id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0910.1868
|
N Vunka Jungum
|
Vishal Goyal and Gurpreet Singh Lehal
|
Evaluation of Hindi to Punjabi Machine Translation System
|
"International Journal of Computer Science Issues, IJCSI, Volume 4,
Issue 1, pp36-39, September 2009"
|
V.Goyal and G. Singh Lehal, "Evaluation of Hindi to Punjabi
Machine Translation System", International Journal of Computer Science
Issues, IJCSI, Volume 4, Issue 1, pp36-39, September 2009
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Machine Translation in India is relatively young. The earliest efforts date
from the late 80s and early 90s. The success of every system is judged from its
evaluation experimental results. Number of machine translation systems has been
started for development but to the best of author knowledge, no high quality
system has been completed which can be used in real applications. Recently,
Punjabi University, Patiala, India has developed Punjabi to Hindi Machine
translation system with high accuracy of about 92%. Both the systems i.e.
system under question and developed system are between same closely related
languages. Thus, this paper presents the evaluation results of Hindi to Punjabi
machine translation system. It makes sense to use same evaluation criteria as
that of Punjabi to Hindi Punjabi Machine Translation System. After evaluation,
the accuracy of the system is found to be about 95%.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 21:40:26 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Goyal",
"Vishal",
""
],
[
"Lehal",
"Gurpreet Singh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0910.1869
|
N Vunka Jungum
|
Ravita Chahar, Komal Hooda and Annu Dhankhar
|
Management Of Volatile Information In Incremental Web Crawler
|
Paper has been withdrawn
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Paper has been withdrawn.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 21:42:58 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Oct 2009 07:09:51 GMT"
}
] | 2009-10-27T00:00:00 |
[
[
"Chahar",
"Ravita",
""
],
[
"Hooda",
"Komal",
""
],
[
"Dhankhar",
"Annu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0910.1871
|
Mustafa Cenk Gursoy
|
Mustafa Cenk Gursoy
|
MIMO Wireless Communications under Statistical Queueing Constraints
|
A shorter version is presented at the 2009 Allerton Conference
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The performance of multiple-input multiple-output wireless systems is
investigated in the presence of statistical queueing constraints. Queuing
constraints are imposed as limitations on buffer violation probabilities. The
performance under such constraints is captured through the effective capacity
formulation. A detailed analysis of the effective capacity is carried out in
the low-power, wideband, and high--signal-to-noise ratio (SNR) regimes. In the
low-power analysis, expressions for the first and second derivatives of the
effective capacity with respect to SNR at SNR= 0 are obtained under various
assumptions on the degree of channel state information at the transmitter.
Transmission strategies that are optimal in the sense of achieving the first
and second derivatives are identified. It is shown that while the first
derivative does not get affected by the presence of queueing constraints, the
second derivative gets smaller as the constraints become more stringent.
Through the energy efficiency analysis, this is shown to imply that the minimum
bit energy requirements do not change with more strict limitations but the
wideband slope diminishes. Similar results are obtained in the wideband regime
if rich multipath fading is being experienced. On the other hand, sparse
multipath fading with bounded number of degrees of freedom is shown to increase
the minimum bit energy requirements in the presence of queueing constraints.
Following the low-SNR study, the impact of buffer limitations on the high-SNR
performance is quantified by analyzing the high-SNR slope and the power offset
in Rayleigh fading channels. Finally, numerical results are provided to
illustrate the theoretical findings.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 22:02:37 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Gursoy",
"Mustafa Cenk",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1879
|
David Gross
|
David Gross
|
Recovering low-rank matrices from few coefficients in any basis
|
See also arxiv:0909.3304. v1=v2. v3: Some bounds substantially
improved. v4, v5: presentation improved. To appear in IEEE Transactions on
Information Theory
|
IEEE Trans. on Information Theory, vol. 57, pages 1548 - 1566
(2011)
|
10.1109/TIT.2011.2104999
| null |
cs.IT cs.NA math.IT math.NA quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present novel techniques for analyzing the problem of low-rank matrix
recovery. The methods are both considerably simpler and more general than
previous approaches. It is shown that an unknown (n x n) matrix of rank r can
be efficiently reconstructed from only O(n r nu log^2 n) randomly sampled
expansion coefficients with respect to any given matrix basis. The number nu
quantifies the "degree of incoherence" between the unknown matrix and the
basis. Existing work concentrated mostly on the problem of "matrix completion"
where one aims to recover a low-rank matrix from randomly selected matrix
elements. Our result covers this situation as a special case. The proof
consists of a series of relatively elementary steps, which stands in contrast
to the highly involved methods previously employed to obtain comparable
results. In cases where bounds had been known before, our estimates are
slightly tighter. We discuss operator bases which are incoherent to all
low-rank matrices simultaneously. For these bases, we show that O(n r nu log n)
randomly sampled expansion coefficients suffice to recover any low-rank matrix
with high probability. The latter bound is tight up to multiplicative
constants.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 19:56:24 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Oct 2009 21:34:41 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Oct 2009 20:08:36 GMT"
},
{
"version": "v4",
"created": "Wed, 16 Dec 2009 20:40:51 GMT"
},
{
"version": "v5",
"created": "Fri, 17 Sep 2010 14:40:19 GMT"
}
] | 2011-03-22T00:00:00 |
[
[
"Gross",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0910.1901
|
Christian Attiogbe
|
Christian Attiogbe (LINA)
|
Can Component/Service-Based Systems Be Proved Correct?
|
16 pages
|
Conference on Current Trends in Theory and Practice of Computer
Science, Czech Republic, Spindleruv Ml\'yn, : Czech Republic (2009)
|
10.1007/978-3-540-95891-8_2
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Component-oriented and service-oriented approaches have gained a strong
enthusiasm in industries and academia with a particular interest for
service-oriented approaches. A component is a software entity with given
functionalities, made available by a provider, and used to build other
application within which it is integrated. The service concept and its use in
web-based application development have a huge impact on reuse practices.
Accordingly a considerable part of software architectures is influenced; these
architectures are moving towards service-oriented architectures. Therefore
applications (re)use services that are available elsewhere and many
applications interact, without knowing each other, using services available via
service servers and their published interfaces and functionalities. Industries
propose, through various consortium, languages, technologies and standards.
More academic works are also undertaken concerning semantics and formalisation
of components and service-based systems. We consider here both streams of works
in order to raise research concerns that will help in building quality
software. Are there new challenging problems with respect to service-based
software construction? Besides, what are the links and the advances compared to
distributed systems?
|
[
{
"version": "v1",
"created": "Sat, 10 Oct 2009 06:33:39 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Attiogbe",
"Christian",
"",
"LINA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0910.1922
|
Valentin Savin
|
Valentin Savin
|
Binary Linear-Time Erasure Decoding for Non-Binary LDPC codes
|
5 pages, ITW
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we first introduce the extended binary representation of
non-binary codes, which corresponds to a covering graph of the bipartite graph
associated with the non-binary code. Then we show that non-binary codewords
correspond to binary codewords of the extended representation that further
satisfy some simplex-constraint: that is, bits lying over the same symbol-node
of the non-binary graph must form a codeword of a simplex code. Applied to the
binary erasure channel, this description leads to a binary erasure decoding
algorithm of non-binary LDPC codes, whose complexity depends linearly on the
cardinality of the alphabet. We also give insights into the structure of
stopping sets for non-binary LDPC codes, and discuss several aspects related to
upper-layer FEC applications.
|
[
{
"version": "v1",
"created": "Sat, 10 Oct 2009 14:41:46 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Savin",
"Valentin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.1923
|
David Bremner
|
David Bremner and Dan Chen
|
A Branch and Cut Algorithm for the Halfspace Depth Problem
| null | null | null | null |
cs.CG cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The concept of \emph{data depth} in non-parametric multivariate descriptive
statistics is the generalization of the univariate rank method to multivariate
data. \emph{Halfspace depth} is a measure of data depth. Given a set $S$ of
points and a point $p$, the halfspace depth (or rank) of $p$ is defined as the
minimum number of points of $S$ contained in any closed halfspace with $p$ on
its boundary. Computing halfspace depth is NP-hard, and it is equivalent to the
Maximum Feasible Subsystem problem. In this paper a mixed integer program is
formulated with the big-$M$ method for the halfspace depth problem. We suggest
a branch and cut algorithm for these integer programs. In this algorithm,
Chinneck's heuristic algorithm is used to find an upper bound and a related
technique based on sensitivity analysis is used for branching. Irreducible
Infeasible Subsystem (IIS) hitting set cuts are applied. We also suggest a
binary search algorithm which may be more numerically stable. The algorithms
are implemented with the BCP framework from the \textbf{COIN-OR} project.
|
[
{
"version": "v1",
"created": "Sat, 10 Oct 2009 14:42:28 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Bremner",
"David",
""
],
[
"Chen",
"Dan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0910.1926
|
David Harvey
|
David Harvey
|
Faster algorithms for the square root and reciprocal of power series
|
6 pages, 1 figure, requires algorithm2e package
| null | null | null |
cs.SC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give new algorithms for the computation of square roots and reciprocals of
power series in C[[x]]. If M(n) denotes the cost of multiplying polynomials of
degree n, the square root to order n costs (1.333... + o(1)) M(n) and the
reciprocal costs (1.444... + o(1)) M(n). These improve on the previous best
results, respectively (1.8333... + o(1)) M(n) and (1.5 + o(1)) M(n).
|
[
{
"version": "v1",
"created": "Sat, 10 Oct 2009 15:41:04 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Harvey",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.1938
|
Patricio Galeas
|
Patricio Galeas, Ralph Kretschmer and Bernd Freisleben
|
Information Retrieval via Truncated Hilbert-Space Expansions
|
12 pages, submitted to proceedings of ECIR-2010
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In addition to the frequency of terms in a document collection, the
distribution of terms plays an important role in determining the relevance of
documents. In this paper, a new approach for representing term positions in
documents is presented. The approach allows an efficient evaluation of
term-positional information at query evaluation time. Three applications are
investigated: a function-based ranking optimization representing a user-defined
document region, a query expansion technique based on overlapping the term
distributions in the top-ranked documents, and cluster analysis of terms in
documents. Experimental results demonstrate the effectiveness of the proposed
approach.
|
[
{
"version": "v1",
"created": "Sat, 10 Oct 2009 19:26:13 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Galeas",
"Patricio",
""
],
[
"Kretschmer",
"Ralph",
""
],
[
"Freisleben",
"Bernd",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0910.1943
|
Sina Jafarpour
|
Robert Calderbank, Stephen Howard, Sina Jafarpour
|
Construction of a Large Class of Deterministic Sensing Matrices that
Satisfy a Statistical Isometry Property
|
16 Pages, 2 figures, to appear in IEEE Journal of Selected Topics in
Signal Processing, the special issue on Compressed Sensing
| null |
10.1109/JSTSP.2010.2043161
| null |
cs.IT math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Compressed Sensing aims to capture attributes of $k$-sparse signals using
very few measurements. In the standard Compressed Sensing paradigm, the
$\m\times \n$ measurement matrix $\A$ is required to act as a near isometry on
the set of all $k$-sparse signals (Restricted Isometry Property or RIP).
Although it is known that certain probabilistic processes generate $\m \times
\n$ matrices that satisfy RIP with high probability, there is no practical
algorithm for verifying whether a given sensing matrix $\A$ has this property,
crucial for the feasibility of the standard recovery algorithms. In contrast
this paper provides simple criteria that guarantee that a deterministic sensing
matrix satisfying these criteria acts as a near isometry on an overwhelming
majority of $k$-sparse signals; in particular, most such signals have a unique
representation in the measurement domain. Probability still plays a critical
role, but it enters the signal model rather than the construction of the
sensing matrix. We require the columns of the sensing matrix to form a group
under pointwise multiplication. The construction allows recovery methods for
which the expected performance is sub-linear in $\n$, and only quadratic in
$\m$; the focus on expected performance is more typical of mainstream signal
processing than the worst-case analysis that prevails in standard Compressed
Sensing. Our framework encompasses many families of deterministic sensing
matrices, including those formed from discrete chirps, Delsarte-Goethals codes,
and extended BCH codes.
|
[
{
"version": "v1",
"created": "Sat, 10 Oct 2009 20:39:44 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Calderbank",
"Robert",
""
],
[
"Howard",
"Stephen",
""
],
[
"Jafarpour",
"Sina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0910.1954
|
Sahand Haji Ali Ahmad
|
Sahand Haji Ali Ahmad, Mingyan Liu
|
Multi-channel Opportunistic Access: A Case of Restless Bandits with
Multiple Plays
|
8 pages, 0 figures, Forty-Seventh Annual Allerton Conference on
Communication, Control, and Computing, 2009
|
Proceedings of Forty-Seventh Annual Allerton Conference on
Communication, Control, and Computing, 2009
| null | null |
cs.IT cs.DM math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers the following stochastic control problem that arises in
opportunistic spectrum access: a system consists of n channels (Gilbert-Elliot
channels)where the state (good or bad) of each channel evolves as independent
and identically distributed Markov processes. A user can select exactly k
channels to sense and access (based on the sensing result) in each time slot. A
reward is obtained whenever the user senses and accesses a good channel. The
objective is to design a channel selection policy that maximizes the expected
discounted total reward accrued over a finite or infinite horizon. In our
previous work we established the optimality of a greedy policy for the special
case of k = 1 (i.e., single channel access) under the condition that the
channel state transitions are positively correlated over time. In this paper we
show under the same condition the greedy policy is optimal for the general case
of k >= 1; the methodology introduced here is thus more general. This problem
may be viewed as a special case of the restless bandit problem, with multiple
plays. We discuss connections between the current problem and existing
literature on this class of problems.
|
[
{
"version": "v1",
"created": "Sat, 10 Oct 2009 22:36:48 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Ahmad",
"Sahand Haji Ali",
""
],
[
"Liu",
"Mingyan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0910.1955
|
Ryszard Piasecki
|
R. Piasecki
|
Microstructure reconstruction using entropic descriptors
|
version accepted for publication in Proc. R. Soc. A
|
Proc. R. Soc. A 467 (2011) 806-820
|
10.1098/rspa.2010.0296
| null |
cond-mat.stat-mech cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A multi-scale approach to the inverse reconstruction of a pattern's
microstructure is reported. Instead of a correlation function, a pair of
entropic descriptors (EDs) is proposed for stochastic optimization method. The
first of them measures a spatial inhomogeneity, for a binary pattern, or
compositional one, for a greyscale image. The second one quantifies a spatial
or compositional statistical complexity. The EDs reveal structural information
that is dissimilar, at least in part, to that given by correlation functions at
almost all of discrete length scales. The method is tested on a few digitized
binary and greyscale images. In each of the cases, the persuasive
reconstruction of the microstructure is found.
|
[
{
"version": "v1",
"created": "Sat, 10 Oct 2009 22:55:53 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Oct 2009 20:53:58 GMT"
},
{
"version": "v3",
"created": "Tue, 24 Nov 2009 17:40:29 GMT"
},
{
"version": "v4",
"created": "Fri, 11 Jun 2010 10:27:03 GMT"
},
{
"version": "v5",
"created": "Thu, 26 Aug 2010 13:59:23 GMT"
}
] | 2011-02-16T00:00:00 |
[
[
"Piasecki",
"R.",
""
]
] |
[
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0910.1969
|
Ajinkya Kale
|
Ajinkya Kale, Shaunak Vaidya, Ashish Joglekar
|
A Generalized Recursive Algorithm for Binary Multiplication based on
Vedic Mathematics
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A generalized algorithm for multiplication is proposed through recursive
application of the Nikhilam Sutra from Vedic Mathematics, operating in radix -
2 number system environment suitable for digital platforms. Statistical
analysis has been carried out based on the number of recursions profile as a
function of the smaller multiplicand. The proposed algorithm is efficient for
smaller multiplicands as well, unlike most of the asymptotically fast
algorithms. Further, a basic block schematic of Hardware Implementation of our
algorithm is suggested to exploit parallelism and speed up the implementation
of the algorithm in a multiprocessor environment.
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2009 04:57:22 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Kale",
"Ajinkya",
""
],
[
"Vaidya",
"Shaunak",
""
],
[
"Joglekar",
"Ashish",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.1974
|
Rajkumar Buyya
|
Rajkumar Buyya, Suraj Pandey, and Christian Vecchiola
|
Cloudbus Toolkit for Market-Oriented Cloud Computing
|
21 pages, 6 figures, 2 tables, Conference paper
|
Proceeding of the 1st International Conference on Cloud Computing
(CloudCom 2009, Springer, Germany), Beijing, China, December 1-4, 2009
|
10.1007/978-3-642-10665-1_4
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This keynote paper: (1) presents the 21st century vision of computing and
identifies various IT paradigms promising to deliver computing as a utility;
(2) defines the architecture for creating market-oriented Clouds and computing
atmosphere by leveraging technologies such as virtual machines; (3) provides
thoughts on market-based resource management strategies that encompass both
customer-driven service management and computational risk management to sustain
SLA-oriented resource allocation; (4) presents the work carried out as part of
our new Cloud Computing initiative, called Cloudbus: (i) Aneka, a Platform as a
Service software system containing SDK (Software Development Kit) for
construction of Cloud applications and deployment on private or public Clouds,
in addition to supporting market-oriented resource management; (ii)
internetworking of Clouds for dynamic creation of federated computing
environments for scaling of elastic applications; (iii) creation of 3rd party
Cloud brokering services for building content delivery networks and e-Science
applications and their deployment on capabilities of IaaS providers such as
Amazon along with Grid mashups; (iv) CloudSim supporting modelling and
simulation of Clouds for performance studies; (v) Energy Efficient Resource
Allocation Mechanisms and Techniques for creation and management of Green
Clouds; and (vi) pathways for future research.
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2009 06:26:29 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Buyya",
"Rajkumar",
""
],
[
"Pandey",
"Suraj",
""
],
[
"Vecchiola",
"Christian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0910.1979
|
Rajkumar Buyya
|
Christian Vecchiola, Suraj Pandey, and Rajkumar Buyya
|
High-Performance Cloud Computing: A View of Scientific Applications
|
13 pages, 9 figures, conference paper
|
Proceedings of the 10th International Symposium on Pervasive
Systems, Algorithms and Networks (I-SPAN 2009, IEEE CS Press, USA),
Kaohsiung, Taiwan, December 14-16, 2009
|
10.1109/I-SPAN.2009.150
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Scientific computing often requires the availability of a massive number of
computers for performing large scale experiments. Traditionally, these needs
have been addressed by using high-performance computing solutions and installed
facilities such as clusters and super computers, which are difficult to setup,
maintain, and operate. Cloud computing provides scientists with a completely
new model of utilizing the computing infrastructure. Compute resources, storage
resources, as well as applications, can be dynamically provisioned (and
integrated within the existing infrastructure) on a pay per use basis. These
resources can be released when they are no more needed. Such services are often
offered within the context of a Service Level Agreement (SLA), which ensure the
desired Quality of Service (QoS). Aneka, an enterprise Cloud computing
solution, harnesses the power of compute resources by relying on private and
public Clouds and delivers to users the desired QoS. Its flexible and service
based infrastructure supports multiple programming paradigms that make Aneka
address a variety of different scenarios: from finance applications to
computational science. As examples of scientific computing in the Cloud, we
present a preliminary case study on using Aneka for the classification of gene
expression data and the execution of fMRI brain imaging workflow.
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2009 07:42:44 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Vecchiola",
"Christian",
""
],
[
"Pandey",
"Suraj",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0910.2004
|
Christian Schulz
|
Manuel Holtgrewe, Peter Sanders, Christian Schulz
|
Engineering a Scalable High Quality Graph Partitioner
| null | null | null | null |
cs.DC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe an approach to parallel graph partitioning that scales to
hundreds of processors and produces a high solution quality. For example, for
many instances from Walshaw's benchmark collection we improve the best known
partitioning. We use the well known framework of multi-level graph
partitioning. All components are implemented by scalable parallel algorithms.
Quality improvements compared to previous systems are due to better
prioritization of edges to be contracted, better approximation algorithms for
identifying matchings, better local search heuristics, and perhaps most
notably, a parallelization of the FM local search algorithm that works more
locally than previous approaches.
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2009 14:36:07 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Apr 2010 14:35:26 GMT"
}
] | 2010-04-08T00:00:00 |
[
[
"Holtgrewe",
"Manuel",
""
],
[
"Sanders",
"Peter",
""
],
[
"Schulz",
"Christian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.2005
|
Fan Zhang
|
Fan Zhang and Henry D. Pfister
|
Modulation Codes for Flash Memory Based on Load-Balancing Theory
|
This work was presented in the 47-th Allerton conference
| null | null | null |
cs.IT math.IT
|
http://creativecommons.org/licenses/publicdomain/
|
In this paper, we consider modulation codes for practical multilevel flash
memory storage systems with cell levels. Instead of maximizing the lifetime of
the device [Ajiang-isit07-01, Ajiang-isit07-02,
Yaakobi_verdy_siegel_wolf_allerton08, Finucane_Liu_Mitzenmacher_aller08], we
maximize the average amount of information stored per cell-level, which is
defined as storage efficiency. Using this framework, we show that the
worst-case criterion [Ajiang-isit07-01, Ajiang-isit07-02,
Yaakobi_verdy_siegel_wolf_allerton08] and the average-case criterion
[Finucane_Liu_Mitzenmacher_aller08] are two extreme cases of our objective
function. A self-randomized modulation code is proposed which is asymptotically
optimal, as, for an arbitrary input alphabet and i.i.d. input distribution.
In practical flash memory systems, the number of cell-levels is only
moderately large. So the asymptotic performance as may not tell the whole
story. Using the tools from load-balancing theory, we analyze the storage
efficiency of the self-randomized modulation code. The result shows that only a
fraction of the cells are utilized when the number of cell-levels is only
moderately large. We also propose a load-balancing modulation code, based on a
phenomenon known as "the power of two random choices" [Mitzenmacher96thepower],
to improve the storage efficiency of practical systems. Theoretical analysis
and simulation results show that our load-balancing modulation codes can
provide significant gain to practical flash memory storage systems. Though
pseudo-random, our approach achieves the same load-balancing performance, for
i.i.d. inputs, as a purely random approach based on the power of two random
choices.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 18:41:32 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Zhang",
"Fan",
""
],
[
"Pfister",
"Henry D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2007
|
Zhang Shengli
|
Shengli Zhang, Soung-Chang Liew, Lu Lu, and Hui Wang
|
Interference with Symbol-misalignment
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies the impact of interference asynchrony among different
links in a wireless network. Without deliberate coordination and cooperation
among the active links, there is a naturally occurring misalignment between the
symbols of the targeted signal of a receiver and the symbols of the interfering
signals. Interestingly, we show that the interference asynchrony can actually
improve the BER performance, compared with the situation in which symbols of al
signals ay aligned. In particular, we show that symbol misalignment can
decrease the "effective interference power" and change the distribution of the
interfering signals, in a way that results in lower BER. To ensure that symbol
misalignment can be consistently attained, we propose two simple schemes that
introduce time-varying symbol offsets to obtain an "average" performance of
random symbol misalignment. Notably, our schemes do not change the simple
receiver design structure; only the transmitters are modified in a minor way.
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2009 14:28:58 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Zhang",
"Shengli",
""
],
[
"Liew",
"Soung-Chang",
""
],
[
"Lu",
"Lu",
""
],
[
"Wang",
"Hui",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.2024
|
Assaf Naor
|
Jeff Cheeger, Bruce Kleiner, Assaf Naor
|
A $(\log n)^{\Omega(1)}$ integrality gap for the Sparsest Cut SDP
| null | null | null | null |
cs.DS math.FA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that the Goemans-Linial semidefinite relaxation of the Sparsest Cut
problem with general demands has integrality gap $(\log n)^{\Omega(1)}$. This
is achieved by exhibiting $n$-point metric spaces of negative type whose $L_1$
distortion is $(\log n)^{\Omega(1)}$. Our result is based on quantitative
bounds on the rate of degeneration of Lipschitz maps from the Heisenberg group
to $L_1$ when restricted to cosets of the center.
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2009 17:39:05 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Nov 2009 20:09:45 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Cheeger",
"Jeff",
""
],
[
"Kleiner",
"Bruce",
""
],
[
"Naor",
"Assaf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
}
] |
0910.2026
|
Assaf Naor
|
Jeff Cheeger, Bruce Kleiner, Assaf Naor
|
Compression bounds for Lipschitz maps from the Heisenberg group to $L_1$
| null | null | null | null |
math.MG cs.DS math.DG math.FA math.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove a quantitative bi-Lipschitz nonembedding theorem for the Heisenberg
group with its Carnot-Carath\'eodory metric and apply it to give a lower bound
on the integrality gap of the Goemans-Linial semidefinite relaxation of the
Sparsest Cut problem.
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2009 17:49:44 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Cheeger",
"Jeff",
""
],
[
"Kleiner",
"Bruce",
""
],
[
"Naor",
"Assaf",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
},
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
}
] |
0910.2028
|
Rdv Ijcsis
|
Shahram Jamali, Morteza Analoui
|
Congestion Control in the Internet by Employing a Ratio dependent Plant
Herbivore Carnivorous Model
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 175-181, September 2009, USA
| null |
ISSN 1947 5500
|
cs.NI cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The demand for Internet based services has exploded over the last decade.
Many organizations use the Internet and particularly the World Wide Web as
their primary medium for communication and business. This phenomenal growth has
dramatically increased the performance requirements for the Internet. To have a
high performance Internet, a good congestion control system is essential for
it. The current work proposes that the congestion control in the Internet can
be inspired from the population control tactics of the nature. Toward this
idea, each flow (W) in the network is viewed as a species whose population size
is congestion window size of the flow. By this assumption, congestion control
problem is redefined as population control of flow species. This paper defines
a three trophic food chain analogy in congestion control area, and gives a
ratio dependent model to control population size of W species within this plant
herbivore carnivorous food chain. Simulation results show that this model
achieves fair bandwidth allocation, high utilization and small queue size. It
does not maintain any per flow state in routers and have few computational
loads per packet, which makes it scalable.
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2009 18:49:00 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Jamali",
"Shahram",
""
],
[
"Analoui",
"Morteza",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.2029
|
Rdv Ijcsis
|
Roya Asadi, Norwati Mustapha, Nasir Sulaiman
|
A Framework For Intelligent Multi Agent System Based Neural Network
Classification Model
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 168-174, September 2009, USA
| null |
ISSN 1947 5500
|
cs.NE cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
TIntelligent multi agent systems have great potentials to use in different
purposes and research areas. One of the important issues to apply intelligent
multi agent systems in real world and virtual environment is to develop a
framework that support machine learning model to reflect the whole complexity
of the real world. In this paper, we proposed a framework of intelligent agent
based neural network classification model to solve the problem of gap between
two applicable flows of intelligent multi agent technology and learning model
from real environment. We consider the new Supervised Multilayers Feed Forward
Neural Network (SMFFNN) model as an intelligent classification for learning
model in the framework. The framework earns the information from the respective
environment and its behavior can be recognized by the weights. Therefore, the
SMFFNN model that lies in the framework will give more benefits in finding the
suitable information and the real weights from the environment which result for
better recognition. The framework is applicable to different domains
successfully and for the potential case study, the clinical organization and
its domain is considered for the proposed framework
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2009 19:02:42 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Asadi",
"Roya",
""
],
[
"Mustapha",
"Norwati",
""
],
[
"Sulaiman",
"Nasir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0910.2034
|
Hugo Zanghi
|
Hugo Zanghi, Franck Picard, Vincent Miele, Christophe Ambroise
|
Strategies for online inference of model-based clustering in large and
growing networks
|
Published in at http://dx.doi.org/10.1214/10-AOAS359 the Annals of
Applied Statistics (http://www.imstat.org/aoas/) by the Institute of
Mathematical Statistics (http://www.imstat.org)
|
Annals of Applied Statistics 2010, Vol. 4, No. 2, 687-714
|
10.1214/10-AOAS359
|
IMS-AOAS-AOAS359
|
stat.AP cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we adapt online estimation strategies to perform model-based
clustering on large networks. Our work focuses on two algorithms, the first
based on the SAEM algorithm, and the second on variational methods. These two
strategies are compared with existing approaches on simulated and real data. We
use the method to decipher the connexion structure of the political websphere
during the US political campaign in 2008. We show that our online EM-based
algorithms offer a good trade-off between precision and speed, when estimating
parameters for mixture distributions in the context of random graphs.
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2009 19:36:16 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Nov 2010 09:02:00 GMT"
}
] | 2010-11-11T00:00:00 |
[
[
"Zanghi",
"Hugo",
""
],
[
"Picard",
"Franck",
""
],
[
"Miele",
"Vincent",
""
],
[
"Ambroise",
"Christophe",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0910.2039
|
Keyan Zahedi
|
Keyan Zahedi, Nihat Ay and Ralf Der
|
Higher coordination with less control - A result of information
maximization in the sensorimotor loop
| null | null | null | null |
cs.AI cs.IT cs.RO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work presents a novel learning method in the context of embodied
artificial intelligence and self-organization, which has as few assumptions and
restrictions as possible about the world and the underlying model. The learning
rule is derived from the principle of maximizing the predictive information in
the sensorimotor loop. It is evaluated on robot chains of varying length with
individually controlled, non-communicating segments. The comparison of the
results shows that maximizing the predictive information per wheel leads to a
higher coordinated behavior of the physically connected robots compared to a
maximization per robot. Another focus of this paper is the analysis of the
effect of the robot chain length on the overall behavior of the robots. It will
be shown that longer chains with less capable controllers outperform those of
shorter length and more complex controllers. The reason is found and discussed
in the information-geometric interpretation of the learning process.
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2009 20:06:04 GMT"
},
{
"version": "v2",
"created": "Tue, 18 May 2010 12:00:44 GMT"
}
] | 2010-05-19T00:00:00 |
[
[
"Zahedi",
"Keyan",
""
],
[
"Ay",
"Nihat",
""
],
[
"Der",
"Ralf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2042
|
Martin Wainwright
|
Garvesh Raskutti, Martin J. Wainwright, and Bin Yu
|
Minimax rates of estimation for high-dimensional linear regression over
$\ell_q$-balls
|
Presented in part at the Allerton Conference on Control,
Communication and Computer, Monticello, IL, October 2009
| null | null | null |
math.ST cs.IT math.IT stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Consider the standard linear regression model $\y = \Xmat \betastar + w$,
where $\y \in \real^\numobs$ is an observation vector, $\Xmat \in
\real^{\numobs \times \pdim}$ is a design matrix, $\betastar \in \real^\pdim$
is the unknown regression vector, and $w \sim \mathcal{N}(0, \sigma^2 I)$ is
additive Gaussian noise. This paper studies the minimax rates of convergence
for estimation of $\betastar$ for $\ell_\rpar$-losses and in the
$\ell_2$-prediction loss, assuming that $\betastar$ belongs to an
$\ell_{\qpar}$-ball $\Ballq(\myrad)$ for some $\qpar \in [0,1]$. We show that
under suitable regularity conditions on the design matrix $\Xmat$, the minimax
error in $\ell_2$-loss and $\ell_2$-prediction loss scales as $\Rq
\big(\frac{\log \pdim}{n}\big)^{1-\frac{\qpar}{2}}$. In addition, we provide
lower bounds on minimax risks in $\ell_{\rpar}$-norms, for all $\rpar \in [1,
+\infty], \rpar \neq \qpar$. Our proofs of the lower bounds are
information-theoretic in nature, based on Fano's inequality and results on the
metric entropy of the balls $\Ballq(\myrad)$, whereas our proofs of the upper
bounds are direct and constructive, involving direct analysis of least-squares
over $\ell_{\qpar}$-balls. For the special case $q = 0$, a comparison with
$\ell_2$-risks achieved by computationally efficient $\ell_1$-relaxations
reveals that although such methods can achieve the minimax rates up to constant
factors, they require slightly stronger assumptions on the design matrix
$\Xmat$ than algorithms involving least-squares over the $\ell_0$-ball.
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2009 20:38:57 GMT"
}
] | 2010-09-14T00:00:00 |
[
[
"Raskutti",
"Garvesh",
""
],
[
"Wainwright",
"Martin J.",
""
],
[
"Yu",
"Bin",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0910.2044
|
Oleg Mokhov
|
O.I.Mokhov
|
Consistency on cubic lattices for determinants of arbitrary orders
| null |
Proceedings of the Steklov Institute of Mathematics, 2009, Vol.
266, pp. 195-209
| null | null |
nlin.SI cs.CG cs.DM math-ph math.DS math.MP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a special class of two-dimensional discrete equations defined by
relations on elementary NxN squares, N>2, of the square lattice Z^2, and
propose a new type of consistency conditions on cubic lattices for such
discrete equations that is connected to bending elementary NxN squares, N>2, in
the cubic lattice Z^3. For an arbitrary N we prove such consistency on cubic
lattices for two-dimensional discrete equations defined by the condition that
the determinants of values of the field at the points of the square lattice Z^2
that are contained in elementary NxN squares vanish.
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2009 20:51:37 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Mokhov",
"O. I.",
""
]
] |
[
{
"class": "Physics",
"code": "nlin.SI",
"description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems",
"span": "(Exactly Solvable and Integrable Systems)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
0910.2048
|
Grenville Croll
|
Raymond J. Butler
|
The Role of Spreadsheets in the Allied Irish Bank / Allfirst Currency
Trading Fraud
|
4 Pages. To Appear Proc. European Spreadsheet Risks Interest Group
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This brief paper outlines how spreadsheets were used as one of the vehicles
for John Rusnak's fraud and the revenue control lessons this case gives us.
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2009 20:58:55 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Butler",
"Raymond J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0910.2058
|
Christopher Laumann
|
C.R. Laumann, A.M. L\"auchli, R. Moessner, A. Scardicchio and S.L.
Sondhi
|
On product, generic and random generic quantum satisfiability
|
9 pages, 5 figures, 1 table. Updated to more closely match published
version. New proof in appendix
|
Phys. Rev. A 81, 062345 (2010)
|
10.1103/PhysRevA.81.062345
| null |
quant-ph cond-mat.stat-mech cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We report a cluster of results on k-QSAT, the problem of quantum
satisfiability for k-qubit projectors which generalizes classical
satisfiability with k-bit clauses to the quantum setting. First we define the
NP-complete problem of product satisfiability and give a geometrical criterion
for deciding when a QSAT interaction graph is product satisfiable with positive
probability. We show that the same criterion suffices to establish quantum
satisfiability for all projectors. Second, we apply these results to the random
graph ensemble with generic projectors and obtain improved lower bounds on the
location of the SAT--unSAT transition. Third, we present numerical results on
random, generic satisfiability which provide estimates for the location of the
transition for k=3 and k=4 and mild evidence for the existence of a phase which
is satisfiable by entangled states alone.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 15:12:52 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Jul 2010 16:20:32 GMT"
}
] | 2010-07-02T00:00:00 |
[
[
"Laumann",
"C. R.",
""
],
[
"Läuchli",
"A. M.",
""
],
[
"Moessner",
"R.",
""
],
[
"Scardicchio",
"A.",
""
],
[
"Sondhi",
"S. L.",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.2065
|
Keqin Liu
|
Keqin Liu and Qing Zhao
|
Distributed Learning in Multi-Armed Bandit with Multiple Players
|
31 pages, 8 figures, revised paper submitted to IEEE Transactions on
Signal Processing, April, 2010, the pre-agreement in the decentralized TDFS
policy is eliminated to achieve a complete decentralization among players
| null |
10.1109/TSP.2010.2062509
| null |
math.OC cs.LG math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We formulate and study a decentralized multi-armed bandit (MAB) problem.
There are M distributed players competing for N independent arms. Each arm,
when played, offers i.i.d. reward according to a distribution with an unknown
parameter. At each time, each player chooses one arm to play without exchanging
observations or any information with other players. Players choosing the same
arm collide, and, depending on the collision model, either no one receives
reward or the colliding players share the reward in an arbitrary way. We show
that the minimum system regret of the decentralized MAB grows with time at the
same logarithmic order as in the centralized counterpart where players act
collectively as a single entity by exchanging observations and making decisions
jointly. A decentralized policy is constructed to achieve this optimal order
while ensuring fairness among players and without assuming any pre-agreement or
information exchange among players. Based on a Time Division Fair Sharing
(TDFS) of the M best arms, the proposed policy is constructed and its order
optimality is proven under a general reward model. Furthermore, the basic
structure of the TDFS policy can be used with any order-optimal single-player
policy to achieve order optimality in the decentralized setting. We also
establish a lower bound on the system regret growth rate for a general class of
decentralized polices, to which the proposed policy belongs. This problem finds
potential applications in cognitive radio networks, multi-channel communication
systems, multi-agent systems, web search and advertising, and social networks.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 00:50:19 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Dec 2009 17:26:06 GMT"
},
{
"version": "v3",
"created": "Mon, 7 Jun 2010 18:04:14 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Liu",
"Keqin",
""
],
[
"Zhao",
"Qing",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0910.2066
|
Philip Baback Alipour
|
Philip B. Alipour
|
A Lossless Fuzzy Binary AND/OR Compressor
|
LaTeX format, 44 pages, 8 images, 2 tables. Minor modifications were
made (pp. 28, 30-33, 37-40); no major content revision. We discussed the
theoretical approach to feasible conjectures in pattern matching and logic on
a new data compression model. We hypothesized a greater plausibility on data
compression and compaction methods relative to data decompression techniques
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this report, a new fuzzy 2bit-AND parallel-to-OR, or simply, a fuzzy
binary AND/OR (FBAR) text data compression model as an algorithm is suggested
for bettering spatial locality limits on nodes during database transactions.
The current model incorporates a four-layer application technique:
string-to-AND/OR pairwise binary bit + fuzzy quantum with noise conversions.
This technique promotes a lossless data compression ratio of 2:1 up to values
approximately = 3:1, generating a spatially-efficient compressed data file
compared to nowadays data compressors. Data decompression/specific data
reconstruction initiates an AND/OR pattern match technique in respect of fuzzy
quantum indicators in the binary function field. The reconstruction of data
occurs in the 4th layer using encryption methods. It is hypothesized that
significant data compression ratio of 2n:1 for n>3:1 ratios, e.g., 32~64:1 are
achievable via fuzzy qubit indexing over classical byte blocks for every bit
position fragmented into a (1/2 upper +1/2 lower)-bit noise frequency parallel
to its counterpart signal comprised of AND/ORed-bit polarity orientation, ready
for an identical data decompression.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 19:52:53 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Oct 2009 17:27:11 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Alipour",
"Philip B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2099
|
Dillon Mayhew
|
Thomas Britz, B{\aa}rd Heiseldel, Trygve Johnsen, Dillon Mayhew,
Keisuke Shiromoto
|
Generalizations of Wei's Duality Theorem
|
10 pages, 1 figure
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wei's celebrated Duality Theorem is generalized in several ways, expressed as
duality theorems for linear codes over division rings and, more generally,
duality theorems for matroids. These results are further generalized, resulting
in two Wei-type duality theorems for new combinatorial structures that are
introduced and named {\em demi-matroids}. These generalize matroids and are the
appropriate combinatorial objects for describing the duality in Wei's Duality
Theorem. A new proof of the Duality Theorem is thereby given that explains the
theorem in combinatorial terms. Special cases of the general duality theorems
are also given, including duality theorems for cycles and bonds in graphs and
for transversals.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 08:08:28 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Britz",
"Thomas",
""
],
[
"Heiseldel",
"Bård",
""
],
[
"Johnsen",
"Trygve",
""
],
[
"Mayhew",
"Dillon",
""
],
[
"Shiromoto",
"Keisuke",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2104
|
Guoqiang Zhang
|
Guoqiang Zhang
|
On cost-effective communication network designing
|
6 pages, 4 figures
|
Europhysics Letters(EPL), 89(2010) 38003
|
10.1209/0295-5075/89/38003
| null |
cs.NI physics.gen-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
How to efficiently design a communication network is a paramount task for
network designing and engineering. It is, however, not a single objective
optimization process as perceived by most previous researches, i.e., to
maximize its transmission capacity, but a multi-objective optimization process,
with lowering its cost to be another important objective. These two objectives
are often contradictive in that optimizing one objective may deteriorate the
other. After a deep investigation of the impact that network topology, node
capability scheme and routing algorithm as well as their interplays have on the
two objectives, this letter presents a systematic approach to achieve a
cost-effective design by carefully choosing the three designing aspects. Only
when routing algorithm and node capability scheme are elegantly chosen can
BA-like scale-free networks have the potential of achieving good tradeoff
between the two objectives. Random networks, on the other hand, have the
built-in character for a cost-effective design, especially when other aspects
cannot be determined beforehand.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 08:34:43 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Apr 2010 02:57:26 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Zhang",
"Guoqiang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.gen-ph",
"description": "Description coming soon",
"span": "(General Physics)"
}
] |
0910.2113
|
Abhimanu Kumar
|
Abhimanu Kumar, Sanjib Kumar Das
|
A real world network pricing game with less severe Braess' Paradox
|
12 pages, 4 figures
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Internet and graphs are very much related. The graphical structure of
internet has been studied extensively to provide efficient solutions to routing
and other problems. But most of these studies assume a central authority which
controls and manages the internet. In the recent years game theoretic models
have been proposed which do not require a central authority and the users are
assumed to be routing their flows selfishly. The existence of Nash Equilibria,
congestion and the amount of inefficiency caused by this selfish routing is a
major concern in this field. A type of paradox in the selfish routing networks,
Braess' Paradox, first discovered by Braess, is a major contributor to
inefficiency. Several pricing mechanisms have also been provided which give a
game theoretical model between users(consumers) and ISPs ({Internet Service
Providers} or sellers) for the internet.
We propose a novel pricing mechanism, based on real world Internet network
architecture, which reduces the severity of Braess' Paradox in selfish routing
game theoretic networks. It's a pricing mechanism between combinatorial users
and ISPs. We prove that Nash equilibria exists in this network and provide
bounds on inefficiency . We use graphical properties of internet to prove our
result. Several interesting extensions and future work have also been
discussed.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 09:34:27 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Kumar",
"Abhimanu",
""
],
[
"Das",
"Sanjib Kumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0910.2115
|
Pedro Peris-Lopez
|
Pedro Peris-Lopez, Julio C. Hernandez-Castro, J. M. E. Tapiador and
Jan C. A. van der Lubbe
|
Security Flaws in a Recent Ultralightweight RFID Protocol
|
14 pages, 2 figures and 1 table
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In 2006, Peris-Lopez et al. [1, 2, 3] initiated the design of
ultralightweight RFID protocols -with the UMAP family of protocols- involving
only simple bitwise logical or arithmetic operations such as bitwise XOR, OR,
AND, and addition. This combination of operations was revealed later to be
insufficient for security. Then, Chien et al. proposed the SASI protocol [4]
with the aim of offering better security, by adding the bitwise rotation to the
set of supported operations. The SASI protocol represented a milestone in the
design of ultralightweight protocols, although certain attacks have been
published against this scheme [5, 6, 7]. In 2008, a new protocol, named
Gossamer [8], was proposed that can be considered a further development of both
the UMAP family and SASI. Although no attacks have been published against
Gossamer, Lee et al. [9] have recently published an alternative scheme that is
highly reminiscent of SASI. In this paper, we show that Lee et al.'s scheme
fails short of many of its security objectives, being vulnerable to several
important attacks like traceability, full disclosure, cloning and
desynchronization.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 09:34:17 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Peris-Lopez",
"Pedro",
""
],
[
"Hernandez-Castro",
"Julio C.",
""
],
[
"Tapiador",
"J. M. E.",
""
],
[
"van der Lubbe",
"Jan C. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0910.2140
|
Richard Clegg
|
Richard G. Clegg, Carla Di Cairano-Gilfedder, Shi Zhou
|
A critical look at power law modelling of the Internet
|
To appear Computer Communications
| null |
10.1016/j.comcom.2009.09.009
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper takes a critical look at the usefulness of power law models of the
Internet. The twin focuses of the paper are Internet traffic and topology
generation. The aim of the paper is twofold. Firstly it summarises the state of
the art in power law modelling particularly giving attention to existing open
research questions. Secondly it provides insight into the failings of such
models and where progress needs to be made for power law research to feed
through to actual improvements in network performance.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 11:58:21 GMT"
}
] | 2013-03-28T00:00:00 |
[
[
"Clegg",
"Richard G.",
""
],
[
"Di Cairano-Gilfedder",
"Carla",
""
],
[
"Zhou",
"Shi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.2153
|
Marine Minier
|
Marine Minier (CITI Insa Lyon / INRIA Grenoble Rh\^one-Alpes, INRIA
Rocquencourt, EA 3720, CITI Insa Lyon / INRIA Grenoble Rh\^one-Alpes, CITI
Insa Lyon / INRIA Grenoble Rh\^one-Alpes), Benjamin Pousse (XLIM)
|
Improving Integral Cryptanalysis against Rijndael with Large Blocks
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This report presents new four-round integral properties against the Rijndael
cipher with block sizes larger than 128 bits. Using higher-order multiset
distinguishers and other well-known extensions of those properties, the deduced
attacks reach up to 7 and 8 rounds of Rijndael variants with 160 up to 256-bit
blocks. For example, a 7-rounds attack against Rijndael-224 has a time
complexity equal to $2^{80}$.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 12:46:46 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Minier",
"Marine",
"",
"CITI Insa Lyon / INRIA Grenoble Rhône-Alpes, INRIA\n Rocquencourt, EA 3720, CITI Insa Lyon / INRIA Grenoble Rhône-Alpes, CITI\n Insa Lyon / INRIA Grenoble Rhône-Alpes"
],
[
"Pousse",
"Benjamin",
"",
"XLIM"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0910.2154
|
Jocelyne Troccaz
|
J. Tonetti (CHU-Grenoble ortho-traumato), L. Vadcard (LSE), P. Girard
(IHPC), M. Dubois (LPS), P. Merloz (CHU-Grenoble ortho-traumato), Jocelyne
Troccaz (TIMC)
|
Assessment of a percutaneous iliosacral screw insertion simulator
| null |
Orthop Traumatol Surg Res (2009) epub ahead of print
|
10.1016/j.otsr.2009.07.005
| null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
BACKGROUND: Navigational simulator use for specialized training purposes is
rather uncommon in orthopaedic and trauma surgery. However, it reveals
providing a valuable tool to train orthopaedic surgeons and help them to plan
complex surgical procedures. PURPOSE: This work's objective was to assess
educational efficiency of a path simulator under fluoroscopic guidance applied
to sacroiliac joint percutaneous screw fixation. MATERIALS AND METHODS: We
evaluated 23 surgeons' accuracy inserting a guide-wire in a human cadaver
experiment, following a pre-established procedure. These medical trainees were
defined in three prospective respects: novice or skilled; with or without
theoretical knowledge; with or without surgical procedure familiarity. Analysed
criteria for each tested surgeon included the number of intraoperative X-rays
taken in order to achieve the surgical procedure as well as an iatrogenic index
reflecting the surgeon's ability to detect any hazardous trajectory at the time
of performing said procedure. RESULTS: An average number of 13 X-rays was
required for wire implantation by the G1 group. G2 group, assisted by the
simulator use, required an average of 10 X-rays. A substantial difference was
especially observed within the novice sub-group (N), with an average of 12.75
X-rays for the G1 category and an average of 8.5 X-rays for the G2 category. As
far as the iatrogenic index is concerned, we were unable to observe any
significant difference between the groups.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 12:49:03 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Tonetti",
"J.",
"",
"CHU-Grenoble ortho-traumato"
],
[
"Vadcard",
"L.",
"",
"LSE"
],
[
"Girard",
"P.",
"",
"IHPC"
],
[
"Dubois",
"M.",
"",
"LPS"
],
[
"Merloz",
"P.",
"",
"CHU-Grenoble ortho-traumato"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0910.2168
|
Han-Shin Jo
|
Han-Shin Jo, Cheol Mun, June Moon, and Jong-Gwan Yook
|
Self-optimized Coverage Coordination in Femtocell Networks
|
16 pages, 5 figures
|
IEEE Transactions on Wireless Communications, vol.9, no.10,
pp.2977-2982, Oct. 2010
|
10.1109/TWC.2010.090210.081313
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a self-optimized coverage coordination scheme for
two-tier femtocell networks, in which a femtocell base station adjusts the
transmit power based on the statistics of the signal and the interference power
that is measured at a femtocell downlink. Furthermore, an analytic expression
is derived for the coverage leakage probability that a femtocell coverage area
leaks into an outdoor macrocell. The coverage analysis is verified by
simulation, which shows that the proposed scheme provides sufficient indoor
femtocell coverage and that the femtocell coverage does not leak into an
outdoor macrocell.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 19:43:23 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Oct 2010 18:29:03 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Jo",
"Han-Shin",
""
],
[
"Mun",
"Cheol",
""
],
[
"Moon",
"June",
""
],
[
"Yook",
"Jong-Gwan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.2173
|
Roua Youssef
|
Roua Youssef and Alexandre Graell i Amat
|
Distributed Turbo-Like Codes for Multi-User Cooperative Relay Networks
|
Submitted to ICC 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a distributed turbo-like coding scheme for wireless networks
with relays is proposed. We consider a scenario where multiple sources
communicate with a single destination with the help of a relay. The proposed
scheme can be regarded as of the decode-and-forward type. The relay decodes the
information from the sources and it properly combines and re-encodes them to
generate some extra redundancy, which is transmitted to the destination. The
amount of redundancy generated by the relay can simply be adjusted according to
requirements in terms of performance, throughput and/or power. At the
destination, decoding of the information of all sources is performed jointly
exploiting the redundancy provided by the relay in an iterative fashion. The
overall communication network can be viewed as a serially concatenated code.
The proposed distributed scheme achieves significant performance gains with
respect to the non-cooperation system, even for a very large number of users.
Furthermore, it presents a high flexibility in terms of code rate, block length
and number of users.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 14:50:50 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Youssef",
"Roua",
""
],
[
"Amat",
"Alexandre Graell i",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2187
|
Gunther Rei{\ss}ig
|
Gunther Rei{\ss}ig
|
Computing abstractions of nonlinear systems
|
This work has been accepted for publication in the IEEE Trans.
Automatic Control. v3: minor modifications; accepted version
|
IEEE Trans. Automat. Control 56, no 11, Nov 2011, pp. 2583-2598
|
10.1109/TAC.2011.2118950
| null |
math.OC cs.SY math.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sufficiently accurate finite state models, also called symbolic models or
discrete abstractions, allow one to apply fully automated methods, originally
developed for purely discrete systems, to formally reason about continuous and
hybrid systems, and to design finite state controllers that provably enforce
predefined specifications. We present a novel algorithm to compute such finite
state models for nonlinear discrete-time and sampled systems which depends on
quantizing the state space using polyhedral cells, embedding these cells into
suitable supersets whose attainable sets are convex, and over-approximating
attainable sets by intersections of supporting half-spaces. We prove a novel
recursive description of these half-spaces and propose an iterative procedure
to compute them efficiently. We also provide new sufficient conditions for the
convexity of attainable sets which imply the existence of the aforementioned
embeddings of quantizer cells. Our method yields highly accurate abstractions
and applies to nonlinear systems under mild assumptions, which reduce to
sufficient smoothness in the case of sampled systems. Its practicability in the
design of discrete controllers for nonlinear continuous plants under state and
control constraints is demonstrated by an example.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 16:13:09 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Dec 2010 20:20:56 GMT"
},
{
"version": "v3",
"created": "Tue, 15 Feb 2011 12:29:55 GMT"
}
] | 2011-11-03T00:00:00 |
[
[
"Reißig",
"Gunther",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
}
] |
0910.2217
|
Tshilidzi Marwala
|
Linda Mthembu, Tshilidzi Marwala, Michael I. Friswell, Sondipon
Adhikari
|
Finite element model selection using Particle Swarm Optimization
|
Accepted for the Proceedings of the International Modal Analysis
Conference 2010
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes the application of particle swarm optimization (PSO) to
the problem of finite element model (FEM) selection. This problem arises when a
choice of the best model for a system has to be made from set of competing
models, each developed a priori from engineering judgment. PSO is a
population-based stochastic search algorithm inspired by the behaviour of
biological entities in nature when they are foraging for resources. Each
potentially correct model is represented as a particle that exhibits both
individualistic and group behaviour. Each particle moves within the model
search space looking for the best solution by updating the parameters values
that define it. The most important step in the particle swarm algorithm is the
method of representing models which should take into account the number,
location and variables of parameters to be updated. One example structural
system is used to show the applicability of PSO in finding an optimal FEM. An
optimal model is defined as the model that has the least number of updated
parameters and has the smallest parameter variable variation from the mean
material properties. Two different objective functions are used to compare
performance of the PSO algorithm.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 19:10:58 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Mthembu",
"Linda",
""
],
[
"Marwala",
"Tshilidzi",
""
],
[
"Friswell",
"Michael I.",
""
],
[
"Adhikari",
"Sondipon",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.2221
|
Han-Shin Jo
|
Han-Shin Jo, Cheol Mun, June Moon, and Jong-Gwan Yook
|
Interference Mitigation Using Uplink Power Control for Two-Tier
Femtocell Networks
|
13 pages, 5 figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes two interference mitigation strategies that adjust the
maximum transmit power of femtocell users to suppress the cross-tier
interference at a macrocell base station (BS). The open-loop and the
closed-loop control suppress the cross-tier interference less than a fixed
threshold and an adaptive threshold based on the noise and interference (NI)
level at the macrocell BS, respectively. Simulation results show that both
schemes effectively compensate the uplink throughput degradation of the
macrocell BS due to the cross-tier interference and that the closed-loop
control provides better femtocell throughput than the open-loop control at a
minimal cost of macrocell throughput.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 19:23:09 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Jo",
"Han-Shin",
""
],
[
"Mun",
"Cheol",
""
],
[
"Moon",
"June",
""
],
[
"Yook",
"Jong-Gwan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.2240
|
Zhu Han
|
Zhu Han, Rong Zheng, Vincent H. Poor
|
Repeated Auctions with Learning for Spectrum Access in Cognitive Radio
Networks
|
This paper is presented in Allerton Conference on Communication,
Control, and Computing 2009
| null | null | null |
cs.IT cs.LG math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, spectrum access in cognitive radio networks is modeled as a
repeated auction game subject to monitoring and entry costs. For secondary
users, sensing costs are incurred as the result of primary users' activity.
Furthermore, each secondary user pays the cost of transmissions upon successful
bidding for a channel. Knowledge regarding other secondary users' activity is
limited due to the distributed nature of the network. The resulting formulation
is thus a dynamic game with incomplete information. In this paper, an efficient
bidding learning algorithm is proposed based on the outcome of past
transactions. As demonstrated through extensive simulations, the proposed
distributed scheme outperforms a myopic one-stage algorithm, and can achieve a
good balance between efficiency and fairness.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 20:16:16 GMT"
}
] | 2009-10-14T00:00:00 |
[
[
"Han",
"Zhu",
""
],
[
"Zheng",
"Rong",
""
],
[
"Poor",
"Vincent H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0910.2245
|
Daniel Cullina
|
Daniel Cullina, Alexandros G. Dimakis, Tracey Ho
|
Searching for Minimum Storage Regenerating Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Regenerating codes allow distributed storage systems to recover from the loss
of a storage node while transmitting the minimum possible amount of data across
the network. We present a systematic computer search for optimal systematic
regenerating codes. To search the space of potential codes, we reduce the
potential search space in several ways. We impose an additional symmetry
condition on codes that we consider. We specify codes in a simple alternative
way, using additional recovered coefficients rather than transmission
coefficients and place codes into equivalence classes to avoid redundant
checking. Our main finding is a few optimal systematic minimum storage
regenerating codes for $n=5$ and $k=3$, over several finite fields. No such
codes were previously known and the matching of the information theoretic
cut-set bound was an open problem.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 20:32:38 GMT"
}
] | 2009-10-14T00:00:00 |
[
[
"Cullina",
"Daniel",
""
],
[
"Dimakis",
"Alexandros G.",
""
],
[
"Ho",
"Tracey",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2263
|
Shurui Huang
|
Shurui Huang, Aditya Ramamoorthy, Muriel Medard
|
Minimum cost mirror sites using network coding: Replication vs. coding
at the source nodes
|
IEEE Trans. on Information Theory (to appear), 2010
| null |
10.1109/TIT.2010.2094890
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Content distribution over networks is often achieved by using mirror sites
that hold copies of files or portions thereof to avoid congestion and delay
issues arising from excessive demands to a single location. Accordingly, there
are distributed storage solutions that divide the file into pieces and place
copies of the pieces (replication) or coded versions of the pieces (coding) at
multiple source nodes. We consider a network which uses network coding for
multicasting the file. There is a set of source nodes that contains either
subsets or coded versions of the pieces of the file. The cost of a given
storage solution is defined as the sum of the storage cost and the cost of the
flows required to support the multicast. Our interest is in finding the storage
capacities and flows at minimum combined cost. We formulate the corresponding
optimization problems by using the theory of information measures. In
particular, we show that when there are two source nodes, there is no loss in
considering subset sources. For three source nodes, we derive a tight upper
bound on the cost gap between the coded and uncoded cases. We also present
algorithms for determining the content of the source nodes.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 22:32:39 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Sep 2010 18:06:56 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Huang",
"Shurui",
""
],
[
"Ramamoorthy",
"Aditya",
""
],
[
"Medard",
"Muriel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2271
|
Ali Sinop
|
Venkatesan Guruswami, Ali Kemal Sinop
|
Improved Inapproximability Results for Maximum k-Colorable Subgraph
|
16 pages, 2 figures
| null |
10.1007/978-3-642-03685-9_13
| null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the maximization version of the fundamental graph coloring problem.
Here the goal is to color the vertices of a k-colorable graph with k colors so
that a maximum fraction of edges are properly colored (i.e. their endpoints
receive different colors). A random k-coloring properly colors an expected
fraction 1-1/k of edges. We prove that given a graph promised to be
k-colorable, it is NP-hard to find a k-coloring that properly colors more than
a fraction ~1-O(1/k} of edges. Previously, only a hardness factor of 1-O(1/k^2)
was known. Our result pins down the correct asymptotic dependence of the
approximation factor on k. Along the way, we prove that approximating the
Maximum 3-colorable subgraph problem within a factor greater than 32/33 is
NP-hard. Using semidefinite programming, it is known that one can do better
than a random coloring and properly color a fraction 1-1/k +2 ln k/k^2 of edges
in polynomial time. We show that, assuming the 2-to-1 conjecture, it is hard to
properly color (using k colors) more than a fraction 1-1/k + O(ln k/ k^2) of
edges of a k-colorable graph.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 23:49:08 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Oct 2009 21:22:15 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Nov 2009 22:34:46 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Guruswami",
"Venkatesan",
""
],
[
"Sinop",
"Ali Kemal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.2276
|
Tshilidzi Marwala
|
Evan Hurwitz and Tshilidzi Marwala
|
State of the Art Review for Applying Computational Intelligence and
Machine Learning Techniques to Portfolio Optimisation
|
9 pages
| null | null | null |
cs.CE cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Computational techniques have shown much promise in the field of Finance,
owing to their ability to extract sense out of dauntingly complex systems. This
paper reviews the most promising of these techniques, from traditional
computational intelligence methods to their machine learning siblings, with
particular view to their application in optimising the management of a
portfolio of financial instruments. The current state of the art is assessed,
and prospective further work is assessed and recommended
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 15:53:45 GMT"
}
] | 2009-10-14T00:00:00 |
[
[
"Hurwitz",
"Evan",
""
],
[
"Marwala",
"Tshilidzi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.2279
|
Chunhua Shen
|
Chunhua Shen, Junae Kim, Lei Wang, Anton van den Hengel
|
Positive Semidefinite Metric Learning with Boosting
|
11 pages, Twenty-Third Annual Conference on Neural Information
Processing Systems (NIPS 2009), Vancouver, Canada
| null | null | null |
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The learning of appropriate distance metrics is a critical problem in image
classification and retrieval. In this work, we propose a boosting-based
technique, termed \BoostMetric, for learning a Mahalanobis distance metric. One
of the primary difficulties in learning such a metric is to ensure that the
Mahalanobis matrix remains positive semidefinite. Semidefinite programming is
sometimes used to enforce this constraint, but does not scale well.
\BoostMetric is instead based on a key observation that any positive
semidefinite matrix can be decomposed into a linear positive combination of
trace-one rank-one matrices. \BoostMetric thus uses rank-one positive
semidefinite matrices as weak learners within an efficient and scalable
boosting-based learning process. The resulting method is easy to implement,
does not require tuning, and can accommodate various types of constraints.
Experiments on various datasets show that the proposed algorithm compares
favorably to those state-of-the-art methods in terms of classification accuracy
and running time.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 00:54:31 GMT"
}
] | 2009-10-14T00:00:00 |
[
[
"Shen",
"Chunhua",
""
],
[
"Kim",
"Junae",
""
],
[
"Wang",
"Lei",
""
],
[
"Hengel",
"Anton van den",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0910.2285
|
Guoqiang Zhang
|
Guoqing Zhang, Shi Zhou, Di Wang, Gang Yan, Guoqiang Zhang
|
Enhancing network transmission capacity by efficiently allocating node
capability
|
9 pages, 2 figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A network's transmission capacity is the maximal rate of traffic inflow that
the network can handle without causing congestion. Here we study how to enhance
this quantity by redistributing the capability of individual nodes while
preserving the total sum of node capability. We propose a practical and
effective node-capability allocation scheme which allocates a node's capability
based on the local knowledge of the node's connectivity. We show the scheme
enhances the transmission capacity by two orders of magnitude for networks with
heterogenous structures.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 02:03:08 GMT"
}
] | 2009-10-14T00:00:00 |
[
[
"Zhang",
"Guoqing",
""
],
[
"Zhou",
"Shi",
""
],
[
"Wang",
"Di",
""
],
[
"Yan",
"Gang",
""
],
[
"Zhang",
"Guoqiang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.2304
|
Rui Zhang
|
Rui Zhang
|
Cooperative Multi-Cell Block Diagonalization with Per-Base-Station Power
Constraints
|
accepted in JSAC, special issue on cooperative communications on
cellular networks, June 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Block diagonalization (BD) is a practical linear precoding technique that
eliminates the inter-user interference in downlink multiuser multiple-input
multiple-output (MIMO) systems. In this paper, we apply BD to the downlink
transmission in a cooperative multi-cell MIMO system, where the signals from
different base stations (BSs) to all the mobile stations (MSs) are jointly
designed with the perfect knowledge of the downlink channels and transmit
messages. Specifically, we study the optimal BD precoder design to maximize the
weighted sum-rate of all the MSs subject to a set of per-BS power constraints.
This design problem is formulated in an auxiliary MIMO broadcast channel (BC)
with a set of transmit power constraints corresponding to those for individual
BSs in the multi-cell system. By applying convex optimization techniques, this
paper develops an efficient algorithm to solve this problem, and derives the
closed-form expression for the optimal BD precoding matrix. It is revealed that
the optimal BD precoding vectors for each MS in the per-BS power constraint
case are in general non-orthogonal, which differs from the conventional
orthogonal BD precoder design for the MIMO-BC under one single sum-power
constraint. Moreover, for the special case of single-antenna BSs and MSs, the
proposed solution reduces to the optimal zero-forcing beamforming (ZF-BF)
precoder design for the weighted sum-rate maximization in the multiple-input
single-output (MISO) BC with per-antenna power constraints. Suboptimal and
low-complexity BD/ZF-BF precoding schemes are also presented, and their
achievable rates are compared against those with the optimal schemes.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 05:37:19 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Jun 2010 06:18:03 GMT"
}
] | 2010-06-23T00:00:00 |
[
[
"Zhang",
"Rui",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2315
|
Kazuhiro Inaba
|
Kazuhiro Inaba and Sebastian Maneth
|
The Complexity of Translation Membership for Macro Tree Transducers
|
9 pages, appeared at International Workshop on Programming Language
Techniques for XML (PLAN-X 2009)
| null | null | null |
cs.FL cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Macro tree transducers (mtts) are a useful formal model for XML query and
transformation languages. In this paper one of the fundamental decision
problems on translations, namely the "translation membership problem" is
studied for mtts. For a fixed translation, the translation membership problem
asks whether a given input/output pair is element of the translation. For
call-by-name mtts this problem is shown to be NP-complete. The main result is
that translation membership for call-by-value mtts is in polynomial time. For
several extensions, such as addition of regular look-ahead or the
generalization to multi-return mtts, it is shown that translation membership
still remains in PTIME.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 06:38:11 GMT"
}
] | 2009-10-14T00:00:00 |
[
[
"Inaba",
"Kazuhiro",
""
],
[
"Maneth",
"Sebastian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0910.2317
|
Andreas Spillner
|
A. Dress, K. T. Huber, J. Koolen, V. Moulton, A. Spillner
|
An algorithm for computing cutpoints in finite metric spaces
|
17 pages, 1 eps-figure
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The theory of the tight span, a cell complex that can be associated to every
metric $D$, offers a unifying view on existing approaches for analyzing
distance data, in particular for decomposing a metric $D$ into a sum of simpler
metrics as well as for representing it by certain specific edge-weighted
graphs, often referred to as realizations of $D$. Many of these approaches
involve the explicit or implicit computation of the so-called cutpoints of (the
tight span of) $D$, such as the algorithm for computing the "building blocks"
of optimal realizations of $D$ recently presented by A. Hertz and S. Varone.
The main result of this paper is an algorithm for computing the set of these
cutpoints for a metric $D$ on a finite set with $n$ elements in $O(n^3)$ time.
As a direct consequence, this improves the run time of the aforementioned
$O(n^6)$-algorithm by Hertz and Varone by ``three orders of magnitude''.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 07:09:03 GMT"
}
] | 2009-10-14T00:00:00 |
[
[
"Dress",
"A.",
""
],
[
"Huber",
"K. T.",
""
],
[
"Koolen",
"J.",
""
],
[
"Moulton",
"V.",
""
],
[
"Spillner",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.2324
|
Bernhard Scholz
|
Raymes Khoury, Bernd Burgstaller and Bernhard Scholz
|
Accelerating the Execution of Matrix Languages on the Cell Broadband
Engine Architecture
|
61 pages, 34 figures
| null | null | null |
cs.PL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Matrix languages, including MATLAB and Octave, are established standards for
applications in science and engineering. They provide interactive programming
environments that are easy to use due to their scripting languages with matrix
data types. Current implementations of matrix languages do not fully utilise
high-performance, special-purpose chip architectures such as the IBM PowerXCell
processor (Cell), which is currently used in the fastest computer in the world.
We present a new framework that extends Octave to harness the computational
power of the Cell. With this framework the programmer is relieved of the burden
of introducing explicit notions of parallelism. Instead the programmer uses a
new matrix data-type to execute matrix operations in parallel on the
synergistic processing elements (SPEs) of the Cell. We employ lazy evaluation
semantics for our new matrix data-type to obtain execution traces of matrix
operations. Traces are converted to data dependence graphs; operations in the
data dependence graph are lowered (split into sub-matrices), scheduled and
executed on the SPEs. Thereby we exploit (1) data parallelism, (2) instruction
level parallelism, (3) pipeline parallelism and (4) task parallelism of matrix
language programs. We conducted extensive experiments to show the validity of
our approach. Our Cell-based implementation achieves speedups of up to a factor
of 12 over code run on recent Intel Core2 Quad processors.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 08:54:18 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Nov 2009 23:55:21 GMT"
}
] | 2009-11-15T00:00:00 |
[
[
"Khoury",
"Raymes",
""
],
[
"Burgstaller",
"Bernd",
""
],
[
"Scholz",
"Bernhard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0910.2350
|
Daoyi Dong
|
Daoyi Dong and Ian R Petersen
|
Quantum control theory and applications: A survey
|
38 pages, invited survey paper from a control systems perspective,
some references are added, published version
|
IET Control Theory & Applications, vol. 4, no. 12, pp.2651-2671,
2010
|
10.1049/iet-cta.2009.0508
| null |
quant-ph cs.SY math-ph math.MP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a survey on quantum control theory and applications from
a control systems perspective. Some of the basic concepts and main developments
(including open-loop control and closed-loop control) in quantum control theory
are reviewed. In the area of open-loop quantum control, the paper surveys the
notion of controllability for quantum systems and presents several control
design strategies including optimal control, Lyapunov-based methodologies,
variable structure control and quantum incoherent control. In the area of
closed-loop quantum control, the paper reviews closed-loop learning control and
several important issues related to quantum feedback control including quantum
filtering, feedback stabilization, LQG control and robust quantum control.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 09:56:16 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Dec 2010 11:53:04 GMT"
},
{
"version": "v3",
"created": "Mon, 10 Jan 2011 00:09:56 GMT"
}
] | 2011-01-12T00:00:00 |
[
[
"Dong",
"Daoyi",
""
],
[
"Petersen",
"Ian R",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
0910.2370
|
Srikanth Srinivasan
|
V. Arvind, Srikanth Srinivasan
|
On the hardness of the noncommutative determinant
|
11 pages, v2: 18 pages, some typos removed, new section added on
Clifford algebras, and some reorganization
| null | null | null |
cs.CC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we study the computational complexity of computing the
noncommutative determinant. We first consider the arithmetic circuit complexity
of computing the noncommutative determinant polynomial. Then, more generally,
we also examine the complexity of computing the determinant (as a function)
over noncommutative domains. Our hardness results are summarized below:
1. We show that if the noncommutative determinant polynomial has small
noncommutative arithmetic circuits then so does the noncommutative permanent.
Consequently, the commutative permanent polynomial has small commutative
arithmetic circuits. 2. For any field F we show that computing the n X n
permanent over F is polynomial-time reducible to computing the 2n X 2n
(noncommutative) determinant whose entries are O(n^2) X O(n^2) matrices over
the field F. 3. We also derive as a consequence that computing the n X n
permanent over nonnegative rationals is polynomial-time reducible to computing
the noncommutative determinant over Clifford algebras of n^{O(1)} dimension.
Our techniques are elementary and use primarily the notion of the Hadamard
Product of noncommutative polynomials.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 11:58:22 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Oct 2009 09:25:42 GMT"
}
] | 2009-10-26T00:00:00 |
[
[
"Arvind",
"V.",
""
],
[
"Srinivasan",
"Srikanth",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.2381
|
Amelia Carolina Sparavigna
|
Amelia Carolina Sparavigna
|
Fractional differentiation based image processing
|
Keywords: Fractional calculation, image processing, astronomy,
Misprints revised
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There are many resources useful for processing images, most of them freely
available and quite friendly to use. In spite of this abundance of tools, a
study of the processing methods is still worthy of efforts. Here, we want to
discuss the possibilities arising from the use of fractional differential
calculus. This calculus evolved in the research field of pure mathematics until
1920, when applied science started to use it. Only recently, fractional
calculus was involved in image processing methods. As we shall see, the
fractional calculation is able to enhance the quality of images, with
interesting possibilities in edge detection and image restoration. We suggest
also the fractional differentiation as a tool to reveal faint objects in
astronomical images.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 12:37:32 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Oct 2009 10:49:09 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Feb 2010 09:19:21 GMT"
},
{
"version": "v4",
"created": "Tue, 7 Apr 2015 07:08:06 GMT"
}
] | 2015-04-08T00:00:00 |
[
[
"Sparavigna",
"Amelia Carolina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0910.2393
|
Samson Abramsky
|
Samson Abramsky
|
Big Toy Models: Representing Physical Systems As Chu Spaces
|
24 pages. Accepted for Synthese 16th April 2010. Published online
20th April 2011
|
Synthese: Volume 186, Issue 3 (2012), Page 697-718
|
10.1007/s11229-011-9912-x
| null |
quant-ph cs.LO math.CT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We pursue a model-oriented rather than axiomatic approach to the foundations
of Quantum Mechanics, with the idea that new models can often suggest new
axioms. This approach has often been fruitful in Logic and Theoretical Computer
Science. Rather than seeking to construct a simplified toy model, we aim for a
`big toy model', in which both quantum and classical systems can be faithfully
represented - as well as, possibly, more exotic kinds of systems.
To this end, we show how Chu spaces can be used to represent physical systems
of various kinds. In particular, we show how quantum systems can be represented
as Chu spaces over the unit interval in such a way that the Chu morphisms
correspond exactly to the physically meaningful symmetries of the systems - the
unitaries and antiunitaries. In this way we obtain a full and faithful functor
from the groupoid of Hilbert spaces and their symmetries to Chu spaces. We also
consider whether it is possible to use a finite value set rather than the unit
interval; we show that three values suffice, while the two standard
possibilistic reductions to two values both fail to preserve fullness.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 13:45:20 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Nov 2009 13:30:24 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Oct 2011 08:25:17 GMT"
}
] | 2012-07-16T00:00:00 |
[
[
"Abramsky",
"Samson",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
0910.2405
|
Maya Ramanath
|
Maya Ramanath, Kondreddi Sarath Kumar, Georgiana Ifrim
|
Generating Concise and Readable Summaries of XML Documents
| null | null | null |
MPI-I-2009-5-002
|
cs.IR cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
XML has become the de-facto standard for data representation and exchange,
resulting in large scale repositories and warehouses of XML data. In order for
users to understand and explore these large collections, a summarized, bird's
eye view of the available data is a necessity. In this paper, we are interested
in semantic XML document summaries which present the "important" information
available in an XML document to the user. In the best case, such a summary is a
concise replacement for the original document itself. At the other extreme, it
should at least help the user make an informed choice as to the relevance of
the document to his needs. In this paper, we address the two main issues which
arise in producing such meaningful and concise summaries: i) which tags or text
units are important and should be included in the summary, ii) how to generate
summaries of different sizes.%for different memory budgets. We conduct user
studies with different real-life datasets and show that our methods are useful
and effective in practice.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 14:19:01 GMT"
}
] | 2009-10-14T00:00:00 |
[
[
"Ramanath",
"Maya",
""
],
[
"Kumar",
"Kondreddi Sarath",
""
],
[
"Ifrim",
"Georgiana",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0910.2415
|
Andrei Romashchenko
|
Bruno Durand (LIF), Andrei Romashchenko (LIF), Alexander Shen (LIF)
|
Fixed-point tile sets and their applications
|
v7: updated reference to S.G.Simpson's paper
| null | null | null |
cs.CC math.DS math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An aperiodic tile set was first constructed by R. Berger while proving the
undecidability of the domino problem. It turned out that aperiodic tile sets
appear in many topics ranging from logic (the Entscheidungsproblem) to physics
(quasicrystals). We present a new construction of an aperiodic tile set that is
based on Kleene's fixed-point construction instead of geometric arguments. This
construction is similar to J. von Neumann self-reproducing automata; similar
ideas were also used by P. Gacs in the context of error-correcting
computations. This construction it rather flexible, so it can be used in many
ways: we show how it can be used to implement substitution rules, to construct
strongly aperiodic tile sets (any tiling is far from any periodic tiling), to
give a new proof for the undecidability of the domino problem and related
results, characterize effectively closed 1D subshift it terms of 2D shifts of
finite type (improvement of a result by M. Hochman), to construct a tile set
which has only complex tilings, and to construct a "robust" aperiodic tile set
that does not have periodic (or close to periodic) tilings even if we allow
some (sparse enough) tiling errors. For the latter we develop a hierarchical
classification of points in random sets into islands of different ranks.
Finally, we combine and modify our tools to prove our main result: there exists
a tile set such that all tilings have high Kolmogorov complexity even if
(sparse enough) tiling errors are allowed.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 18:55:52 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Oct 2009 06:38:41 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Jan 2010 14:42:41 GMT"
},
{
"version": "v4",
"created": "Fri, 17 Sep 2010 14:22:01 GMT"
},
{
"version": "v5",
"created": "Fri, 12 Nov 2010 15:39:26 GMT"
},
{
"version": "v6",
"created": "Mon, 3 Oct 2011 19:31:37 GMT"
},
{
"version": "v7",
"created": "Thu, 4 Dec 2014 10:19:41 GMT"
}
] | 2014-12-05T00:00:00 |
[
[
"Durand",
"Bruno",
"",
"LIF"
],
[
"Romashchenko",
"Andrei",
"",
"LIF"
],
[
"Shen",
"Alexander",
"",
"LIF"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0910.2443
|
J. M. Landsberg
|
J.M. Landsberg
|
P versus NP and geometry
|
20 pages, to appear in special issue of J. Symbolic. Comp. dedicated
to MEGA 2009
| null | null | null |
math.AG cs.CC math.DG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
I describe three geometric approaches to resolving variants of P v. NP,
present several results that illustrate the role of group actions in complexity
theory, and make a first step towards completely geometric definitions of
complexity classes.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 17:47:36 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Apr 2010 18:10:18 GMT"
}
] | 2010-04-15T00:00:00 |
[
[
"Landsberg",
"J. M.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
}
] |
0910.2472
|
Yanbin Lu
|
Yanbin Lu and Gene Tsudik
|
Towards Plugging Privacy Leaks in Domain Name System
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Privacy leaks are an unfortunate and an integral part of the current Internet
domain name resolution. Each DNS query generated by a user reveals -- to one or
more DNS servers -- the origin and target of that query. Over time, a user's
browsing behavior might be exposed to entities with little or no trust. Current
DNS privacy leaks stem from fundamental DNS features and are not easily fixable
by simple patches. Moreover, privacy issues have been overlooked by DNS
security efforts (i.e. DNSSEC) and are thus likely to propagate into future
versions of DNS.
In order to mitigate privacy issues in current DNS, this paper proposes a
Privacy-Preserving Domain Name System (PPDNS), which maintains privacy during
domain name resolution. PPDNS is based on distributed hash tables (DHTs), an
alternative naming infrastructure, and computational private information
retrieval (cPIR), an advanced cryptographic construct. PPDNS takes advantage of
the DHT's index structure to improve name resolution query privacy, while
leveraging cPIR to reduce communication overhead for bandwidth-sensitive
clients. Our analysis shows that PPDNS is a viable approach for obtaining a
higher degree of privacy for name resolution queries. PPDNS also serves as a
demonstration of blending advanced systems techniques with their cryptographic
counterparts.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 21:09:33 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Jun 2010 08:23:46 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Jun 2010 23:14:03 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Lu",
"Yanbin",
""
],
[
"Tsudik",
"Gene",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0910.2486
|
Yunnan Wu
|
Yunnan Wu
|
A Construction of Systematic MDS Codes with Minimum Repair Bandwidth
|
Submitted to IEEE Transactions on Information Theory on August 14,
2009
| null |
10.1109/TIT.2011.2134170
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a distributed storage system based on erasure coding, an important problem
is the \emph{repair problem}: If a node storing a coded piece fails, in order
to maintain the same level of reliability, we need to create a new encoded
piece and store it at a new node. This paper presents a construction of
systematic $(n,k)$-MDS codes for $2k\le n$ that achieves the minimum repair
bandwidth when repairing from $k+1$ nodes.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 22:22:58 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Wu",
"Yunnan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2502
|
Aylin Yener
|
Xiang He, Aylin Yener
|
Interference Channels with Strong Secrecy
|
Presented at the Forty-Seventh Annual Allerton Conference on
Communication, Control, and Computing, 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is known that given the real sum of two independent uniformly distributed
lattice points from the same nested lattice codebook, the eavesdropper can
obtain at most 1 bit of information per channel regarding the value of one of
the lattice points. In this work, we study the effect of this 1 bit information
on the equivocation expressed in three commonly used information theoretic
measures, i.e., the Shannon entropy, the Renyi entropy and the min entropy. We
then demonstrate its applications in an interference channel with a
confidential message. In our previous work, we showed that nested lattice codes
can outperform Gaussian codes for this channel when the achieved rate is
measured with the weak secrecy notion. Here, with the Renyi entropy and the min
entropy measure, we prove that the same secure degree of freedom is achievable
with the strong secrecy notion as well. A major benefit of the new coding
scheme is that the strong secrecy is generated from a single lattice point
instead of a sequence of lattice points. Hence the mutual information between
the confidential message and the observation of the eavesdropper decreases much
faster with the number of channel uses than previously known strong secrecy
coding methods for nested lattice codes.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 00:44:43 GMT"
}
] | 2009-10-15T00:00:00 |
[
[
"He",
"Xiang",
""
],
[
"Yener",
"Aylin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2525
|
Amitav Mukherjee
|
Amitav Mukherjee and A. Lee Swindlehurst
|
Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap
Channels
|
This paper was presented at Allerton Conference on Communication,
Control, and Computing, 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper examines linear beamforming methods for secure communications in a
multiuser wiretap channel with a single transmitter, multiple legitimate
receivers, and a single eavesdropper, where all nodes are equipped with
multiple antennas. No information regarding the eavesdropper is presumed at the
transmitter, and we examine both the broadcast MIMO downlink with independent
information, and the multicast MIMO downlink with common information for all
legitimate receivers. In both cases the information signal is transmitted with
just enough power to guarantee a certain SINR at the desired receivers, while
the remainder of the power is used to broadcast artificial noise. The
artificial interference selectively degrades the passive eavesdropper's signal
while remaining orthogonal to the desired receivers. We analyze the
confidentiality provided by zero-forcing and optimal minimum-power beamforming
designs for the broadcast channel, and optimal minimum-MSE beamformers for the
multicast channel. Numerical simulations for the relative SINR and BER
performance of the eavesdropper demonstrate the effectiveness of the proposed
physical-layer security schemes.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 03:58:23 GMT"
}
] | 2009-10-15T00:00:00 |
[
[
"Mukherjee",
"Amitav",
""
],
[
"Swindlehurst",
"A. Lee",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2534
|
Sung ho Chae
|
Sung ho Chae, Sang Won Choi, Sae-Young Chung
|
Optimal Multiplexing Gain of K-user Line-of-Sight Interference Channels
with Polarization
|
6 pages, 5 figures, to appear in Proc. Allerton Conference on
Communication, Control, and Computing, Monticello, IL, USA, Sept. 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the multiplexing gain (MUXG) of the fully connected K-user
line-of-sight (LOS) interference channels (ICs). A polarimetric antenna
composed of 3 orthogonal electric dipoles and 3 orthogonal magnetic dipoles is
considered where all 6 dipoles are co-located. In case of K-user IC with single
polarization, the maximum achievable MUXG is K regardless of the number of
transmit and receive antennas because of the key-hole effect. With
polarization, a trivial upper bound on the MUXG is 2K. We propose a zero
forcing (ZF) scheme for the K-user LOS IC, where each user uses one or more
polarimetric antennas. By using the proposed ZF scheme, we find minimal antenna
configurations that achieve this bound for K <= 5. For K > 5, we show that the
optimal MUXG of 2K is achieved with M = (K+1)/6 polarimetric antennas at each
user.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 07:24:01 GMT"
}
] | 2009-10-15T00:00:00 |
[
[
"Chae",
"Sung ho",
""
],
[
"Choi",
"Sang Won",
""
],
[
"Chung",
"Sae-Young",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2540
|
M. Tariq Banday
|
M. Tariq Banday and Tariq R. Jan
|
Effectiveness and Limitations of Statistical Spam Filters
|
International Conference on New Trends in Statistics and
Optimization, Organized by Department of Statistics, University of Kashmir,
Srinagar, India, from 20th to 23rd October, 2008
|
International Conference on New Trends in Statistics and
Optimization, Organized by Department of Statistics, University of Kashmir,
Srinagar, India, from 20th to 23rd October, 2008
| null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we discuss the techniques involved in the design of the famous
statistical spam filters that include Naive Bayes, Term Frequency-Inverse
Document Frequency, K-Nearest Neighbor, Support Vector Machine, and Bayes
Additive Regression Tree. We compare these techniques with each other in terms
of accuracy, recall, precision, etc. Further, we discuss the effectiveness and
limitations of statistical filters in filtering out various types of spam from
legitimate e-mails.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 07:43:03 GMT"
}
] | 2009-10-15T00:00:00 |
[
[
"Banday",
"M. Tariq",
""
],
[
"Jan",
"Tariq R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0910.2582
|
Johannes Singler
|
Mirko Rahn, Peter Sanders, Johannes Singler
|
Scalable Distributed-Memory External Sorting
| null | null | null | null |
cs.DS cs.DC cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We engineer algorithms for sorting huge data sets on massively parallel
machines. The algorithms are based on the multiway merging paradigm. We first
outline an algorithm whose I/O requirement is close to a lower bound. Thus, in
contrast to naive implementations of multiway merging and all other approaches
known to us, the algorithm works with just two passes over the data even for
the largest conceivable inputs. A second algorithm reduces communication
overhead and uses more conventional specifications of the result at the cost of
slightly increased I/O requirements. An implementation wins the well known
sorting benchmark in several categories and by a large margin over its
competitors.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 12:18:28 GMT"
}
] | 2009-10-15T00:00:00 |
[
[
"Rahn",
"Mirko",
""
],
[
"Sanders",
"Peter",
""
],
[
"Singler",
"Johannes",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0910.2586
|
James Whitacre
|
James Whitacre, Axel Bender
|
Degeneracy: a link between evolvability, robustness and complexity in
biological systems
|
accepted in BMC Journal of Theoretical Biology and Medical Modelling
| null |
10.1186/1742-4682-7-6
| null |
nlin.AO cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A full accounting of biological robustness remains elusive; both in terms of
the mechanisms by which robustness is achieved and the forces that have caused
robustness to grow over evolutionary time. Although its importance to topics
such as ecosystem services and resilience is well recognized, the broader
relationship between robustness and evolution is only starting to be fully
appreciated. A renewed interest in this relationship has been prompted by
evidence that mutational robustness can play a positive role in the discovery
of future adaptive innovations (evolvability) and evidence of an intimate
relationship between robustness and complexity in biology.
This paper offers a new perspective on the mechanics of evolution and the
origins of complexity, robustness, and evolvability. Here we explore the
hypothesis that degeneracy, a partial overlap in the functioning of
multi-functional components, plays a central role in the evolution and
robustness of complex forms. In support of this hypothesis, we present evidence
that degeneracy is a fundamental source of robustness, it is intimately tied to
multi-scaled complexity, and it establishes conditions that are necessary for
system evolvability.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 10:55:12 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Jan 2010 10:27:42 GMT"
}
] | 2011-12-15T00:00:00 |
[
[
"Whitacre",
"James",
""
],
[
"Bender",
"Axel",
""
]
] |
[
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0910.2593
|
Uwe Aickelin
|
Jingpeng Li, Uwe Aickelin, Edmund Burke
|
A Component Based Heuristic Search Method with Evolutionary Eliminations
|
27 pages, 4 figures
|
INFORMS Journal of Computing, 21 (3), 468-479, 2008
| null | null |
cs.AI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nurse rostering is a complex scheduling problem that affects hospital
personnel on a daily basis all over the world. This paper presents a new
component-based approach with evolutionary eliminations, for a nurse scheduling
problem arising at a major UK hospital. The main idea behind this technique is
to decompose a schedule into its components (i.e. the allocated shift pattern
of each nurse), and then to implement two evolutionary elimination strategies
mimicking natural selection and natural mutation process on these components
respectively to iteratively deliver better schedules. The worthiness of all
components in the schedule has to be continuously demonstrated in order for
them to remain there. This demonstration employs an evaluation function which
evaluates how well each component contributes towards the final objective. Two
elimination steps are then applied: the first elimination eliminates a number
of components that are deemed not worthy to stay in the current schedule; the
second elimination may also throw out, with a low level of probability, some
worthy components. The eliminated components are replenished with new ones
using a set of constructive heuristics using local optimality criteria.
Computational results using 52 data instances demonstrate the applicability of
the proposed approach in solving real-world problems.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 11:44:57 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Li",
"Jingpeng",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Burke",
"Edmund",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0910.2603
|
Zhang Shengli
|
Shengli Zhang, Soung-Chang Liew
|
Physical layer network coding with multiple antennas
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The two-phase MIMO NC (network coding) scheme can be used to boost the
throughput in a two-way relay channel in which nodes are equipped with multiple
antennas. The obvious strategy is for the relay node to extract the individual
packets from the two end nodes and mix the two packets to form a network-coded
packet. In this paper, we propose a new scheme called MIMO PNC (physical
network coding), in which the relay extracts the summation and difference of
the two end packets and then converts them to the network-coded form. MIMO PNC
is a natural combination of the single-antenna PNC scheme and the linear MIMO
detection scheme. The advantages of MIMO PNC are many. First, it removes the
stringent carrier-phase requirement in single-antenna PNC. Second, it is linear
in complexity with respect to the constellation size and the number of
simultaneous data streams in MIMO. Simulation shows that MIMO PNC outperforms
the straightforward MIMO NC significantly under random Rayleigh fading channel.
Based on our analysis, we further conjecture that MIMO PNC outperforms MIMO NC
under all possible realizations of the channel.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 12:48:22 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Jan 2010 00:42:20 GMT"
}
] | 2010-01-18T00:00:00 |
[
[
"Zhang",
"Shengli",
""
],
[
"Liew",
"Soung-Chang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.2604
|
Zhang Shengli
|
Zhang Shengli, Soung Chang Liew
|
Applying physical layer network coding in wireless networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A main distinguishing feature of a wireless network compared with a wired
network is its broadcast nature, in which the signal transmitted by a node may
reach several other nodes, and a node may receive signals from several other
nodes, simultaneously. Rather than a blessing, this feature is treated more as
an interference-inducing nuisance in most wireless networks today (e.g., IEEE
802.11). This paper shows that the concept of network coding can be applied at
the physical layer to turn the broadcast property into a capacity-boosting
advantage in wireless ad hoc networks. Specifically, we propose a
physical-layer network coding (PNC) scheme to coordinate transmissions among
nodes. In contrast to "straightforward" network coding which performs coding
arithmetic on digital bit streams after they have been received, PNC makes use
of the additive nature of simultaneously arriving electromagnetic (EM) waves
for equivalent coding operation. And in doing so, PNC can potentially achieve
100% and 50% throughput increases compared with traditional transmission and
straightforward network coding, respectively, in 1-D regular linear networks
with multiple random flows. The throughput improvements are even larger in 2-D
regular networks: 200% and 100%, respectively.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 12:52:32 GMT"
}
] | 2009-10-15T00:00:00 |
[
[
"Shengli",
"Zhang",
""
],
[
"Liew",
"Soung Chang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.2626
|
Arijit Laha Ph.D.
|
Arijit Laha
|
On challenges and opportunities of designing integrated IT platforms for
supporting knowledge works in organizations
|
39 pages, Sibmitted to journal Vikalpa
|
Vikalpa: The Journal for Decision Makers, Volume 36, No 3, pp 35 -
60, Jul - Sep 2011
| null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Designing and implementing comprehensive IT-based support environments for KM
in organizations is fraught with many problems. Solving them requires intimate
knowledge about the information usage in knowledge works and the scopes of
technology intervention. In this paper, the Task-oriented Organizational
Knowledge Management or TOKM, a design theory for building integrated IT
platforms for supporting organizational KM, is proposed. TOKM brings together
two apparently mutually exclusive practices of building KM systems, the
task-based approach and the generic or universalistic approach. In developing
the design, the information requirements of knowledge workers in light of an
information usage model of knowledge works is studied. Then the model is
extended to study possibilities of more advanced IT support and formulate them
in form of a set of meta-requirements. Following the IS design theory paradigm,
a set of artifacts are hypothesized to meet the requirements. Finally, a design
method, as a possible approach of building an IT-based integrated platform, the
Knowledge Work Support Platform (KWSP) to realize the artifacts in order to
meet the requirements, is outlined. The KWSP is a powerful platform for
building and maintaining a number of task-type specific Knowledge Work Support
Systems (KWSS) on a common sharable platform. Each KWSS, for the task-type
supported by it, can be easily designed to provide extensive and sophisticated
support to individual as well as group of knowledge workers in performing their
respective knowledge work instances
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 13:55:57 GMT"
}
] | 2011-12-23T00:00:00 |
[
[
"Laha",
"Arijit",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0910.2632
|
Laurent Romary
|
Laurent Romary (INRIA Saclay - Ile de France, IDSL)
|
Communication scientifique : Pour le meilleur et pour le PEER
| null |
Hermes (2009)
| null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper provides an overview (in French) of the European PEER project,
focusing on its origins, the actual objectives and the technical deployment.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 14:28:28 GMT"
}
] | 2009-10-15T00:00:00 |
[
[
"Romary",
"Laurent",
"",
"INRIA Saclay - Ile de France, IDSL"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0910.2638
|
Arijit Laha Ph.D.
|
Arijit Laha
|
On building Information Warehouses
|
11 pages 1st IIMA International Conference on Advanced Data Analysis,
Business Analytics and Intelligence (ICADABAI 2009), 6-7 June, Indian
Institute of Management, Ahmedabad, India
| null | null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the most important goals of information management (IM) is supporting
the knowledge workers in performing their works. In this paper we examine
issues of relevance, linkage and provenance of information, as accessed and
used by the knowledge workers. These are usually not adequately addressed in
most of the IT based solutions for IM. Here we propose a non-conventional
approach for building information systems for supporting the knowledge workers
which addresses these issues. The approach leads to the ideas of building
Information Warehouses (IW) and Knowledge work Support Systems (KwSS). Such
systems can open up potential for building innovative applications of
significant impact, including those capable of helping organizations in
implementing processes for double-loop learning.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 14:59:42 GMT"
}
] | 2009-10-15T00:00:00 |
[
[
"Laha",
"Arijit",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0910.2649
|
Chinmay Karande
|
Chinmay Karande
|
Polynomially Correlated Knapsack is NP-complete
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
0-1 Knapsack is a fundamental NP-complete problem. In this article we prove
that it remains NP-complete even when the weights of the objects in the packing
constraints and their values in the objective function satisfy specific
stringent conditions: the values are integral powers of the weights of the
objects.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 15:43:40 GMT"
}
] | 2009-10-15T00:00:00 |
[
[
"Karande",
"Chinmay",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.2654
|
Wonseok Chae
|
Wonseok Chae
|
Type Safe Extensible Programming
|
PhD Thesis submitted October, 2009
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Software products evolve over time. Sometimes they evolve by adding new
features, and sometimes by either fixing bugs or replacing outdated
implementations with new ones. When software engineers fail to anticipate such
evolution during development, they will eventually be forced to re-architect or
re-build from scratch. Therefore, it has been common practice to prepare for
changes so that software products are extensible over their lifetimes. However,
making software extensible is challenging because it is difficult to anticipate
successive changes and to provide adequate abstraction mechanisms over
potential changes. Such extensibility mechanisms, furthermore, should not
compromise any existing functionality during extension. Software engineers
would benefit from a tool that provides a way to add extensions in a reliable
way. It is natural to expect programming languages to serve this role.
Extensible programming is one effort to address these issues.
In this thesis, we present type safe extensible programming using the MLPolyR
language. MLPolyR is an ML-like functional language whose type system provides
type-safe extensibility mechanisms at several levels. After presenting the
language, we will show how these extensibility mechanisms can be put to good
use in the context of product line engineering. Product line engineering is an
emerging software engineering paradigm that aims to manage variations, which
originate from successive changes in software.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 16:08:29 GMT"
}
] | 2009-10-15T00:00:00 |
[
[
"Chae",
"Wonseok",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0910.2655
|
Chinmay Karande
|
Deeparnab Chakrabarty, Chinmay Karande, Ashish Sangwan
|
The Effect of Malice on the Social Optimum in Linear Load Balancing
Games
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this note we consider the following problem to study the effect of
malicious players on the social optimum in load balancing games: Consider two
players SOC and MAL controlling (1-f) and f fraction of the flow in a load
balancing game. SOC tries to minimize the total cost faced by her players while
MAL tries to maximize the same.
If the latencies are linear, we show that this 2-player zero-sum game has a
pure strategy Nash equilibrium. Moreover, we show that one of the optimal
strategies for MAL is to play selfishly: let the f fraction of the flow be sent
as when the flow was controlled by infinitesimal players playing selfishly and
reaching a Nash equilibrium. This shows that a malicious player cannot cause
more harm in this game than a set of selfish agents.
We also introduce the notion of Cost of Malice - the ratio of the cost faced
by SOC at equilibrium to (1-f)OPT, where OPT is the social optimum minimizing
the cost of all the players. In linear load balancing games we bound the cost
of malice by (1+f/2).
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 15:59:39 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Oct 2009 23:05:54 GMT"
}
] | 2009-10-15T00:00:00 |
[
[
"Chakrabarty",
"Deeparnab",
""
],
[
"Karande",
"Chinmay",
""
],
[
"Sangwan",
"Ashish",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0910.2718
|
Aylin Yener
|
Xiang He, Aylin Yener
|
Two-hop Secure Communication Using an Untrusted Relay
|
Accepted for publication in EURASIP Journal on Communications and
Networks, Special Issue on Wireless Physical Layer Security
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a source-destination pair that can only communicate through an
untrusted intermediate relay node. The intermediate node is willing to employ a
designated relaying scheme to facilitate reliable communication between the
source and the destination. Yet, the information it relays needs to be kept
secret from it. In this two-hop communication scenario, where the use of the
untrusted relay node is essential, we find that a positive secrecy rate is
achievable. The center piece of the achievability scheme is the help provided
by either the destination node with transmission capability, or an external
"good samaritan" node. In either case, the helper performs cooperative jamming
that confuses the eavesdropping relay and disables it from being able to
decipher what it is relaying. We next derive an upper bound on the secrecy rate
for this system. We observe that the gap between the upper bound and the
achievable rate vanishes as the power of the relay node goes to infinity.
Overall, the paper presents a case for intentional interference, i.e.,
cooperative jamming, as an enabler for secure communication.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 20:08:34 GMT"
}
] | 2009-10-16T00:00:00 |
[
[
"He",
"Xiang",
""
],
[
"Yener",
"Aylin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2743
|
Soummya Kar
|
Usman A. Khan, Soummya Kar, and Jose M. F. Moura
|
DILAND: An Algorithm for Distributed Sensor Localization with Noisy
Distance Measurements
|
Submitted to the IEEE Transactions on Signal Processing. Initial
submission on May 2009. 12 pages
| null |
10.1109/TSP.2009.2038423
| null |
cs.DC cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this correspondence, we present an algorithm for distributed sensor
localization with noisy distance measurements (DILAND) that extends and makes
the DLRE more robust. DLRE is a distributed sensor localization algorithm in
$\mathbb{R}^m$ $(m\geq1)$ introduced in \cite{usman_loctsp:08}. DILAND operates
when (i) the communication among the sensors is noisy; (ii) the communication
links in the network may fail with a non-zero probability; and (iii) the
measurements performed to compute distances among the sensors are corrupted
with noise. The sensors (which do not know their locations) lie in the convex
hull of at least $m+1$ anchors (nodes that know their own locations.) Under
minimal assumptions on the connectivity and triangulation of each sensor in the
network, this correspondence shows that, under the broad random phenomena
described above, DILAND converges almost surely (a.s.) to the exact sensor
locations.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 22:31:39 GMT"
}
] | 2015-10-28T00:00:00 |
[
[
"Khan",
"Usman A.",
""
],
[
"Kar",
"Soummya",
""
],
[
"Moura",
"Jose M. F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2771
|
Rui Zhang
|
Rui Zhang and Shuguang Cui
|
Cooperative Interference Management with MISO Beamforming
|
accepted in IEEE Transactions on Signal Processing, June 2010
| null |
10.1109/TSP.2010.2056685
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This correspondence studies the downlink transmission in a multi-cell system,
where multiple base stations (BSs) each with multiple antennas cooperatively
design their respective transmit beamforming vectors to optimize the overall
system performance. For simplicity, it is assumed that all mobile stations
(MSs) are equipped with a single antenna each, and there is one active MS in
each cell at one time. Accordingly, the system of interests can be modeled by a
multiple-input single-output (MISO) interference channel (IC), termed as
MISO-IC, with interference treated as noise. We propose a new method to
characterize different rate-tuples for active MSs on the Pareto boundary of the
achievable rate region for the MISO-IC, by exploring the relationship between
the MISO-IC and the cognitive radio (CR) MISO channel. We show that each
Pareto-boundary rate-tuple of the MISO-IC can be achieved in a decentralized
manner when each of the BSs attains its own channel capacity subject to a
certain set of interference-power constraints (also known as
interference-temperature constraints in the CR system) at the other MS
receivers. Furthermore, we show that this result leads to a new decentralized
algorithm for implementing the multi-cell cooperative downlink beamforming.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 04:10:06 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jun 2010 09:35:37 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Zhang",
"Rui",
""
],
[
"Cui",
"Shuguang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2818
|
Rdv Ijcsis
|
R. Venkatachalam, A. Krishnan
|
Multiple Cross-Layer Design Based Complete Architecture for Mobile Adhoc
Networks
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 182-187, September 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Different cross layer design for mobile adhoc network focuses on different
optimization purpose, different Quality of Service (QoS) metric and the
functions like delay, priority handling, security, etc. Existing cross layer
designs provide individual solution for congestion control, fault tolerance,
power conservation, energy minimization and flow control and the major drawback
is of high cost and overhead. In this paper, we propose to design multiple
cross layer design based architecture to provide a combined solution for link
failure management, power conservation, congestion control and admission
control. By simulation results, we show that the average end to end delay,
average energy consumption and the packet loss are considerably reduced with
the increase in high throughput and good delivery ratio.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 09:28:35 GMT"
}
] | 2009-10-16T00:00:00 |
[
[
"Venkatachalam",
"R.",
""
],
[
"Krishnan",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.2829
|
Matteo Pradella
|
Matteo Pradella, Alessandra Cherubini, Stefano Crespi Reghizzi
|
A unifying approach to picture grammars
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Several old and recent classes of picture grammars, that variously extend
context-free string grammars in two dimensions, are based on rules that rewrite
arrays of pixels. Such grammars can be unified and extended using a tiling
based approach, whereby the right part of a rule is formalized by means of a
finite set of permitted tiles. We focus on a simple type of tiling,named
regional, and define the corresponding regional tile grammars. They include
both Siromoney's (or Matz's) Kolam grammars and their generalization by Prusa,
as well as Drewes's grid grammars. Regionally defined pictures can be
recognized with polynomial-time complexity by an algorithm extending the CKY
one for strings. Regional tile grammars and languages are strictly included
into our previous tile grammars and languages, and are incomparable with
Giammarresi-Restivo tiling systems (or Wang systems).
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 11:35:42 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Mar 2010 18:02:47 GMT"
},
{
"version": "v3",
"created": "Sat, 8 Jan 2011 08:39:12 GMT"
}
] | 2011-01-11T00:00:00 |
[
[
"Pradella",
"Matteo",
""
],
[
"Cherubini",
"Alessandra",
""
],
[
"Reghizzi",
"Stefano Crespi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0910.2832
|
Hans-Andrea Loeliger
|
Justin Dauwels, Andrew Eckford, Sascha Korl, Hans-Andrea Loeliger
|
Expectation Maximization as Message Passing - Part I: Principles and
Gaussian Messages
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is shown how expectation maximization (EM) may be viewed as a message
passing algorithm in factor graphs. In particular, a general EM message
computation rule is identified. As a factor graph tool, EM may be used to break
cycles in a factor graph, and tractable messages may in some cases be obtained
where the sum-product messages are unwieldy.
As an exemplary application, the paper considers linear Gaussian state space
models. Unknown coefficients in such models give rise to multipliers in the
corresponding factor graph. A main attraction of EM in such cases is that it
results in purely Gaussian message passing algorithms. These Gaussian EM
messages are tabulated for several (scalar, vector, matrix) multipliers that
frequently appear in applications.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 10:26:59 GMT"
}
] | 2009-10-16T00:00:00 |
[
[
"Dauwels",
"Justin",
""
],
[
"Eckford",
"Andrew",
""
],
[
"Korl",
"Sascha",
""
],
[
"Loeliger",
"Hans-Andrea",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2849
|
Marija Mitrovic
|
Marija Mitrovi\'c and Bosiljka Tadi\'c
|
Bloggers Behavior and Emergent Communities in Blog Space
| null | null |
10.1140/epjb/e2009-00431-9
| null |
cs.CY physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Interactions between users in cyberspace may lead to phenomena different from
those observed in common social networks. Here we analyse large data sets about
users and Blogs which they write and comment, mapped onto a bipartite graph. In
such enlarged Blog space we trace user activity over time, which results in
robust temporal patterns of user--Blog behavior and the emergence of
communities. With the spectral methods applied to the projection on weighted
user network we detect clusters of users related to their common interests and
habits. Our results suggest that different mechanisms may play the role in the
case of very popular Blogs. Our analysis makes a suitable basis for theoretical
modeling of the evolution of cyber communities and for practical study of the
data, in particular for an efficient search of interesting Blog clusters and
further retrieval of their contents by text analysis.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 11:54:12 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Mitrović",
"Marija",
""
],
[
"Tadić",
"Bosiljka",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0910.2853
|
Aart Middeldorp
|
Nao Hirokawa and Aart Middeldorp
|
Decreasing Diagrams and Relative Termination
|
v3: missing references added
| null | null | null |
cs.LO cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we use the decreasing diagrams technique to show that a
left-linear term rewrite system R is confluent if all its critical pairs are
joinable and the critical pair steps are relatively terminating with respect to
R. We further show how to encode the rule-labeling heuristic for decreasing
diagrams as a satisfiability problem. Experimental data for both methods are
presented.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 12:34:04 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Oct 2009 10:15:59 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Oct 2009 08:11:13 GMT"
}
] | 2009-10-30T00:00:00 |
[
[
"Hirokawa",
"Nao",
""
],
[
"Middeldorp",
"Aart",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0910.2859
|
Apostolos Syropoulos
|
Apostolos Syropoulos
|
Can we debug the Universe?
|
An early version of this paper was read in the "Future Trends in
Hypercomputation" Workshop held in Sheffield U.K., 11-13 September 2006
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Roughly, the Church-Turing thesis is a hypothesis that describes exactly what
can be computed by any real or feasible conceptual computing device. Generally
speaking, the computational metaphor is the idea that everything, including the
universe itself, has a computational nature. However, if the Church-Turing
thesis is not valid, then does it make sense to expect the construction of a
computer program capable of simulating the whole Universe? In the lights of
hypercomputation, the scientific discipline that is about computing beyond the
Church-Turing barrier, the most natural answer to this question is: No. This
note is a justification of this answer and its deeper meaning based on
arguments from physics, the philosophy of the mind, and, of course,
(hyper)computability theory.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 12:47:37 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Oct 2009 12:26:20 GMT"
}
] | 2009-10-26T00:00:00 |
[
[
"Syropoulos",
"Apostolos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0910.2874
|
Uwe Aickelin
|
Feng Gu, Uwe Aickelin, Julie Greensmith
|
An Agent Based Classification Model
|
4 pages, 2 figures, 9th European Agent Systems Summer School, Durham,
UK
| null | null | null |
cs.AI cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The major function of this model is to access the UCI Wisconsin Breast Can-
cer data-set[1] and classify the data items into two categories, which are
normal and anomalous. This kind of classifi cation can be referred as anomaly
detection, which discriminates anomalous behaviour from normal behaviour in
computer systems. One popular solution for anomaly detection is Artifi cial
Immune Sys- tems (AIS). AIS are adaptive systems inspired by theoretical
immunology and observed immune functions, principles and models which are
applied to prob- lem solving. The Dendritic Cell Algorithm (DCA)[2] is an AIS
algorithm that is developed specifi cally for anomaly detection. It has been
successfully applied to intrusion detection in computer security. It is
believed that agent-based mod- elling is an ideal approach for implementing
AIS, as intelligent agents could be the perfect representations of immune
entities in AIS. This model evaluates the feasibility of re-implementing the
DCA in an agent-based simulation environ- ment called AnyLogic, where the
immune entities in the DCA are represented by intelligent agents. If this model
can be successfully implemented, it makes it possible to implement more
complicated and adaptive AIS models in the agent-based simulation environment.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 13:47:02 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Gu",
"Feng",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Greensmith",
"Julie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0910.2891
|
Ashutosh Trivedi Dr
|
Marcin Jurdzinski and Ashutosh Trivedi
|
Average-Time Games on Timed Automata
| null |
Proc.FSTTCS'08, volume 08004 of Dagstuhl Seminar Proceedings, 2008
|
10.4230/LIPIcs.FSTTCS.2008.1765
| null |
cs.GT cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An average-time game is played on the infinite graph of configurations of a
finite timed automaton. The two players, Min and Max, construct an infinite run
of the automaton by taking turns to perform a timed transition. Player Min
wants to minimise the average time per transition and player Max wants to
maximise it. A solution of average-time games is presented using a reduction to
average-price game on a finite graph. A direct consequence is an elementary
proof of determinacy for average-time games. This complements our results for
reachability-time games and partially solves a problem posed by Bouyer et al.,
to design an algorithm for solving average-price games on priced timed
automata. The paper also establishes the exact computational complexity of
solving average-time games: the problem is EXPTIME-complete for timed automata
with at least two clocks.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 14:45:56 GMT"
}
] | 2020-01-16T00:00:00 |
[
[
"Jurdzinski",
"Marcin",
""
],
[
"Trivedi",
"Ashutosh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.2912
|
Dominique Unruh
|
Dominique Unruh
|
Universally Composable Quantum Multi-Party Computation
| null | null |
10.1007/978-3-642-13190-5_25
| null |
quant-ph cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Universal Composability model (UC) by Canetti (FOCS 2001) allows for
secure composition of arbitrary protocols. We present a quantum version of the
UC model which enjoys the same compositionality guarantees. We prove that in
this model statistically secure oblivious transfer protocols can be constructed
from commitments. Furthermore, we show that every statistically classically UC
secure protocol is also statistically quantum UC secure. Such implications are
not known for other quantum security definitions. As a corollary, we get that
quantum UC secure protocols for general multi-party computation can be
constructed from commitments.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 16:12:16 GMT"
}
] | 2018-02-13T00:00:00 |
[
[
"Unruh",
"Dominique",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0910.2917
|
Venkatesh Saligrama
|
P. M. Jodoin, V. Saligrama, J. Konrad
|
Behavior Subtraction
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Background subtraction has been a driving engine for many computer vision and
video analytics tasks. Although its many variants exist, they all share the
underlying assumption that photometric scene properties are either static or
exhibit temporal stationarity. While this works in some applications, the model
fails when one is interested in discovering {\it changes in scene dynamics}
rather than those in a static background; detection of unusual pedestrian and
motor traffic patterns is but one example. We propose a new model and
computational framework that address this failure by considering stationary
scene dynamics as a ``background'' with which observed scene dynamics are
compared. Central to our approach is the concept of an {\it event}, that we
define as short-term scene dynamics captured over a time window at a specific
spatial location in the camera field of view. We compute events by
time-aggregating motion labels, obtained by background subtraction, as well as
object descriptors (e.g., object size). Subsequently, we characterize events
probabilistically, but use a low-memory, low-complexity surrogates in practical
implementation. Using these surrogates amounts to {\it behavior subtraction}, a
new algorithm with some surprising properties. As demonstrated here, behavior
subtraction is an effective tool in anomaly detection and localization. It is
resilient to spurious background motion, such as one due to camera jitter, and
is content-blind, i.e., it works equally well on humans, cars, animals, and
other objects in both uncluttered and highly-cluttered scenes. Clearly,
treating video as a collection of events rather than colored pixels opens new
possibilities for video analytics.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 16:09:18 GMT"
}
] | 2009-10-16T00:00:00 |
[
[
"Jodoin",
"P. M.",
""
],
[
"Saligrama",
"V.",
""
],
[
"Konrad",
"J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0910.2931
|
Samson Abramsky
|
Samson Abramsky
|
Abstract Scalars, Loops, and Free Traced and Strongly Compact Closed
Categories
|
32 pages
|
In Proceedings of CALCO 2005, Springer Lecture Notes in Computer
Science Vol. 3629, 1--31, 2005
| null | null |
quant-ph cs.LO math.CT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study structures which have arisen in recent work by the present author
and Bob Coecke on a categorical axiomatics for Quantum Mechanics; in
particular, the notion of strongly compact closed category. We explain how
these structures support a notion of scalar which allows quantitative aspects
of physical theory to be expressed, and how the notion of strong compact
closure emerges as a significant refinement of the more classical notion of
compact closed category.
We then proceed to an extended discussion of free constructions for a
sequence of progressively more complex kinds of structured category,
culminating in the strongly compact closed case. The simple geometric and
combinatorial ideas underlying these constructions are emphasized. We also
discuss variations where a prescribed monoid of scalars can be "glued in" to
the free construction.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 16:39:34 GMT"
}
] | 2009-10-16T00:00:00 |
[
[
"Abramsky",
"Samson",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
0910.2942
|
Mugurel Ionut Andreica
|
Florin Pop, Ciprian Mihai Dobre, Alexandru Costan, Mugurel Ionut
Andreica, Eliana-Dina Tirsa, Corina Stratan, Valentin Cristea
|
Critical Analysis of Middleware Architectures for Large Scale
Distributed Systems
| null |
Proc. of the 17th Intl. Conf. on Control Systems and Computer
Science (CSCS), vol. 1, pp. 29-36, Bucharest, Romania, 26-29 May, 2009.
(ISSN: 2066-4451)
| null | null |
cs.DC cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distributed computing is increasingly being viewed as the next phase of Large
Scale Distributed Systems (LSDSs). However, the vision of large scale resource
sharing is not yet a reality in many areas - Grid computing is an evolving area
of computing, where standards and technology are still being developed to
enable this new paradigm. Hence, in this paper we analyze the current
development of middleware tools for LSDS, from multiple perspectives:
architecture, applications and market research. For each perspective we are
interested in relevant technologies used in undergoing projects, existing
products or services and useful design issues. In the end, based on this
approach, we draw some conclusions regarding the future research directions in
this area.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 17:14:55 GMT"
}
] | 2009-10-16T00:00:00 |
[
[
"Pop",
"Florin",
""
],
[
"Dobre",
"Ciprian Mihai",
""
],
[
"Costan",
"Alexandru",
""
],
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Tirsa",
"Eliana-Dina",
""
],
[
"Stratan",
"Corina",
""
],
[
"Cristea",
"Valentin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.2961
|
Yan Zhu
|
Yan Zhu and Dongning Guo
|
Isotropic MIMO Interference Channels without CSIT: The Loss of Degrees
of Freedom
|
appears in Allerton 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies two-user MIMO interference channel with isotropic fading.
We assume that users are equipped with arbitrary number of antennas and the
channel state information (CSI) is available at receivers only. An outer bound
is obtained for the degree of freedom region, which suggests the loss of
degrees of freedom due to the lack of CSI at transmitters under many
circumstances.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 18:39:27 GMT"
}
] | 2009-10-16T00:00:00 |
[
[
"Zhu",
"Yan",
""
],
[
"Guo",
"Dongning",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.2973
|
Mohab Safey El Din
|
Mohab Safey El Din (LIP6, INRIA Rocquencourt), Lihong Zhi (KLMM)
|
Computing rational points in convex semi-algebraic sets and SOS
decompositions
| null | null | null | null |
cs.SC cs.DS math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let ${\cal P}=\{h_1, ..., h_s\}\subset \Z[Y_1, ..., Y_k]$, $D\geq \deg(h_i)$
for $1\leq i \leq s$, $\sigma$ bounding the bit length of the coefficients of
the $h_i$'s, and $\Phi$ be a quantifier-free ${\cal P}$-formula defining a
convex semi-algebraic set. We design an algorithm returning a rational point in
${\cal S}$ if and only if ${\cal S}\cap \Q\neq\emptyset$. It requires
$\sigma^{\bigO(1)}D^{\bigO(k^3)}$ bit operations. If a rational point is
outputted its coordinates have bit length dominated by $\sigma D^{\bigO(k^3)}$.
Using this result, we obtain a procedure deciding if a polynomial $f\in \Z[X_1,
>..., X_n]$ is a sum of squares of polynomials in $\Q[X_1, ..., X_n]$. Denote
by $d$ the degree of $f$, $\tau$ the maximum bit length of the coefficients in
$f$, $D={{n+d}\choose{n}}$ and $k\leq D(D+1)-{{n+2d}\choose{n}}$. This
procedure requires $\tau^{\bigO(1)}D^{\bigO(k^3)}$ bit operations and the
coefficients of the outputted polynomials have bit length dominated by $\tau
D^{\bigO(k^3)}$.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 19:18:05 GMT"
}
] | 2009-10-16T00:00:00 |
[
[
"Din",
"Mohab Safey El",
"",
"LIP6, INRIA Rocquencourt"
],
[
"Zhi",
"Lihong",
"",
"KLMM"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0910.3028
|
Natasha Devroye
|
Stefano Rini, Daniela Tuninetti, Natasha Devroye
|
State of the cognitive interference channel: a new unified inner bound
|
Presented at the 2010 International Zurich Seminar on Communications
- an 2nd updated version.
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The capacity region of the interference channel in which one transmitter
non-causally knows the message of the other, termed the cognitive interference
channel, has remained open since its inception in 2005. A number of subtly
differing achievable rate regions and outer bounds have been derived, some of
which are tight under specific conditions. In this work we present a new
unified inner bound for the discrete memoryless cognitive interference channel.
We show explicitly how it encompasses all known discrete memoryless achievable
rate regions as special cases. The presented achievable region was recently
used in deriving the capacity region of the general deterministic cognitive
interference channel, and thus also the linear high-SNR deterministic
approximation of the Gaussian cognitive interference channel. The high-SNR
deterministic approximation was then used to obtain the capacity of the
Gaussian cognitive interference channel to within 1.87 bits.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 03:14:05 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Mar 2010 05:45:48 GMT"
},
{
"version": "v3",
"created": "Fri, 19 Mar 2010 22:35:24 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Rini",
"Stefano",
""
],
[
"Tuninetti",
"Daniela",
""
],
[
"Devroye",
"Natasha",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.3033
|
Ersen Ekrem
|
Ersen Ekrem and Sennur Ulukus
|
Degraded Compound Multi-receiver Wiretap Channels
|
Submitted to IEEE Transactions on Information Theory, October 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we study the degraded compound multi-receiver wiretap channel.
The degraded compound multi-receiver wiretap channel consists of two groups of
users and a group of eavesdroppers, where, if we pick an arbitrary user from
each group of users and an arbitrary eavesdropper, they satisfy a certain
Markov chain. We study two different communication scenarios for this channel.
In the first scenario, the transmitter wants to send a confidential message to
users in the first (stronger) group and a different confidential message to
users in the second (weaker) group, where both messages need to be kept
confidential from the eavesdroppers. For this scenario, we assume that there is
only one eavesdropper. We obtain the secrecy capacity region for the general
discrete memoryless channel model, the parallel channel model, and the Gaussian
parallel channel model. For the Gaussian multiple-input multiple-output (MIMO)
channel model, we obtain the secrecy capacity region when there is only one
user in the second group. In the second scenario we study, the transmitter
sends a confidential message to users in the first group which needs to be kept
confidential from the second group of users and the eavesdroppers. Furthermore,
the transmitter sends a different confidential message to users in the second
group which needs to be kept confidential only from the eavesdroppers. For this
scenario, we do not put any restriction on the number of eavesdroppers. As in
the first scenario, we obtain the secrecy capacity region for the general
discrete memoryless channel model, the parallel channel model, and the Gaussian
parallel channel model. For the Gaussian MIMO channel model, we establish the
secrecy capacity region when there is only one user in the second group.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 04:00:24 GMT"
}
] | 2009-10-19T00:00:00 |
[
[
"Ekrem",
"Ersen",
""
],
[
"Ulukus",
"Sennur",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.3068
|
Uwe Aickelin
|
Uwe Aickelin, Jingpeng Li, Edmund Burke
|
An Evolutionary Squeaky Wheel Optimisation Approach to Personnel
Scheduling
|
21 pages, 5 tables, 1 figure, IEEE Transactions on Evolutionary
Computation
|
IEEE Transactions on Evolutionary Computation, 13 (2), 433-443,
2009
|
10.2139/ssrn.2823393
| null |
cs.AI cs.CE cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The quest for robust heuristics that are able to solve more than one problem
is ongoing. In this paper, we present, discuss and analyse a technique called
Evolutionary Squeaky Wheel Optimisation and apply it to two different personnel
scheduling problems. Evolutionary Squeaky Wheel Optimisation improves the
original Squeaky Wheel Optimisation's effectiveness and execution speed by
incorporating two extra steps (Selection and Mutation) for added evolution. In
the Evolutionary Squeaky Wheel Optimisation, a cycle of
Analysis-Selection-Mutation-Prioritization-Construction continues until
stopping conditions are reached. The aim of the Analysis step is to identify
below average solution components by calculating a fitness value for all
components. The Selection step then chooses amongst these underperformers and
discards some probabilistically based on fitness. The Mutation step further
discards a few components at random. Solutions can become incomplete and thus
repairs may be required. The repairs are carried out by using the
Prioritization to first produce priorities that determine an order by which the
following Construction step then schedules the remaining components. Therefore,
improvement in the Evolutionary Squeaky Wheel Optimisation is achieved by
selective solution disruption mixed with interative improvement and
constructive repair. Strong experimental results are reported on two different
domains of personnel scheduling: bus and rail driver scheduling and hospital
nurse scheduling.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 13:36:01 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Aickelin",
"Uwe",
""
],
[
"Li",
"Jingpeng",
""
],
[
"Burke",
"Edmund",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0910.3084
|
Cristina Fern\'andez-C\'ordoba
|
J. Borges, S.T. Dougherty and C. Fernandez-Cordoba
|
Self-Dual Codes over Z_2xZ_4
|
Submitted to Designs, Codes and Cryptography
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Self-dual codes over $\Z_2\times\Z_4$ are subgroups of $\Z_2^\alpha
\times\Z_4^\beta$ that are equal to their orthogonal under an inner-product
that relates to the binary Hamming scheme. Three types of self-dual codes are
defined. For each type, the possible values $\alpha,\beta$ such that there
exist a code $\C\subseteq \Z_2^\alpha \times\Z_4^\beta$ are established.
Moreover, the construction of a $\add$-linear code for each type and possible
pair $(\alpha,\beta)$ is given. Finally, the standard techniques of invariant
theory are applied to describe the weight enumerators for each type.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 11:30:57 GMT"
}
] | 2009-10-19T00:00:00 |
[
[
"Borges",
"J.",
""
],
[
"Dougherty",
"S. T.",
""
],
[
"Fernandez-Cordoba",
"C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.3085
|
Achim Blumensath
|
Achim Blumensath
|
Guarded Second-Order Logic, Spanning Trees, and Network Flows
| null |
Logical Methods in Computer Science, Volume 6, Issue 1 (February
16, 2010) lmcs:1207
|
10.2168/LMCS-6(1:4)2010
| null |
cs.LO cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
According to a theorem of Courcelle monadic second-order logic and guarded
second-order logic (where one can also quantify over sets of edges) have the
same expressive power over the class of all countable $k$-sparse hypergraphs.
In the first part of the present paper we extend this result to hypergraphs of
arbitrary cardinality. In the second part, we present a generalisation dealing
with methods to encode sets of vertices by single vertices.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 11:32:13 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Feb 2010 15:00:14 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"Blumensath",
"Achim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.3113
|
Pavel Chebotarev
|
Rafig Agaev and Pavel Chebotarev
|
Which Digraphs with Ring Structure are Essentially Cyclic?
|
19 pages, 8 figures, Advances in Applied Mathematics: accepted for
publication (2010) http://dx.doi.org/10.1016/j.aam.2010.01.005
|
Advances in Applied Mathematics 45 (2010), pp. 232-251
|
10.1016/j.aam.2010.01.005
| null |
math.CO cs.DM cs.MA math.SP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We say that a digraph is essentially cyclic if its Laplacian spectrum is not
completely real. The essential cyclicity implies the presence of directed
cycles, but not vice versa. The problem of characterizing essential cyclicity
in terms of graph topology is difficult and yet unsolved. Its solution is
important for some applications of graph theory, including that in
decentralized control. In the present paper, this problem is solved with
respect to the class of digraphs with ring structure, which models some typical
communication networks. It is shown that the digraphs in this class are
essentially cyclic, except for certain specified digraphs. The main technical
tool we employ is the Chebyshev polynomials of the second kind. A by-product of
this study is a theorem on the zeros of polynomials that differ by one from the
products of Chebyshev polynomials of the second kind. We also consider the
problem of essential cyclicity for weighted digraphs and enumerate the spanning
trees in some digraphs with ring structure.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 13:48:03 GMT"
},
{
"version": "v2",
"created": "Sun, 18 Oct 2009 09:03:30 GMT"
},
{
"version": "v3",
"created": "Sat, 23 Jan 2010 15:58:35 GMT"
},
{
"version": "v4",
"created": "Tue, 23 Feb 2010 20:08:40 GMT"
}
] | 2010-06-04T00:00:00 |
[
[
"Agaev",
"Rafig",
""
],
[
"Chebotarev",
"Pavel",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Mathematics",
"code": "math.SP",
"description": "Schrodinger operators, operators on manifolds, general differential operators, numerical studies, integral operators, discrete models, resonances, non-self-adjoint operators, random operators/matrices",
"span": "(Spectral Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.