Sep. 30 - Oct. 2, 2009. This version of the paper contains all the
proofs that were omitted in the official version due to space limitations
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This is a tale of two linear programming decoders, namely channel coding
linear programming decoding (CC-LPD) and compressed sensing linear programming
decoding (CS-LPD). So far, they have evolved quite independently. The aim of
the present paper is to show that there is a tight connection between, on the
one hand, CS-LPD based on a zero-one measurement matrix over the reals and, on
the other hand, CC-LPD of the binary linear code that is obtained by viewing
this measurement matrix as a binary parity-check matrix. This connection allows
one to translate performance guarantees from one setup to the other.
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 21:54:44 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Dimakis",
"Alexandros G.",
""
],
[
"Vontobel",
"Pascal O.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1123
|
Arvind Yedla
|
Arvind Yedla, Henry D. Pfister, Krishna R. Narayanan
|
Can Iterative Decoding for Erasure Correlated Sources be Universal?
|
8 pages, to appear in Allerton '09
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider a few iterative decoding schemes for the joint
source-channel coding of correlated sources. Specifically, we consider the
joint source-channel coding of two erasure correlated sources with transmission
over different erasure channels. Our main interest is in determining whether or
not various code ensembles can achieve the capacity region universally over
varying channel conditions. We consider two ensembles in the class of
low-density generator-matrix (LDGM) codes known as Luby-Transform (LT) codes
and one ensemble of low-density parity-check (LDPC) codes. We analyze them
using density evolution and show that optimized LT codes can achieve the
extremal symmetric point of the capacity region. We also show that LT codes are
not universal under iterative decoding for this problem because they cannot
simultaneously achieve the extremal symmetric point and a corner point of the
capacity region. The sub-universality of iterative decoding is characterized by
studying the density evolution for LT codes.
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 22:10:56 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Yedla",
"Arvind",
""
],
[
"Pfister",
"Henry D.",
""
],
[
"Narayanan",
"Krishna R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1145
|
Jun Li
|
Jun Li, Marwan H. Azmi, Robert. Malaney, and Jinhong Yuan
|
Design of network-coding based multi-edge type LDPC codes for
multi-source relaying systems
|
6 pages, 8figure. conference
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we investigate a multi-source LDPC scheme for a Gaussian relay
system, where M sources communicate with the destination under the help of a
single relay (M-1-1 system). Since various distributed LDPC schemes in the
cooperative single-source system, e.g. bilayer LDPC and bilayer multi-edge type
LDPC (BMET-LDPC), have been designed to approach the Shannon limit, these
schemes can be applied to the $M-1-1$ system by the relay serving each source
in a round-robin fashion. However, such a direct application is not optimal due
to the lack of potential joint processing gain. In this paper, we propose a
network coded multi-edge type LDPC (NCMET-LDPC) scheme for the multi-source
scenario. Through an EXIT analysis, we conclude that the NCMET-LDPC scheme
achieves higher extrinsic mutual information, relative to a separate
application of BMET-LDPC to each source. Our new NCMET-LDPC scheme thus
achieves a higher threshold relative to existing schemes.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 01:29:45 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Li",
"Jun",
""
],
[
"Azmi",
"Marwan H.",
""
],
[
"Malaney",
"Robert.",
""
],
[
"Yuan",
"Jinhong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1151
|
Rahul Urgaonkar
|
Rahul Urgaonkar, Michael J. Neely
|
Delay-Limited Cooperative Communication with Reliability Constraints in
Wireless Networks
|
13 pages, 4 figures
| null | null | null |
cs.IT math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate optimal resource allocation for delay-limited cooperative
communication in time varying wireless networks. Motivated by real-time
applications that have stringent delay constraints, we develop a dynamic
cooperation strategy that makes optimal use of network resources to achieve a
target outage probability (reliability) for each user subject to average power
constraints. Using the technique of Lyapunov optimization, we first present a
general framework to solve this problem and then derive quasi-closed form
solutions for several cooperative protocols proposed in the literature. Unlike
earlier works, our scheme does not require prior knowledge of the statistical
description of the packet arrival, channel state and node mobility processes
and can be implemented in an online fashion.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 03:34:33 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Urgaonkar",
"Rahul",
""
],
[
"Neely",
"Michael J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0910.1191
|
Elchanan Mossel
|
Mark Braverman and Elchanan Mossel
|
Sorting from Noisy Information
| null | null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies problems of inferring order given noisy information. In
these problems there is an unknown order (permutation) $\pi$ on $n$ elements
denoted by $1,...,n$. We assume that information is generated in a way
correlated with $\pi$. The goal is to find a maximum likelihood $\pi^*$ given
the information observed. We will consider two different types of observations:
noisy comparisons and noisy orders. The data in Noisy orders are permutations
given from an exponential distribution correlated with \pi (this is also called
the Mallow's model). The data in Noisy Comparisons is a signal given for each
pair of elements which is correlated with their true ordering.
In this paper we present polynomial time algorithms for solving both problems
with high probability. As part of our proof we show that for both models the
maximum likelihood solution $\pi^{\ast}$ is close to the original permutation
$\pi$.
Our results are of interest in applications to ranking, such as ranking in
sports, or ranking of search items based on comparisons by experts.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 09:14:54 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Braverman",
"Mark",
""
],
[
"Mossel",
"Elchanan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.1217
|
EPTCS
|
Bogdan Aman, Gabriel Ciobanu
|
Mutual Mobile Membranes with Timers
| null |
EPTCS 6, 2009, pp. 1-15
|
10.4204/EPTCS.6.1
| null |
cs.FL q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A feature of current membrane systems is the fact that objects and membranes
are persistent. However, this is not true in the real world. In fact, cells and
intracellular proteins have a well-defined lifetime. Inspired from these
biological facts, we define a model of systems of mobile membranes in which
each membrane and each object has a timer representing their lifetime. We show
that systems of mutual mobile membranes with and without timers have the same
computational power. An encoding of timed safe mobile ambients into systems of
mutual mobile membranes with timers offers a relationship between two
formalisms used in describing biological systems.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 11:15:13 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Aman",
"Bogdan",
""
],
[
"Ciobanu",
"Gabriel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0910.1219
|
EPTCS
|
Roberto Barbuti (University of Pisa), Giulio Caravagna (University of
Pisa), Paolo Milazzo (University of Pisa), Andrea Maggiolo-Schettini
(University of Pisa)
|
On the Interpretation of Delays in Delay Stochastic Simulation of
Biological Systems
| null |
EPTCS 6, 2009, pp. 17-29
|
10.4204/EPTCS.6.2
| null |
q-bio.QM cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Delays in biological systems may be used to model events for which the
underlying dynamics cannot be precisely observed. Mathematical modeling of
biological systems with delays is usually based on Delay Differential Equations
(DDEs), a kind of differential equations in which the derivative of the unknown
function at a certain time is given in terms of the values of the function at
previous times. In the literature, delay stochastic simulation algorithms have
been proposed. These algorithms follow a "delay as duration" approach, namely
they are based on an interpretation of a delay as the elapsing time between the
start and the termination of a chemical reaction. This interpretation is not
suitable for some classes of biological systems in which species involved in a
delayed interaction can be involved at the same time in other interactions. We
show on a DDE model of tumor growth that the delay as duration approach for
stochastic simulation is not precise, and we propose a simulation algorithm
based on a ``purely delayed'' interpretation of delays which provides better
results on the considered model.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 11:25:03 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Barbuti",
"Roberto",
"",
"University of Pisa"
],
[
"Caravagna",
"Giulio",
"",
"University of\n Pisa"
],
[
"Milazzo",
"Paolo",
"",
"University of Pisa"
],
[
"Maggiolo-Schettini",
"Andrea",
"",
"University of Pisa"
]
] |
[
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0910.1238
|
Yves Deville
|
Quang Dung Pham, Yves Deville, Pascal Van Hentenryck
|
A Local Search Modeling for Constrained Optimum Paths Problems (Extended
Abstract)
| null |
EPTCS 5, 2009, pp. 5-11
|
10.4204/EPTCS.5.1
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Constrained Optimum Path (COP) problems appear in many real-life
applications, especially on communication networks. Some of these problems have
been considered and solved by specific techniques which are usually difficult
to extend. In this paper, we introduce a novel local search modeling for
solving some COPs by local search. The modeling features the compositionality,
modularity, reuse and strengthens the benefits of Constrained-Based Local
Search. We also apply the modeling to the edge-disjoint paths problem (EDP). We
show that side constraints can easily be added in the model. Computational
results show the significance of the approach.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 12:36:40 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Pham",
"Quang Dung",
""
],
[
"Deville",
"Yves",
""
],
[
"Van Hentenryck",
"Pascal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.1239
|
Yves Deville
|
Farshid Hassani Bijarbooneh, Pierre Flener, Justin Pearson
|
Dynamic Demand-Capacity Balancing for Air Traffic Management Using
Constraint-Based Local Search: First Results
| null |
EPTCS 5, 2009, pp. 27-40
|
10.4204/EPTCS.5.3
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Using constraint-based local search, we effectively model and efficiently
solve the problem of balancing the traffic demands on portions of the European
airspace while ensuring that their capacity constraints are satisfied. The
traffic demand of a portion of airspace is the hourly number of flights planned
to enter it, and its capacity is the upper bound on this number under which
air-traffic controllers can work. Currently, the only form of demand-capacity
balancing we allow is ground holding, that is the changing of the take-off
times of not yet airborne flights. Experiments with projected European flight
plans of the year 2030 show that already this first form of demand-capacity
balancing is feasible without incurring too much total delay and that it can
lead to a significantly better demand-capacity balance.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 12:50:34 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Bijarbooneh",
"Farshid Hassani",
""
],
[
"Flener",
"Pierre",
""
],
[
"Pearson",
"Justin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.1244
|
Yves Deville
|
David Pereira, In\^es Lynce, Steven Prestwich
|
On Improving Local Search for Unsatisfiability
| null |
EPTCS 5, 2009, pp. 41-53
|
10.4204/EPTCS.5.4
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Stochastic local search (SLS) has been an active field of research in the
last few years, with new techniques and procedures being developed at an
astonishing rate. SLS has been traditionally associated with satisfiability
solving, that is, finding a solution for a given problem instance, as its
intrinsic nature does not address unsatisfiable problems. Unsatisfiable
instances were therefore commonly solved using backtrack search solvers. For
this reason, in the late 90s Selman, Kautz and McAllester proposed a challenge
to use local search instead to prove unsatisfiability. More recently, two SLS
solvers - Ranger and Gunsat - have been developed, which are able to prove
unsatisfiability albeit being SLS solvers. In this paper, we first compare
Ranger with Gunsat and then propose to improve Ranger performance using some of
Gunsat's techniques, namely unit propagation look-ahead and extended
resolution.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 16:08:44 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Pereira",
"David",
""
],
[
"Lynce",
"Inês",
""
],
[
"Prestwich",
"Steven",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.1247
|
Yves Deville
|
Gilles Audenard, Jean-Marie Lagniez, Bertrand Mazure, Lakhdar Sa\"is
|
Integrating Conflict Driven Clause Learning to Local Search
| null |
EPTCS 5, 2009, pp. 55-68
|
10.4204/EPTCS.5.5
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article introduces SatHyS (SAT HYbrid Solver), a novel hybrid approach
for propositional satisfiability. It combines local search and conflict driven
clause learning (CDCL) scheme. Each time the local search part reaches a local
minimum, the CDCL is launched. For SAT problems it behaves like a tabu list,
whereas for UNSAT ones, the CDCL part tries to focus on minimum unsatisfiable
sub-formula (MUS). Experimental results show good performances on many classes
of SAT instances from the last SAT competitions.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 16:06:29 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Audenard",
"Gilles",
""
],
[
"Lagniez",
"Jean-Marie",
""
],
[
"Mazure",
"Bertrand",
""
],
[
"Saïs",
"Lakhdar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.1253
|
Yves Deville
|
Fang He, Rong Qu
|
A Constraint-directed Local Search Approach to Nurse Rostering Problems
| null |
EPTCS 5, 2009, pp. 69-80
|
10.4204/EPTCS.5.6
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we investigate the hybridization of constraint programming and
local search techniques within a large neighbourhood search scheme for solving
highly constrained nurse rostering problems. As identified by the research, a
crucial part of the large neighbourhood search is the selection of the fragment
(neighbourhood, i.e. the set of variables), to be relaxed and re-optimized
iteratively. The success of the large neighbourhood search depends on the
adequacy of this identified neighbourhood with regard to the problematic part
of the solution assignment and the choice of the neighbourhood size. We
investigate three strategies to choose the fragment of different sizes within
the large neighbourhood search scheme. The first two strategies are tailored
concerning the problem properties. The third strategy is more general, using
the information of the cost from the soft constraint violations and their
propagation as the indicator to choose the variables added into the fragment.
The three strategies are analyzed and compared upon a benchmark nurse rostering
problem. Promising results demonstrate the possibility of future work in the
hybrid approach.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 13:17:36 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"He",
"Fang",
""
],
[
"Qu",
"Rong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.1255
|
Yves Deville
|
Marie Pelleau, Pascal Van Hentenryck, Charlotte Truchet
|
Sonet Network Design Problems
| null |
EPTCS 5, 2009, pp. 81-95
|
10.4204/EPTCS.5.7
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a new method and a constraint-based objective function to
solve two problems related to the design of optical telecommunication networks,
namely the Synchronous Optical Network Ring Assignment Problem (SRAP) and the
Intra-ring Synchronous Optical Network Design Problem (IDP). These network
topology problems can be represented as a graph partitioning with capacity
constraints as shown in previous works. We present here a new objective
function and a new local search algorithm to solve these problems. Experiments
conducted in Comet allow us to compare our method to previous ones and show
that we obtain better results.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 13:22:22 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Pelleau",
"Marie",
""
],
[
"Van Hentenryck",
"Pascal",
""
],
[
"Truchet",
"Charlotte",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.1264
|
Yves Deville
|
Salvator Abreu, Daniel Diaz, Philippe Codognet
|
Parallel local search for solving Constraint Problems on the Cell
Broadband Engine (Preliminary Results)
| null |
EPTCS 5, 2009, pp. 97-111
|
10.4204/EPTCS.5.8
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We explore the use of the Cell Broadband Engine (Cell/BE for short) for
combinatorial optimization applications: we present a parallel version of a
constraint-based local search algorithm that has been implemented on a
multiprocessor BladeCenter machine with twin Cell/BE processors (total of 16
SPUs per blade). This algorithm was chosen because it fits very well the
Cell/BE architecture and requires neither shared memory nor communication
between processors, while retaining a compact memory footprint. We study the
performance on several large optimization benchmarks and show that this
achieves mostly linear time speedups, even sometimes super-linear. This is
possible because the parallel implementation might explore simultaneously
different parts of the search space and therefore converge faster towards the
best sub-space and thus towards a solution. Besides getting speedups, the
resulting times exhibit a much smaller variance, which benefits applications
where a timely reply is critical.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 13:44:11 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Abreu",
"Salvator",
""
],
[
"Diaz",
"Daniel",
""
],
[
"Codognet",
"Philippe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.1266
|
Yves Deville
|
Jun He, Pierre Flener, Justin Pearson
|
Toward an automaton Constraint for Local Search
| null |
EPTCS 5, 2009, pp. 13-25
|
10.4204/EPTCS.5.2
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We explore the idea of using finite automata to implement new constraints for
local search (this is already a successful technique in constraint-based global
search). We show how it is possible to maintain incrementally the violations of
a constraint and its decision variables from an automaton that describes a
ground checker for that constraint. We establish the practicality of our
approach idea on real-life personnel rostering problems, and show that it is
competitive with the approach of [Pralong, 2007].
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 13:49:26 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"He",
"Jun",
""
],
[
"Flener",
"Pierre",
""
],
[
"Pearson",
"Justin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.1268
|
Olivier Finkel
|
Olivier Finkel (ELM)
|
The Complexity of Infinite Computations In Models of Set Theory
| null |
Logical Methods in Computer Science, Volume 5, Issue 4 (December
21, 2009) lmcs:1205
|
10.2168/LMCS-5(4:4)2009
| null |
cs.LO cs.CC math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove the following surprising result: there exist a 1-counter B\"uchi
automaton and a 2-tape B\"uchi automaton such that the \omega-language of the
first and the infinitary rational relation of the second in one model of ZFC
are \pi_2^0-sets, while in a different model of ZFC both are analytic but non
Borel sets.
This shows that the topological complexity of an \omega-language accepted by
a 1-counter B\"uchi automaton or of an infinitary rational relation accepted by
a 2-tape B\"uchi automaton is not determined by the axiomatic system ZFC.
We show that a similar result holds for the class of languages of infinite
pictures which are recognized by B\"uchi tiling systems.
We infer from the proof of the above results an improvement of the lower
bound of some decision problems recently studied by the author.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 14:03:53 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Oct 2009 18:58:05 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Oct 2009 18:39:54 GMT"
},
{
"version": "v4",
"created": "Mon, 21 Dec 2009 14:08:27 GMT"
},
{
"version": "v5",
"created": "Wed, 23 Dec 2009 20:10:04 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"Finkel",
"Olivier",
"",
"ELM"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0910.1273
|
Fabien Moutarde
|
Taoufik Bdiri (CAOR), Fabien Moutarde (CAOR), Nicolas Bourdis (CAOR),
Bruno Steux (CAOR)
|
Adaboost with "Keypoint Presence Features" for Real-Time Vehicle Visual
Detection
| null |
16th World Congress on Intelligent Transport Systems (ITSwc'2009),
Su\`ede (2009)
| null | null |
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present promising results for real-time vehicle visual detection, obtained
with adaBoost using new original ?keypoints presence features?. These
weak-classifiers produce a boolean response based on presence or absence in the
tested image of a ?keypoint? (~ a SURF interest point) with a descriptor
sufficiently similar (i.e. within a given distance) to a reference descriptor
characterizing the feature. A first experiment was conducted on a public image
dataset containing lateral-viewed cars, yielding 95% recall with 95% precision
on test set. Moreover, analysis of the positions of adaBoost-selected keypoints
show that they correspond to a specific part of the object category (such as
?wheel? or ?side skirt?) and thus have a ?semantic? meaning.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 14:26:01 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Bdiri",
"Taoufik",
"",
"CAOR"
],
[
"Moutarde",
"Fabien",
"",
"CAOR"
],
[
"Bourdis",
"Nicolas",
"",
"CAOR"
],
[
"Steux",
"Bruno",
"",
"CAOR"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0910.1293
|
Fabien Moutarde
|
Bogdan Stanciulescu (CAOR), Amaury Breheret (CAOR), Fabien Moutarde
(CAOR)
|
Introducing New AdaBoost Features for Real-Time Vehicle Detection
| null |
COGIS'07 conference on COGnitive systems with Interactive Sensors,
Stanford, Palo Alto : United States (2007)
| null | null |
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper shows how to improve the real-time object detection in complex
robotics applications, by exploring new visual features as AdaBoost weak
classifiers. These new features are symmetric Haar filters (enforcing global
horizontal and vertical symmetry) and N-connexity control points. Experimental
evaluation on a car database show that the latter appear to provide the best
results for the vehicle-detection problem.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 15:42:03 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Stanciulescu",
"Bogdan",
"",
"CAOR"
],
[
"Breheret",
"Amaury",
"",
"CAOR"
],
[
"Moutarde",
"Fabien",
"",
"CAOR"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0910.1294
|
Fabien Moutarde
|
Taoufik Bdiri (CAOR), Fabien Moutarde (CAOR), Bruno Steux (CAOR)
|
Visual object categorization with new keypoint-based adaBoost features
| null |
IEEE Symposium on Intelligent Vehicles (IV'2009), XiAn : China
(2009)
| null | null |
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present promising results for visual object categorization, obtained with
adaBoost using new original ?keypoints-based features?. These weak-classifiers
produce a boolean response based on presence or absence in the tested image of
a ?keypoint? (a kind of SURF interest point) with a descriptor sufficiently
similar (i.e. within a given distance) to a reference descriptor characterizing
the feature. A first experiment was conducted on a public image dataset
containing lateral-viewed cars, yielding 95% recall with 95% precision on test
set. Preliminary tests on a small subset of a pedestrians database also gives
promising 97% recall with 92 % precision, which shows the generality of our new
family of features. Moreover, analysis of the positions of adaBoost-selected
keypoints show that they correspond to a specific part of the object category
(such as ?wheel? or ?side skirt? in the case of lateral-cars) and thus have a
?semantic? meaning. We also made a first test on video for detecting vehicles
from adaBoostselected keypoints filtered in real-time from all detected
keypoints.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 15:42:30 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Bdiri",
"Taoufik",
"",
"CAOR"
],
[
"Moutarde",
"Fabien",
"",
"CAOR"
],
[
"Steux",
"Bruno",
"",
"CAOR"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0910.1295
|
Fabien Moutarde
|
Fabien Moutarde (CAOR), Alexandre Bargeton (CAOR), Anne Herbin, Lowik
Chanussot
|
Modular Traffic Sign Recognition applied to on-vehicle real-time visual
detection of American and European speed limit signs
| null |
14th World congress on Intelligent Transportation Systems
(ITS'2007), Beijing : China (2007)
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new modular traffic signs recognition system, successfully
applied to both American and European speed limit signs. Our sign detection
step is based only on shape-detection (rectangles or circles). This enables it
to work on grayscale images, contrary to most European competitors, which eases
robustness to illumination conditions (notably night operation). Speed sign
candidates are classified (or rejected) by segmenting potential digits inside
them (which is rather original and has several advantages), and then applying a
neural digit recognition. The global detection rate is ~90% for both (standard)
U.S. and E.U. speed signs, with a misclassification rate <1%, and no validated
false alarm in >150 minutes of video. The system processes in real-time ~20
frames/s on a standard high-end laptop.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 15:43:01 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Moutarde",
"Fabien",
"",
"CAOR"
],
[
"Bargeton",
"Alexandre",
"",
"CAOR"
],
[
"Herbin",
"Anne",
""
],
[
"Chanussot",
"Lowik",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0910.1300
|
Mehdi Torbatian
|
Mehdi Torbatian, Mohamed Oussama Damen
|
D-MG Tradeoff of DF and AF Relaying Protocols over Asynchronous PAM
Cooperative Networks
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The diversity multiplexing tradeoff of a general two-hop asynchronous
cooperative network is examined for various relaying protocols such as
non-orthogonal selection decode-and-forward (NSDF), orthogonal selection
decode-and-forward (OSDF), non-orthogonal amplify-and-forward (NAF), and
orthogonal amplify-and-forward (OAF). The transmitter nodes are assumed to send
pulse amplitude modulation (PAM) signals asynchronously, in which information
symbols are linearly modulated by a shaping waveform to be sent to the
destination. We consider two different cases with respect to the length of the
shaping waveforms in the time domain. In the theoretical case where the shaping
waveforms with infinite time support are used, it is shown that asynchronism
does not affect the DMT performance of the system and the same DMT as that of
the corresponding synchronous network is obtained for all the aforementioned
protocols. In the practical case where finite length shaping waveforms are
used, it is shown that better diversity gains can be achieved at the expense of
bandwidth expansion. In the decode-and-forward (DF) type protocols, the
asynchronous network provides better diversity gains than those of the
corresponding synchronous network throughout the range of the multiplexing
gain. In the amplify-and-forward (AF) type protocols, the asynchronous network
provides the same DMT as that of the corresponding synchronous counterpart
under the OAF protocol; however, a better diversity gain is achieved under the
NAF protocol throughout the range of the multiplexing gain. In particular, in
the single relay asynchronous network, the NAF protocol provides the same DMT
as that of the 2 {\times} 1 multiple-input single-output (MISO) channel.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 15:55:41 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Feb 2011 20:33:00 GMT"
}
] | 2011-02-21T00:00:00 |
[
[
"Torbatian",
"Mehdi",
""
],
[
"Damen",
"Mohamed Oussama",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1335
|
Wei Mao
|
Wei Mao, Babak Hassibi
|
Violating the Ingleton Inequality with Finite Groups
|
17 pages, 1 figure. Presented at Allerton 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is well known that there is a one-to-one correspondence between the
entropy vector of a collection of n random variables and a certain
group-characterizable vector obtained from a finite group and n of its
subgroups. However, if one restricts attention to abelian groups then not all
entropy vectors can be obtained. This is an explanation for the fact shown by
Dougherty et al that linear network codes cannot achieve capacity in general
network coding problems (since linear network codes form an abelian group). All
abelian group-characterizable vectors, and by fiat all entropy vectors
generated by linear network codes, satisfy a linear inequality called the
Ingleton inequality. In this paper, we study the problem of finding nonabelian
finite groups that yield characterizable vectors which violate the Ingleton
inequality. Using a refined computer search, we find the symmetric group S_5 to
be the smallest group that violates the Ingleton inequality. Careful study of
the structure of this group, and its subgroups, reveals that it belongs to the
Ingleton-violating family PGL(2,p) with primes p > 3, i.e., the projective
group of 2 by 2 nonsingular matrices with entries in F_p. This family of groups
is therefore a good candidate for constructing network codes more powerful than
linear network codes.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 19:11:38 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Mao",
"Wei",
""
],
[
"Hassibi",
"Babak",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1387
|
Tobias Jacobs
|
Tobias Jacobs
|
Simpler Proofs by Symbolic Perturbation
|
This work introduces a fairly novel model for combinatorial problems
and algorithms. The author believes that the result is successfully
applicable to the analyes of a very broad class of algorithms. He would be
happy to receive feedback from the readers
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In analyses of algorithms, a substantial amount of effort has often to be
spent on the discussion of special cases. For example, when the analysis
considers the cases X<Y and X>Y separately, one might have to be especially
careful about what happens when X=Y. On the other hand, experience tells us
that when a yet unregarded special case of this kind is discovered, one nearly
always finds a way to handle it. This is typically done by modifying the
analysis and/or the algorithm very slightly.
In this article we substantiate this observation theoretically. We
concentrate on deterministic algorithms for weighted combinatorial optimization
problems. A problem instance of this kind is defined by its structure and a
vector of weights. The concept of a null case is introduced as set of problem
instances whose weight vectors constitute a nowhere open set (or null set) in
the space of all possible weight configurations. An algorithm is called robust
if any null case can be disregarded in the analysis of both its solution
quality and resource requirements.
We show that achieving robustness is only a matter of breaking ties the right
way. More specifically, we show that the concept of symbolic perturbation known
from the area of geometric algorithms guarantees that no surprises will happen
in null cases. We argue that for a huge class of combinatorial optimization
algorithms it is easy to verify that they implicitly use symbolic perturbation
for breaking ties and thus can be analyzed under the assumption that some
arbitrary null case never occurs. Finally, we prove that there exists a
symbolic perturbation tie breaking policy for any algorithm.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 02:23:15 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Nov 2009 09:00:16 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Jacobs",
"Tobias",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.1392
|
Tsung-Hsi Tsai
|
Wei-Mei Chen, Hsien-Kuei Hwang, Tsung-Hsi Tsai
|
Simple, efficient maxima-finding algorithms for multidimensional samples
| null | null | null | null |
cs.DS cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
New algorithms are devised for finding the maxima of multidimensional point
samples, one of the very first problems studied in computational geometry. The
algorithms are very simple and easily coded and modified for practical needs.
The expected complexity of some measures related to the performance of the
algorithms is analyzed. We also compare the efficiency of the algorithms with a
few major ones used in practice, and apply our algorithms to find the maximal
layers and the longest common subsequences of multiple sequences.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 02:53:58 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Chen",
"Wei-Mei",
""
],
[
"Hwang",
"Hsien-Kuei",
""
],
[
"Tsai",
"Tsung-Hsi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0910.1403
|
Ping Li
|
Ping Li
|
On the Sample Complexity of Compressed Counting
| null | null | null | null |
cs.DS cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Compressed Counting (CC), based on maximally skewed stable random
projections, was recently proposed for estimating the p-th frequency moments of
data streams. The case p->1 is extremely useful for estimating Shannon entropy
of data streams. In this study, we provide a very simple algorithm based on the
sample minimum estimator and prove a much improved sample complexity bound,
compared to prior results.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 04:40:46 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Li",
"Ping",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1404
|
EPTCS
|
Yves Deville, Christine Solnon
|
Proceedings 6th International Workshop on Local Search Techniques in
Constraint Satisfaction
| null |
EPTCS 5, 2009
|
10.4204/EPTCS.5
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
LSCS is a satellite workshop of the international conference on principles
and practice of Constraint Programming (CP), since 2004. It is devoted to local
search techniques in constraint satisfaction, and focuses on all aspects of
local search techniques, including: design and implementation of new
algorithms, hybrid stochastic-systematic search, reactive search optimization,
adaptive search, modeling for local-search, global constraints, flexibility and
robustness, learning methods, and specific applications.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 06:27:26 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Deville",
"Yves",
""
],
[
"Solnon",
"Christine",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.1406
|
EPTCS
|
Luca Bortolussi (University of Trieste), Alberto Policriti (University
of Udine)
|
Hybrid Semantics of Stochastic Programs with Dynamic Reconfiguration
| null |
EPTCS 6, 2009, pp. 63-76
|
10.4204/EPTCS.6.5
| null |
cs.PL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We begin by reviewing a technique to approximate the dynamics of stochastic
programs --written in a stochastic process algebra-- by a hybrid system,
suitable to capture a mixed discrete/continuous evolution. In a nutshell, the
discrete dynamics is kept stochastic while the continuous evolution is given in
terms of ODEs, and the overall technique, therefore, naturally associates a
Piecewise Deterministic Markov Process with a stochastic program. The specific
contribution in this work consists in an increase of the flexibility of the
translation scheme, obtained by allowing a dynamic reconfiguration of the
degree of discreteness/continuity of the semantics. We also discuss the
relationships of this approach with other hybrid simulation strategies for
biochemical systems.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 06:33:01 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Bortolussi",
"Luca",
"",
"University of Trieste"
],
[
"Policriti",
"Alberto",
"",
"University\n of Udine"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.1407
|
Yeow-Khiang Chia
|
Yeow-Khiang Chia and Abbas El Gamal
|
3-Receiver Broadcast Channels with Common and Confidential Messages
|
Revised version
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper establishes inner bounds on the secrecy capacity regions for the
general 3-receiver broadcast channel with one common and one confidential
message sets. We consider two setups. The first is when the confidential
message is to be sent to two receivers and kept secret from the third receiver.
Achievability is established using indirect decoding, Wyner wiretap channel
coding, and the new idea of generating secrecy from a publicly available
superposition codebook. The inner bound is shown to be tight for a class of
reversely degraded broadcast channels and when both legitimate receivers are
less noisy than the third receiver. The second setup investigated in this paper
is when the confidential message is to be sent to one receiver and kept secret
from the other two receivers. Achievability in this case follows from Wyner
wiretap channel coding and indirect decoding. This inner bound is also shown to
be tight for several special cases.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 05:00:38 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Oct 2009 21:45:13 GMT"
},
{
"version": "v3",
"created": "Sat, 7 Nov 2009 01:08:31 GMT"
},
{
"version": "v4",
"created": "Sat, 18 Jun 2011 22:56:09 GMT"
}
] | 2011-06-21T00:00:00 |
[
[
"Chia",
"Yeow-Khiang",
""
],
[
"Gamal",
"Abbas El",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1409
|
James Lee
|
James R. Lee, Anastasios Sidiropoulos
|
Pathwidth, trees, and random embeddings
|
21 pages
| null | null | null |
math.MG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that, for every $k=1,2,...,$ every shortest-path metric on a graph
of pathwidth $k$ embeds into a distribution over random trees with distortion
at most $c$ for some $c=c(k)$. A well-known conjecture of Gupta, Newman,
Rabinovich, and Sinclair states that for every minor-closed family of graphs
$F$, there is a constant $c(F)$ such that the multi-commodity max-flow/min-cut
gap for every flow instance on a graph from $F$ is at most $c(F)$. The
preceding embedding theorem is used to prove this conjecture whenever the
family $F$ does not contain all trees.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 05:06:48 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Aug 2011 23:37:27 GMT"
},
{
"version": "v3",
"created": "Sat, 6 Oct 2012 01:08:02 GMT"
}
] | 2012-10-09T00:00:00 |
[
[
"Lee",
"James R.",
""
],
[
"Sidiropoulos",
"Anastasios",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.1410
|
EPTCS
|
Laurence Loewe, Stuart Moodie, Jane Hillston
|
Quantifying the implicit process flow abstraction in SBGN-PD diagrams
with Bio-PEPA
| null |
EPTCS 6, 2009, pp. 93-107
|
10.4204/EPTCS.6.7
| null |
cs.PL cs.CE q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For a long time biologists have used visual representations of biochemical
networks to gain a quick overview of important structural properties. Recently
SBGN, the Systems Biology Graphical Notation, has been developed to standardise
the way in which such graphical maps are drawn in order to facilitate the
exchange of information. Its qualitative Process Diagrams (SBGN-PD) are based
on an implicit Process Flow Abstraction (PFA) that can also be used to
construct quantitative representations, which can be used for automated
analyses of the system. Here we explicitly describe the PFA that underpins
SBGN-PD and define attributes for SBGN-PD glyphs that make it possible to
capture the quantitative details of a biochemical reaction network. We
implemented SBGNtext2BioPEPA, a tool that demonstrates how such quantitative
details can be used to automatically generate working Bio-PEPA code from a
textual representation of SBGN-PD that we developed. Bio-PEPA is a process
algebra that was designed for implementing quantitative models of concurrent
biochemical reaction systems. We use this approach to compute the expected
delay between input and output using deterministic and stochastic simulations
of the MAPK signal transduction cascade. The scheme developed here is general
and can be easily adapted to other output formalisms.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 05:10:21 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Loewe",
"Laurence",
""
],
[
"Moodie",
"Stuart",
""
],
[
"Hillston",
"Jane",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0910.1412
|
EPTCS
|
Heike Siebert
|
Dynamical and Structural Modularity of Discrete Regulatory Networks
| null |
EPTCS 6, 2009, pp. 109-124
|
10.4204/EPTCS.6.8
| null |
cs.DM cs.CE q-bio.MN
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A biological regulatory network can be modeled as a discrete function that
contains all available information on network component interactions. From this
function we can derive a graph representation of the network structure as well
as of the dynamics of the system. In this paper we introduce a method to
identify modules of the network that allow us to construct the behavior of the
given function from the dynamics of the modules. Here, it proves useful to
distinguish between dynamical and structural modules, and to define network
modules combining aspects of both. As a key concept we establish the notion of
symbolic steady state, which basically represents a set of states where the
behavior of the given function is in some sense predictable, and which gives
rise to suitable network modules. We apply the method to a regulatory network
involved in T helper cell differentiation.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 05:19:04 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Siebert",
"Heike",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
}
] |
0910.1415
|
EPTCS
|
Daniela Besozzi, Paolo Cazzaniga, Matteo Dugo, Dario Pescini,
Giancarlo Mauri
|
A study on the combined interplay between stochastic fluctuations and
the number of flagella in bacterial chemotaxis
| null |
EPTCS 6, 2009, pp. 47-62
|
10.4204/EPTCS.6.4
| null |
q-bio.MN cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The chemotactic pathway allows bacteria to respond and adapt to environmental
changes, by tuning the tumbling and running motions that are due to clockwise
and counterclockwise rotations of their flagella. The pathway is tightly
regulated by feedback mechanisms governed by the phosphorylation and
methylation of several proteins. In this paper, we present a detailed
mechanistic model for chemotaxis, that considers all of its transmembrane and
cytoplasmic components, and their mutual interactions. Stochastic simulations
of the dynamics of a pivotal protein, CheYp, are performed by means of tau
leaping algorithm. This approach is then used to investigate the interplay
between the stochastic fluctuations of CheYp amount and the number of cellular
flagella. Our results suggest that the combination of these factors might
represent a relevant component for chemotaxis. Moreover, we study the pathway
under various conditions, such as different methylation levels and ligand
amounts, in order to test its adaptation response. Some issues for future work
are finally discussed.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 05:31:06 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Besozzi",
"Daniela",
""
],
[
"Cazzaniga",
"Paolo",
""
],
[
"Dugo",
"Matteo",
""
],
[
"Pescini",
"Dario",
""
],
[
"Mauri",
"Giancarlo",
""
]
] |
[
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0910.1416
|
Sk Sarif Hassan s
|
Sk. Sarif Hassan, Pabitra Pal Choudhury, Amita Pal, R. L. Brahmachary
and Arunava Goswami
|
Use of L-system mathematics for making new subfamily members of
olfactory receptor full length genes, OR1D2, OR1D4 and OR1D5
| null | null | null | null |
cs.OH cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ligands for only two human olfactory receptors are known. One of them, OR1D2,
binds to Bourgeonal [Malnic B, Godfrey P-A, Buck L-B (2004) The human olfactory
receptor gene family. Proc. Natl. Acad. Sci U. S. A. 101: 2584-2589 and Erratum
in: Proc Natl Acad Sci U. S. A. (2004) 101: 7205]. OR1D2, OR1D4 and OR1D5 are
three full length olfactory receptors present in an olfactory locus in human
genome. These receptors are more than 80% identical in DNA sequences and have
108 base pair mismatches among them. We have used L-system mathematics and have
been able to show a closely related subfamily of OR1D2, OR1D4 and OR1D5.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 05:37:39 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Feb 2010 09:33:00 GMT"
}
] | 2010-02-25T00:00:00 |
[
[
"Hassan",
"Sk. Sarif",
""
],
[
"Choudhury",
"Pabitra Pal",
""
],
[
"Pal",
"Amita",
""
],
[
"Brahmachary",
"R. L.",
""
],
[
"Goswami",
"Arunava",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0910.1418
|
Angelo Troina
|
Mario Coppo (Dipartimento di Informatica, Universit\'a di Torino),
Ferruccio Damiani (Dipartimento di Informatica, Universit\'a di Torino),
Elena Grassi (Molecular Biotechnology Center, Dipartimento di Genetica,
Biologia e Biochimica and Dipartimento di Informatica, Universit\'a di
Torino), Mike Guether (Dipartimento di Biologia Vegetale, Universit\`a di
Torino), Angelo Troina (Dipartimento di Informatica, Universit\'a di Torino)
|
Modelling an Ammonium Transporter with SCLS
| null |
EPTCS 6, 2009, pp. 77-92
|
10.4204/EPTCS.6.6
| null |
q-bio.QM cs.CE q-bio.CB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Stochastic Calculus of Looping Sequences (SCLS) is a recently proposed
modelling language for the representation and simulation of biological systems
behaviour. It has been designed with the aim of combining the simplicity of
notation of rewrite systems with the advantage of compositionality. It also
allows a rather simple and accurate description of biological membranes and
their interactions with the environment.
In this work we apply SCLS to model a newly discovered ammonium transporter.
This transporter is believed to play a fundamental role for plant mineral
acquisition, which takes place in the arbuscular mycorrhiza, the most
wide-spread plant-fungus symbiosis on earth. Due to its potential application
in agriculture this kind of symbiosis is one of the main focuses of the BioBITs
project.
In our experiments the passage of NH3 / NH4+ from the fungus to the plant has
been dissected in known and hypothetical mechanisms; with the model so far we
have been able to simulate the behaviour of the system under different
conditions. Our simulations confirmed some of the latest experimental results
about the LjAMT2;2 transporter. The initial simulation results of the modelling
of the symbiosis process are promising and indicate new directions for
biological investigations.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 19:48:20 GMT"
},
{
"version": "v2",
"created": "Fri, 14 May 2010 11:30:46 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Coppo",
"Mario",
"",
"Dipartimento di Informatica, Universitá di Torino"
],
[
"Damiani",
"Ferruccio",
"",
"Dipartimento di Informatica, Universitá di Torino"
],
[
"Grassi",
"Elena",
"",
"Molecular Biotechnology Center, Dipartimento di Genetica,\n Biologia e Biochimica and Dipartimento di Informatica, Universitá di\n Torino"
],
[
"Guether",
"Mike",
"",
"Dipartimento di Biologia Vegetale, Università di\n Torino"
],
[
"Troina",
"Angelo",
"",
"Dipartimento di Informatica, Universitá di Torino"
]
] |
[
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.CB",
"description": "Cell-cell signaling and interaction; morphogenesis and development; apoptosis; bacterial conjugation; viral-host interaction; immunology",
"span": "(Cell Behavior)"
}
] |
0910.1427
|
Maurice Jansen
|
Maurice Jansen and Jayalal Sarma M.N
|
Balancing Bounded Treewidth Circuits
| null | null |
10.1007/978-3-642-13182-0_21
| null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Algorithmic tools for graphs of small treewidth are used to address questions
in complexity theory. For both arithmetic and Boolean circuits, it is shown
that any circuit of size $n^{O(1)}$ and treewidth $O(\log^i n)$ can be
simulated by a circuit of width $O(\log^{i+1} n)$ and size $n^c$, where $c =
O(1)$, if $i=0$, and $c=O(\log \log n)$ otherwise. For our main construction,
we prove that multiplicatively disjoint arithmetic circuits of size $n^{O(1)}$
and treewidth $k$ can be simulated by bounded fan-in arithmetic formulas of
depth $O(k^2\log n)$. From this we derive the analogous statement for
syntactically multilinear arithmetic circuits, which strengthens a theorem of
Mahajan and Rao. As another application, we derive that constant width
arithmetic circuits of size $n^{O(1)}$ can be balanced to depth $O(\log n)$,
provided certain restrictions are made on the use of iterated multiplication.
Also from our main construction, we derive that Boolean bounded fan-in circuits
of size $n^{O(1)}$ and treewidth $k$ can be simulated by bounded fan-in
formulas of depth $O(k^2\log n)$. This strengthens in the non-uniform setting
the known inclusion that $SC^0 \subseteq NC^1$. Finally, we apply our
construction to show that {\sc reachability} for directed graphs of bounded
treewidth is in $LogDCFL$.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 06:56:50 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Jansen",
"Maurice",
""
],
[
"N",
"Jayalal Sarma M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.1433
|
Jean Dezert
|
Albena Tchamova (IPP BAS), Jean Dezert (ONERA), Florentin Smarandache
(UNM)
|
Tracking object's type changes with fuzzy based fusion rule
| null |
First International Conference on Modelling and Development of
Intelligent Systems, Sibiu : Romania (2009)
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper the behavior of three combinational rules for
temporal/sequential attribute data fusion for target type estimation are
analyzed. The comparative analysis is based on: Dempster's fusion rule proposed
in Dempster-Shafer Theory; Proportional Conflict Redistribution rule no. 5
(PCR5), proposed in Dezert-Smarandache Theory and one alternative class fusion
rule, connecting the combination rules for information fusion with particular
fuzzy operators, focusing on the t-norm based Conjunctive rule as an analog of
the ordinary conjunctive rule and t-conorm based Disjunctive rule as an analog
of the ordinary disjunctive rule. The way how different t-conorms and t-norms
functions within TCN fusion rule influence over target type estimation
performance is studied and estimated.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 07:53:27 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Tchamova",
"Albena",
"",
"IPP BAS"
],
[
"Dezert",
"Jean",
"",
"ONERA"
],
[
"Smarandache",
"Florentin",
"",
"UNM"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.1443
|
Maurice Jansen
|
Maurice Jansen
|
Weakening Assumptions for Deterministic Subexponential Time Non-Singular
Matrix Completion
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In (Kabanets, Impagliazzo, 2004) it is shown how to decide the circuit
polynomial identity testing problem (CPIT) in deterministic subexponential
time, assuming hardness of some explicit multilinear polynomial family for
arithmetical circuits. In this paper, a special case of CPIT is considered,
namely low-degree non-singular matrix completion (NSMC). For this subclass of
problems it is shown how to obtain the same deterministic time bound, using a
weaker assumption in terms of determinantal complexity.
Hardness-randomness tradeoffs will also be shown in the converse direction,
in an effort to make progress on Valiant's VP versus VNP problem. To separate
VP and VNP, it is known to be sufficient to prove that the determinantal
complexity of the m-by-m permanent is $m^{\omega(\log m)}$. In this paper it is
shown, for an appropriate notion of explicitness, that the existence of an
explicit multilinear polynomial family with determinantal complexity
m^{\omega(\log m)}$ is equivalent to the existence of an efficiently computable
generator $G_n$ for multilinear NSMC with seed length $O(n^{1/\sqrt{\log n}})$.
The latter is a combinatorial object that provides an efficient deterministic
black-box algorithm for NSMC. ``Multilinear NSMC'' indicates that $G_n$ only
has to work for matrices $M(x)$ of $poly(n)$ size in $n$ variables, for which
$det(M(x))$ is a multilinear polynomial.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 08:44:29 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Jansen",
"Maurice",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.1463
|
Alexandros Dimakis
|
Morten Hansen and Babak Hassibi and Alexandros G. Dimakis and Weiyu Xu
|
Near-Optimal Detection in MIMO Systems using Gibbs Sampling
|
To appear in Globecom 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we study a Markov Chain Monte Carlo (MCMC) Gibbs sampler for
solving the integer least-squares problem. In digital communication the problem
is equivalent to performing Maximum Likelihood (ML) detection in Multiple-Input
Multiple-Output (MIMO) systems. While the use of MCMC methods for such problems
has already been proposed, our method is novel in that we optimize the
"temperature" parameter so that in steady state, i.e. after the Markov chain
has mixed, there is only polynomially (rather than exponentially) small
probability of encountering the optimal solution. More precisely, we obtain the
largest value of the temperature parameter for this to occur, since the higher
the temperature, the faster the mixing. This is in contrast to simulated
annealing techniques where, rather than being held fixed, the temperature
parameter is tended to zero. Simulations suggest that the resulting Gibbs
sampler provides a computationally efficient way of achieving approximative ML
detection in MIMO systems having a huge number of transmit and receive
dimensions. In fact, they further suggest that the Markov chain is rapidly
mixing. Thus, it has been observed that even in cases were ML detection using,
e.g. sphere decoding becomes infeasible, the Gibbs sampler can still offer a
near-optimal solution using much less computations.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 10:57:03 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Hansen",
"Morten",
""
],
[
"Hassibi",
"Babak",
""
],
[
"Dimakis",
"Alexandros G.",
""
],
[
"Xu",
"Weiyu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1468
|
Rdv Ijcsis
|
P. Jayarekha, T. R. GopalaKrishnan Nair
|
Prefetching of VoD Programs Based On ART1 Requesting Clustering
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 128-134, September 2009, USA
| null |
ISSN 1947 5500
|
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a novel approach to group users according to the
VoD user request pattern. We cluster the user requests based on ART1 neural
network algorithm. The knowledge extracted from the cluster is used to prefetch
the multimedia object from each cluster before the users request. We have
developed an algorithm to cluster users according to the users request patterns
based on ART1 neural network algorithm that offers an unsupervised clustering.
This approach adapts to changes in user request patterns over period without
losing previous information. Each cluster is represented as prototype vector by
generalizing the most frequently used URLs that are accessed by all the cluster
members. The simulation results of our proposed clustering and prefetching
algorithm, shows enormous increase in the performance of streaming server. Our
algorithm helps the servers agent to learn user preferences and discover the
information about the corresponding sources and other similar interested
individuals.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 11:21:21 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Jayarekha",
"P.",
""
],
[
"Nair",
"T. R. GopalaKrishnan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0910.1471
|
Rdv Ijcsis
|
M Dakshayini, T R GopalaKrishnan Nair
|
Prefix based Chaining Scheme for Streaming Popular Videos using Proxy
servers in VoD
|
9 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 135-143, September 2009, USA
| null |
ISSN 1947 5500
|
cs.MM cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Streaming high quality videos consumes significantly large amount of network
resources. In this context request to service delay, network traffic,
congestion and server overloading are the main parameters to be considered in
video streaming over the internet that effect the quality of service (QoS). In
this paper, we propose an efficient architecture as a cluster of proxy servers
and clients that uses a peer to peer (P2P) approach to cooperatively stream the
video using chaining technique. We consider the following two key issues in the
proposed architecture (1) Prefix caching technique to accommodate more number
of videos close to client (2) Cooperative client and proxy chaining to achieve
the network efficiency. Our simulation results shows that the proposed approach
yields a prefix caching close to the optimal solution minimizing WAN bandwidth
usage on server-proxy path by utilizing the proxy-client and client-client path
bandwidth, which is much cheaper than the expensive server proxy path
bandwidth, server load, and client rejection ratio significantly using
chaining.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 11:26:01 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Dakshayini",
"M",
""
],
[
"Nair",
"T R GopalaKrishnan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.1475
|
Rdv Ijcsis
|
Annapurna P Patil, Narmada Sambaturu, Krittaya Chunhaviriyakul
|
Convergence Time Evaluation of Algorithms in MANETs
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 144-149, September 2009, USA
| null |
ISSN 1947 5500
|
cs.DS cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Since the advent of wireless communication, the need for mobile ad hoc
networks has been growing exponentially. This has opened up a Pandoras Box of
algorithms for dealing with mobile ad hoc networks, or MANETs, as they are
generally referred to. Most attempts made at evaluating these algorithms so far
have focused on parameters such as throughput, packet delivery ratio, overhead
etc. An analysis of the convergence times of these algorithms is still an open
issue. The work carried out fills this gap by evaluating the algorithms on the
basis of convergence time. Algorithms for MANETs can be classified into three
categories: reactive, proactive, and hybrid protocols. In this project, we
compare the convergence times of representative algorithms in each category,
namely Ad hoc On Demand Distance Vector (AODV) reactive, Destination Sequence
Distance Vector protocol (DSDV) proactive, and Temporally Ordered Routing
Algorithm (TORA) hybrid. The algorithm performances are compared by simulating
them in ns2. Tcl is used to conduct the simulations, while perl is used to
extract data from the simulation output and calculate convergence time. The
design of the experiments carried on is documented using Unified modeling
Language. Also, a user interface is created using perl, which enables the user
to either run a desired simulation and measure convergence time, or measure the
convergence time of a simulation that has been run earlier.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 11:33:37 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Patil",
"Annapurna P",
""
],
[
"Sambaturu",
"Narmada",
""
],
[
"Chunhaviriyakul",
"Krittaya",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.1484
|
Alain Lecomte
|
Alain Lecomte (INRIA Futurs, SFLTAMP), Myriam Quatrini (IML)
|
Ludics and its Applications to natural Language Semantics
| null |
Lecture Notes in Artificial Intelligence LNAI, 5514 (2009) pp
242--255
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Proofs, in Ludics, have an interpretation provided by their counter-proofs,
that is the objects they interact with. We follow the same idea by proposing
that sentence meanings are given by the counter-meanings they are opposed to in
a dialectical interaction. The conception is at the intersection of a
proof-theoretic and a game-theoretic accounts of semantics, but it enlarges
them by allowing to deal with possibly infinite processes.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 12:21:22 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Lecomte",
"Alain",
"",
"INRIA Futurs, SFLTAMP"
],
[
"Quatrini",
"Myriam",
"",
"IML"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0910.1494
|
Apostolos Syropoulos
|
Apostolos Syropoulos
|
Some Thoughts on Hypercomputation
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hypercomputation is a relatively new branch of computer science that emerged
from the idea that the Church--Turing Thesis, which is supposed to describe
what is computable and what is noncomputable, cannot possible be true. Because
of its apparent validity, the Church--Turing Thesis has been used to
investigate the possible limits of intelligence of any imaginable life form,
and, consequently, the limits of information processing, since living beings
are, among others, information processors. However, in the light of
hypercomputation, which seems to be feasibly in our universe, one cannot impose
arbitrary limits to what intelligence can achieve unless there are specific
physical laws that prohibit the realization of something. In addition,
hypercomputation allows us to ponder about aspects of communication between
intelligent beings that have not been considered before
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 12:53:50 GMT"
}
] | 2009-10-12T00:00:00 |
[
[
"Syropoulos",
"Apostolos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0910.1495
|
Ping Li
|
Ping Li
|
Estimating Entropy of Data Streams Using Compressed Counting
| null | null | null | null |
cs.DS cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Shannon entropy is a widely used summary statistic, for example, network
traffic measurement, anomaly detection, neural computations, spike trains, etc.
This study focuses on estimating Shannon entropy of data streams. It is known
that Shannon entropy can be approximated by Reenyi entropy or Tsallis entropy,
which are both functions of the p-th frequency moments and approach Shannon
entropy as p->1.
Compressed Counting (CC) is a new method for approximating the p-th frequency
moments of data streams. Our contributions include:
1) We prove that Renyi entropy is (much) better than Tsallis entropy for
approximating Shannon entropy.
2) We propose the optimal quantile estimator for CC, which considerably
improves the previous estimators.
3) Our experiments demonstrate that CC is indeed highly effective
approximating the moments and entropies. We also demonstrate the crucial
importance of utilizing the variance-bias trade-off.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 12:54:36 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Li",
"Ping",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0910.1511
|
Aylin Yener
|
Xiang He, Aylin Yener
|
Cooperation with an Untrusted Relay: A Secrecy Perspective
|
IEEE Transactions on Information Theory, submitted October 2008,
revised October 2009. This is the revised version
| null |
10.1109/TIT.2010.2050958
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the communication scenario where a source-destination pair wishes
to keep the information secret from a relay node despite wanting to enlist its
help. For this scenario, an interesting question is whether the relay node
should be deployed at all. That is, whether cooperation with an untrusted relay
node can ever be beneficial. We first provide an achievable secrecy rate for
the general untrusted relay channel, and proceed to investigate this question
for two types of relay networks with orthogonal components. For the first
model, there is an orthogonal link from the source to the relay. For the second
model, there is an orthogonal link from the relay to the destination. For the
first model, we find the equivocation capacity region and show that answer is
negative. In contrast, for the second model, we find that the answer is
positive. Specifically, we show by means of the achievable secrecy rate based
on compress-and-forward, that, by asking the untrusted relay node to relay
information, we can achieve a higher secrecy rate than just treating the relay
as an eavesdropper. For a special class of the second model, where the relay is
not interfering itself, we derive an upper bound for the secrecy rate using an
argument whose net effect is to separate the eavesdropper from the relay. The
merit of the new upper bound is demonstrated on two channels that belong to
this special class. The Gaussian case of the second model mentioned above
benefits from this approach in that the new upper bound improves the previously
known bounds. For the Cover-Kim deterministic relay channel, the new upper
bound finds the secrecy capacity when the source-destination link is not worse
than the source-relay link, by matching with the achievable rate we present.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 13:59:55 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"He",
"Xiang",
""
],
[
"Yener",
"Aylin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1528
|
Jeffrey Shallit
|
Thomas Ang, Jeffrey Shallit
|
Length of the Shortest Word in the Intersection of Regular Languages
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this note, we give a construction that provides a tight lower bound of
mn-1 for the length of the shortest word in the intersection of two regular
languages with state complexities m and n.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 15:16:48 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Ang",
"Thomas",
""
],
[
"Shallit",
"Jeffrey",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0910.1532
|
Yi Cao
|
Yi Cao and Biao Chen
|
Capacity Bounds for Two-Hop Interference Networks
|
8 pages, 5 figures, presented in Allerton Conference'09
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers a two-hop interference network, where two users transmit
independent messages to their respective receivers with the help of two relay
nodes. The transmitters do not have direct links to the receivers; instead, two
relay nodes serve as intermediaries between the transmitters and receivers.
Each hop, one from the transmitters to the relays and the other from the relays
to the receivers, is modeled as a Gaussian interference channel, thus the
network is essentially a cascade of two interference channels. For this
network, achievable symmetric rates for different parameter regimes under
decode-and- forward relaying and amplify-and-forward relaying are proposed and
the corresponding coding schemes are carefully studied. Numerical results are
also provided.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 15:29:57 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Cao",
"Yi",
""
],
[
"Chen",
"Biao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1536
|
Manas Patra
|
Manas K. Patra and Samuel L. Braunstein
|
An algebraic framework for information theory: Classical Information
|
35 pages. Typo corrected in the abstract
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work proposes a complete algebraic model for classical information
theory. As a precursor the essential probabilistic concepts have been defined
and analyzed in the algebraic setting. Examples from probability and
information theory demonstrate that in addition to theoretical insights
provided by the algebraic model one obtains new computational and anlytical
tools. Several important theorems of classical probahility and information
theory are formulated and proved in the algebraic framework.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 16:23:10 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Oct 2009 17:44:24 GMT"
}
] | 2009-10-12T00:00:00 |
[
[
"Patra",
"Manas K.",
""
],
[
"Braunstein",
"Samuel L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1585
|
Aaron D. Jaggard
|
Aaron D. Jaggard, Michael Schapira, and Rebecca N. Wright
|
Distributed Computing with Adaptive Heuristics
|
36 pages, four figures. Expands both technical results and discussion
of v1. Revised version will appear in the proceedings of Innovations in
Computer Science 2011
| null | null | null |
cs.DC cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We use ideas from distributed computing to study dynamic environments in
which computational nodes, or decision makers, follow adaptive heuristics (Hart
2005), i.e., simple and unsophisticated rules of behavior, e.g., repeatedly
"best replying" to others' actions, and minimizing "regret", that have been
extensively studied in game theory and economics. We explore when convergence
of such simple dynamics to an equilibrium is guaranteed in asynchronous
computational environments, where nodes can act at any time. Our research
agenda, distributed computing with adaptive heuristics, lies on the borderline
of computer science (including distributed computing and learning) and game
theory (including game dynamics and adaptive heuristics). We exhibit a general
non-termination result for a broad class of heuristics with bounded
recall---that is, simple rules of behavior that depend only on recent history
of interaction between nodes. We consider implications of our result across a
wide variety of interesting and timely applications: game theory, circuit
design, social networks, routing and congestion control. We also study the
computational and communication complexity of asynchronous dynamics and present
some basic observations regarding the effects of asynchrony on no-regret
dynamics. We believe that our work opens a new avenue for research in both
distributed computing and game theory.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 22:39:39 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Oct 2010 19:35:08 GMT"
}
] | 2010-10-13T00:00:00 |
[
[
"Jaggard",
"Aaron D.",
""
],
[
"Schapira",
"Michael",
""
],
[
"Wright",
"Rebecca N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0910.1605
|
EPTCS
|
Ralph-Johan Back ({\AA}bo Akademi University, Finland), Ion Petre
({\AA}bo Akademi University, Finland), Erik de Vink (Eindhoven University of
Technology, the Netherlands)
|
Proceedings Second International Workshop on Computational Models for
Cell Processes
| null |
EPTCS 6, 2009
|
10.4204/EPTCS.6
| null |
cs.CE cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The second international workshop on Computational Models for Cell Processes
(ComProc 2009) took place on November 3, 2009 at the Eindhoven University of
Technology, in conjunction with Formal Methods 2009. The workshop was jointly
organized with the EC-MOAN project. This volume contains the final versions of
all contributions accepted for presentation at the workshop.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 20:15:51 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Oct 2009 02:29:16 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Back",
"Ralph-Johan",
"",
"Åbo Akademi University, Finland"
],
[
"Petre",
"Ion",
"",
"Åbo Akademi University, Finland"
],
[
"de Vink",
"Erik",
"",
"Eindhoven University of\n Technology, the Netherlands"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.1623
|
Wei Lu
|
Wei Lu, Namrata Vaswani
|
Modified Basis Pursuit Denoising(MODIFIED-BPDN) for Noisy Compressive
Sensing with Partially Known Support
|
5 pages, 3 figures, submitted ICASSP 2010
| null | null | null |
cs.IT math.IT
|
http://creativecommons.org/licenses/by/3.0/
|
In this work, we study the problem of reconstructing a sparse signal from a
limited number of linear 'incoherent' noisy measurements, when a part of its
support is known. The known part of the support may be available from prior
knowledge or from the previous time instant (in applications requiring
recursive reconstruction of a time sequence of sparse signals, e.g. dynamic
MRI). We study a modification of Basis Pursuit Denoising (BPDN) and bound its
reconstruction error. A key feature of our work is that the bounds that we
obtain are computable. Hence, we are able to use Monte Carlo to study their
average behavior as the size of the unknown support increases. We also
demonstrate that when the unknown support size is small, modified-BPDN bounds
are much tighter than those for BPDN, and hold under much weaker sufficient
conditions (require fewer measurements).
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 22:00:19 GMT"
}
] | 2009-10-12T00:00:00 |
[
[
"Lu",
"Wei",
""
],
[
"Vaswani",
"Namrata",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1639
|
Goochul Chung
|
G. Chung, S. Vishwanath, and C. S. Hwang
|
On the Fundamental Limits of Interweaved Cognitive Radios
|
7 pages, 3 figures, IEEE Radio and Wireless Symposium, 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers the problem of channel sensing in cognitive radios. The
system model considered is a set of N parallel (dis-similar) channels, where
each channel at any given time is either available or occupied by a legitimate
user. The cognitive radio is permitted to sense channels to determine each of
their states as available or occupied. The end goal of this paper is to select
the best L channels to sense at any given time. Using a convex relaxation
approach, this paper formulates and approximately solves this optimal selection
problem. Finally, the solution obtained to the relaxed optimization problem is
translated into a practical algorithm.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 00:55:37 GMT"
}
] | 2009-10-12T00:00:00 |
[
[
"Chung",
"G.",
""
],
[
"Vishwanath",
"S.",
""
],
[
"Hwang",
"C. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1643
|
Iris Reinbacher
|
Hee-Kap Ahn, Sang Won Bae, Erik D. Demaine, Martin L. Demaine,
Sang-Sub Kim, Matias Korman, Iris Reinbacher, Wanbin Son
|
Covering Points by Disjoint Boxes with Outliers
|
updated version: - changed problem from 'cover exactly n-k points' to
'cover at least n-k points' to avoid having non-feasible solutions. Results
are unchanged. - added Proof to Lemma 11, clarified some sections - corrected
typos and small errors - updated affiliations of two authors
| null | null | null |
cs.CG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For a set of n points in the plane, we consider the axis--aligned (p,k)-Box
Covering problem: Find p axis-aligned, pairwise-disjoint boxes that together
contain n-k points. In this paper, we consider the boxes to be either squares
or rectangles, and we want to minimize the area of the largest box. For general
p we show that the problem is NP-hard for both squares and rectangles. For a
small, fixed number p, we give algorithms that find the solution in the
following running times:
For squares we have O(n+k log k) time for p=1, and O(n log n+k^p log^p k time
for p = 2,3. For rectangles we get O(n + k^3) for p = 1 and O(n log n+k^{2+p}
log^{p-1} k) time for p = 2,3.
In all cases, our algorithms use O(n) space.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 02:31:23 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jul 2010 03:38:43 GMT"
}
] | 2010-07-28T00:00:00 |
[
[
"Ahn",
"Hee-Kap",
""
],
[
"Bae",
"Sang Won",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Kim",
"Sang-Sub",
""
],
[
"Korman",
"Matias",
""
],
[
"Reinbacher",
"Iris",
""
],
[
"Son",
"Wanbin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.1650
|
Dingyin Xia
|
Dingyin Xia, Fei Wu, Xuqing Zhang, Yueting Zhuang
|
Local and global approaches of affinity propagation clustering for large
scale data
|
9 pages
|
J Zhejiang Univ Sci A 2008 9(10):1373-1381
|
10.1631/jzus.A0720058
| null |
cs.LG cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently a new clustering algorithm called 'affinity propagation' (AP) has
been proposed, which efficiently clustered sparsely related data by passing
messages between data points. However, we want to cluster large scale data
where the similarities are not sparse in many cases. This paper presents two
variants of AP for grouping large scale data with a dense similarity matrix.
The local approach is partition affinity propagation (PAP) and the global
method is landmark affinity propagation (LAP). PAP passes messages in the
subsets of data first and then merges them as the number of initial step of
iterations; it can effectively reduce the number of iterations of clustering.
LAP passes messages between the landmark data points first and then clusters
non-landmark data points; it is a large global approximation method to speed up
clustering. Experiments are conducted on many datasets, such as random data
points, manifold subspaces, images of faces and Chinese calligraphy, and the
results demonstrate that the two approaches are feasible and practicable.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 04:55:41 GMT"
}
] | 2009-10-12T00:00:00 |
[
[
"Xia",
"Dingyin",
""
],
[
"Wu",
"Fei",
""
],
[
"Zhang",
"Xuqing",
""
],
[
"Zhuang",
"Yueting",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0910.1688
|
Zuleita Ka Ming Ho
|
Zuleita Ka Ming Ho and David Gesbert
|
Balancing Egoism and Altruism on MIMO Interference Channel
|
version 4: 10 pages, journal paper, fixed typo, additional remarks
and figures for explanation and illustration
| null | null | null |
cs.IT math.IT
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
This paper considers the so-called multiple-input-multiple-output
interference channel (MIMO-IC) which has relevance in applications such as
multi-cell coordination in cellular networks as well as spectrum sharing in
cognitive radio networks among others. We consider a beamforming design
framework based on striking a compromise between beamforming gain at the
intended receiver (Egoism) and the mitigation of interference created towards
other receivers (Altruism). Combining egoistic and altruistic beamforming has
been shown previously in several papers to be instrumental to optimizing the
rates in a multiple-input-single-output interference channel MISO-IC (i.e.
where receivers have no interference canceling capability). Here, by using the
framework of Bayesian games, we shed more light on these game-theoretic
concepts in the more general context of MIMO channels and more particularly
when coordinating parties only have channel state information (CSI) of channels
that they can measure directly. This allows us to derive distributed
beamforming techniques. We draw parallels with existing work on the MIMO-IC,
including rate-optimizing and interference-alignment precoding techniques,
showing how such techniques may be improved or re-interpreted through a common
prism based on balancing egoistic and altruistic beamforming. Our analysis and
simulations currently limited to single stream transmission per user attest the
improvements over known interference alignment based methods in terms of sum
rate performance in the case of so-called asymmetric networks.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 09:07:24 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Jun 2010 12:13:29 GMT"
},
{
"version": "v3",
"created": "Wed, 2 Jun 2010 08:09:35 GMT"
},
{
"version": "v4",
"created": "Thu, 7 Oct 2010 17:47:58 GMT"
}
] | 2010-10-08T00:00:00 |
[
[
"Ho",
"Zuleita Ka Ming",
""
],
[
"Gesbert",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1690
|
Christian Attiogbe
|
Christian Attiogbe (LINA)
|
Tool-Assisted Multi-Facet Analysis of Formal Specifications (Using
Alelier-B and ProB)
| null |
IASTED Conf. on Software Engineering (SE'2006), Innsbruck :
Austria (2006)
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Tool-assisted analysis of software systems and convenient guides to practise
the formal methods are still motivating challenges. This article addresses
these challenges. We ex periment on analysing a formal specification from
multiple aspects. The B method and the Atelier-B tool are used for formal
specifications, for safety property analysis and for refinements. The ProB tool
is used to supplement the study with model checking; it helps to discover
errors and there fore to improve the former specifications.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 09:19:51 GMT"
}
] | 2016-11-25T00:00:00 |
[
[
"Attiogbe",
"Christian",
"",
"LINA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0910.1691
|
Dominik Janzing
|
Dominik Janzing and Bastian Steudel
|
Justifying additive-noise-model based causal discovery via algorithmic
information theory
|
17 pages, 1 Figure
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A recent method for causal discovery is in many cases able to infer whether X
causes Y or Y causes X for just two observed variables X and Y. It is based on
the observation that there exist (non-Gaussian) joint distributions P(X,Y) for
which Y may be written as a function of X up to an additive noise term that is
independent of X and no such model exists from Y to X. Whenever this is the
case, one prefers the causal model X--> Y.
Here we justify this method by showing that the causal hypothesis Y--> X is
unlikely because it requires a specific tuning between P(Y) and P(X|Y) to
generate a distribution that admits an additive noise model from X to Y. To
quantify the amount of tuning required we derive lower bounds on the
algorithmic information shared by P(Y) and P(X|Y). This way, our justification
is consistent with recent approaches for using algorithmic information theory
for causal reasoning. We extend this principle to the case where P(X,Y) almost
admits an additive noise model.
Our results suggest that the above conclusion is more reliable if the
complexity of P(Y) is high.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 09:52:37 GMT"
}
] | 2009-10-12T00:00:00 |
[
[
"Janzing",
"Dominik",
""
],
[
"Steudel",
"Bastian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1719
|
Federico Calzolari
|
Federico Calzolari
|
High availability using virtualization
|
PhD Thesis in Information Technology Engineering: Electronics,
Computer Science, Telecommunications, pp. 94, University of Pisa [Italy]
| null | null | null |
cs.DC cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
High availability has always been one of the main problems for a data center.
Till now high availability was achieved by host per host redundancy, a highly
expensive method in terms of hardware and human costs. A new approach to the
problem can be offered by virtualization. Using virtualization, it is possible
to achieve a redundancy system for all the services running on a data center.
This new approach to high availability allows to share the running virtual
machines over the servers up and running, by exploiting the features of the
virtualization layer: start, stop and move virtual machines between physical
hosts. The system (3RC) is based on a finite state machine with hysteresis,
providing the possibility to restart each virtual machine over any physical
host, or reinstall it from scratch. A complete infrastructure has been
developed to install operating system and middleware in a few minutes. To
virtualize the main servers of a data center, a new procedure has been
developed to migrate physical to virtual hosts. The whole Grid data center
SNS-PISA is running at the moment in virtual environment under the high
availability system. As extension of the 3RC architecture, several storage
solutions have been tested to store and centralize all the virtual disks, from
NAS to SAN, to grant data safety and access from everywhere. Exploiting
virtualization and ability to automatically reinstall a host, we provide a sort
of host on-demand, where the action on a virtual machine is performed only when
a disaster occurs.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 12:04:13 GMT"
}
] | 2009-10-12T00:00:00 |
[
[
"Calzolari",
"Federico",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0910.1757
|
Laurent Tapie
|
Laurent Tapie (LURPA), Kwamiwi Mawussi (LURPA)
|
Decomposition of forging die for high speed machining
| null |
IDMME - Virtual Concept 2008, Beijing : China (2008)
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Today's forging die manufacturing process must be adapted to several
evolutions in machining process generation: CAD/CAM models, CAM software
solutions and High Speed Machining (HSM). In this context, the adequacy between
die shape and HSM process is in the core of machining preparation and process
planning approaches. This paper deals with an original approach of machining
preparation integrating this adequacy in the main tasks carried out. In this
approach, the design of the machining process is based on two levels of
decomposition of the geometrical model of a given die with respect to HSM
cutting conditions (cutting speed and feed rate) and technological constrains
(tool selection, features accessibility). This decomposition assists machining
assistant to generate an HSM process. The result of this decomposition is the
identification of machining features.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 14:33:17 GMT"
}
] | 2009-10-12T00:00:00 |
[
[
"Tapie",
"Laurent",
"",
"LURPA"
],
[
"Mawussi",
"Kwamiwi",
"",
"LURPA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0910.1758
|
Laurent Tapie
|
Laurent Tapie (LURPA), Kwamiwi Mawussi (LURPA), Bernard Anselmetti
(LURPA)
|
Circular tests for HSM machine tools: Bore machining application
| null |
International Journal of Machine Tools & Manufacture 47 (2007)
805-819
|
10.1016/j.ijmachtools.2006.06.021
| null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Today's High-Speed Machining (HSM) machine tool combines productivity and
part quality. The difficulty inherent in HSM operations lies in understanding
the impact of machine tool behaviour on machining time and part quality.
Analysis of some of the relevant ISO standards (230-1998, 10791-1998) and a
complementary protocol for better understanding HSM technology are presented in
the first part of this paper. These ISO standards are devoted to the procedures
implemented in order to study the behavior of machine tool. As these procedures
do not integrate HSM technology, the need for HSM machine tool tests becomes
critical to improving the trade-off between machining time and part quality. A
new protocol for analysing the HSM technology impact during circular
interpolation is presented in the second part of the paper. This protocol which
allows evaluating kinematic machine tool behaviour during circular
interpolation was designed from tests without machining. These tests are
discussed and their results analysed in the paper. During the circular
interpolation, axis capacities (such as acceleration or Jerk) related to
certain setting parameters of the numerical control unit have a significant
impact on the value of the feed rate. Consequently, a kinematic model for a
circular-interpolated trajectory was developed on the basis of these
parameters. Moreover, the link between part accuracy and kinematic machine tool
behaviour was established. The kinematic model was ultimately validated on a
bore machining simulation.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 14:33:48 GMT"
}
] | 2009-10-12T00:00:00 |
[
[
"Tapie",
"Laurent",
"",
"LURPA"
],
[
"Mawussi",
"Kwamiwi",
"",
"LURPA"
],
[
"Anselmetti",
"Bernard",
"",
"LURPA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0910.1760
|
Laurent Tapie
|
Laurent Tapie (LURPA), Kwamiwi Mawussi (LURPA), Bernard Anselmetti
(LURPA)
|
Machining strategy choice: performance VIEWER
| null |
Advances in Integrated Design and Manufacturing in Mechanical
Engineering II (2007) 343
| null |
Adv-2007-343
|
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nowadays high speed machining (HSM) machine tool combines productivity and
part quality. So mould and die maker invested in HSM. Die and mould features
are more and more complex shaped. Thus, it is difficult to choose the best
machining strategy according to part shape. Geometrical analysis of machining
features is not sufficient to make an optimal choice. Some research show that
security, technical, functional and economical constrains must be taken into
account to elaborate a machining strategy. During complex shape machining,
production system limits induce feed rate decreases, thus loss of productivity,
in some part areas. In this paper we propose to analyse these areas by
estimating tool path quality. First we perform experiments on HSM machine tool
to determine trajectory impact on machine tool behaviour. Then, we extract
critical criteria and establish models of performance loss. Our work is focused
on machine tool kinematical performance and numerical controller unit
calculation capacity. We implement these models on Esprit CAM Software. During
machining trajectory creation, critical part areas can be visualised and
analysed. Parameters, such as, segment or arc lengths, nature of
discontinuities encountered are used to analyse critical part areas. According
to this visualisation, process development engineer should validate or modify
the trajectory.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 14:36:41 GMT"
}
] | 2009-10-12T00:00:00 |
[
[
"Tapie",
"Laurent",
"",
"LURPA"
],
[
"Mawussi",
"Kwamiwi",
"",
"LURPA"
],
[
"Anselmetti",
"Bernard",
"",
"LURPA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0910.1761
|
Laurent Tapie
|
Laurent Tapie (LURPA), Kwamiwi Mawussi (LURPA), Bernard Anselmetti
(LURPA)
|
Decomposition of forging dies for machining planning
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper will provide a method to decompose forging dies for machining
planning in the case of high speed machining finishing operations. This method
lies on a machining feature approach model presented in the following paper.
The two main decomposition phases, called Basic Machining Features Extraction
and Process Planning Generation, are presented. These two decomposition phases
integrates machining resources models and expert machining knowledge to provide
an outstanding process planning.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 14:37:04 GMT"
}
] | 2009-10-12T00:00:00 |
[
[
"Tapie",
"Laurent",
"",
"LURPA"
],
[
"Mawussi",
"Kwamiwi",
"",
"LURPA"
],
[
"Anselmetti",
"Bernard",
"",
"LURPA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0910.1762
|
Laurent Tapie
|
Kwamiwi Mawussi (LURPA), Laurent Tapie (LURPA)
|
D\'efinition d'une pi\`ece test pour la caract\'erisation d'une machine
UGV
| null |
1er Conrg\`es International Conception et Mod\'elisation des
Syst\`emes M\'ecaniques, CMSM\'05, Tunisie (2005)
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In several fields like aeronautics, die and automotive, the machining of the
parts is done more and more on high speed machines tools. Today, the offer for
purchasing these machine tools is very wide. This situation poses the problem
of the judicious and objective choice meeting industrial needs that must be
necessary well expressed. The choice remains difficult insofar as the technical
data provided to the customers by the manufacturers of machine tools are
insufficient as well quantitatively as qualitatively. In this paper we present
a protocol for the characterization of machines tools in order to direct the
choice. The protocol is based on the one hand on no-load complementary tests to
those recommended by the standards ISO 230 and ISO 10791 and on the other hand
on the tests in load on a part test. In the first part, we present the
industrial needs as well as an analysis of the technical data of machine tools.
The second part is devoted to the study of the standards, the description of
the protocol and the presentation of the results.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 14:37:27 GMT"
}
] | 2009-10-12T00:00:00 |
[
[
"Mawussi",
"Kwamiwi",
"",
"LURPA"
],
[
"Tapie",
"Laurent",
"",
"LURPA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0910.1763
|
Sylvie Putot
|
Eric Goubault and Sylvie Putot
|
A zonotopic framework for functional abstractions
|
23 pages
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article formalizes an abstraction of input/output relations, based on
parameterized zonotopes, which we call affine sets. We describe the abstract
transfer functions and prove their correctness, which allows the generation of
accurate numerical invariants. Other applications range from compositional
reasoning to proofs of user-defined complex invariants and test case
generation.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 14:43:30 GMT"
}
] | 2009-10-12T00:00:00 |
[
[
"Goubault",
"Eric",
""
],
[
"Putot",
"Sylvie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.1787
|
Jaeweon Kim
|
Jaeweon Kim and Jeffrey G. Andrews
|
Sensitive White Space Detection with Spectral Covariance Sensing
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a novel, highly effective spectrum sensing algorithm for
cognitive radio and whitespace applications. The proposed spectral covariance
sensing (SCS) algorithm exploits the different statistical correlations of the
received signal and noise in the frequency domain. Test statistics are computed
from the covariance matrix of a partial spectrogram and compared with a
decision threshold to determine whether a primary signal or arbitrary type is
present or not. This detector is analyzed theoretically and verified through
realistic open-source simulations using actual digital television signals
captured in the US. Compared to the state of the art in the literature, SCS
improves sensitivity by 3 dB for the same dwell time, which is a very
significant improvement for this application. Further, it is shown that SCS is
highly robust to noise uncertainty, whereas many other spectrum sensors are
not.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 16:50:41 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Feb 2010 02:03:18 GMT"
},
{
"version": "v3",
"created": "Wed, 5 May 2010 20:08:33 GMT"
}
] | 2010-05-07T00:00:00 |
[
[
"Kim",
"Jaeweon",
""
],
[
"Andrews",
"Jeffrey G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.1800
|
Cyril Furtlehner
|
Cyril Furtlehner, Michele Sebag and Xiangliang Zhang
|
Scaling Analysis of Affinity Propagation
|
28 pages, 14 figures, Inria research report
|
Phys. Rev. E 81,066102 (2010)
|
10.1103/PhysRevE.81.066102
|
7046
|
cs.AI cond-mat.stat-mech
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We analyze and exploit some scaling properties of the Affinity Propagation
(AP) clustering algorithm proposed by Frey and Dueck (2007). First we observe
that a divide and conquer strategy, used on a large data set hierarchically
reduces the complexity ${\cal O}(N^2)$ to ${\cal O}(N^{(h+2)/(h+1)})$, for a
data-set of size $N$ and a depth $h$ of the hierarchical strategy. For a
data-set embedded in a $d$-dimensional space, we show that this is obtained
without notably damaging the precision except in dimension $d=2$. In fact, for
$d$ larger than 2 the relative loss in precision scales like
$N^{(2-d)/(h+1)d}$. Finally, under some conditions we observe that there is a
value $s^*$ of the penalty coefficient, a free parameter used to fix the number
of clusters, which separates a fragmentation phase (for $s<s^*$) from a
coalescent one (for $s>s^*$) of the underlying hidden cluster structure. At
this precise point holds a self-similarity property which can be exploited by
the hierarchical strategy to actually locate its position. From this
observation, a strategy based on \AP can be defined to find out how many
clusters are present in a given dataset.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 17:43:35 GMT"
}
] | 2013-05-29T00:00:00 |
[
[
"Furtlehner",
"Cyril",
""
],
[
"Sebag",
"Michele",
""
],
[
"Zhang",
"Xiangliang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
}
] |
0910.1808
|
Chinh Hoang
|
Elaine M. Eschen, Chinh T. Hoang, Jeremy P. Spinrad, R. Sritharan
|
Finding a sun in building-free graphs
|
3 figures
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Deciding whether an arbitrary graph contains a sun was recently shown to be
NP-complete. We show that whether a building-free graph contains a sun can be
decided in O(min$\{m{n^3}, m^{1.5}n^2\}$) time and, if a sun exists, it can be
found in the same time bound. The class of building-free graphs contains many
interesting classes of perfect graphs such as Meyniel graphs which, in turn,
contains classes such as hhd-free graphs, i-triangulated graphs, and parity
graphs. Moreover, there are imperfect graphs that are building-free. The class
of building-free graphs generalizes several classes of graphs for which an
efficient test for the presence of a sun is known. We also present a vertex
elimination scheme for the class of (building, gem)-free graphs. The class of
(building, gem)-free graphs is a generalization of the class of distance
hereditary graphs and a restriction of the class of (building, sun)-free
graphs.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 18:11:18 GMT"
}
] | 2009-10-12T00:00:00 |
[
[
"Eschen",
"Elaine M.",
""
],
[
"Hoang",
"Chinh T.",
""
],
[
"Spinrad",
"Jeremy P.",
""
],
[
"Sritharan",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.1838
|
N Vunka Jungum
|
Manoj Kumar Singh
|
Password Based a Generalize Robust Security System Design Using Neural
Network
|
International Journal of Computer Science Issues, IJCSI, Volume 4,
Issue 2, pp1-9, September 2009
|
M.K Singh, "Password Based A Generalize Robust Security System
Design Using Neural Network", International Journal of Computer Science
Issues, IJCSI, Volume 4, Issue 2, pp1-9, September 2009
| null | null |
cs.CR cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Among the various means of available resource protection including
biometrics, password based system is most simple, user friendly, cost effective
and commonly used. But this method having high sensitivity with attacks. Most
of the advanced methods for authentication based on password encrypt the
contents of password before storing or transmitting in physical domain. But all
conventional cryptographic based encryption methods are having its own
limitations, generally either in terms of complexity or in terms of efficiency.
Multi-application usability of password today forcing users to have a proper
memory aids. Which itself degrades the level of security. In this paper a
method to exploit the artificial neural network to develop the more secure
means of authentication, which is more efficient in providing the
authentication, at the same time simple in design, has given. Apart from
protection, a step toward perfect security has taken by adding the feature of
intruder detection along with the protection system. This is possible by
analysis of several logical parameters associated with the user activities. A
new method of designing the security system centrally based on neural network
with intrusion detection capability to handles the challenges available with
present solutions, for any kind of resource has presented.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 20:01:36 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Singh",
"Manoj Kumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0910.1844
|
N Vunka Jungum
|
Pascal Fallavollita
|
3D/2D Registration of Mapping Catheter Images for Arrhythmia
Interventional Assistance
|
International Journal of Computer Science Issues, IJCSI, Volume 4,
Issue 2, pp10-19, September 2009
|
P. Fallavollita, " 3D/2D Registration of Mapping Catheter Images
for Arrhythmia Interventional Assistance", International Journal of Computer
Science Issues, IJCSI, Volume 4, Issue 2, pp10-19, September 2009"
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Radiofrequency (RF) catheter ablation has transformed treatment for
tachyarrhythmias and has become first-line therapy for some tachycardias. The
precise localization of the arrhythmogenic site and the positioning of the RF
catheter over that site are problematic: they can impair the efficiency of the
procedure and are time consuming (several hours). Electroanatomic mapping
technologies are available that enable the display of the cardiac chambers and
the relative position of ablation lesions. However, these are expensive and use
custom-made catheters. The proposed methodology makes use of standard catheters
and inexpensive technology in order to create a 3D volume of the heart chamber
affected by the arrhythmia. Further, we propose a novel method that uses a
priori 3D information of the mapping catheter in order to estimate the 3D
locations of multiple electrodes across single view C-arm images. The monoplane
algorithm is tested for feasibility on computer simulations and initial canine
data.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 20:07:11 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Fallavollita",
"Pascal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0910.1845
|
N Vunka Jungum
|
Mandhapati P. Raju
|
Parallel Computation of Finite Element Navier-Stokes codes using MUMPS
Solver
|
"International Journal of Computer Science Issues, IJCSI, Volume 4,
Issue 2, pp20-24, September 2009"
|
M. P. Raju," Parallel Computation of Finite Element Navier-Stokes
codes using MUMPS Solver",International Journal of Computer Science Issues,
IJCSI, Volume 4, Issue 2, pp20-24, September 2009"
| null | null |
cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The study deals with the parallelization of 2D and 3D finite element based
Navier-Stokes codes using direct solvers. Development of sparse direct solvers
using multifrontal solvers has significantly reduced the computational time of
direct solution methods. Although limited by its stringent memory requirements,
multifrontal solvers can be computationally efficient. First the performance of
MUltifrontal Massively Parallel Solver (MUMPS) is evaluated for both 2D and 3D
codes in terms of memory requirements and CPU times. The scalability of both
Newton and modified Newton algorithms is tested.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 20:11:36 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Raju",
"Mandhapati P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0910.1849
|
N Vunka Jungum
|
Sanjay Silakari, Mahesh Motwani and Manish Maheshwari
|
Color Image Clustering using Block Truncation Algorithm
|
" International Journal of Computer Science Issues, IJCSI, Volume 4,
Issue 2, pp31-35, September 2009"
|
S. Silakari, M. Motwani and M. Maheshwari," Color Image Clustering
using Block Truncation Algorithm", International Journal of Computer Science
Issues, IJCSI, Volume 4, Issue 2, pp31-35, September 2009
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the advancement in image capturing device, the image data been generated
at high volume. If images are analyzed properly, they can reveal useful
information to the human users. Content based image retrieval address the
problem of retrieving images relevant to the user needs from image databases on
the basis of low-level visual features that can be derived from the images.
Grouping images into meaningful categories to reveal useful information is a
challenging and important problem. Clustering is a data mining technique to
group a set of unsupervised data based on the conceptual clustering principal:
maximizing the intraclass similarity and minimizing the interclass similarity.
Proposed framework focuses on color as feature. Color Moment and Block
Truncation Coding (BTC) are used to extract features for image dataset.
Experimental study using K-Means clustering algorithm is conducted to group the
image dataset into various clusters.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 20:21:23 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Silakari",
"Sanjay",
""
],
[
"Motwani",
"Mahesh",
""
],
[
"Maheshwari",
"Manish",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0910.1852
|
N Vunka Jungum
|
Mohammad Ali Jabraeil Jamali and Ahmad Khademzadeh
|
DAMQ-Based Schemes for Efficiently Using the Buffer Spaces of a NoC
Router
|
" International Journal of Computer Science Issues, IJCSI, Volume 4,
Issue 2, pp36-41, September 2009"
|
M. A. J. Jamali and A. Khademzadeh, " DAMQ-Based Schemes for
Efficiently Using the Buffer Spaces of a NoC Router", International Journal
of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp36-41, September 2009
| null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present high performance dynamically allocated multi-queue
(DAMQ) buffer schemes for fault tolerance systems on chip applications that
require an interconnection network. Two or four virtual channels shared the
same buffer space. On the message switching layer, we make improvement to boost
system performance when there are faults involved in the components
communication. The proposed schemes are when a node or a physical channel is
deemed as faulty, the previous hop node will terminate the buffer occupancy of
messages destined to the failed link. The buffer usage decisions are made at
switching layer without interactions with higher abstract layer, thus buffer
space will be released to messages destined to other healthy nodes quickly.
Therefore, the buffer space will be efficiently used in case fault occurs at
some nodes.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 20:24:57 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Jamali",
"Mohammad Ali Jabraeil",
""
],
[
"Khademzadeh",
"Ahmad",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0910.1857
|
N Vunka Jungum
|
Ahmad Shukri Mohd Noor and Md Yazid Md Saman
|
Distributed Object Medical Imaging Model
|
" International Journal of Computer Science Issues, IJCSI, Volume 4,
Issue 2, pp42-48, September 2009"
|
A.S.M. Noor and Y.Saman, "Distributed Object Medical Imaging
Model", International Journal of Computer Science Issues, IJCSI, Volume 4,
Issue 2, pp42-48, September 2009
| null | null |
cs.SE cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Digital medical informatics and images are commonly used in hospitals today,.
Because of the interrelatedness of the radiology department and other
departments, especially the intensive care unit and emergency department, the
transmission and sharing of medical images has become a critical issue. Our
research group has developed a Java-based Distributed Object Medical Imaging
Model(DOMIM) to facilitate the rapid development and deployment of medical
imaging applications in a distributed environment that can be shared and used
by related departments and mobile physiciansDOMIM is a unique suite of
multimedia telemedicine applications developed for the use by medical related
organizations. The applications support realtime patients' data, image files,
audio and video diagnosis annotation exchanges. The DOMIM enables joint
collaboration between radiologists and physicians while they are at distant
geographical locations. The DOMIM environment consists of heterogeneous,
autonomous, and legacy resources. The Common Object Request Broker Architecture
(CORBA), Java Database Connectivity (JDBC), and Java language provide the
capability to combine the DOMIM resources into an integrated, interoperable,
and scalable system. The underneath technology, including IDL ORB, Event
Service, IIOP JDBC/ODBC, legacy system wrapping and Java implementation are
explored. This paper explores a distributed collaborative CORBA/JDBC based
framework that will enhance medical information management requirements and
development. It encompasses a new paradigm for the delivery of health services
that requires process reengineering, cultural changes, as well as
organizational changes
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 20:42:48 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Noor",
"Ahmad Shukri Mohd",
""
],
[
"Saman",
"Md Yazid Md",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0910.1862
|
Alexander A. Sherstov
|
Alexander A. Sherstov
|
The intersection of two halfspaces has high threshold degree
|
Full version of the FOCS'09 paper
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The threshold degree of a Boolean function f:{0,1}^n->{-1,+1} is the least
degree of a real polynomial p such that f(x)=sgn p(x). We construct two
halfspaces on {0,1}^n whose intersection has threshold degree Theta(sqrt n), an
exponential improvement on previous lower bounds. This solves an open problem
due to Klivans (2002) and rules out the use of perceptron-based techniques for
PAC learning the intersection of two halfspaces, a central unresolved challenge
in computational learning. We also prove that the intersection of two majority
functions has threshold degree Omega(log n), which is tight and settles a
conjecture of O'Donnell and Servedio (2003).
Our proof consists of two parts. First, we show that for any nonconstant
Boolean functions f and g, the intersection f(x)^g(y) has threshold degree O(d)
if and only if ||f-F||_infty + ||g-G||_infty < 1 for some rational functions F,
G of degree O(d). Second, we settle the least degree required for approximating
a halfspace and a majority function to any given accuracy by rational
functions.
Our technique further allows us to make progress on Aaronson's challenge
(2008) and contribute strong direct product theorems for polynomial
representations of composed Boolean functions of the form F(f_1,...,f_n). In
particular, we give an improved lower bound on the approximate degree of the
AND-OR tree.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 16:14:48 GMT"
}
] | 2016-09-08T00:00:00 |
[
[
"Sherstov",
"Alexander A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.1863
|
Ender Ayanoglu
|
Ender Ayanoglu, Erik G. Larsson, Eleftherios Karipidis
|
Computational Complexity of Decoding Orthogonal Space-Time Block Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The computational complexity of optimum decoding for an orthogonal space-time
block code G satisfying the orthogonality property that the Hermitian transpose
of G multiplied by G is equal to a constant c times the sum of the squared
symbols of the code times an identity matrix, where c is a positive integer is
quantified. Four equivalent techniques of optimum decoding which have the same
computational complexity are specified. Modifications to the basic formulation
in special cases are calculated and illustrated by means of examples. This
paper corrects and extends [1],[2], and unifies them with the results from the
literature. In addition, a number of results from the literature are extended
to the case c > 1.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 21:20:24 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Ayanoglu",
"Ender",
""
],
[
"Larsson",
"Erik G.",
""
],
[
"Karipidis",
"Eleftherios",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1865
|
N Vunka Jungum
|
Yee Ming Chen and Bo-Yuan Wang
|
Towards Participatory Design of Multi-agent Approach to Transport
Demands
|
"International Journal of Computer Science Issues, IJCSI, Volume 4,
Issue 1, pp10-15, September 2009"
|
Y. M. Chen and B. Wang, "Towards Participatory Design of
Multi-agent Approach to Transport Demands ", International Journal of
Computer Science Issues, IJCSI, Volume 4, Issue 1, pp10-15, September 2009
| null | null |
cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The design of multi-agent based simulations (MABS) is up to now mainly done
in laboratories and based on designers' understanding of the activities to be
simulated. Domain experts have little chance to directly validate agent
behaviors. To fill this gap, we are investigating participatory methods of
design, which allow users to participate in the design the pickup and delivery
problem (PDP) in the taxi planning problem. In this paper, we present a
participatory process for designing new socio-technical architectures to afford
the taxi dispatch for this transportation system. The proposed dispatch
architecture attempts to increase passenger satisfaction more globally, by
concurrently dispatching multiple taxis to the same number of passengers in the
same geographical region, and vis-avis human driver and dispatcher
satisfaction.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 21:27:36 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Chen",
"Yee Ming",
""
],
[
"Wang",
"Bo-Yuan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.