id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0910.1868
N Vunka Jungum
Vishal Goyal and Gurpreet Singh Lehal
Evaluation of Hindi to Punjabi Machine Translation System
"International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 1, pp36-39, September 2009"
V.Goyal and G. Singh Lehal, "Evaluation of Hindi to Punjabi Machine Translation System", International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 1, pp36-39, September 2009
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Machine Translation in India is relatively young. The earliest efforts date from the late 80s and early 90s. The success of every system is judged from its evaluation experimental results. Number of machine translation systems has been started for development but to the best of author knowledge, no high quality system has been completed which can be used in real applications. Recently, Punjabi University, Patiala, India has developed Punjabi to Hindi Machine translation system with high accuracy of about 92%. Both the systems i.e. system under question and developed system are between same closely related languages. Thus, this paper presents the evaluation results of Hindi to Punjabi machine translation system. It makes sense to use same evaluation criteria as that of Punjabi to Hindi Punjabi Machine Translation System. After evaluation, the accuracy of the system is found to be about 95%.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 21:40:26 GMT" } ]
2009-10-13T00:00:00
[ [ "Goyal", "Vishal", "" ], [ "Lehal", "Gurpreet Singh", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0910.1869
N Vunka Jungum
Ravita Chahar, Komal Hooda and Annu Dhankhar
Management Of Volatile Information In Incremental Web Crawler
Paper has been withdrawn
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Paper has been withdrawn.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 21:42:58 GMT" }, { "version": "v2", "created": "Tue, 27 Oct 2009 07:09:51 GMT" } ]
2009-10-27T00:00:00
[ [ "Chahar", "Ravita", "" ], [ "Hooda", "Komal", "" ], [ "Dhankhar", "Annu", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0910.1871
Mustafa Cenk Gursoy
Mustafa Cenk Gursoy
MIMO Wireless Communications under Statistical Queueing Constraints
A shorter version is presented at the 2009 Allerton Conference
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The performance of multiple-input multiple-output wireless systems is investigated in the presence of statistical queueing constraints. Queuing constraints are imposed as limitations on buffer violation probabilities. The performance under such constraints is captured through the effective capacity formulation. A detailed analysis of the effective capacity is carried out in the low-power, wideband, and high--signal-to-noise ratio (SNR) regimes. In the low-power analysis, expressions for the first and second derivatives of the effective capacity with respect to SNR at SNR= 0 are obtained under various assumptions on the degree of channel state information at the transmitter. Transmission strategies that are optimal in the sense of achieving the first and second derivatives are identified. It is shown that while the first derivative does not get affected by the presence of queueing constraints, the second derivative gets smaller as the constraints become more stringent. Through the energy efficiency analysis, this is shown to imply that the minimum bit energy requirements do not change with more strict limitations but the wideband slope diminishes. Similar results are obtained in the wideband regime if rich multipath fading is being experienced. On the other hand, sparse multipath fading with bounded number of degrees of freedom is shown to increase the minimum bit energy requirements in the presence of queueing constraints. Following the low-SNR study, the impact of buffer limitations on the high-SNR performance is quantified by analyzing the high-SNR slope and the power offset in Rayleigh fading channels. Finally, numerical results are provided to illustrate the theoretical findings.
[ { "version": "v1", "created": "Fri, 9 Oct 2009 22:02:37 GMT" } ]
2009-10-13T00:00:00
[ [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1879
David Gross
David Gross
Recovering low-rank matrices from few coefficients in any basis
See also arxiv:0909.3304. v1=v2. v3: Some bounds substantially improved. v4, v5: presentation improved. To appear in IEEE Transactions on Information Theory
IEEE Trans. on Information Theory, vol. 57, pages 1548 - 1566 (2011)
10.1109/TIT.2011.2104999
null
cs.IT cs.NA math.IT math.NA quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present novel techniques for analyzing the problem of low-rank matrix recovery. The methods are both considerably simpler and more general than previous approaches. It is shown that an unknown (n x n) matrix of rank r can be efficiently reconstructed from only O(n r nu log^2 n) randomly sampled expansion coefficients with respect to any given matrix basis. The number nu quantifies the "degree of incoherence" between the unknown matrix and the basis. Existing work concentrated mostly on the problem of "matrix completion" where one aims to recover a low-rank matrix from randomly selected matrix elements. Our result covers this situation as a special case. The proof consists of a series of relatively elementary steps, which stands in contrast to the highly involved methods previously employed to obtain comparable results. In cases where bounds had been known before, our estimates are slightly tighter. We discuss operator bases which are incoherent to all low-rank matrices simultaneously. For these bases, we show that O(n r nu log n) randomly sampled expansion coefficients suffice to recover any low-rank matrix with high probability. The latter bound is tight up to multiplicative constants.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 19:56:24 GMT" }, { "version": "v2", "created": "Mon, 12 Oct 2009 21:34:41 GMT" }, { "version": "v3", "created": "Thu, 29 Oct 2009 20:08:36 GMT" }, { "version": "v4", "created": "Wed, 16 Dec 2009 20:40:51 GMT" }, { "version": "v5", "created": "Fri, 17 Sep 2010 14:40:19 GMT" } ]
2011-03-22T00:00:00
[ [ "Gross", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0910.1901
Christian Attiogbe
Christian Attiogbe (LINA)
Can Component/Service-Based Systems Be Proved Correct?
16 pages
Conference on Current Trends in Theory and Practice of Computer Science, Czech Republic, Spindleruv Ml\'yn, : Czech Republic (2009)
10.1007/978-3-540-95891-8_2
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Component-oriented and service-oriented approaches have gained a strong enthusiasm in industries and academia with a particular interest for service-oriented approaches. A component is a software entity with given functionalities, made available by a provider, and used to build other application within which it is integrated. The service concept and its use in web-based application development have a huge impact on reuse practices. Accordingly a considerable part of software architectures is influenced; these architectures are moving towards service-oriented architectures. Therefore applications (re)use services that are available elsewhere and many applications interact, without knowing each other, using services available via service servers and their published interfaces and functionalities. Industries propose, through various consortium, languages, technologies and standards. More academic works are also undertaken concerning semantics and formalisation of components and service-based systems. We consider here both streams of works in order to raise research concerns that will help in building quality software. Are there new challenging problems with respect to service-based software construction? Besides, what are the links and the advances compared to distributed systems?
[ { "version": "v1", "created": "Sat, 10 Oct 2009 06:33:39 GMT" } ]
2009-10-13T00:00:00
[ [ "Attiogbe", "Christian", "", "LINA" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0910.1922
Valentin Savin
Valentin Savin
Binary Linear-Time Erasure Decoding for Non-Binary LDPC codes
5 pages, ITW
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we first introduce the extended binary representation of non-binary codes, which corresponds to a covering graph of the bipartite graph associated with the non-binary code. Then we show that non-binary codewords correspond to binary codewords of the extended representation that further satisfy some simplex-constraint: that is, bits lying over the same symbol-node of the non-binary graph must form a codeword of a simplex code. Applied to the binary erasure channel, this description leads to a binary erasure decoding algorithm of non-binary LDPC codes, whose complexity depends linearly on the cardinality of the alphabet. We also give insights into the structure of stopping sets for non-binary LDPC codes, and discuss several aspects related to upper-layer FEC applications.
[ { "version": "v1", "created": "Sat, 10 Oct 2009 14:41:46 GMT" } ]
2009-10-13T00:00:00
[ [ "Savin", "Valentin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.1923
David Bremner
David Bremner and Dan Chen
A Branch and Cut Algorithm for the Halfspace Depth Problem
null
null
null
null
cs.CG cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The concept of \emph{data depth} in non-parametric multivariate descriptive statistics is the generalization of the univariate rank method to multivariate data. \emph{Halfspace depth} is a measure of data depth. Given a set $S$ of points and a point $p$, the halfspace depth (or rank) of $p$ is defined as the minimum number of points of $S$ contained in any closed halfspace with $p$ on its boundary. Computing halfspace depth is NP-hard, and it is equivalent to the Maximum Feasible Subsystem problem. In this paper a mixed integer program is formulated with the big-$M$ method for the halfspace depth problem. We suggest a branch and cut algorithm for these integer programs. In this algorithm, Chinneck's heuristic algorithm is used to find an upper bound and a related technique based on sensitivity analysis is used for branching. Irreducible Infeasible Subsystem (IIS) hitting set cuts are applied. We also suggest a binary search algorithm which may be more numerically stable. The algorithms are implemented with the BCP framework from the \textbf{COIN-OR} project.
[ { "version": "v1", "created": "Sat, 10 Oct 2009 14:42:28 GMT" } ]
2009-10-13T00:00:00
[ [ "Bremner", "David", "" ], [ "Chen", "Dan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0910.1926
David Harvey
David Harvey
Faster algorithms for the square root and reciprocal of power series
6 pages, 1 figure, requires algorithm2e package
null
null
null
cs.SC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give new algorithms for the computation of square roots and reciprocals of power series in C[[x]]. If M(n) denotes the cost of multiplying polynomials of degree n, the square root to order n costs (1.333... + o(1)) M(n) and the reciprocal costs (1.444... + o(1)) M(n). These improve on the previous best results, respectively (1.8333... + o(1)) M(n) and (1.5 + o(1)) M(n).
[ { "version": "v1", "created": "Sat, 10 Oct 2009 15:41:04 GMT" } ]
2009-10-13T00:00:00
[ [ "Harvey", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.1938
Patricio Galeas
Patricio Galeas, Ralph Kretschmer and Bernd Freisleben
Information Retrieval via Truncated Hilbert-Space Expansions
12 pages, submitted to proceedings of ECIR-2010
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In addition to the frequency of terms in a document collection, the distribution of terms plays an important role in determining the relevance of documents. In this paper, a new approach for representing term positions in documents is presented. The approach allows an efficient evaluation of term-positional information at query evaluation time. Three applications are investigated: a function-based ranking optimization representing a user-defined document region, a query expansion technique based on overlapping the term distributions in the top-ranked documents, and cluster analysis of terms in documents. Experimental results demonstrate the effectiveness of the proposed approach.
[ { "version": "v1", "created": "Sat, 10 Oct 2009 19:26:13 GMT" } ]
2009-10-13T00:00:00
[ [ "Galeas", "Patricio", "" ], [ "Kretschmer", "Ralph", "" ], [ "Freisleben", "Bernd", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0910.1943
Sina Jafarpour
Robert Calderbank, Stephen Howard, Sina Jafarpour
Construction of a Large Class of Deterministic Sensing Matrices that Satisfy a Statistical Isometry Property
16 Pages, 2 figures, to appear in IEEE Journal of Selected Topics in Signal Processing, the special issue on Compressed Sensing
null
10.1109/JSTSP.2010.2043161
null
cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed Sensing aims to capture attributes of $k$-sparse signals using very few measurements. In the standard Compressed Sensing paradigm, the $\m\times \n$ measurement matrix $\A$ is required to act as a near isometry on the set of all $k$-sparse signals (Restricted Isometry Property or RIP). Although it is known that certain probabilistic processes generate $\m \times \n$ matrices that satisfy RIP with high probability, there is no practical algorithm for verifying whether a given sensing matrix $\A$ has this property, crucial for the feasibility of the standard recovery algorithms. In contrast this paper provides simple criteria that guarantee that a deterministic sensing matrix satisfying these criteria acts as a near isometry on an overwhelming majority of $k$-sparse signals; in particular, most such signals have a unique representation in the measurement domain. Probability still plays a critical role, but it enters the signal model rather than the construction of the sensing matrix. We require the columns of the sensing matrix to form a group under pointwise multiplication. The construction allows recovery methods for which the expected performance is sub-linear in $\n$, and only quadratic in $\m$; the focus on expected performance is more typical of mainstream signal processing than the worst-case analysis that prevails in standard Compressed Sensing. Our framework encompasses many families of deterministic sensing matrices, including those formed from discrete chirps, Delsarte-Goethals codes, and extended BCH codes.
[ { "version": "v1", "created": "Sat, 10 Oct 2009 20:39:44 GMT" } ]
2015-05-14T00:00:00
[ [ "Calderbank", "Robert", "" ], [ "Howard", "Stephen", "" ], [ "Jafarpour", "Sina", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0910.1954
Sahand Haji Ali Ahmad
Sahand Haji Ali Ahmad, Mingyan Liu
Multi-channel Opportunistic Access: A Case of Restless Bandits with Multiple Plays
8 pages, 0 figures, Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing, 2009
Proceedings of Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing, 2009
null
null
cs.IT cs.DM math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the following stochastic control problem that arises in opportunistic spectrum access: a system consists of n channels (Gilbert-Elliot channels)where the state (good or bad) of each channel evolves as independent and identically distributed Markov processes. A user can select exactly k channels to sense and access (based on the sensing result) in each time slot. A reward is obtained whenever the user senses and accesses a good channel. The objective is to design a channel selection policy that maximizes the expected discounted total reward accrued over a finite or infinite horizon. In our previous work we established the optimality of a greedy policy for the special case of k = 1 (i.e., single channel access) under the condition that the channel state transitions are positively correlated over time. In this paper we show under the same condition the greedy policy is optimal for the general case of k >= 1; the methodology introduced here is thus more general. This problem may be viewed as a special case of the restless bandit problem, with multiple plays. We discuss connections between the current problem and existing literature on this class of problems.
[ { "version": "v1", "created": "Sat, 10 Oct 2009 22:36:48 GMT" } ]
2009-10-13T00:00:00
[ [ "Ahmad", "Sahand Haji Ali", "" ], [ "Liu", "Mingyan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0910.1955
Ryszard Piasecki
R. Piasecki
Microstructure reconstruction using entropic descriptors
version accepted for publication in Proc. R. Soc. A
Proc. R. Soc. A 467 (2011) 806-820
10.1098/rspa.2010.0296
null
cond-mat.stat-mech cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A multi-scale approach to the inverse reconstruction of a pattern's microstructure is reported. Instead of a correlation function, a pair of entropic descriptors (EDs) is proposed for stochastic optimization method. The first of them measures a spatial inhomogeneity, for a binary pattern, or compositional one, for a greyscale image. The second one quantifies a spatial or compositional statistical complexity. The EDs reveal structural information that is dissimilar, at least in part, to that given by correlation functions at almost all of discrete length scales. The method is tested on a few digitized binary and greyscale images. In each of the cases, the persuasive reconstruction of the microstructure is found.
[ { "version": "v1", "created": "Sat, 10 Oct 2009 22:55:53 GMT" }, { "version": "v2", "created": "Wed, 21 Oct 2009 20:53:58 GMT" }, { "version": "v3", "created": "Tue, 24 Nov 2009 17:40:29 GMT" }, { "version": "v4", "created": "Fri, 11 Jun 2010 10:27:03 GMT" }, { "version": "v5", "created": "Thu, 26 Aug 2010 13:59:23 GMT" } ]
2011-02-16T00:00:00
[ [ "Piasecki", "R.", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0910.1969
Ajinkya Kale
Ajinkya Kale, Shaunak Vaidya, Ashish Joglekar
A Generalized Recursive Algorithm for Binary Multiplication based on Vedic Mathematics
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A generalized algorithm for multiplication is proposed through recursive application of the Nikhilam Sutra from Vedic Mathematics, operating in radix - 2 number system environment suitable for digital platforms. Statistical analysis has been carried out based on the number of recursions profile as a function of the smaller multiplicand. The proposed algorithm is efficient for smaller multiplicands as well, unlike most of the asymptotically fast algorithms. Further, a basic block schematic of Hardware Implementation of our algorithm is suggested to exploit parallelism and speed up the implementation of the algorithm in a multiprocessor environment.
[ { "version": "v1", "created": "Sun, 11 Oct 2009 04:57:22 GMT" } ]
2009-10-13T00:00:00
[ [ "Kale", "Ajinkya", "" ], [ "Vaidya", "Shaunak", "" ], [ "Joglekar", "Ashish", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.1974
Rajkumar Buyya
Rajkumar Buyya, Suraj Pandey, and Christian Vecchiola
Cloudbus Toolkit for Market-Oriented Cloud Computing
21 pages, 6 figures, 2 tables, Conference paper
Proceeding of the 1st International Conference on Cloud Computing (CloudCom 2009, Springer, Germany), Beijing, China, December 1-4, 2009
10.1007/978-3-642-10665-1_4
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This keynote paper: (1) presents the 21st century vision of computing and identifies various IT paradigms promising to deliver computing as a utility; (2) defines the architecture for creating market-oriented Clouds and computing atmosphere by leveraging technologies such as virtual machines; (3) provides thoughts on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain SLA-oriented resource allocation; (4) presents the work carried out as part of our new Cloud Computing initiative, called Cloudbus: (i) Aneka, a Platform as a Service software system containing SDK (Software Development Kit) for construction of Cloud applications and deployment on private or public Clouds, in addition to supporting market-oriented resource management; (ii) internetworking of Clouds for dynamic creation of federated computing environments for scaling of elastic applications; (iii) creation of 3rd party Cloud brokering services for building content delivery networks and e-Science applications and their deployment on capabilities of IaaS providers such as Amazon along with Grid mashups; (iv) CloudSim supporting modelling and simulation of Clouds for performance studies; (v) Energy Efficient Resource Allocation Mechanisms and Techniques for creation and management of Green Clouds; and (vi) pathways for future research.
[ { "version": "v1", "created": "Sun, 11 Oct 2009 06:26:29 GMT" } ]
2015-05-14T00:00:00
[ [ "Buyya", "Rajkumar", "" ], [ "Pandey", "Suraj", "" ], [ "Vecchiola", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0910.1979
Rajkumar Buyya
Christian Vecchiola, Suraj Pandey, and Rajkumar Buyya
High-Performance Cloud Computing: A View of Scientific Applications
13 pages, 9 figures, conference paper
Proceedings of the 10th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN 2009, IEEE CS Press, USA), Kaohsiung, Taiwan, December 14-16, 2009
10.1109/I-SPAN.2009.150
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scientific computing often requires the availability of a massive number of computers for performing large scale experiments. Traditionally, these needs have been addressed by using high-performance computing solutions and installed facilities such as clusters and super computers, which are difficult to setup, maintain, and operate. Cloud computing provides scientists with a completely new model of utilizing the computing infrastructure. Compute resources, storage resources, as well as applications, can be dynamically provisioned (and integrated within the existing infrastructure) on a pay per use basis. These resources can be released when they are no more needed. Such services are often offered within the context of a Service Level Agreement (SLA), which ensure the desired Quality of Service (QoS). Aneka, an enterprise Cloud computing solution, harnesses the power of compute resources by relying on private and public Clouds and delivers to users the desired QoS. Its flexible and service based infrastructure supports multiple programming paradigms that make Aneka address a variety of different scenarios: from finance applications to computational science. As examples of scientific computing in the Cloud, we present a preliminary case study on using Aneka for the classification of gene expression data and the execution of fMRI brain imaging workflow.
[ { "version": "v1", "created": "Sun, 11 Oct 2009 07:42:44 GMT" } ]
2016-11-15T00:00:00
[ [ "Vecchiola", "Christian", "" ], [ "Pandey", "Suraj", "" ], [ "Buyya", "Rajkumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0910.2004
Christian Schulz
Manuel Holtgrewe, Peter Sanders, Christian Schulz
Engineering a Scalable High Quality Graph Partitioner
null
null
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an approach to parallel graph partitioning that scales to hundreds of processors and produces a high solution quality. For example, for many instances from Walshaw's benchmark collection we improve the best known partitioning. We use the well known framework of multi-level graph partitioning. All components are implemented by scalable parallel algorithms. Quality improvements compared to previous systems are due to better prioritization of edges to be contracted, better approximation algorithms for identifying matchings, better local search heuristics, and perhaps most notably, a parallelization of the FM local search algorithm that works more locally than previous approaches.
[ { "version": "v1", "created": "Sun, 11 Oct 2009 14:36:07 GMT" }, { "version": "v2", "created": "Wed, 7 Apr 2010 14:35:26 GMT" } ]
2010-04-08T00:00:00
[ [ "Holtgrewe", "Manuel", "" ], [ "Sanders", "Peter", "" ], [ "Schulz", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.2005
Fan Zhang
Fan Zhang and Henry D. Pfister
Modulation Codes for Flash Memory Based on Load-Balancing Theory
This work was presented in the 47-th Allerton conference
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/publicdomain/
In this paper, we consider modulation codes for practical multilevel flash memory storage systems with cell levels. Instead of maximizing the lifetime of the device [Ajiang-isit07-01, Ajiang-isit07-02, Yaakobi_verdy_siegel_wolf_allerton08, Finucane_Liu_Mitzenmacher_aller08], we maximize the average amount of information stored per cell-level, which is defined as storage efficiency. Using this framework, we show that the worst-case criterion [Ajiang-isit07-01, Ajiang-isit07-02, Yaakobi_verdy_siegel_wolf_allerton08] and the average-case criterion [Finucane_Liu_Mitzenmacher_aller08] are two extreme cases of our objective function. A self-randomized modulation code is proposed which is asymptotically optimal, as, for an arbitrary input alphabet and i.i.d. input distribution. In practical flash memory systems, the number of cell-levels is only moderately large. So the asymptotic performance as may not tell the whole story. Using the tools from load-balancing theory, we analyze the storage efficiency of the self-randomized modulation code. The result shows that only a fraction of the cells are utilized when the number of cell-levels is only moderately large. We also propose a load-balancing modulation code, based on a phenomenon known as "the power of two random choices" [Mitzenmacher96thepower], to improve the storage efficiency of practical systems. Theoretical analysis and simulation results show that our load-balancing modulation codes can provide significant gain to practical flash memory storage systems. Though pseudo-random, our approach achieves the same load-balancing performance, for i.i.d. inputs, as a purely random approach based on the power of two random choices.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 18:41:32 GMT" } ]
2009-10-13T00:00:00
[ [ "Zhang", "Fan", "" ], [ "Pfister", "Henry D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2007
Zhang Shengli
Shengli Zhang, Soung-Chang Liew, Lu Lu, and Hui Wang
Interference with Symbol-misalignment
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the impact of interference asynchrony among different links in a wireless network. Without deliberate coordination and cooperation among the active links, there is a naturally occurring misalignment between the symbols of the targeted signal of a receiver and the symbols of the interfering signals. Interestingly, we show that the interference asynchrony can actually improve the BER performance, compared with the situation in which symbols of al signals ay aligned. In particular, we show that symbol misalignment can decrease the "effective interference power" and change the distribution of the interfering signals, in a way that results in lower BER. To ensure that symbol misalignment can be consistently attained, we propose two simple schemes that introduce time-varying symbol offsets to obtain an "average" performance of random symbol misalignment. Notably, our schemes do not change the simple receiver design structure; only the transmitters are modified in a minor way.
[ { "version": "v1", "created": "Sun, 11 Oct 2009 14:28:58 GMT" } ]
2009-10-13T00:00:00
[ [ "Zhang", "Shengli", "" ], [ "Liew", "Soung-Chang", "" ], [ "Lu", "Lu", "" ], [ "Wang", "Hui", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.2024
Assaf Naor
Jeff Cheeger, Bruce Kleiner, Assaf Naor
A $(\log n)^{\Omega(1)}$ integrality gap for the Sparsest Cut SDP
null
null
null
null
cs.DS math.FA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the Goemans-Linial semidefinite relaxation of the Sparsest Cut problem with general demands has integrality gap $(\log n)^{\Omega(1)}$. This is achieved by exhibiting $n$-point metric spaces of negative type whose $L_1$ distortion is $(\log n)^{\Omega(1)}$. Our result is based on quantitative bounds on the rate of degeneration of Lipschitz maps from the Heisenberg group to $L_1$ when restricted to cosets of the center.
[ { "version": "v1", "created": "Sun, 11 Oct 2009 17:39:05 GMT" }, { "version": "v2", "created": "Wed, 18 Nov 2009 20:09:45 GMT" } ]
2009-11-18T00:00:00
[ [ "Cheeger", "Jeff", "" ], [ "Kleiner", "Bruce", "" ], [ "Naor", "Assaf", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" } ]
0910.2026
Assaf Naor
Jeff Cheeger, Bruce Kleiner, Assaf Naor
Compression bounds for Lipschitz maps from the Heisenberg group to $L_1$
null
null
null
null
math.MG cs.DS math.DG math.FA math.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove a quantitative bi-Lipschitz nonembedding theorem for the Heisenberg group with its Carnot-Carath\'eodory metric and apply it to give a lower bound on the integrality gap of the Goemans-Linial semidefinite relaxation of the Sparsest Cut problem.
[ { "version": "v1", "created": "Sun, 11 Oct 2009 17:49:44 GMT" } ]
2009-10-13T00:00:00
[ [ "Cheeger", "Jeff", "" ], [ "Kleiner", "Bruce", "" ], [ "Naor", "Assaf", "" ] ]
[ { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.DG", "description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis", "span": "(Differential Geometry)" }, { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" }, { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" } ]
0910.2028
Rdv Ijcsis
Shahram Jamali, Morteza Analoui
Congestion Control in the Internet by Employing a Ratio dependent Plant Herbivore Carnivorous Model
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 175-181, September 2009, USA
null
ISSN 1947 5500
cs.NI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The demand for Internet based services has exploded over the last decade. Many organizations use the Internet and particularly the World Wide Web as their primary medium for communication and business. This phenomenal growth has dramatically increased the performance requirements for the Internet. To have a high performance Internet, a good congestion control system is essential for it. The current work proposes that the congestion control in the Internet can be inspired from the population control tactics of the nature. Toward this idea, each flow (W) in the network is viewed as a species whose population size is congestion window size of the flow. By this assumption, congestion control problem is redefined as population control of flow species. This paper defines a three trophic food chain analogy in congestion control area, and gives a ratio dependent model to control population size of W species within this plant herbivore carnivorous food chain. Simulation results show that this model achieves fair bandwidth allocation, high utilization and small queue size. It does not maintain any per flow state in routers and have few computational loads per packet, which makes it scalable.
[ { "version": "v1", "created": "Sun, 11 Oct 2009 18:49:00 GMT" } ]
2009-10-13T00:00:00
[ [ "Jamali", "Shahram", "" ], [ "Analoui", "Morteza", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.2029
Rdv Ijcsis
Roya Asadi, Norwati Mustapha, Nasir Sulaiman
A Framework For Intelligent Multi Agent System Based Neural Network Classification Model
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 168-174, September 2009, USA
null
ISSN 1947 5500
cs.NE cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
TIntelligent multi agent systems have great potentials to use in different purposes and research areas. One of the important issues to apply intelligent multi agent systems in real world and virtual environment is to develop a framework that support machine learning model to reflect the whole complexity of the real world. In this paper, we proposed a framework of intelligent agent based neural network classification model to solve the problem of gap between two applicable flows of intelligent multi agent technology and learning model from real environment. We consider the new Supervised Multilayers Feed Forward Neural Network (SMFFNN) model as an intelligent classification for learning model in the framework. The framework earns the information from the respective environment and its behavior can be recognized by the weights. Therefore, the SMFFNN model that lies in the framework will give more benefits in finding the suitable information and the real weights from the environment which result for better recognition. The framework is applicable to different domains successfully and for the potential case study, the clinical organization and its domain is considered for the proposed framework
[ { "version": "v1", "created": "Sun, 11 Oct 2009 19:02:42 GMT" } ]
2009-10-13T00:00:00
[ [ "Asadi", "Roya", "" ], [ "Mustapha", "Norwati", "" ], [ "Sulaiman", "Nasir", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0910.2034
Hugo Zanghi
Hugo Zanghi, Franck Picard, Vincent Miele, Christophe Ambroise
Strategies for online inference of model-based clustering in large and growing networks
Published in at http://dx.doi.org/10.1214/10-AOAS359 the Annals of Applied Statistics (http://www.imstat.org/aoas/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Statistics 2010, Vol. 4, No. 2, 687-714
10.1214/10-AOAS359
IMS-AOAS-AOAS359
stat.AP cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we adapt online estimation strategies to perform model-based clustering on large networks. Our work focuses on two algorithms, the first based on the SAEM algorithm, and the second on variational methods. These two strategies are compared with existing approaches on simulated and real data. We use the method to decipher the connexion structure of the political websphere during the US political campaign in 2008. We show that our online EM-based algorithms offer a good trade-off between precision and speed, when estimating parameters for mixture distributions in the context of random graphs.
[ { "version": "v1", "created": "Sun, 11 Oct 2009 19:36:16 GMT" }, { "version": "v2", "created": "Wed, 10 Nov 2010 09:02:00 GMT" } ]
2010-11-11T00:00:00
[ [ "Zanghi", "Hugo", "" ], [ "Picard", "Franck", "" ], [ "Miele", "Vincent", "" ], [ "Ambroise", "Christophe", "" ] ]
[ { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0910.2039
Keyan Zahedi
Keyan Zahedi, Nihat Ay and Ralf Der
Higher coordination with less control - A result of information maximization in the sensorimotor loop
null
null
null
null
cs.AI cs.IT cs.RO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work presents a novel learning method in the context of embodied artificial intelligence and self-organization, which has as few assumptions and restrictions as possible about the world and the underlying model. The learning rule is derived from the principle of maximizing the predictive information in the sensorimotor loop. It is evaluated on robot chains of varying length with individually controlled, non-communicating segments. The comparison of the results shows that maximizing the predictive information per wheel leads to a higher coordinated behavior of the physically connected robots compared to a maximization per robot. Another focus of this paper is the analysis of the effect of the robot chain length on the overall behavior of the robots. It will be shown that longer chains with less capable controllers outperform those of shorter length and more complex controllers. The reason is found and discussed in the information-geometric interpretation of the learning process.
[ { "version": "v1", "created": "Sun, 11 Oct 2009 20:06:04 GMT" }, { "version": "v2", "created": "Tue, 18 May 2010 12:00:44 GMT" } ]
2010-05-19T00:00:00
[ [ "Zahedi", "Keyan", "" ], [ "Ay", "Nihat", "" ], [ "Der", "Ralf", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2042
Martin Wainwright
Garvesh Raskutti, Martin J. Wainwright, and Bin Yu
Minimax rates of estimation for high-dimensional linear regression over $\ell_q$-balls
Presented in part at the Allerton Conference on Control, Communication and Computer, Monticello, IL, October 2009
null
null
null
math.ST cs.IT math.IT stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider the standard linear regression model $\y = \Xmat \betastar + w$, where $\y \in \real^\numobs$ is an observation vector, $\Xmat \in \real^{\numobs \times \pdim}$ is a design matrix, $\betastar \in \real^\pdim$ is the unknown regression vector, and $w \sim \mathcal{N}(0, \sigma^2 I)$ is additive Gaussian noise. This paper studies the minimax rates of convergence for estimation of $\betastar$ for $\ell_\rpar$-losses and in the $\ell_2$-prediction loss, assuming that $\betastar$ belongs to an $\ell_{\qpar}$-ball $\Ballq(\myrad)$ for some $\qpar \in [0,1]$. We show that under suitable regularity conditions on the design matrix $\Xmat$, the minimax error in $\ell_2$-loss and $\ell_2$-prediction loss scales as $\Rq \big(\frac{\log \pdim}{n}\big)^{1-\frac{\qpar}{2}}$. In addition, we provide lower bounds on minimax risks in $\ell_{\rpar}$-norms, for all $\rpar \in [1, +\infty], \rpar \neq \qpar$. Our proofs of the lower bounds are information-theoretic in nature, based on Fano's inequality and results on the metric entropy of the balls $\Ballq(\myrad)$, whereas our proofs of the upper bounds are direct and constructive, involving direct analysis of least-squares over $\ell_{\qpar}$-balls. For the special case $q = 0$, a comparison with $\ell_2$-risks achieved by computationally efficient $\ell_1$-relaxations reveals that although such methods can achieve the minimax rates up to constant factors, they require slightly stronger assumptions on the design matrix $\Xmat$ than algorithms involving least-squares over the $\ell_0$-ball.
[ { "version": "v1", "created": "Sun, 11 Oct 2009 20:38:57 GMT" } ]
2010-09-14T00:00:00
[ [ "Raskutti", "Garvesh", "" ], [ "Wainwright", "Martin J.", "" ], [ "Yu", "Bin", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0910.2044
Oleg Mokhov
O.I.Mokhov
Consistency on cubic lattices for determinants of arbitrary orders
null
Proceedings of the Steklov Institute of Mathematics, 2009, Vol. 266, pp. 195-209
null
null
nlin.SI cs.CG cs.DM math-ph math.DS math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a special class of two-dimensional discrete equations defined by relations on elementary NxN squares, N>2, of the square lattice Z^2, and propose a new type of consistency conditions on cubic lattices for such discrete equations that is connected to bending elementary NxN squares, N>2, in the cubic lattice Z^3. For an arbitrary N we prove such consistency on cubic lattices for two-dimensional discrete equations defined by the condition that the determinants of values of the field at the points of the square lattice Z^2 that are contained in elementary NxN squares vanish.
[ { "version": "v1", "created": "Sun, 11 Oct 2009 20:51:37 GMT" } ]
2009-10-13T00:00:00
[ [ "Mokhov", "O. I.", "" ] ]
[ { "class": "Physics", "code": "nlin.SI", "description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems", "span": "(Exactly Solvable and Integrable Systems)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
0910.2048
Grenville Croll
Raymond J. Butler
The Role of Spreadsheets in the Allied Irish Bank / Allfirst Currency Trading Fraud
4 Pages. To Appear Proc. European Spreadsheet Risks Interest Group
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This brief paper outlines how spreadsheets were used as one of the vehicles for John Rusnak's fraud and the revenue control lessons this case gives us.
[ { "version": "v1", "created": "Sun, 11 Oct 2009 20:58:55 GMT" } ]
2009-10-13T00:00:00
[ [ "Butler", "Raymond J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0910.2058
Christopher Laumann
C.R. Laumann, A.M. L\"auchli, R. Moessner, A. Scardicchio and S.L. Sondhi
On product, generic and random generic quantum satisfiability
9 pages, 5 figures, 1 table. Updated to more closely match published version. New proof in appendix
Phys. Rev. A 81, 062345 (2010)
10.1103/PhysRevA.81.062345
null
quant-ph cond-mat.stat-mech cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report a cluster of results on k-QSAT, the problem of quantum satisfiability for k-qubit projectors which generalizes classical satisfiability with k-bit clauses to the quantum setting. First we define the NP-complete problem of product satisfiability and give a geometrical criterion for deciding when a QSAT interaction graph is product satisfiable with positive probability. We show that the same criterion suffices to establish quantum satisfiability for all projectors. Second, we apply these results to the random graph ensemble with generic projectors and obtain improved lower bounds on the location of the SAT--unSAT transition. Third, we present numerical results on random, generic satisfiability which provide estimates for the location of the transition for k=3 and k=4 and mild evidence for the existence of a phase which is satisfiable by entangled states alone.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 15:12:52 GMT" }, { "version": "v2", "created": "Thu, 1 Jul 2010 16:20:32 GMT" } ]
2010-07-02T00:00:00
[ [ "Laumann", "C. R.", "" ], [ "Läuchli", "A. M.", "" ], [ "Moessner", "R.", "" ], [ "Scardicchio", "A.", "" ], [ "Sondhi", "S. L.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.2065
Keqin Liu
Keqin Liu and Qing Zhao
Distributed Learning in Multi-Armed Bandit with Multiple Players
31 pages, 8 figures, revised paper submitted to IEEE Transactions on Signal Processing, April, 2010, the pre-agreement in the decentralized TDFS policy is eliminated to achieve a complete decentralization among players
null
10.1109/TSP.2010.2062509
null
math.OC cs.LG math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We formulate and study a decentralized multi-armed bandit (MAB) problem. There are M distributed players competing for N independent arms. Each arm, when played, offers i.i.d. reward according to a distribution with an unknown parameter. At each time, each player chooses one arm to play without exchanging observations or any information with other players. Players choosing the same arm collide, and, depending on the collision model, either no one receives reward or the colliding players share the reward in an arbitrary way. We show that the minimum system regret of the decentralized MAB grows with time at the same logarithmic order as in the centralized counterpart where players act collectively as a single entity by exchanging observations and making decisions jointly. A decentralized policy is constructed to achieve this optimal order while ensuring fairness among players and without assuming any pre-agreement or information exchange among players. Based on a Time Division Fair Sharing (TDFS) of the M best arms, the proposed policy is constructed and its order optimality is proven under a general reward model. Furthermore, the basic structure of the TDFS policy can be used with any order-optimal single-player policy to achieve order optimality in the decentralized setting. We also establish a lower bound on the system regret growth rate for a general class of decentralized polices, to which the proposed policy belongs. This problem finds potential applications in cognitive radio networks, multi-channel communication systems, multi-agent systems, web search and advertising, and social networks.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 00:50:19 GMT" }, { "version": "v2", "created": "Sat, 19 Dec 2009 17:26:06 GMT" }, { "version": "v3", "created": "Mon, 7 Jun 2010 18:04:14 GMT" } ]
2015-05-14T00:00:00
[ [ "Liu", "Keqin", "" ], [ "Zhao", "Qing", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0910.2066
Philip Baback Alipour
Philip B. Alipour
A Lossless Fuzzy Binary AND/OR Compressor
LaTeX format, 44 pages, 8 images, 2 tables. Minor modifications were made (pp. 28, 30-33, 37-40); no major content revision. We discussed the theoretical approach to feasible conjectures in pattern matching and logic on a new data compression model. We hypothesized a greater plausibility on data compression and compaction methods relative to data decompression techniques
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this report, a new fuzzy 2bit-AND parallel-to-OR, or simply, a fuzzy binary AND/OR (FBAR) text data compression model as an algorithm is suggested for bettering spatial locality limits on nodes during database transactions. The current model incorporates a four-layer application technique: string-to-AND/OR pairwise binary bit + fuzzy quantum with noise conversions. This technique promotes a lossless data compression ratio of 2:1 up to values approximately = 3:1, generating a spatially-efficient compressed data file compared to nowadays data compressors. Data decompression/specific data reconstruction initiates an AND/OR pattern match technique in respect of fuzzy quantum indicators in the binary function field. The reconstruction of data occurs in the 4th layer using encryption methods. It is hypothesized that significant data compression ratio of 2n:1 for n>3:1 ratios, e.g., 32~64:1 are achievable via fuzzy qubit indexing over classical byte blocks for every bit position fragmented into a (1/2 upper +1/2 lower)-bit noise frequency parallel to its counterpart signal comprised of AND/ORed-bit polarity orientation, ready for an identical data decompression.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 19:52:53 GMT" }, { "version": "v2", "created": "Wed, 14 Oct 2009 17:27:11 GMT" } ]
2015-03-13T00:00:00
[ [ "Alipour", "Philip B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2099
Dillon Mayhew
Thomas Britz, B{\aa}rd Heiseldel, Trygve Johnsen, Dillon Mayhew, Keisuke Shiromoto
Generalizations of Wei's Duality Theorem
10 pages, 1 figure
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wei's celebrated Duality Theorem is generalized in several ways, expressed as duality theorems for linear codes over division rings and, more generally, duality theorems for matroids. These results are further generalized, resulting in two Wei-type duality theorems for new combinatorial structures that are introduced and named {\em demi-matroids}. These generalize matroids and are the appropriate combinatorial objects for describing the duality in Wei's Duality Theorem. A new proof of the Duality Theorem is thereby given that explains the theorem in combinatorial terms. Special cases of the general duality theorems are also given, including duality theorems for cycles and bonds in graphs and for transversals.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 08:08:28 GMT" } ]
2009-10-13T00:00:00
[ [ "Britz", "Thomas", "" ], [ "Heiseldel", "Bård", "" ], [ "Johnsen", "Trygve", "" ], [ "Mayhew", "Dillon", "" ], [ "Shiromoto", "Keisuke", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2104
Guoqiang Zhang
Guoqiang Zhang
On cost-effective communication network designing
6 pages, 4 figures
Europhysics Letters(EPL), 89(2010) 38003
10.1209/0295-5075/89/38003
null
cs.NI physics.gen-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How to efficiently design a communication network is a paramount task for network designing and engineering. It is, however, not a single objective optimization process as perceived by most previous researches, i.e., to maximize its transmission capacity, but a multi-objective optimization process, with lowering its cost to be another important objective. These two objectives are often contradictive in that optimizing one objective may deteriorate the other. After a deep investigation of the impact that network topology, node capability scheme and routing algorithm as well as their interplays have on the two objectives, this letter presents a systematic approach to achieve a cost-effective design by carefully choosing the three designing aspects. Only when routing algorithm and node capability scheme are elegantly chosen can BA-like scale-free networks have the potential of achieving good tradeoff between the two objectives. Random networks, on the other hand, have the built-in character for a cost-effective design, especially when other aspects cannot be determined beforehand.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 08:34:43 GMT" }, { "version": "v2", "created": "Wed, 14 Apr 2010 02:57:26 GMT" } ]
2015-05-14T00:00:00
[ [ "Zhang", "Guoqiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.gen-ph", "description": "Description coming soon", "span": "(General Physics)" } ]
0910.2113
Abhimanu Kumar
Abhimanu Kumar, Sanjib Kumar Das
A real world network pricing game with less severe Braess' Paradox
12 pages, 4 figures
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Internet and graphs are very much related. The graphical structure of internet has been studied extensively to provide efficient solutions to routing and other problems. But most of these studies assume a central authority which controls and manages the internet. In the recent years game theoretic models have been proposed which do not require a central authority and the users are assumed to be routing their flows selfishly. The existence of Nash Equilibria, congestion and the amount of inefficiency caused by this selfish routing is a major concern in this field. A type of paradox in the selfish routing networks, Braess' Paradox, first discovered by Braess, is a major contributor to inefficiency. Several pricing mechanisms have also been provided which give a game theoretical model between users(consumers) and ISPs ({Internet Service Providers} or sellers) for the internet. We propose a novel pricing mechanism, based on real world Internet network architecture, which reduces the severity of Braess' Paradox in selfish routing game theoretic networks. It's a pricing mechanism between combinatorial users and ISPs. We prove that Nash equilibria exists in this network and provide bounds on inefficiency . We use graphical properties of internet to prove our result. Several interesting extensions and future work have also been discussed.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 09:34:27 GMT" } ]
2009-10-13T00:00:00
[ [ "Kumar", "Abhimanu", "" ], [ "Das", "Sanjib Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0910.2115
Pedro Peris-Lopez
Pedro Peris-Lopez, Julio C. Hernandez-Castro, J. M. E. Tapiador and Jan C. A. van der Lubbe
Security Flaws in a Recent Ultralightweight RFID Protocol
14 pages, 2 figures and 1 table
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 2006, Peris-Lopez et al. [1, 2, 3] initiated the design of ultralightweight RFID protocols -with the UMAP family of protocols- involving only simple bitwise logical or arithmetic operations such as bitwise XOR, OR, AND, and addition. This combination of operations was revealed later to be insufficient for security. Then, Chien et al. proposed the SASI protocol [4] with the aim of offering better security, by adding the bitwise rotation to the set of supported operations. The SASI protocol represented a milestone in the design of ultralightweight protocols, although certain attacks have been published against this scheme [5, 6, 7]. In 2008, a new protocol, named Gossamer [8], was proposed that can be considered a further development of both the UMAP family and SASI. Although no attacks have been published against Gossamer, Lee et al. [9] have recently published an alternative scheme that is highly reminiscent of SASI. In this paper, we show that Lee et al.'s scheme fails short of many of its security objectives, being vulnerable to several important attacks like traceability, full disclosure, cloning and desynchronization.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 09:34:17 GMT" } ]
2009-10-13T00:00:00
[ [ "Peris-Lopez", "Pedro", "" ], [ "Hernandez-Castro", "Julio C.", "" ], [ "Tapiador", "J. M. E.", "" ], [ "van der Lubbe", "Jan C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0910.2140
Richard Clegg
Richard G. Clegg, Carla Di Cairano-Gilfedder, Shi Zhou
A critical look at power law modelling of the Internet
To appear Computer Communications
null
10.1016/j.comcom.2009.09.009
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper takes a critical look at the usefulness of power law models of the Internet. The twin focuses of the paper are Internet traffic and topology generation. The aim of the paper is twofold. Firstly it summarises the state of the art in power law modelling particularly giving attention to existing open research questions. Secondly it provides insight into the failings of such models and where progress needs to be made for power law research to feed through to actual improvements in network performance.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 11:58:21 GMT" } ]
2013-03-28T00:00:00
[ [ "Clegg", "Richard G.", "" ], [ "Di Cairano-Gilfedder", "Carla", "" ], [ "Zhou", "Shi", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.2153
Marine Minier
Marine Minier (CITI Insa Lyon / INRIA Grenoble Rh\^one-Alpes, INRIA Rocquencourt, EA 3720, CITI Insa Lyon / INRIA Grenoble Rh\^one-Alpes, CITI Insa Lyon / INRIA Grenoble Rh\^one-Alpes), Benjamin Pousse (XLIM)
Improving Integral Cryptanalysis against Rijndael with Large Blocks
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report presents new four-round integral properties against the Rijndael cipher with block sizes larger than 128 bits. Using higher-order multiset distinguishers and other well-known extensions of those properties, the deduced attacks reach up to 7 and 8 rounds of Rijndael variants with 160 up to 256-bit blocks. For example, a 7-rounds attack against Rijndael-224 has a time complexity equal to $2^{80}$.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 12:46:46 GMT" } ]
2009-10-13T00:00:00
[ [ "Minier", "Marine", "", "CITI Insa Lyon / INRIA Grenoble Rhône-Alpes, INRIA\n Rocquencourt, EA 3720, CITI Insa Lyon / INRIA Grenoble Rhône-Alpes, CITI\n Insa Lyon / INRIA Grenoble Rhône-Alpes" ], [ "Pousse", "Benjamin", "", "XLIM" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0910.2154
Jocelyne Troccaz
J. Tonetti (CHU-Grenoble ortho-traumato), L. Vadcard (LSE), P. Girard (IHPC), M. Dubois (LPS), P. Merloz (CHU-Grenoble ortho-traumato), Jocelyne Troccaz (TIMC)
Assessment of a percutaneous iliosacral screw insertion simulator
null
Orthop Traumatol Surg Res (2009) epub ahead of print
10.1016/j.otsr.2009.07.005
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
BACKGROUND: Navigational simulator use for specialized training purposes is rather uncommon in orthopaedic and trauma surgery. However, it reveals providing a valuable tool to train orthopaedic surgeons and help them to plan complex surgical procedures. PURPOSE: This work's objective was to assess educational efficiency of a path simulator under fluoroscopic guidance applied to sacroiliac joint percutaneous screw fixation. MATERIALS AND METHODS: We evaluated 23 surgeons' accuracy inserting a guide-wire in a human cadaver experiment, following a pre-established procedure. These medical trainees were defined in three prospective respects: novice or skilled; with or without theoretical knowledge; with or without surgical procedure familiarity. Analysed criteria for each tested surgeon included the number of intraoperative X-rays taken in order to achieve the surgical procedure as well as an iatrogenic index reflecting the surgeon's ability to detect any hazardous trajectory at the time of performing said procedure. RESULTS: An average number of 13 X-rays was required for wire implantation by the G1 group. G2 group, assisted by the simulator use, required an average of 10 X-rays. A substantial difference was especially observed within the novice sub-group (N), with an average of 12.75 X-rays for the G1 category and an average of 8.5 X-rays for the G2 category. As far as the iatrogenic index is concerned, we were unable to observe any significant difference between the groups.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 12:49:03 GMT" } ]
2009-10-13T00:00:00
[ [ "Tonetti", "J.", "", "CHU-Grenoble ortho-traumato" ], [ "Vadcard", "L.", "", "LSE" ], [ "Girard", "P.", "", "IHPC" ], [ "Dubois", "M.", "", "LPS" ], [ "Merloz", "P.", "", "CHU-Grenoble ortho-traumato" ], [ "Troccaz", "Jocelyne", "", "TIMC" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0910.2168
Han-Shin Jo
Han-Shin Jo, Cheol Mun, June Moon, and Jong-Gwan Yook
Self-optimized Coverage Coordination in Femtocell Networks
16 pages, 5 figures
IEEE Transactions on Wireless Communications, vol.9, no.10, pp.2977-2982, Oct. 2010
10.1109/TWC.2010.090210.081313
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a self-optimized coverage coordination scheme for two-tier femtocell networks, in which a femtocell base station adjusts the transmit power based on the statistics of the signal and the interference power that is measured at a femtocell downlink. Furthermore, an analytic expression is derived for the coverage leakage probability that a femtocell coverage area leaks into an outdoor macrocell. The coverage analysis is verified by simulation, which shows that the proposed scheme provides sufficient indoor femtocell coverage and that the femtocell coverage does not leak into an outdoor macrocell.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 19:43:23 GMT" }, { "version": "v2", "created": "Thu, 14 Oct 2010 18:29:03 GMT" } ]
2016-11-15T00:00:00
[ [ "Jo", "Han-Shin", "" ], [ "Mun", "Cheol", "" ], [ "Moon", "June", "" ], [ "Yook", "Jong-Gwan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.2173
Roua Youssef
Roua Youssef and Alexandre Graell i Amat
Distributed Turbo-Like Codes for Multi-User Cooperative Relay Networks
Submitted to ICC 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a distributed turbo-like coding scheme for wireless networks with relays is proposed. We consider a scenario where multiple sources communicate with a single destination with the help of a relay. The proposed scheme can be regarded as of the decode-and-forward type. The relay decodes the information from the sources and it properly combines and re-encodes them to generate some extra redundancy, which is transmitted to the destination. The amount of redundancy generated by the relay can simply be adjusted according to requirements in terms of performance, throughput and/or power. At the destination, decoding of the information of all sources is performed jointly exploiting the redundancy provided by the relay in an iterative fashion. The overall communication network can be viewed as a serially concatenated code. The proposed distributed scheme achieves significant performance gains with respect to the non-cooperation system, even for a very large number of users. Furthermore, it presents a high flexibility in terms of code rate, block length and number of users.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 14:50:50 GMT" } ]
2009-10-13T00:00:00
[ [ "Youssef", "Roua", "" ], [ "Amat", "Alexandre Graell i", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2187
Gunther Rei{\ss}ig
Gunther Rei{\ss}ig
Computing abstractions of nonlinear systems
This work has been accepted for publication in the IEEE Trans. Automatic Control. v3: minor modifications; accepted version
IEEE Trans. Automat. Control 56, no 11, Nov 2011, pp. 2583-2598
10.1109/TAC.2011.2118950
null
math.OC cs.SY math.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sufficiently accurate finite state models, also called symbolic models or discrete abstractions, allow one to apply fully automated methods, originally developed for purely discrete systems, to formally reason about continuous and hybrid systems, and to design finite state controllers that provably enforce predefined specifications. We present a novel algorithm to compute such finite state models for nonlinear discrete-time and sampled systems which depends on quantizing the state space using polyhedral cells, embedding these cells into suitable supersets whose attainable sets are convex, and over-approximating attainable sets by intersections of supporting half-spaces. We prove a novel recursive description of these half-spaces and propose an iterative procedure to compute them efficiently. We also provide new sufficient conditions for the convexity of attainable sets which imply the existence of the aforementioned embeddings of quantizer cells. Our method yields highly accurate abstractions and applies to nonlinear systems under mild assumptions, which reduce to sufficient smoothness in the case of sampled systems. Its practicability in the design of discrete controllers for nonlinear continuous plants under state and control constraints is demonstrated by an example.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 16:13:09 GMT" }, { "version": "v2", "created": "Wed, 1 Dec 2010 20:20:56 GMT" }, { "version": "v3", "created": "Tue, 15 Feb 2011 12:29:55 GMT" } ]
2011-11-03T00:00:00
[ [ "Reißig", "Gunther", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" } ]
0910.2217
Tshilidzi Marwala
Linda Mthembu, Tshilidzi Marwala, Michael I. Friswell, Sondipon Adhikari
Finite element model selection using Particle Swarm Optimization
Accepted for the Proceedings of the International Modal Analysis Conference 2010
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes the application of particle swarm optimization (PSO) to the problem of finite element model (FEM) selection. This problem arises when a choice of the best model for a system has to be made from set of competing models, each developed a priori from engineering judgment. PSO is a population-based stochastic search algorithm inspired by the behaviour of biological entities in nature when they are foraging for resources. Each potentially correct model is represented as a particle that exhibits both individualistic and group behaviour. Each particle moves within the model search space looking for the best solution by updating the parameters values that define it. The most important step in the particle swarm algorithm is the method of representing models which should take into account the number, location and variables of parameters to be updated. One example structural system is used to show the applicability of PSO in finding an optimal FEM. An optimal model is defined as the model that has the least number of updated parameters and has the smallest parameter variable variation from the mean material properties. Two different objective functions are used to compare performance of the PSO algorithm.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 19:10:58 GMT" } ]
2009-10-13T00:00:00
[ [ "Mthembu", "Linda", "" ], [ "Marwala", "Tshilidzi", "" ], [ "Friswell", "Michael I.", "" ], [ "Adhikari", "Sondipon", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.2221
Han-Shin Jo
Han-Shin Jo, Cheol Mun, June Moon, and Jong-Gwan Yook
Interference Mitigation Using Uplink Power Control for Two-Tier Femtocell Networks
13 pages, 5 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes two interference mitigation strategies that adjust the maximum transmit power of femtocell users to suppress the cross-tier interference at a macrocell base station (BS). The open-loop and the closed-loop control suppress the cross-tier interference less than a fixed threshold and an adaptive threshold based on the noise and interference (NI) level at the macrocell BS, respectively. Simulation results show that both schemes effectively compensate the uplink throughput degradation of the macrocell BS due to the cross-tier interference and that the closed-loop control provides better femtocell throughput than the open-loop control at a minimal cost of macrocell throughput.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 19:23:09 GMT" } ]
2009-10-13T00:00:00
[ [ "Jo", "Han-Shin", "" ], [ "Mun", "Cheol", "" ], [ "Moon", "June", "" ], [ "Yook", "Jong-Gwan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.2240
Zhu Han
Zhu Han, Rong Zheng, Vincent H. Poor
Repeated Auctions with Learning for Spectrum Access in Cognitive Radio Networks
This paper is presented in Allerton Conference on Communication, Control, and Computing 2009
null
null
null
cs.IT cs.LG math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmissions upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. In this paper, an efficient bidding learning algorithm is proposed based on the outcome of past transactions. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good balance between efficiency and fairness.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 20:16:16 GMT" } ]
2009-10-14T00:00:00
[ [ "Han", "Zhu", "" ], [ "Zheng", "Rong", "" ], [ "Poor", "Vincent H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0910.2245
Daniel Cullina
Daniel Cullina, Alexandros G. Dimakis, Tracey Ho
Searching for Minimum Storage Regenerating Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Regenerating codes allow distributed storage systems to recover from the loss of a storage node while transmitting the minimum possible amount of data across the network. We present a systematic computer search for optimal systematic regenerating codes. To search the space of potential codes, we reduce the potential search space in several ways. We impose an additional symmetry condition on codes that we consider. We specify codes in a simple alternative way, using additional recovered coefficients rather than transmission coefficients and place codes into equivalence classes to avoid redundant checking. Our main finding is a few optimal systematic minimum storage regenerating codes for $n=5$ and $k=3$, over several finite fields. No such codes were previously known and the matching of the information theoretic cut-set bound was an open problem.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 20:32:38 GMT" } ]
2009-10-14T00:00:00
[ [ "Cullina", "Daniel", "" ], [ "Dimakis", "Alexandros G.", "" ], [ "Ho", "Tracey", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2263
Shurui Huang
Shurui Huang, Aditya Ramamoorthy, Muriel Medard
Minimum cost mirror sites using network coding: Replication vs. coding at the source nodes
IEEE Trans. on Information Theory (to appear), 2010
null
10.1109/TIT.2010.2094890
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Content distribution over networks is often achieved by using mirror sites that hold copies of files or portions thereof to avoid congestion and delay issues arising from excessive demands to a single location. Accordingly, there are distributed storage solutions that divide the file into pieces and place copies of the pieces (replication) or coded versions of the pieces (coding) at multiple source nodes. We consider a network which uses network coding for multicasting the file. There is a set of source nodes that contains either subsets or coded versions of the pieces of the file. The cost of a given storage solution is defined as the sum of the storage cost and the cost of the flows required to support the multicast. Our interest is in finding the storage capacities and flows at minimum combined cost. We formulate the corresponding optimization problems by using the theory of information measures. In particular, we show that when there are two source nodes, there is no loss in considering subset sources. For three source nodes, we derive a tight upper bound on the cost gap between the coded and uncoded cases. We also present algorithms for determining the content of the source nodes.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 22:32:39 GMT" }, { "version": "v2", "created": "Mon, 27 Sep 2010 18:06:56 GMT" } ]
2016-11-15T00:00:00
[ [ "Huang", "Shurui", "" ], [ "Ramamoorthy", "Aditya", "" ], [ "Medard", "Muriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2271
Ali Sinop
Venkatesan Guruswami, Ali Kemal Sinop
Improved Inapproximability Results for Maximum k-Colorable Subgraph
16 pages, 2 figures
null
10.1007/978-3-642-03685-9_13
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the maximization version of the fundamental graph coloring problem. Here the goal is to color the vertices of a k-colorable graph with k colors so that a maximum fraction of edges are properly colored (i.e. their endpoints receive different colors). A random k-coloring properly colors an expected fraction 1-1/k of edges. We prove that given a graph promised to be k-colorable, it is NP-hard to find a k-coloring that properly colors more than a fraction ~1-O(1/k} of edges. Previously, only a hardness factor of 1-O(1/k^2) was known. Our result pins down the correct asymptotic dependence of the approximation factor on k. Along the way, we prove that approximating the Maximum 3-colorable subgraph problem within a factor greater than 32/33 is NP-hard. Using semidefinite programming, it is known that one can do better than a random coloring and properly color a fraction 1-1/k +2 ln k/k^2 of edges in polynomial time. We show that, assuming the 2-to-1 conjecture, it is hard to properly color (using k colors) more than a fraction 1-1/k + O(ln k/ k^2) of edges of a k-colorable graph.
[ { "version": "v1", "created": "Mon, 12 Oct 2009 23:49:08 GMT" }, { "version": "v2", "created": "Fri, 16 Oct 2009 21:22:15 GMT" }, { "version": "v3", "created": "Wed, 11 Nov 2009 22:34:46 GMT" } ]
2015-05-14T00:00:00
[ [ "Guruswami", "Venkatesan", "" ], [ "Sinop", "Ali Kemal", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.2276
Tshilidzi Marwala
Evan Hurwitz and Tshilidzi Marwala
State of the Art Review for Applying Computational Intelligence and Machine Learning Techniques to Portfolio Optimisation
9 pages
null
null
null
cs.CE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computational techniques have shown much promise in the field of Finance, owing to their ability to extract sense out of dauntingly complex systems. This paper reviews the most promising of these techniques, from traditional computational intelligence methods to their machine learning siblings, with particular view to their application in optimising the management of a portfolio of financial instruments. The current state of the art is assessed, and prospective further work is assessed and recommended
[ { "version": "v1", "created": "Tue, 13 Oct 2009 15:53:45 GMT" } ]
2009-10-14T00:00:00
[ [ "Hurwitz", "Evan", "" ], [ "Marwala", "Tshilidzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.2279
Chunhua Shen
Chunhua Shen, Junae Kim, Lei Wang, Anton van den Hengel
Positive Semidefinite Metric Learning with Boosting
11 pages, Twenty-Third Annual Conference on Neural Information Processing Systems (NIPS 2009), Vancouver, Canada
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The learning of appropriate distance metrics is a critical problem in image classification and retrieval. In this work, we propose a boosting-based technique, termed \BoostMetric, for learning a Mahalanobis distance metric. One of the primary difficulties in learning such a metric is to ensure that the Mahalanobis matrix remains positive semidefinite. Semidefinite programming is sometimes used to enforce this constraint, but does not scale well. \BoostMetric is instead based on a key observation that any positive semidefinite matrix can be decomposed into a linear positive combination of trace-one rank-one matrices. \BoostMetric thus uses rank-one positive semidefinite matrices as weak learners within an efficient and scalable boosting-based learning process. The resulting method is easy to implement, does not require tuning, and can accommodate various types of constraints. Experiments on various datasets show that the proposed algorithm compares favorably to those state-of-the-art methods in terms of classification accuracy and running time.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 00:54:31 GMT" } ]
2009-10-14T00:00:00
[ [ "Shen", "Chunhua", "" ], [ "Kim", "Junae", "" ], [ "Wang", "Lei", "" ], [ "Hengel", "Anton van den", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0910.2285
Guoqiang Zhang
Guoqing Zhang, Shi Zhou, Di Wang, Gang Yan, Guoqiang Zhang
Enhancing network transmission capacity by efficiently allocating node capability
9 pages, 2 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A network's transmission capacity is the maximal rate of traffic inflow that the network can handle without causing congestion. Here we study how to enhance this quantity by redistributing the capability of individual nodes while preserving the total sum of node capability. We propose a practical and effective node-capability allocation scheme which allocates a node's capability based on the local knowledge of the node's connectivity. We show the scheme enhances the transmission capacity by two orders of magnitude for networks with heterogenous structures.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 02:03:08 GMT" } ]
2009-10-14T00:00:00
[ [ "Zhang", "Guoqing", "" ], [ "Zhou", "Shi", "" ], [ "Wang", "Di", "" ], [ "Yan", "Gang", "" ], [ "Zhang", "Guoqiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.2304
Rui Zhang
Rui Zhang
Cooperative Multi-Cell Block Diagonalization with Per-Base-Station Power Constraints
accepted in JSAC, special issue on cooperative communications on cellular networks, June 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Block diagonalization (BD) is a practical linear precoding technique that eliminates the inter-user interference in downlink multiuser multiple-input multiple-output (MIMO) systems. In this paper, we apply BD to the downlink transmission in a cooperative multi-cell MIMO system, where the signals from different base stations (BSs) to all the mobile stations (MSs) are jointly designed with the perfect knowledge of the downlink channels and transmit messages. Specifically, we study the optimal BD precoder design to maximize the weighted sum-rate of all the MSs subject to a set of per-BS power constraints. This design problem is formulated in an auxiliary MIMO broadcast channel (BC) with a set of transmit power constraints corresponding to those for individual BSs in the multi-cell system. By applying convex optimization techniques, this paper develops an efficient algorithm to solve this problem, and derives the closed-form expression for the optimal BD precoding matrix. It is revealed that the optimal BD precoding vectors for each MS in the per-BS power constraint case are in general non-orthogonal, which differs from the conventional orthogonal BD precoder design for the MIMO-BC under one single sum-power constraint. Moreover, for the special case of single-antenna BSs and MSs, the proposed solution reduces to the optimal zero-forcing beamforming (ZF-BF) precoder design for the weighted sum-rate maximization in the multiple-input single-output (MISO) BC with per-antenna power constraints. Suboptimal and low-complexity BD/ZF-BF precoding schemes are also presented, and their achievable rates are compared against those with the optimal schemes.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 05:37:19 GMT" }, { "version": "v2", "created": "Tue, 22 Jun 2010 06:18:03 GMT" } ]
2010-06-23T00:00:00
[ [ "Zhang", "Rui", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2315
Kazuhiro Inaba
Kazuhiro Inaba and Sebastian Maneth
The Complexity of Translation Membership for Macro Tree Transducers
9 pages, appeared at International Workshop on Programming Language Techniques for XML (PLAN-X 2009)
null
null
null
cs.FL cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Macro tree transducers (mtts) are a useful formal model for XML query and transformation languages. In this paper one of the fundamental decision problems on translations, namely the "translation membership problem" is studied for mtts. For a fixed translation, the translation membership problem asks whether a given input/output pair is element of the translation. For call-by-name mtts this problem is shown to be NP-complete. The main result is that translation membership for call-by-value mtts is in polynomial time. For several extensions, such as addition of regular look-ahead or the generalization to multi-return mtts, it is shown that translation membership still remains in PTIME.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 06:38:11 GMT" } ]
2009-10-14T00:00:00
[ [ "Inaba", "Kazuhiro", "" ], [ "Maneth", "Sebastian", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0910.2317
Andreas Spillner
A. Dress, K. T. Huber, J. Koolen, V. Moulton, A. Spillner
An algorithm for computing cutpoints in finite metric spaces
17 pages, 1 eps-figure
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The theory of the tight span, a cell complex that can be associated to every metric $D$, offers a unifying view on existing approaches for analyzing distance data, in particular for decomposing a metric $D$ into a sum of simpler metrics as well as for representing it by certain specific edge-weighted graphs, often referred to as realizations of $D$. Many of these approaches involve the explicit or implicit computation of the so-called cutpoints of (the tight span of) $D$, such as the algorithm for computing the "building blocks" of optimal realizations of $D$ recently presented by A. Hertz and S. Varone. The main result of this paper is an algorithm for computing the set of these cutpoints for a metric $D$ on a finite set with $n$ elements in $O(n^3)$ time. As a direct consequence, this improves the run time of the aforementioned $O(n^6)$-algorithm by Hertz and Varone by ``three orders of magnitude''.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 07:09:03 GMT" } ]
2009-10-14T00:00:00
[ [ "Dress", "A.", "" ], [ "Huber", "K. T.", "" ], [ "Koolen", "J.", "" ], [ "Moulton", "V.", "" ], [ "Spillner", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.2324
Bernhard Scholz
Raymes Khoury, Bernd Burgstaller and Bernhard Scholz
Accelerating the Execution of Matrix Languages on the Cell Broadband Engine Architecture
61 pages, 34 figures
null
null
null
cs.PL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Matrix languages, including MATLAB and Octave, are established standards for applications in science and engineering. They provide interactive programming environments that are easy to use due to their scripting languages with matrix data types. Current implementations of matrix languages do not fully utilise high-performance, special-purpose chip architectures such as the IBM PowerXCell processor (Cell), which is currently used in the fastest computer in the world. We present a new framework that extends Octave to harness the computational power of the Cell. With this framework the programmer is relieved of the burden of introducing explicit notions of parallelism. Instead the programmer uses a new matrix data-type to execute matrix operations in parallel on the synergistic processing elements (SPEs) of the Cell. We employ lazy evaluation semantics for our new matrix data-type to obtain execution traces of matrix operations. Traces are converted to data dependence graphs; operations in the data dependence graph are lowered (split into sub-matrices), scheduled and executed on the SPEs. Thereby we exploit (1) data parallelism, (2) instruction level parallelism, (3) pipeline parallelism and (4) task parallelism of matrix language programs. We conducted extensive experiments to show the validity of our approach. Our Cell-based implementation achieves speedups of up to a factor of 12 over code run on recent Intel Core2 Quad processors.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 08:54:18 GMT" }, { "version": "v2", "created": "Sat, 14 Nov 2009 23:55:21 GMT" } ]
2009-11-15T00:00:00
[ [ "Khoury", "Raymes", "" ], [ "Burgstaller", "Bernd", "" ], [ "Scholz", "Bernhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0910.2350
Daoyi Dong
Daoyi Dong and Ian R Petersen
Quantum control theory and applications: A survey
38 pages, invited survey paper from a control systems perspective, some references are added, published version
IET Control Theory & Applications, vol. 4, no. 12, pp.2651-2671, 2010
10.1049/iet-cta.2009.0508
null
quant-ph cs.SY math-ph math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a survey on quantum control theory and applications from a control systems perspective. Some of the basic concepts and main developments (including open-loop control and closed-loop control) in quantum control theory are reviewed. In the area of open-loop quantum control, the paper surveys the notion of controllability for quantum systems and presents several control design strategies including optimal control, Lyapunov-based methodologies, variable structure control and quantum incoherent control. In the area of closed-loop quantum control, the paper reviews closed-loop learning control and several important issues related to quantum feedback control including quantum filtering, feedback stabilization, LQG control and robust quantum control.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 09:56:16 GMT" }, { "version": "v2", "created": "Mon, 27 Dec 2010 11:53:04 GMT" }, { "version": "v3", "created": "Mon, 10 Jan 2011 00:09:56 GMT" } ]
2011-01-12T00:00:00
[ [ "Dong", "Daoyi", "" ], [ "Petersen", "Ian R", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
0910.2370
Srikanth Srinivasan
V. Arvind, Srikanth Srinivasan
On the hardness of the noncommutative determinant
11 pages, v2: 18 pages, some typos removed, new section added on Clifford algebras, and some reorganization
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the computational complexity of computing the noncommutative determinant. We first consider the arithmetic circuit complexity of computing the noncommutative determinant polynomial. Then, more generally, we also examine the complexity of computing the determinant (as a function) over noncommutative domains. Our hardness results are summarized below: 1. We show that if the noncommutative determinant polynomial has small noncommutative arithmetic circuits then so does the noncommutative permanent. Consequently, the commutative permanent polynomial has small commutative arithmetic circuits. 2. For any field F we show that computing the n X n permanent over F is polynomial-time reducible to computing the 2n X 2n (noncommutative) determinant whose entries are O(n^2) X O(n^2) matrices over the field F. 3. We also derive as a consequence that computing the n X n permanent over nonnegative rationals is polynomial-time reducible to computing the noncommutative determinant over Clifford algebras of n^{O(1)} dimension. Our techniques are elementary and use primarily the notion of the Hadamard Product of noncommutative polynomials.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 11:58:22 GMT" }, { "version": "v2", "created": "Mon, 26 Oct 2009 09:25:42 GMT" } ]
2009-10-26T00:00:00
[ [ "Arvind", "V.", "" ], [ "Srinivasan", "Srikanth", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.2381
Amelia Carolina Sparavigna
Amelia Carolina Sparavigna
Fractional differentiation based image processing
Keywords: Fractional calculation, image processing, astronomy, Misprints revised
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are many resources useful for processing images, most of them freely available and quite friendly to use. In spite of this abundance of tools, a study of the processing methods is still worthy of efforts. Here, we want to discuss the possibilities arising from the use of fractional differential calculus. This calculus evolved in the research field of pure mathematics until 1920, when applied science started to use it. Only recently, fractional calculus was involved in image processing methods. As we shall see, the fractional calculation is able to enhance the quality of images, with interesting possibilities in edge detection and image restoration. We suggest also the fractional differentiation as a tool to reveal faint objects in astronomical images.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 12:37:32 GMT" }, { "version": "v2", "created": "Wed, 14 Oct 2009 10:49:09 GMT" }, { "version": "v3", "created": "Mon, 8 Feb 2010 09:19:21 GMT" }, { "version": "v4", "created": "Tue, 7 Apr 2015 07:08:06 GMT" } ]
2015-04-08T00:00:00
[ [ "Sparavigna", "Amelia Carolina", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0910.2393
Samson Abramsky
Samson Abramsky
Big Toy Models: Representing Physical Systems As Chu Spaces
24 pages. Accepted for Synthese 16th April 2010. Published online 20th April 2011
Synthese: Volume 186, Issue 3 (2012), Page 697-718
10.1007/s11229-011-9912-x
null
quant-ph cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We pursue a model-oriented rather than axiomatic approach to the foundations of Quantum Mechanics, with the idea that new models can often suggest new axioms. This approach has often been fruitful in Logic and Theoretical Computer Science. Rather than seeking to construct a simplified toy model, we aim for a `big toy model', in which both quantum and classical systems can be faithfully represented - as well as, possibly, more exotic kinds of systems. To this end, we show how Chu spaces can be used to represent physical systems of various kinds. In particular, we show how quantum systems can be represented as Chu spaces over the unit interval in such a way that the Chu morphisms correspond exactly to the physically meaningful symmetries of the systems - the unitaries and antiunitaries. In this way we obtain a full and faithful functor from the groupoid of Hilbert spaces and their symmetries to Chu spaces. We also consider whether it is possible to use a finite value set rather than the unit interval; we show that three values suffice, while the two standard possibilistic reductions to two values both fail to preserve fullness.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 13:45:20 GMT" }, { "version": "v2", "created": "Thu, 5 Nov 2009 13:30:24 GMT" }, { "version": "v3", "created": "Wed, 19 Oct 2011 08:25:17 GMT" } ]
2012-07-16T00:00:00
[ [ "Abramsky", "Samson", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
0910.2405
Maya Ramanath
Maya Ramanath, Kondreddi Sarath Kumar, Georgiana Ifrim
Generating Concise and Readable Summaries of XML Documents
null
null
null
MPI-I-2009-5-002
cs.IR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
XML has become the de-facto standard for data representation and exchange, resulting in large scale repositories and warehouses of XML data. In order for users to understand and explore these large collections, a summarized, bird's eye view of the available data is a necessity. In this paper, we are interested in semantic XML document summaries which present the "important" information available in an XML document to the user. In the best case, such a summary is a concise replacement for the original document itself. At the other extreme, it should at least help the user make an informed choice as to the relevance of the document to his needs. In this paper, we address the two main issues which arise in producing such meaningful and concise summaries: i) which tags or text units are important and should be included in the summary, ii) how to generate summaries of different sizes.%for different memory budgets. We conduct user studies with different real-life datasets and show that our methods are useful and effective in practice.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 14:19:01 GMT" } ]
2009-10-14T00:00:00
[ [ "Ramanath", "Maya", "" ], [ "Kumar", "Kondreddi Sarath", "" ], [ "Ifrim", "Georgiana", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0910.2415
Andrei Romashchenko
Bruno Durand (LIF), Andrei Romashchenko (LIF), Alexander Shen (LIF)
Fixed-point tile sets and their applications
v7: updated reference to S.G.Simpson's paper
null
null
null
cs.CC math.DS math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An aperiodic tile set was first constructed by R. Berger while proving the undecidability of the domino problem. It turned out that aperiodic tile sets appear in many topics ranging from logic (the Entscheidungsproblem) to physics (quasicrystals). We present a new construction of an aperiodic tile set that is based on Kleene's fixed-point construction instead of geometric arguments. This construction is similar to J. von Neumann self-reproducing automata; similar ideas were also used by P. Gacs in the context of error-correcting computations. This construction it rather flexible, so it can be used in many ways: we show how it can be used to implement substitution rules, to construct strongly aperiodic tile sets (any tiling is far from any periodic tiling), to give a new proof for the undecidability of the domino problem and related results, characterize effectively closed 1D subshift it terms of 2D shifts of finite type (improvement of a result by M. Hochman), to construct a tile set which has only complex tilings, and to construct a "robust" aperiodic tile set that does not have periodic (or close to periodic) tilings even if we allow some (sparse enough) tiling errors. For the latter we develop a hierarchical classification of points in random sets into islands of different ranks. Finally, we combine and modify our tools to prove our main result: there exists a tile set such that all tilings have high Kolmogorov complexity even if (sparse enough) tiling errors are allowed.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 18:55:52 GMT" }, { "version": "v2", "created": "Wed, 14 Oct 2009 06:38:41 GMT" }, { "version": "v3", "created": "Wed, 13 Jan 2010 14:42:41 GMT" }, { "version": "v4", "created": "Fri, 17 Sep 2010 14:22:01 GMT" }, { "version": "v5", "created": "Fri, 12 Nov 2010 15:39:26 GMT" }, { "version": "v6", "created": "Mon, 3 Oct 2011 19:31:37 GMT" }, { "version": "v7", "created": "Thu, 4 Dec 2014 10:19:41 GMT" } ]
2014-12-05T00:00:00
[ [ "Durand", "Bruno", "", "LIF" ], [ "Romashchenko", "Andrei", "", "LIF" ], [ "Shen", "Alexander", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0910.2443
J. M. Landsberg
J.M. Landsberg
P versus NP and geometry
20 pages, to appear in special issue of J. Symbolic. Comp. dedicated to MEGA 2009
null
null
null
math.AG cs.CC math.DG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
I describe three geometric approaches to resolving variants of P v. NP, present several results that illustrate the role of group actions in complexity theory, and make a first step towards completely geometric definitions of complexity classes.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 17:47:36 GMT" }, { "version": "v2", "created": "Wed, 14 Apr 2010 18:10:18 GMT" } ]
2010-04-15T00:00:00
[ [ "Landsberg", "J. M.", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.DG", "description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis", "span": "(Differential Geometry)" } ]
0910.2472
Yanbin Lu
Yanbin Lu and Gene Tsudik
Towards Plugging Privacy Leaks in Domain Name System
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals -- to one or more DNS servers -- the origin and target of that query. Over time, a user's browsing behavior might be exposed to entities with little or no trust. Current DNS privacy leaks stem from fundamental DNS features and are not easily fixable by simple patches. Moreover, privacy issues have been overlooked by DNS security efforts (i.e. DNSSEC) and are thus likely to propagate into future versions of DNS. In order to mitigate privacy issues in current DNS, this paper proposes a Privacy-Preserving Domain Name System (PPDNS), which maintains privacy during domain name resolution. PPDNS is based on distributed hash tables (DHTs), an alternative naming infrastructure, and computational private information retrieval (cPIR), an advanced cryptographic construct. PPDNS takes advantage of the DHT's index structure to improve name resolution query privacy, while leveraging cPIR to reduce communication overhead for bandwidth-sensitive clients. Our analysis shows that PPDNS is a viable approach for obtaining a higher degree of privacy for name resolution queries. PPDNS also serves as a demonstration of blending advanced systems techniques with their cryptographic counterparts.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 21:09:33 GMT" }, { "version": "v2", "created": "Tue, 1 Jun 2010 08:23:46 GMT" }, { "version": "v3", "created": "Sat, 19 Jun 2010 23:14:03 GMT" } ]
2015-03-13T00:00:00
[ [ "Lu", "Yanbin", "" ], [ "Tsudik", "Gene", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0910.2486
Yunnan Wu
Yunnan Wu
A Construction of Systematic MDS Codes with Minimum Repair Bandwidth
Submitted to IEEE Transactions on Information Theory on August 14, 2009
null
10.1109/TIT.2011.2134170
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a distributed storage system based on erasure coding, an important problem is the \emph{repair problem}: If a node storing a coded piece fails, in order to maintain the same level of reliability, we need to create a new encoded piece and store it at a new node. This paper presents a construction of systematic $(n,k)$-MDS codes for $2k\le n$ that achieves the minimum repair bandwidth when repairing from $k+1$ nodes.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 22:22:58 GMT" } ]
2016-11-17T00:00:00
[ [ "Wu", "Yunnan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2502
Aylin Yener
Xiang He, Aylin Yener
Interference Channels with Strong Secrecy
Presented at the Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is known that given the real sum of two independent uniformly distributed lattice points from the same nested lattice codebook, the eavesdropper can obtain at most 1 bit of information per channel regarding the value of one of the lattice points. In this work, we study the effect of this 1 bit information on the equivocation expressed in three commonly used information theoretic measures, i.e., the Shannon entropy, the Renyi entropy and the min entropy. We then demonstrate its applications in an interference channel with a confidential message. In our previous work, we showed that nested lattice codes can outperform Gaussian codes for this channel when the achieved rate is measured with the weak secrecy notion. Here, with the Renyi entropy and the min entropy measure, we prove that the same secure degree of freedom is achievable with the strong secrecy notion as well. A major benefit of the new coding scheme is that the strong secrecy is generated from a single lattice point instead of a sequence of lattice points. Hence the mutual information between the confidential message and the observation of the eavesdropper decreases much faster with the number of channel uses than previously known strong secrecy coding methods for nested lattice codes.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 00:44:43 GMT" } ]
2009-10-15T00:00:00
[ [ "He", "Xiang", "" ], [ "Yener", "Aylin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2525
Amitav Mukherjee
Amitav Mukherjee and A. Lee Swindlehurst
Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels
This paper was presented at Allerton Conference on Communication, Control, and Computing, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper examines linear beamforming methods for secure communications in a multiuser wiretap channel with a single transmitter, multiple legitimate receivers, and a single eavesdropper, where all nodes are equipped with multiple antennas. No information regarding the eavesdropper is presumed at the transmitter, and we examine both the broadcast MIMO downlink with independent information, and the multicast MIMO downlink with common information for all legitimate receivers. In both cases the information signal is transmitted with just enough power to guarantee a certain SINR at the desired receivers, while the remainder of the power is used to broadcast artificial noise. The artificial interference selectively degrades the passive eavesdropper's signal while remaining orthogonal to the desired receivers. We analyze the confidentiality provided by zero-forcing and optimal minimum-power beamforming designs for the broadcast channel, and optimal minimum-MSE beamformers for the multicast channel. Numerical simulations for the relative SINR and BER performance of the eavesdropper demonstrate the effectiveness of the proposed physical-layer security schemes.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 03:58:23 GMT" } ]
2009-10-15T00:00:00
[ [ "Mukherjee", "Amitav", "" ], [ "Swindlehurst", "A. Lee", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2534
Sung ho Chae
Sung ho Chae, Sang Won Choi, Sae-Young Chung
Optimal Multiplexing Gain of K-user Line-of-Sight Interference Channels with Polarization
6 pages, 5 figures, to appear in Proc. Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, Sept. 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the multiplexing gain (MUXG) of the fully connected K-user line-of-sight (LOS) interference channels (ICs). A polarimetric antenna composed of 3 orthogonal electric dipoles and 3 orthogonal magnetic dipoles is considered where all 6 dipoles are co-located. In case of K-user IC with single polarization, the maximum achievable MUXG is K regardless of the number of transmit and receive antennas because of the key-hole effect. With polarization, a trivial upper bound on the MUXG is 2K. We propose a zero forcing (ZF) scheme for the K-user LOS IC, where each user uses one or more polarimetric antennas. By using the proposed ZF scheme, we find minimal antenna configurations that achieve this bound for K <= 5. For K > 5, we show that the optimal MUXG of 2K is achieved with M = (K+1)/6 polarimetric antennas at each user.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 07:24:01 GMT" } ]
2009-10-15T00:00:00
[ [ "Chae", "Sung ho", "" ], [ "Choi", "Sang Won", "" ], [ "Chung", "Sae-Young", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2540
M. Tariq Banday
M. Tariq Banday and Tariq R. Jan
Effectiveness and Limitations of Statistical Spam Filters
International Conference on New Trends in Statistics and Optimization, Organized by Department of Statistics, University of Kashmir, Srinagar, India, from 20th to 23rd October, 2008
International Conference on New Trends in Statistics and Optimization, Organized by Department of Statistics, University of Kashmir, Srinagar, India, from 20th to 23rd October, 2008
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we discuss the techniques involved in the design of the famous statistical spam filters that include Naive Bayes, Term Frequency-Inverse Document Frequency, K-Nearest Neighbor, Support Vector Machine, and Bayes Additive Regression Tree. We compare these techniques with each other in terms of accuracy, recall, precision, etc. Further, we discuss the effectiveness and limitations of statistical filters in filtering out various types of spam from legitimate e-mails.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 07:43:03 GMT" } ]
2009-10-15T00:00:00
[ [ "Banday", "M. Tariq", "" ], [ "Jan", "Tariq R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0910.2582
Johannes Singler
Mirko Rahn, Peter Sanders, Johannes Singler
Scalable Distributed-Memory External Sorting
null
null
null
null
cs.DS cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We engineer algorithms for sorting huge data sets on massively parallel machines. The algorithms are based on the multiway merging paradigm. We first outline an algorithm whose I/O requirement is close to a lower bound. Thus, in contrast to naive implementations of multiway merging and all other approaches known to us, the algorithm works with just two passes over the data even for the largest conceivable inputs. A second algorithm reduces communication overhead and uses more conventional specifications of the result at the cost of slightly increased I/O requirements. An implementation wins the well known sorting benchmark in several categories and by a large margin over its competitors.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 12:18:28 GMT" } ]
2009-10-15T00:00:00
[ [ "Rahn", "Mirko", "" ], [ "Sanders", "Peter", "" ], [ "Singler", "Johannes", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0910.2586
James Whitacre
James Whitacre, Axel Bender
Degeneracy: a link between evolvability, robustness and complexity in biological systems
accepted in BMC Journal of Theoretical Biology and Medical Modelling
null
10.1186/1742-4682-7-6
null
nlin.AO cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A full accounting of biological robustness remains elusive; both in terms of the mechanisms by which robustness is achieved and the forces that have caused robustness to grow over evolutionary time. Although its importance to topics such as ecosystem services and resilience is well recognized, the broader relationship between robustness and evolution is only starting to be fully appreciated. A renewed interest in this relationship has been prompted by evidence that mutational robustness can play a positive role in the discovery of future adaptive innovations (evolvability) and evidence of an intimate relationship between robustness and complexity in biology. This paper offers a new perspective on the mechanics of evolution and the origins of complexity, robustness, and evolvability. Here we explore the hypothesis that degeneracy, a partial overlap in the functioning of multi-functional components, plays a central role in the evolution and robustness of complex forms. In support of this hypothesis, we present evidence that degeneracy is a fundamental source of robustness, it is intimately tied to multi-scaled complexity, and it establishes conditions that are necessary for system evolvability.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 10:55:12 GMT" }, { "version": "v2", "created": "Fri, 15 Jan 2010 10:27:42 GMT" } ]
2011-12-15T00:00:00
[ [ "Whitacre", "James", "" ], [ "Bender", "Axel", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0910.2593
Uwe Aickelin
Jingpeng Li, Uwe Aickelin, Edmund Burke
A Component Based Heuristic Search Method with Evolutionary Eliminations
27 pages, 4 figures
INFORMS Journal of Computing, 21 (3), 468-479, 2008
null
null
cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nurse rostering is a complex scheduling problem that affects hospital personnel on a daily basis all over the world. This paper presents a new component-based approach with evolutionary eliminations, for a nurse scheduling problem arising at a major UK hospital. The main idea behind this technique is to decompose a schedule into its components (i.e. the allocated shift pattern of each nurse), and then to implement two evolutionary elimination strategies mimicking natural selection and natural mutation process on these components respectively to iteratively deliver better schedules. The worthiness of all components in the schedule has to be continuously demonstrated in order for them to remain there. This demonstration employs an evaluation function which evaluates how well each component contributes towards the final objective. Two elimination steps are then applied: the first elimination eliminates a number of components that are deemed not worthy to stay in the current schedule; the second elimination may also throw out, with a low level of probability, some worthy components. The eliminated components are replenished with new ones using a set of constructive heuristics using local optimality criteria. Computational results using 52 data instances demonstrate the applicability of the proposed approach in solving real-world problems.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 11:44:57 GMT" } ]
2010-07-05T00:00:00
[ [ "Li", "Jingpeng", "" ], [ "Aickelin", "Uwe", "" ], [ "Burke", "Edmund", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0910.2603
Zhang Shengli
Shengli Zhang, Soung-Chang Liew
Physical layer network coding with multiple antennas
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The two-phase MIMO NC (network coding) scheme can be used to boost the throughput in a two-way relay channel in which nodes are equipped with multiple antennas. The obvious strategy is for the relay node to extract the individual packets from the two end nodes and mix the two packets to form a network-coded packet. In this paper, we propose a new scheme called MIMO PNC (physical network coding), in which the relay extracts the summation and difference of the two end packets and then converts them to the network-coded form. MIMO PNC is a natural combination of the single-antenna PNC scheme and the linear MIMO detection scheme. The advantages of MIMO PNC are many. First, it removes the stringent carrier-phase requirement in single-antenna PNC. Second, it is linear in complexity with respect to the constellation size and the number of simultaneous data streams in MIMO. Simulation shows that MIMO PNC outperforms the straightforward MIMO NC significantly under random Rayleigh fading channel. Based on our analysis, we further conjecture that MIMO PNC outperforms MIMO NC under all possible realizations of the channel.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 12:48:22 GMT" }, { "version": "v2", "created": "Mon, 18 Jan 2010 00:42:20 GMT" } ]
2010-01-18T00:00:00
[ [ "Zhang", "Shengli", "" ], [ "Liew", "Soung-Chang", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.2604
Zhang Shengli
Zhang Shengli, Soung Chang Liew
Applying physical layer network coding in wireless networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to "straightforward" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM) waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increases compared with traditional transmission and straightforward network coding, respectively, in 1-D regular linear networks with multiple random flows. The throughput improvements are even larger in 2-D regular networks: 200% and 100%, respectively.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 12:52:32 GMT" } ]
2009-10-15T00:00:00
[ [ "Shengli", "Zhang", "" ], [ "Liew", "Soung Chang", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.2626
Arijit Laha Ph.D.
Arijit Laha
On challenges and opportunities of designing integrated IT platforms for supporting knowledge works in organizations
39 pages, Sibmitted to journal Vikalpa
Vikalpa: The Journal for Decision Makers, Volume 36, No 3, pp 35 - 60, Jul - Sep 2011
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Designing and implementing comprehensive IT-based support environments for KM in organizations is fraught with many problems. Solving them requires intimate knowledge about the information usage in knowledge works and the scopes of technology intervention. In this paper, the Task-oriented Organizational Knowledge Management or TOKM, a design theory for building integrated IT platforms for supporting organizational KM, is proposed. TOKM brings together two apparently mutually exclusive practices of building KM systems, the task-based approach and the generic or universalistic approach. In developing the design, the information requirements of knowledge workers in light of an information usage model of knowledge works is studied. Then the model is extended to study possibilities of more advanced IT support and formulate them in form of a set of meta-requirements. Following the IS design theory paradigm, a set of artifacts are hypothesized to meet the requirements. Finally, a design method, as a possible approach of building an IT-based integrated platform, the Knowledge Work Support Platform (KWSP) to realize the artifacts in order to meet the requirements, is outlined. The KWSP is a powerful platform for building and maintaining a number of task-type specific Knowledge Work Support Systems (KWSS) on a common sharable platform. Each KWSS, for the task-type supported by it, can be easily designed to provide extensive and sophisticated support to individual as well as group of knowledge workers in performing their respective knowledge work instances
[ { "version": "v1", "created": "Wed, 14 Oct 2009 13:55:57 GMT" } ]
2011-12-23T00:00:00
[ [ "Laha", "Arijit", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0910.2632
Laurent Romary
Laurent Romary (INRIA Saclay - Ile de France, IDSL)
Communication scientifique : Pour le meilleur et pour le PEER
null
Hermes (2009)
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides an overview (in French) of the European PEER project, focusing on its origins, the actual objectives and the technical deployment.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 14:28:28 GMT" } ]
2009-10-15T00:00:00
[ [ "Romary", "Laurent", "", "INRIA Saclay - Ile de France, IDSL" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0910.2638
Arijit Laha Ph.D.
Arijit Laha
On building Information Warehouses
11 pages 1st IIMA International Conference on Advanced Data Analysis, Business Analytics and Intelligence (ICADABAI 2009), 6-7 June, Indian Institute of Management, Ahmedabad, India
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most important goals of information management (IM) is supporting the knowledge workers in performing their works. In this paper we examine issues of relevance, linkage and provenance of information, as accessed and used by the knowledge workers. These are usually not adequately addressed in most of the IT based solutions for IM. Here we propose a non-conventional approach for building information systems for supporting the knowledge workers which addresses these issues. The approach leads to the ideas of building Information Warehouses (IW) and Knowledge work Support Systems (KwSS). Such systems can open up potential for building innovative applications of significant impact, including those capable of helping organizations in implementing processes for double-loop learning.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 14:59:42 GMT" } ]
2009-10-15T00:00:00
[ [ "Laha", "Arijit", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0910.2649
Chinmay Karande
Chinmay Karande
Polynomially Correlated Knapsack is NP-complete
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
0-1 Knapsack is a fundamental NP-complete problem. In this article we prove that it remains NP-complete even when the weights of the objects in the packing constraints and their values in the objective function satisfy specific stringent conditions: the values are integral powers of the weights of the objects.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 15:43:40 GMT" } ]
2009-10-15T00:00:00
[ [ "Karande", "Chinmay", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.2654
Wonseok Chae
Wonseok Chae
Type Safe Extensible Programming
PhD Thesis submitted October, 2009
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software products evolve over time. Sometimes they evolve by adding new features, and sometimes by either fixing bugs or replacing outdated implementations with new ones. When software engineers fail to anticipate such evolution during development, they will eventually be forced to re-architect or re-build from scratch. Therefore, it has been common practice to prepare for changes so that software products are extensible over their lifetimes. However, making software extensible is challenging because it is difficult to anticipate successive changes and to provide adequate abstraction mechanisms over potential changes. Such extensibility mechanisms, furthermore, should not compromise any existing functionality during extension. Software engineers would benefit from a tool that provides a way to add extensions in a reliable way. It is natural to expect programming languages to serve this role. Extensible programming is one effort to address these issues. In this thesis, we present type safe extensible programming using the MLPolyR language. MLPolyR is an ML-like functional language whose type system provides type-safe extensibility mechanisms at several levels. After presenting the language, we will show how these extensibility mechanisms can be put to good use in the context of product line engineering. Product line engineering is an emerging software engineering paradigm that aims to manage variations, which originate from successive changes in software.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 16:08:29 GMT" } ]
2009-10-15T00:00:00
[ [ "Chae", "Wonseok", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0910.2655
Chinmay Karande
Deeparnab Chakrabarty, Chinmay Karande, Ashish Sangwan
The Effect of Malice on the Social Optimum in Linear Load Balancing Games
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note we consider the following problem to study the effect of malicious players on the social optimum in load balancing games: Consider two players SOC and MAL controlling (1-f) and f fraction of the flow in a load balancing game. SOC tries to minimize the total cost faced by her players while MAL tries to maximize the same. If the latencies are linear, we show that this 2-player zero-sum game has a pure strategy Nash equilibrium. Moreover, we show that one of the optimal strategies for MAL is to play selfishly: let the f fraction of the flow be sent as when the flow was controlled by infinitesimal players playing selfishly and reaching a Nash equilibrium. This shows that a malicious player cannot cause more harm in this game than a set of selfish agents. We also introduce the notion of Cost of Malice - the ratio of the cost faced by SOC at equilibrium to (1-f)OPT, where OPT is the social optimum minimizing the cost of all the players. In linear load balancing games we bound the cost of malice by (1+f/2).
[ { "version": "v1", "created": "Wed, 14 Oct 2009 15:59:39 GMT" }, { "version": "v2", "created": "Wed, 14 Oct 2009 23:05:54 GMT" } ]
2009-10-15T00:00:00
[ [ "Chakrabarty", "Deeparnab", "" ], [ "Karande", "Chinmay", "" ], [ "Sangwan", "Ashish", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0910.2718
Aylin Yener
Xiang He, Aylin Yener
Two-hop Secure Communication Using an Untrusted Relay
Accepted for publication in EURASIP Journal on Communications and Networks, Special Issue on Wireless Physical Layer Security
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external "good samaritan" node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall, the paper presents a case for intentional interference, i.e., cooperative jamming, as an enabler for secure communication.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 20:08:34 GMT" } ]
2009-10-16T00:00:00
[ [ "He", "Xiang", "" ], [ "Yener", "Aylin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2743
Soummya Kar
Usman A. Khan, Soummya Kar, and Jose M. F. Moura
DILAND: An Algorithm for Distributed Sensor Localization with Noisy Distance Measurements
Submitted to the IEEE Transactions on Signal Processing. Initial submission on May 2009. 12 pages
null
10.1109/TSP.2009.2038423
null
cs.DC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this correspondence, we present an algorithm for distributed sensor localization with noisy distance measurements (DILAND) that extends and makes the DLRE more robust. DLRE is a distributed sensor localization algorithm in $\mathbb{R}^m$ $(m\geq1)$ introduced in \cite{usman_loctsp:08}. DILAND operates when (i) the communication among the sensors is noisy; (ii) the communication links in the network may fail with a non-zero probability; and (iii) the measurements performed to compute distances among the sensors are corrupted with noise. The sensors (which do not know their locations) lie in the convex hull of at least $m+1$ anchors (nodes that know their own locations.) Under minimal assumptions on the connectivity and triangulation of each sensor in the network, this correspondence shows that, under the broad random phenomena described above, DILAND converges almost surely (a.s.) to the exact sensor locations.
[ { "version": "v1", "created": "Wed, 14 Oct 2009 22:31:39 GMT" } ]
2015-10-28T00:00:00
[ [ "Khan", "Usman A.", "" ], [ "Kar", "Soummya", "" ], [ "Moura", "Jose M. F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2771
Rui Zhang
Rui Zhang and Shuguang Cui
Cooperative Interference Management with MISO Beamforming
accepted in IEEE Transactions on Signal Processing, June 2010
null
10.1109/TSP.2010.2056685
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This correspondence studies the downlink transmission in a multi-cell system, where multiple base stations (BSs) each with multiple antennas cooperatively design their respective transmit beamforming vectors to optimize the overall system performance. For simplicity, it is assumed that all mobile stations (MSs) are equipped with a single antenna each, and there is one active MS in each cell at one time. Accordingly, the system of interests can be modeled by a multiple-input single-output (MISO) interference channel (IC), termed as MISO-IC, with interference treated as noise. We propose a new method to characterize different rate-tuples for active MSs on the Pareto boundary of the achievable rate region for the MISO-IC, by exploring the relationship between the MISO-IC and the cognitive radio (CR) MISO channel. We show that each Pareto-boundary rate-tuple of the MISO-IC can be achieved in a decentralized manner when each of the BSs attains its own channel capacity subject to a certain set of interference-power constraints (also known as interference-temperature constraints in the CR system) at the other MS receivers. Furthermore, we show that this result leads to a new decentralized algorithm for implementing the multi-cell cooperative downlink beamforming.
[ { "version": "v1", "created": "Thu, 15 Oct 2009 04:10:06 GMT" }, { "version": "v2", "created": "Mon, 28 Jun 2010 09:35:37 GMT" } ]
2015-05-14T00:00:00
[ [ "Zhang", "Rui", "" ], [ "Cui", "Shuguang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2818
Rdv Ijcsis
R. Venkatachalam, A. Krishnan
Multiple Cross-Layer Design Based Complete Architecture for Mobile Adhoc Networks
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 182-187, September 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Different cross layer design for mobile adhoc network focuses on different optimization purpose, different Quality of Service (QoS) metric and the functions like delay, priority handling, security, etc. Existing cross layer designs provide individual solution for congestion control, fault tolerance, power conservation, energy minimization and flow control and the major drawback is of high cost and overhead. In this paper, we propose to design multiple cross layer design based architecture to provide a combined solution for link failure management, power conservation, congestion control and admission control. By simulation results, we show that the average end to end delay, average energy consumption and the packet loss are considerably reduced with the increase in high throughput and good delivery ratio.
[ { "version": "v1", "created": "Thu, 15 Oct 2009 09:28:35 GMT" } ]
2009-10-16T00:00:00
[ [ "Venkatachalam", "R.", "" ], [ "Krishnan", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.2829
Matteo Pradella
Matteo Pradella, Alessandra Cherubini, Stefano Crespi Reghizzi
A unifying approach to picture grammars
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several old and recent classes of picture grammars, that variously extend context-free string grammars in two dimensions, are based on rules that rewrite arrays of pixels. Such grammars can be unified and extended using a tiling based approach, whereby the right part of a rule is formalized by means of a finite set of permitted tiles. We focus on a simple type of tiling,named regional, and define the corresponding regional tile grammars. They include both Siromoney's (or Matz's) Kolam grammars and their generalization by Prusa, as well as Drewes's grid grammars. Regionally defined pictures can be recognized with polynomial-time complexity by an algorithm extending the CKY one for strings. Regional tile grammars and languages are strictly included into our previous tile grammars and languages, and are incomparable with Giammarresi-Restivo tiling systems (or Wang systems).
[ { "version": "v1", "created": "Thu, 15 Oct 2009 11:35:42 GMT" }, { "version": "v2", "created": "Mon, 15 Mar 2010 18:02:47 GMT" }, { "version": "v3", "created": "Sat, 8 Jan 2011 08:39:12 GMT" } ]
2011-01-11T00:00:00
[ [ "Pradella", "Matteo", "" ], [ "Cherubini", "Alessandra", "" ], [ "Reghizzi", "Stefano Crespi", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0910.2832
Hans-Andrea Loeliger
Justin Dauwels, Andrew Eckford, Sascha Korl, Hans-Andrea Loeliger
Expectation Maximization as Message Passing - Part I: Principles and Gaussian Messages
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown how expectation maximization (EM) may be viewed as a message passing algorithm in factor graphs. In particular, a general EM message computation rule is identified. As a factor graph tool, EM may be used to break cycles in a factor graph, and tractable messages may in some cases be obtained where the sum-product messages are unwieldy. As an exemplary application, the paper considers linear Gaussian state space models. Unknown coefficients in such models give rise to multipliers in the corresponding factor graph. A main attraction of EM in such cases is that it results in purely Gaussian message passing algorithms. These Gaussian EM messages are tabulated for several (scalar, vector, matrix) multipliers that frequently appear in applications.
[ { "version": "v1", "created": "Thu, 15 Oct 2009 10:26:59 GMT" } ]
2009-10-16T00:00:00
[ [ "Dauwels", "Justin", "" ], [ "Eckford", "Andrew", "" ], [ "Korl", "Sascha", "" ], [ "Loeliger", "Hans-Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2849
Marija Mitrovic
Marija Mitrovi\'c and Bosiljka Tadi\'c
Bloggers Behavior and Emergent Communities in Blog Space
null
null
10.1140/epjb/e2009-00431-9
null
cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interactions between users in cyberspace may lead to phenomena different from those observed in common social networks. Here we analyse large data sets about users and Blogs which they write and comment, mapped onto a bipartite graph. In such enlarged Blog space we trace user activity over time, which results in robust temporal patterns of user--Blog behavior and the emergence of communities. With the spectral methods applied to the projection on weighted user network we detect clusters of users related to their common interests and habits. Our results suggest that different mechanisms may play the role in the case of very popular Blogs. Our analysis makes a suitable basis for theoretical modeling of the evolution of cyber communities and for practical study of the data, in particular for an efficient search of interesting Blog clusters and further retrieval of their contents by text analysis.
[ { "version": "v1", "created": "Thu, 15 Oct 2009 11:54:12 GMT" } ]
2015-05-14T00:00:00
[ [ "Mitrović", "Marija", "" ], [ "Tadić", "Bosiljka", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0910.2853
Aart Middeldorp
Nao Hirokawa and Aart Middeldorp
Decreasing Diagrams and Relative Termination
v3: missing references added
null
null
null
cs.LO cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we use the decreasing diagrams technique to show that a left-linear term rewrite system R is confluent if all its critical pairs are joinable and the critical pair steps are relatively terminating with respect to R. We further show how to encode the rule-labeling heuristic for decreasing diagrams as a satisfiability problem. Experimental data for both methods are presented.
[ { "version": "v1", "created": "Thu, 15 Oct 2009 12:34:04 GMT" }, { "version": "v2", "created": "Thu, 29 Oct 2009 10:15:59 GMT" }, { "version": "v3", "created": "Fri, 30 Oct 2009 08:11:13 GMT" } ]
2009-10-30T00:00:00
[ [ "Hirokawa", "Nao", "" ], [ "Middeldorp", "Aart", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0910.2859
Apostolos Syropoulos
Apostolos Syropoulos
Can we debug the Universe?
An early version of this paper was read in the "Future Trends in Hypercomputation" Workshop held in Sheffield U.K., 11-13 September 2006
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Roughly, the Church-Turing thesis is a hypothesis that describes exactly what can be computed by any real or feasible conceptual computing device. Generally speaking, the computational metaphor is the idea that everything, including the universe itself, has a computational nature. However, if the Church-Turing thesis is not valid, then does it make sense to expect the construction of a computer program capable of simulating the whole Universe? In the lights of hypercomputation, the scientific discipline that is about computing beyond the Church-Turing barrier, the most natural answer to this question is: No. This note is a justification of this answer and its deeper meaning based on arguments from physics, the philosophy of the mind, and, of course, (hyper)computability theory.
[ { "version": "v1", "created": "Thu, 15 Oct 2009 12:47:37 GMT" }, { "version": "v2", "created": "Mon, 26 Oct 2009 12:26:20 GMT" } ]
2009-10-26T00:00:00
[ [ "Syropoulos", "Apostolos", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0910.2874
Uwe Aickelin
Feng Gu, Uwe Aickelin, Julie Greensmith
An Agent Based Classification Model
4 pages, 2 figures, 9th European Agent Systems Summer School, Durham, UK
null
null
null
cs.AI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The major function of this model is to access the UCI Wisconsin Breast Can- cer data-set[1] and classify the data items into two categories, which are normal and anomalous. This kind of classifi cation can be referred as anomaly detection, which discriminates anomalous behaviour from normal behaviour in computer systems. One popular solution for anomaly detection is Artifi cial Immune Sys- tems (AIS). AIS are adaptive systems inspired by theoretical immunology and observed immune functions, principles and models which are applied to prob- lem solving. The Dendritic Cell Algorithm (DCA)[2] is an AIS algorithm that is developed specifi cally for anomaly detection. It has been successfully applied to intrusion detection in computer security. It is believed that agent-based mod- elling is an ideal approach for implementing AIS, as intelligent agents could be the perfect representations of immune entities in AIS. This model evaluates the feasibility of re-implementing the DCA in an agent-based simulation environ- ment called AnyLogic, where the immune entities in the DCA are represented by intelligent agents. If this model can be successfully implemented, it makes it possible to implement more complicated and adaptive AIS models in the agent-based simulation environment.
[ { "version": "v1", "created": "Thu, 15 Oct 2009 13:47:02 GMT" } ]
2010-07-05T00:00:00
[ [ "Gu", "Feng", "" ], [ "Aickelin", "Uwe", "" ], [ "Greensmith", "Julie", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0910.2891
Ashutosh Trivedi Dr
Marcin Jurdzinski and Ashutosh Trivedi
Average-Time Games on Timed Automata
null
Proc.FSTTCS'08, volume 08004 of Dagstuhl Seminar Proceedings, 2008
10.4230/LIPIcs.FSTTCS.2008.1765
null
cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An average-time game is played on the infinite graph of configurations of a finite timed automaton. The two players, Min and Max, construct an infinite run of the automaton by taking turns to perform a timed transition. Player Min wants to minimise the average time per transition and player Max wants to maximise it. A solution of average-time games is presented using a reduction to average-price game on a finite graph. A direct consequence is an elementary proof of determinacy for average-time games. This complements our results for reachability-time games and partially solves a problem posed by Bouyer et al., to design an algorithm for solving average-price games on priced timed automata. The paper also establishes the exact computational complexity of solving average-time games: the problem is EXPTIME-complete for timed automata with at least two clocks.
[ { "version": "v1", "created": "Thu, 15 Oct 2009 14:45:56 GMT" } ]
2020-01-16T00:00:00
[ [ "Jurdzinski", "Marcin", "" ], [ "Trivedi", "Ashutosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.2912
Dominique Unruh
Dominique Unruh
Universally Composable Quantum Multi-Party Computation
null
null
10.1007/978-3-642-13190-5_25
null
quant-ph cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Universal Composability model (UC) by Canetti (FOCS 2001) allows for secure composition of arbitrary protocols. We present a quantum version of the UC model which enjoys the same compositionality guarantees. We prove that in this model statistically secure oblivious transfer protocols can be constructed from commitments. Furthermore, we show that every statistically classically UC secure protocol is also statistically quantum UC secure. Such implications are not known for other quantum security definitions. As a corollary, we get that quantum UC secure protocols for general multi-party computation can be constructed from commitments.
[ { "version": "v1", "created": "Thu, 15 Oct 2009 16:12:16 GMT" } ]
2018-02-13T00:00:00
[ [ "Unruh", "Dominique", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0910.2917
Venkatesh Saligrama
P. M. Jodoin, V. Saligrama, J. Konrad
Behavior Subtraction
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Background subtraction has been a driving engine for many computer vision and video analytics tasks. Although its many variants exist, they all share the underlying assumption that photometric scene properties are either static or exhibit temporal stationarity. While this works in some applications, the model fails when one is interested in discovering {\it changes in scene dynamics} rather than those in a static background; detection of unusual pedestrian and motor traffic patterns is but one example. We propose a new model and computational framework that address this failure by considering stationary scene dynamics as a ``background'' with which observed scene dynamics are compared. Central to our approach is the concept of an {\it event}, that we define as short-term scene dynamics captured over a time window at a specific spatial location in the camera field of view. We compute events by time-aggregating motion labels, obtained by background subtraction, as well as object descriptors (e.g., object size). Subsequently, we characterize events probabilistically, but use a low-memory, low-complexity surrogates in practical implementation. Using these surrogates amounts to {\it behavior subtraction}, a new algorithm with some surprising properties. As demonstrated here, behavior subtraction is an effective tool in anomaly detection and localization. It is resilient to spurious background motion, such as one due to camera jitter, and is content-blind, i.e., it works equally well on humans, cars, animals, and other objects in both uncluttered and highly-cluttered scenes. Clearly, treating video as a collection of events rather than colored pixels opens new possibilities for video analytics.
[ { "version": "v1", "created": "Thu, 15 Oct 2009 16:09:18 GMT" } ]
2009-10-16T00:00:00
[ [ "Jodoin", "P. M.", "" ], [ "Saligrama", "V.", "" ], [ "Konrad", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0910.2931
Samson Abramsky
Samson Abramsky
Abstract Scalars, Loops, and Free Traced and Strongly Compact Closed Categories
32 pages
In Proceedings of CALCO 2005, Springer Lecture Notes in Computer Science Vol. 3629, 1--31, 2005
null
null
quant-ph cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study structures which have arisen in recent work by the present author and Bob Coecke on a categorical axiomatics for Quantum Mechanics; in particular, the notion of strongly compact closed category. We explain how these structures support a notion of scalar which allows quantitative aspects of physical theory to be expressed, and how the notion of strong compact closure emerges as a significant refinement of the more classical notion of compact closed category. We then proceed to an extended discussion of free constructions for a sequence of progressively more complex kinds of structured category, culminating in the strongly compact closed case. The simple geometric and combinatorial ideas underlying these constructions are emphasized. We also discuss variations where a prescribed monoid of scalars can be "glued in" to the free construction.
[ { "version": "v1", "created": "Thu, 15 Oct 2009 16:39:34 GMT" } ]
2009-10-16T00:00:00
[ [ "Abramsky", "Samson", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
0910.2942
Mugurel Ionut Andreica
Florin Pop, Ciprian Mihai Dobre, Alexandru Costan, Mugurel Ionut Andreica, Eliana-Dina Tirsa, Corina Stratan, Valentin Cristea
Critical Analysis of Middleware Architectures for Large Scale Distributed Systems
null
Proc. of the 17th Intl. Conf. on Control Systems and Computer Science (CSCS), vol. 1, pp. 29-36, Bucharest, Romania, 26-29 May, 2009. (ISSN: 2066-4451)
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed computing is increasingly being viewed as the next phase of Large Scale Distributed Systems (LSDSs). However, the vision of large scale resource sharing is not yet a reality in many areas - Grid computing is an evolving area of computing, where standards and technology are still being developed to enable this new paradigm. Hence, in this paper we analyze the current development of middleware tools for LSDS, from multiple perspectives: architecture, applications and market research. For each perspective we are interested in relevant technologies used in undergoing projects, existing products or services and useful design issues. In the end, based on this approach, we draw some conclusions regarding the future research directions in this area.
[ { "version": "v1", "created": "Thu, 15 Oct 2009 17:14:55 GMT" } ]
2009-10-16T00:00:00
[ [ "Pop", "Florin", "" ], [ "Dobre", "Ciprian Mihai", "" ], [ "Costan", "Alexandru", "" ], [ "Andreica", "Mugurel Ionut", "" ], [ "Tirsa", "Eliana-Dina", "" ], [ "Stratan", "Corina", "" ], [ "Cristea", "Valentin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.2961
Yan Zhu
Yan Zhu and Dongning Guo
Isotropic MIMO Interference Channels without CSIT: The Loss of Degrees of Freedom
appears in Allerton 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies two-user MIMO interference channel with isotropic fading. We assume that users are equipped with arbitrary number of antennas and the channel state information (CSI) is available at receivers only. An outer bound is obtained for the degree of freedom region, which suggests the loss of degrees of freedom due to the lack of CSI at transmitters under many circumstances.
[ { "version": "v1", "created": "Thu, 15 Oct 2009 18:39:27 GMT" } ]
2009-10-16T00:00:00
[ [ "Zhu", "Yan", "" ], [ "Guo", "Dongning", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.2973
Mohab Safey El Din
Mohab Safey El Din (LIP6, INRIA Rocquencourt), Lihong Zhi (KLMM)
Computing rational points in convex semi-algebraic sets and SOS decompositions
null
null
null
null
cs.SC cs.DS math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let ${\cal P}=\{h_1, ..., h_s\}\subset \Z[Y_1, ..., Y_k]$, $D\geq \deg(h_i)$ for $1\leq i \leq s$, $\sigma$ bounding the bit length of the coefficients of the $h_i$'s, and $\Phi$ be a quantifier-free ${\cal P}$-formula defining a convex semi-algebraic set. We design an algorithm returning a rational point in ${\cal S}$ if and only if ${\cal S}\cap \Q\neq\emptyset$. It requires $\sigma^{\bigO(1)}D^{\bigO(k^3)}$ bit operations. If a rational point is outputted its coordinates have bit length dominated by $\sigma D^{\bigO(k^3)}$. Using this result, we obtain a procedure deciding if a polynomial $f\in \Z[X_1, >..., X_n]$ is a sum of squares of polynomials in $\Q[X_1, ..., X_n]$. Denote by $d$ the degree of $f$, $\tau$ the maximum bit length of the coefficients in $f$, $D={{n+d}\choose{n}}$ and $k\leq D(D+1)-{{n+2d}\choose{n}}$. This procedure requires $\tau^{\bigO(1)}D^{\bigO(k^3)}$ bit operations and the coefficients of the outputted polynomials have bit length dominated by $\tau D^{\bigO(k^3)}$.
[ { "version": "v1", "created": "Thu, 15 Oct 2009 19:18:05 GMT" } ]
2009-10-16T00:00:00
[ [ "Din", "Mohab Safey El", "", "LIP6, INRIA Rocquencourt" ], [ "Zhi", "Lihong", "", "KLMM" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0910.3028
Natasha Devroye
Stefano Rini, Daniela Tuninetti, Natasha Devroye
State of the cognitive interference channel: a new unified inner bound
Presented at the 2010 International Zurich Seminar on Communications - an 2nd updated version.
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity region of the interference channel in which one transmitter non-causally knows the message of the other, termed the cognitive interference channel, has remained open since its inception in 2005. A number of subtly differing achievable rate regions and outer bounds have been derived, some of which are tight under specific conditions. In this work we present a new unified inner bound for the discrete memoryless cognitive interference channel. We show explicitly how it encompasses all known discrete memoryless achievable rate regions as special cases. The presented achievable region was recently used in deriving the capacity region of the general deterministic cognitive interference channel, and thus also the linear high-SNR deterministic approximation of the Gaussian cognitive interference channel. The high-SNR deterministic approximation was then used to obtain the capacity of the Gaussian cognitive interference channel to within 1.87 bits.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 03:14:05 GMT" }, { "version": "v2", "created": "Thu, 11 Mar 2010 05:45:48 GMT" }, { "version": "v3", "created": "Fri, 19 Mar 2010 22:35:24 GMT" } ]
2015-03-13T00:00:00
[ [ "Rini", "Stefano", "" ], [ "Tuninetti", "Daniela", "" ], [ "Devroye", "Natasha", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.3033
Ersen Ekrem
Ersen Ekrem and Sennur Ulukus
Degraded Compound Multi-receiver Wiretap Channels
Submitted to IEEE Transactions on Information Theory, October 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the degraded compound multi-receiver wiretap channel. The degraded compound multi-receiver wiretap channel consists of two groups of users and a group of eavesdroppers, where, if we pick an arbitrary user from each group of users and an arbitrary eavesdropper, they satisfy a certain Markov chain. We study two different communication scenarios for this channel. In the first scenario, the transmitter wants to send a confidential message to users in the first (stronger) group and a different confidential message to users in the second (weaker) group, where both messages need to be kept confidential from the eavesdroppers. For this scenario, we assume that there is only one eavesdropper. We obtain the secrecy capacity region for the general discrete memoryless channel model, the parallel channel model, and the Gaussian parallel channel model. For the Gaussian multiple-input multiple-output (MIMO) channel model, we obtain the secrecy capacity region when there is only one user in the second group. In the second scenario we study, the transmitter sends a confidential message to users in the first group which needs to be kept confidential from the second group of users and the eavesdroppers. Furthermore, the transmitter sends a different confidential message to users in the second group which needs to be kept confidential only from the eavesdroppers. For this scenario, we do not put any restriction on the number of eavesdroppers. As in the first scenario, we obtain the secrecy capacity region for the general discrete memoryless channel model, the parallel channel model, and the Gaussian parallel channel model. For the Gaussian MIMO channel model, we establish the secrecy capacity region when there is only one user in the second group.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 04:00:24 GMT" } ]
2009-10-19T00:00:00
[ [ "Ekrem", "Ersen", "" ], [ "Ulukus", "Sennur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.3068
Uwe Aickelin
Uwe Aickelin, Jingpeng Li, Edmund Burke
An Evolutionary Squeaky Wheel Optimisation Approach to Personnel Scheduling
21 pages, 5 tables, 1 figure, IEEE Transactions on Evolutionary Computation
IEEE Transactions on Evolutionary Computation, 13 (2), 433-443, 2009
10.2139/ssrn.2823393
null
cs.AI cs.CE cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The quest for robust heuristics that are able to solve more than one problem is ongoing. In this paper, we present, discuss and analyse a technique called Evolutionary Squeaky Wheel Optimisation and apply it to two different personnel scheduling problems. Evolutionary Squeaky Wheel Optimisation improves the original Squeaky Wheel Optimisation's effectiveness and execution speed by incorporating two extra steps (Selection and Mutation) for added evolution. In the Evolutionary Squeaky Wheel Optimisation, a cycle of Analysis-Selection-Mutation-Prioritization-Construction continues until stopping conditions are reached. The aim of the Analysis step is to identify below average solution components by calculating a fitness value for all components. The Selection step then chooses amongst these underperformers and discards some probabilistically based on fitness. The Mutation step further discards a few components at random. Solutions can become incomplete and thus repairs may be required. The repairs are carried out by using the Prioritization to first produce priorities that determine an order by which the following Construction step then schedules the remaining components. Therefore, improvement in the Evolutionary Squeaky Wheel Optimisation is achieved by selective solution disruption mixed with interative improvement and constructive repair. Strong experimental results are reported on two different domains of personnel scheduling: bus and rail driver scheduling and hospital nurse scheduling.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 13:36:01 GMT" } ]
2016-11-17T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Li", "Jingpeng", "" ], [ "Burke", "Edmund", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0910.3084
Cristina Fern\'andez-C\'ordoba
J. Borges, S.T. Dougherty and C. Fernandez-Cordoba
Self-Dual Codes over Z_2xZ_4
Submitted to Designs, Codes and Cryptography
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Self-dual codes over $\Z_2\times\Z_4$ are subgroups of $\Z_2^\alpha \times\Z_4^\beta$ that are equal to their orthogonal under an inner-product that relates to the binary Hamming scheme. Three types of self-dual codes are defined. For each type, the possible values $\alpha,\beta$ such that there exist a code $\C\subseteq \Z_2^\alpha \times\Z_4^\beta$ are established. Moreover, the construction of a $\add$-linear code for each type and possible pair $(\alpha,\beta)$ is given. Finally, the standard techniques of invariant theory are applied to describe the weight enumerators for each type.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 11:30:57 GMT" } ]
2009-10-19T00:00:00
[ [ "Borges", "J.", "" ], [ "Dougherty", "S. T.", "" ], [ "Fernandez-Cordoba", "C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.3085
Achim Blumensath
Achim Blumensath
Guarded Second-Order Logic, Spanning Trees, and Network Flows
null
Logical Methods in Computer Science, Volume 6, Issue 1 (February 16, 2010) lmcs:1207
10.2168/LMCS-6(1:4)2010
null
cs.LO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
According to a theorem of Courcelle monadic second-order logic and guarded second-order logic (where one can also quantify over sets of edges) have the same expressive power over the class of all countable $k$-sparse hypergraphs. In the first part of the present paper we extend this result to hypergraphs of arbitrary cardinality. In the second part, we present a generalisation dealing with methods to encode sets of vertices by single vertices.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 11:32:13 GMT" }, { "version": "v2", "created": "Tue, 16 Feb 2010 15:00:14 GMT" } ]
2015-07-01T00:00:00
[ [ "Blumensath", "Achim", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.3113
Pavel Chebotarev
Rafig Agaev and Pavel Chebotarev
Which Digraphs with Ring Structure are Essentially Cyclic?
19 pages, 8 figures, Advances in Applied Mathematics: accepted for publication (2010) http://dx.doi.org/10.1016/j.aam.2010.01.005
Advances in Applied Mathematics 45 (2010), pp. 232-251
10.1016/j.aam.2010.01.005
null
math.CO cs.DM cs.MA math.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We say that a digraph is essentially cyclic if its Laplacian spectrum is not completely real. The essential cyclicity implies the presence of directed cycles, but not vice versa. The problem of characterizing essential cyclicity in terms of graph topology is difficult and yet unsolved. Its solution is important for some applications of graph theory, including that in decentralized control. In the present paper, this problem is solved with respect to the class of digraphs with ring structure, which models some typical communication networks. It is shown that the digraphs in this class are essentially cyclic, except for certain specified digraphs. The main technical tool we employ is the Chebyshev polynomials of the second kind. A by-product of this study is a theorem on the zeros of polynomials that differ by one from the products of Chebyshev polynomials of the second kind. We also consider the problem of essential cyclicity for weighted digraphs and enumerate the spanning trees in some digraphs with ring structure.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 13:48:03 GMT" }, { "version": "v2", "created": "Sun, 18 Oct 2009 09:03:30 GMT" }, { "version": "v3", "created": "Sat, 23 Jan 2010 15:58:35 GMT" }, { "version": "v4", "created": "Tue, 23 Feb 2010 20:08:40 GMT" } ]
2010-06-04T00:00:00
[ [ "Agaev", "Rafig", "" ], [ "Chebotarev", "Pavel", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Mathematics", "code": "math.SP", "description": "Schrodinger operators, operators on manifolds, general differential operators, numerical studies, integral operators, discrete models, resonances, non-self-adjoint operators, random operators/matrices", "span": "(Spectral Theory)" } ]