id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0910.3115
Uwe Aickelin
Amanda Whitbrook, Uwe Aickelin, Jonathan M Garibaldi
An Idiotypic Immune Network as a Short Term Learning Architecture for Mobile Robots
13 pages, 5 tables, 4 figures, 7th International Conference on Artificial Immune Systems (ICARIS2008), Phuket, Thailand
Proceedings of the 7th International Conference on Artificial Imune Systems (ICARIS2008), Phuket, Thailand, 266-278, 2008
null
null
cs.AI cs.NE cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A combined Short-Term Learning (STL) and Long-Term Learning (LTL) approach to solving mobile robot navigation problems is presented and tested in both real and simulated environments. The LTL consists of rapid simulations that use a Genetic Algorithm to derive diverse sets of behaviours. These sets are then transferred to an idiotypic Artificial Immune System (AIS), which forms the STL phase, and the system is said to be seeded. The combined LTL-STL approach is compared with using STL only, and with using a handdesigned controller. In addition, the STL phase is tested when the idiotypic mechanism is turned off. The results provide substantial evidence that the best option is the seeded idiotypic system, i.e. the architecture that merges LTL with an idiotypic AIS for the STL. They also show that structurally different environments can be used for the two phases without compromising transferability
[ { "version": "v1", "created": "Fri, 16 Oct 2009 13:40:49 GMT" } ]
2010-07-05T00:00:00
[ [ "Whitbrook", "Amanda", "" ], [ "Aickelin", "Uwe", "" ], [ "Garibaldi", "Jonathan M", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0910.3117
Uwe Aickelin
Jamie Twycross, Uwe Aickelin
An Immune Inspired Approach to Anomaly Detection
19 pages, 4 tables, 2 figures, Handbook of Research on Information Security and Assurance
Handbook of Research on Information Security and Assurance, Chapter X, 2008
null
null
cs.AI cs.CR cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success. Arguably, this was due to these artificial systems being based on too simplistic a view of the immune system. We present here a second generation artificial immune system for process anomaly detection. It improves on earlier systems by having different artificial cell types that process information. Following detailed information about how to build such second generation systems, we find that communication between cells types is key to performance. Through realistic testing and validation we show that second generation artificial immune systems are capable of anomaly detection beyond generic system policies. The paper concludes with a discussion and outline of the next steps in this exciting area of computer security.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 13:44:37 GMT" } ]
2010-07-05T00:00:00
[ [ "Twycross", "Jamie", "" ], [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0910.3119
Alexandre Soro
Alexandre Soro and Jerome Lacan
FFT-based Network Coding For Peer-To-Peer Content Delivery
Submitted to ICC 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a structured peer-to-peer (P2P) distribution scheme based on Fast Fourier Transform (FFT) graphs. We build a peer-to-peer network that reproduces the FFT graph initially designed for hardware FFT codecs. This topology allows content delivery with a maximum diversity level for a minimum global complexity. The resulting FFTbased network is a structured architecture with an adapted network coding that brings flexibility upon content distribution and robustness upon the dynamic nature of the network. This structure can achieve optimal capacity in terms of content recovery while solving the problem of last remaining blocks, even for large networks.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 13:48:35 GMT" } ]
2009-10-19T00:00:00
[ [ "Soro", "Alexandre", "" ], [ "Lacan", "Jerome", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.3123
Johannes Fischer
Johannes Fischer
Wee LCP
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that longest common prefix (LCP) information can be stored in much less space than previously known. More precisely, we show that in the presence of the text and the suffix array, o(n) additional bits are sufficient to answer LCP-queries asymptotically in the same time that is needed to retrieve an entry from the suffix array. This yields the smallest compressed suffix tree with sub-logarithmic navigation time.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 13:50:12 GMT" }, { "version": "v2", "created": "Fri, 19 Feb 2010 09:19:42 GMT" } ]
2010-02-19T00:00:00
[ [ "Fischer", "Johannes", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.3124
Uwe Aickelin
Gianni Tedesco, Uwe Aickelin
An Immune Inspired Network Intrusion Detection System Utilising Correlation Context
2 pages, Workshop on Artificial Immune Systems and Immune System Modelling
null
null
null
cs.AI cs.CR cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network Intrusion Detection Systems (NIDS) are computer systems which monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDSs rely on having access to a database of known attack signatures which are written by security experts. Nowadays, in order to solve problems with false positive alerts, correlation algorithms are used to add additional structure to sequences of IDS alerts. However, such techniques are of no help in discovering novel attacks or variations of known attacks, something the human immune system (HIS) is capable of doing in its own specialised domain. This paper presents a novel immune algorithm for application to the IDS problem. The goal is to discover packets containing novel variations of attacks covered by an existing signature base.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 13:55:41 GMT" } ]
2010-07-05T00:00:00
[ [ "Tedesco", "Gianni", "" ], [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0910.3127
Jakob Nordstr\"om
Jakob Nordstr\"om, Alexander Razborov
On Minimal Unsatisfiability and Time-Space Trade-offs for k-DNF Resolution
null
null
null
null
cs.DM cs.CC math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the context of proving lower bounds on proof space in k-DNF resolution, [Ben-Sasson and Nordstrom 2009] introduced the concept of minimally unsatisfiable sets of k-DNF formulas and proved that a minimally unsatisfiable k-DNF set with m formulas can have at most O((mk)^(k+1)) variables. They also gave an example of such sets with Omega(mk^2) variables. In this paper we significantly improve the lower bound to Omega(m)^k, which almost matches the upper bound above. Furthermore, we show that this implies that the analysis of their technique for proving time-space separations and trade-offs for k-DNF resolution is almost tight. This means that although it is possible, or even plausible, that stronger results than in [Ben-Sasson and Nordstrom 2009] should hold, a fundamentally different approach would be needed to obtain such results.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 14:33:58 GMT" }, { "version": "v2", "created": "Fri, 16 Oct 2009 21:10:31 GMT" } ]
2016-09-08T00:00:00
[ [ "Nordström", "Jakob", "" ], [ "Razborov", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0910.3144
Samson Abramsky
Samson Abramsky and Bob Coecke
Abstract Physical Traces
14 pages
Theory and Applications of Categories, vol 14, pages 111--124, 2005
null
null
quant-ph cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We revise our "Physical Traces" paper in the light of the results in "A Categorical Semantics of Quantum Protocols". The key fact is that the notion of a strongly compact closed category allows abstract notions of adjoint, bipartite projector and inner product to be defined, and their key properties to be proved. In this paper we improve on the definition of strong compact closure as compared to the one presented in Categorical Semantics of Quantum Protocols. This modification enables an elegant characterization of strong compact closure in terms of adjoints and a Yanking axiom, and a better treatment of bipartite projectors.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 15:40:03 GMT" } ]
2009-10-19T00:00:00
[ [ "Abramsky", "Samson", "" ], [ "Coecke", "Bob", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
0910.3148
Riccardo Dondi
Stefano Beretta, Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi and Yuri Pirola
Parameterized Complexity of the k-anonymity Problem
22 pages, 2 figures
J. of Combinatorial Optimization 26.1 (2013) 19-43
10.1007/s10878-011-9428-9
null
cs.DS cs.DB cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of publishing personal data without giving up privacy is becoming increasingly important. An interesting formalization that has been recently proposed is the $k$-anonymity. This approach requires that the rows of a table are partitioned in clusters of size at least $k$ and that all the rows in a cluster become the same tuple, after the suppression of some entries. The natural optimization problem, where the goal is to minimize the number of suppressed entries, is known to be APX-hard even when the records values are over a binary alphabet and $k=3$, and when the records have length at most 8 and $k=4$ . In this paper we study how the complexity of the problem is influenced by different parameters. In this paper we follow this direction of research, first showing that the problem is W[1]-hard when parameterized by the size of the solution (and the value $k$). Then we exhibit a fixed parameter algorithm, when the problem is parameterized by the size of the alphabet and the number of columns. Finally, we investigate the computational (and approximation) complexity of the $k$-anonymity problem, when restricting the instance to records having length bounded by 3 and $k=3$. We show that such a restriction is APX-hard.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 16:01:33 GMT" }, { "version": "v2", "created": "Mon, 17 May 2010 08:06:06 GMT" } ]
2013-11-20T00:00:00
[ [ "Beretta", "Stefano", "" ], [ "Bonizzoni", "Paola", "" ], [ "Della Vedova", "Gianluca", "" ], [ "Dondi", "Riccardo", "" ], [ "Pirola", "Yuri", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.3152
Robert McGrath
Robert E. McGrath, Jason Kastner, Alejandro Rodriguez, Jim Myers
Towards a Semantic Preservation System
null
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Preserving access to file content requires preserving not just bits but also meaningful logical structures. The ongoing development of the Data Format Description Language (DFDL) is a completely general standard that addresses this need. The Defuddle parser is a generic parser that can use DFDL-style format descriptions to extract logical structures from ASCII or binary files written in those formats. DFDL and Defuddle provide a preservation capability that has minimal format-specific software and cleanly separates issues related to bits, formats, and logical content. Such a system has the potential to greatly reduce overall system development and maintenance costs as well as the per-file-format costs for long term preservation.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 16:22:12 GMT" } ]
2009-10-19T00:00:00
[ [ "McGrath", "Robert E.", "" ], [ "Kastner", "Jason", "" ], [ "Rodriguez", "Alejandro", "" ], [ "Myers", "Jim", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0910.3243
Krzysztof Onak
Krzysztof Onak
Testing Distribution Identity Efficiently
4 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of testing distribution identity. Given a sequence of independent samples from an unknown distribution on a domain of size n, the goal is to check if the unknown distribution approximately equals a known distribution on the same domain. While Batu, Fortnow, Fischer, Kumar, Rubinfeld, and White (FOCS 2001) proved that the sample complexity of the problem is O~(sqrt(n) * poly(1/epsilon)), the running time of their tester is much higher: O(n) + O~(sqrt(n) * poly(1/epsilon)). We modify their tester to achieve a running time of O~(sqrt(n) * poly(1/epsilon)).
[ { "version": "v1", "created": "Fri, 16 Oct 2009 22:26:02 GMT" } ]
2009-10-20T00:00:00
[ [ "Onak", "Krzysztof", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.3275
Sang-Woon Jeon
Sang-Woon Jeon, Sae-Young Chung, Syed A. Jafar
Degrees of Freedom of Multi-Source Relay Networks
6 pages, 2 figures, presented at the 47-th Allerton Conference on Communication, Control, and Computing, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a multi-source Gaussian relay network consisting of $K$ source--destination pairs having $K$ unicast sessions. We assume $M$ layers of relays between the sources and the destinations. We find achievable degrees of freedom of the network. Our schemes are based on interference alignment at the transmitters and symbol extension and opportunistic interference cancellation at the relays. For $K$-$L$-$K$ networks, i.e., 2-hop network with $L$ relays, we show $\min\{K,K/2+L/(2(K-1))\}$ degrees of freedom are achievable. For $K$-hop networks with $K$ relays in each layer, we show the full $K$ degrees of freedom are achievable provided that $K$ is even and the channel distribution satisfies a certain symmetry.
[ { "version": "v1", "created": "Sat, 17 Oct 2009 05:49:44 GMT" } ]
2009-10-20T00:00:00
[ [ "Jeon", "Sang-Woon", "" ], [ "Chung", "Sae-Young", "" ], [ "Jafar", "Syed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.3282
Yunlei Zhao
Andrew C. Yao, Moti Yung, Yunlei Zhao
Adaptive Concurrent Non-Malleability with Bare Public-Keys
41 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Concurrent non-malleability (CNM) is central for cryptographic protocols running concurrently in environments such as the Internet. In this work, we formulate CNM in the bare public-key (BPK) model, and show that round-efficient concurrent non-malleable cryptography with full adaptive input selection can be established, in general, with bare public-keys (where, in particular, no trusted assumption is made). Along the way, we clarify the various subtleties of adaptive concurrent non-malleability in the bare public-key model.
[ { "version": "v1", "created": "Sat, 17 Oct 2009 07:28:50 GMT" } ]
2009-10-20T00:00:00
[ [ "Yao", "Andrew C.", "" ], [ "Yung", "Moti", "" ], [ "Zhao", "Yunlei", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.3292
Masud Hasan
Jesun Sahariar Firoz, Masud Hasan, Ashik Zinnat Khan, and M. Sohel Rahman
The 1.375 Approximation Algorithm for Sorting by Transpositions Can Run in $O(n\log n)$ Time
5 pages
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sorting a Permutation by Transpositions (SPbT) is an important problem in Bioinformtics. In this paper, we improve the running time of the best known approximation algorithm for SPbT. We use the permutation tree data structure of Feng and Zhu and improve the running time of the 1.375 Approximation Algorithm for SPbT of Elias and Hartman to $O(n\log n)$. The previous running time of EH algorithm was $O(n^2)$.
[ { "version": "v1", "created": "Sat, 17 Oct 2009 10:16:48 GMT" } ]
2009-10-20T00:00:00
[ [ "Firoz", "Jesun Sahariar", "" ], [ "Hasan", "Masud", "" ], [ "Khan", "Ashik Zinnat", "" ], [ "Rahman", "M. Sohel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.3301
Julian McAuley
Julian J. McAuley, Tiberio S. Caetano
Faster Algorithms for Max-Product Message-Passing
34 pages, 22 figures
null
null
null
cs.AI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Maximum A Posteriori inference in graphical models is often solved via message-passing algorithms, such as the junction-tree algorithm, or loopy belief-propagation. The exact solution to this problem is well known to be exponential in the size of the model's maximal cliques after it is triangulated, while approximate inference is typically exponential in the size of the model's factors. In this paper, we take advantage of the fact that many models have maximal cliques that are larger than their constituent factors, and also of the fact that many factors consist entirely of latent variables (i.e., they do not depend on an observation). This is a common case in a wide variety of applications, including grids, trees, and ring-structured models. In such cases, we are able to decrease the exponent of complexity for message-passing by 0.5 for both exact and approximate inference.
[ { "version": "v1", "created": "Sat, 17 Oct 2009 13:42:35 GMT" }, { "version": "v2", "created": "Thu, 22 Oct 2009 04:02:16 GMT" }, { "version": "v3", "created": "Sat, 5 Dec 2009 03:41:24 GMT" }, { "version": "v4", "created": "Thu, 8 Apr 2010 05:24:55 GMT" } ]
2010-04-09T00:00:00
[ [ "McAuley", "Julian J.", "" ], [ "Caetano", "Tiberio S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.3321
Miguel Vilaca
Ian Mackie, Jorge Sousa Pinto and Miguel Vilaca
Iterators, Recursors and Interaction Nets
ISBN: 978-972-9348-18-1
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a method for encoding iterators (and recursion operators in general) using interaction nets (INs). There are two main applications for this: the method can be used to obtain a visual nota- tion for functional programs; and it can be used to extend the existing translations of the lambda-calculus into INs to languages with recursive types.
[ { "version": "v1", "created": "Sat, 17 Oct 2009 18:52:53 GMT" } ]
2009-10-20T00:00:00
[ [ "Mackie", "Ian", "" ], [ "Pinto", "Jorge Sousa", "" ], [ "Vilaca", "Miguel", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0910.3348
Harris Georgiou
Harris Georgiou
Algorithms for Image Analysis and Combination of Pattern Classifiers with Application to Medical Diagnosis
PhD thesis summary, 12 pages
null
null
null
cs.CV cs.AI cs.GT cs.NE
http://creativecommons.org/licenses/by-nc-sa/3.0/
Medical Informatics and the application of modern signal processing in the assistance of the diagnostic process in medical imaging is one of the more recent and active research areas today. This thesis addresses a variety of issues related to the general problem of medical image analysis, specifically in mammography, and presents a series of algorithms and design approaches for all the intermediate levels of a modern system for computer-aided diagnosis (CAD). The diagnostic problem is analyzed with a systematic approach, first defining the imaging characteristics and features that are relevant to probable pathology in mammo-grams. Next, these features are quantified and fused into new, integrated radio-logical systems that exhibit embedded digital signal processing, in order to improve the final result and minimize the radiological dose for the patient. In a higher level, special algorithms are designed for detecting and encoding these clinically interest-ing imaging features, in order to be used as input to advanced pattern classifiers and machine learning models. Finally, these approaches are extended in multi-classifier models under the scope of Game Theory and optimum collective deci-sion, in order to produce efficient solutions for combining classifiers with minimum computational costs for advanced diagnostic systems. The material covered in this thesis is related to a total of 18 published papers, 6 in scientific journals and 12 in international conferences.
[ { "version": "v1", "created": "Sun, 18 Oct 2009 03:31:33 GMT" } ]
2009-10-20T00:00:00
[ [ "Georgiou", "Harris", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0910.3349
Ping Li
Ping Li, Arnd Christian Konig
b-Bit Minwise Hashing
null
null
null
null
cs.DS cs.DB cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper establishes the theoretical framework of b-bit minwise hashing. The original minwise hashing method has become a standard technique for estimating set similarity (e.g., resemblance) with applications in information retrieval, data management, social networks and computational advertising. By only storing the lowest $b$ bits of each (minwise) hashed value (e.g., b=1 or 2), one can gain substantial advantages in terms of computational efficiency and storage space. We prove the basic theoretical results and provide an unbiased estimator of the resemblance for any b. We demonstrate that, even in the least favorable scenario, using b=1 may reduce the storage space at least by a factor of 21.3 (or 10.7) compared to using b=64 (or b=32), if one is interested in resemblance > 0.5.
[ { "version": "v1", "created": "Sun, 18 Oct 2009 03:39:56 GMT" } ]
2009-10-20T00:00:00
[ [ "Li", "Ping", "" ], [ "Konig", "Arnd Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0910.3372
Marcelo Arenas
Marcelo Arenas, Jorge Perez, Juan Reutter and Cristian Riveros
Composition and Inversion of Schema Mappings
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the recent years, a lot of attention has been paid to the development of solid foundations for the composition and inversion of schema mappings. In this paper, we review the proposals for the semantics of these crucial operators. For each of these proposals, we concentrate on the three following problems: the definition of the semantics of the operator, the language needed to express the operator, and the algorithmic issues associated to the problem of computing the operator. It should be pointed out that we primarily consider the formalization of schema mappings introduced in the work on data exchange. In particular, when studying the problem of computing the composition and inverse of a schema mapping, we will be mostly interested in computing these operators for mappings specified by source-to-target tuple-generating dependencies.
[ { "version": "v1", "created": "Sun, 18 Oct 2009 13:46:36 GMT" }, { "version": "v2", "created": "Tue, 20 Oct 2009 17:48:48 GMT" }, { "version": "v3", "created": "Mon, 21 Dec 2009 18:22:06 GMT" }, { "version": "v4", "created": "Thu, 4 Mar 2010 18:36:16 GMT" } ]
2010-03-04T00:00:00
[ [ "Arenas", "Marcelo", "" ], [ "Perez", "Jorge", "" ], [ "Reutter", "Juan", "" ], [ "Riveros", "Cristian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0910.3376
Andrew Drucker
Andrew Drucker (MIT), Ronald de Wolf (CWI Amsterdam)
Quantum Proofs for Classical Theorems
50 pages LaTeX. Updated based on journal version; the journal version is open-access and has nicer typesetting (http://theoryofcomputing.org/articles/gs002/)
Theory of Computing, Graduate surveys 2, 2011
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Alongside the development of quantum algorithms and quantum complexity theory in recent years, quantum techniques have also proved instrumental in obtaining results in classical (non-quantum) areas. In this paper we survey these results and the quantum toolbox they use.
[ { "version": "v1", "created": "Sun, 18 Oct 2009 14:19:34 GMT" }, { "version": "v2", "created": "Mon, 14 Mar 2011 00:33:32 GMT" } ]
2011-03-15T00:00:00
[ [ "Drucker", "Andrew", "", "MIT" ], [ "de Wolf", "Ronald", "", "CWI Amsterdam" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.3383
David Baelde
David Baelde
Least and Greatest Fixed Points in Linear Logic
Accepted for publication at the ACM Transactions on Computational Logic
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The first-order theory of MALL (multiplicative, additive linear logic) over only equalities is an interesting but weak logic since it cannot capture unbounded (infinite) behavior. Instead of accounting for unbounded behavior via the addition of the exponentials (! and ?), we add least and greatest fixed point operators. The resulting logic, which we call muMALL, satisfies two fundamental proof theoretic properties: we establish weak normalization for it, and we design a focused proof system that we prove complete. That second result provides a strong normal form for cut-free proof structures that can be used, for example, to help automate proof search. We show how these foundations can be applied to intuitionistic logic.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 19:56:36 GMT" }, { "version": "v2", "created": "Thu, 11 Feb 2010 19:43:53 GMT" }, { "version": "v3", "created": "Wed, 7 Jul 2010 05:38:57 GMT" }, { "version": "v4", "created": "Tue, 30 Nov 2010 22:52:45 GMT" } ]
2010-12-02T00:00:00
[ [ "Baelde", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.3427
Ernst Martin Witte
Ernst Martin Witte, Filippo Borlenghi, Gerd Ascheid, Rainer Leupers, Heinrich Meyr
A Scalable VLSI Architecture for Soft-Input Soft-Output Depth-First Sphere Decoding
Accepted for IEEE Transactions on Circuits and Systems II Express Briefs, May 2010. This draft from April 2010 will not be updated any more. Please refer to IEEE Xplore for the final version. *) The final publication will appear with the modified title "A Scalable VLSI Architecture for Soft-Input Soft-Output Single Tree-Search Sphere Decoding"
IEEE Transactions on Circuits and Systems-Part II: Express Briefs, vol. 57, no. 9, pp. 706-710, Sep 2010
10.1109/TCSII.2010.2056014
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple-input multiple-output (MIMO) wireless transmission imposes huge challenges on the design of efficient hardware architectures for iterative receivers. A major challenge is soft-input soft-output (SISO) MIMO demapping, often approached by sphere decoding (SD). In this paper, we introduce the - to our best knowledge - first VLSI architecture for SISO SD applying a single tree-search approach. Compared with a soft-output-only base architecture similar to the one proposed by Studer et al. in IEEE J-SAC 2008, the architectural modifications for soft input still allow a one-node-per-cycle execution. For a 4x4 16-QAM system, the area increases by 57% and the operating frequency degrades by 34% only.
[ { "version": "v1", "created": "Sun, 18 Oct 2009 21:51:55 GMT" }, { "version": "v2", "created": "Mon, 26 Oct 2009 17:03:44 GMT" }, { "version": "v3", "created": "Tue, 6 Apr 2010 11:55:31 GMT" }, { "version": "v4", "created": "Mon, 7 Jun 2010 16:47:05 GMT" } ]
2015-03-13T00:00:00
[ [ "Witte", "Ernst Martin", "" ], [ "Borlenghi", "Filippo", "" ], [ "Ascheid", "Gerd", "" ], [ "Leupers", "Rainer", "" ], [ "Meyr", "Heinrich", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0910.3485
Yongzhi Cao
Yongzhi Cao and Guoqing Chen
A Fuzzy Petri Nets Model for Computing With Words
double columns 14 pages, 8 figures
IEEE Trans. Fuzzy Syst., vol. 18, no. 3, pp. 486-499, 2010
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by Zadeh's paradigm of computing with words rather than numbers, several formal models of computing with words have recently been proposed. These models are based on automata and thus are not well-suited for concurrent computing. In this paper, we incorporate the well-known model of concurrent computing, Petri nets, together with fuzzy set theory and thereby establish a concurrency model of computing with words--fuzzy Petri nets for computing with words (FPNCWs). The new feature of such fuzzy Petri nets is that the labels of transitions are some special words modeled by fuzzy sets. By employing the methodology of fuzzy reasoning, we give a faithful extension of an FPNCW which makes it possible for computing with more words. The language expressiveness of the two formal models of computing with words, fuzzy automata for computing with words and FPNCWs, is compared as well. A few small examples are provided to illustrate the theoretical development.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 09:09:43 GMT" } ]
2011-10-04T00:00:00
[ [ "Cao", "Yongzhi", "" ], [ "Chen", "Guoqing", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.3490
Mat\'u\v{s} Medo
Matus Medo, Yi-Cheng Zhang, Tao Zhou
Adaptive model for recommendation of news
6 pages, 6 figures
EPL 88, 38005, 2009
10.1209/0295-5075/88/38005
null
cs.IR cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most news recommender systems try to identify users' interests and news' attributes and use them to obtain recommendations. Here we propose an adaptive model which combines similarities in users' rating patterns with epidemic-like spreading of news on an evolving network. We study the model by computer agent-based simulations, measure its performance and discuss its robustness against bias and malicious behavior. Subject to the approval fraction of news recommended, the proposed model outperforms the widely adopted recommendation of news according to their absolute or relative popularity. This model provides a general social mechanism for recommender systems and may find its applications also in other types of recommendation.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 09:43:12 GMT" }, { "version": "v2", "created": "Fri, 23 Oct 2009 07:52:46 GMT" } ]
2009-11-13T00:00:00
[ [ "Medo", "Matus", "" ], [ "Zhang", "Yi-Cheng", "" ], [ "Zhou", "Tao", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0910.3494
Vaneet Aggarwal
Vaneet Aggarwal and Youjian Liu and Ashutosh Sabharwal
Sum-capacity of Interference Channels with a Local View: Impact of Distributed Decisions
Submitted to IEEE Transactions on Information Theory, October 2009
IEEE Transactions on Information Theory, vol.58, no.3, pp.1630,1659, March 2012
10.1109/TIT.2011.2178132
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to the large size of wireless networks, it is often impractical for nodes to track changes in the complete network state. As a result, nodes have to make distributed decisions about their transmission and reception parameters based on their local view of the network. In this paper, we characterize the impact of distributed decisions on the global network performance in terms of achievable sum-rates. We first formalize the concept of local view by proposing a protocol abstraction using the concept of local message passing. In the proposed protocol, nodes forward information about the network state to other neighboring nodes, thereby allowing network state information to trickle to all the nodes. The protocol proceeds in rounds, where all transmitters send a message followed by a message by all receivers. The number of rounds then provides a natural metric to quantify the extent of local information at each node. We next study three network connectivities, Z-channel, a three-user double Z-channel and a reduced-parametrization $K$-user stacked Z-channel. In each case, we characterize achievable sum-rate with partial message passing leading to three main results. First, in many cases, nodes can make distributed decisions with only local information about the network and can still achieve the same sum-capacity as can be attained with global information irrespective of the actual channel gains. Second, for the case of three-user double Z-channel, we show that universal optimality is not achievable if the per node information is below a threshold. Third, using reduced parametrization $K$-user channel, we show that very few protocol rounds are needed for the case of very weak or very strong interference.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 09:40:45 GMT" } ]
2014-07-15T00:00:00
[ [ "Aggarwal", "Vaneet", "" ], [ "Liu", "Youjian", "" ], [ "Sabharwal", "Ashutosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.3503
Benjamin Burton
Benjamin A. Burton
Searching a bitstream in linear time for the longest substring of any given density
22 pages, 19 figures; v2: minor edits and enhancements
Algorithmica 61 (2011), no. 3, 555-579
10.1007/s00453-010-9424-y
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given an arbitrary bitstream, we consider the problem of finding the longest substring whose ratio of ones to zeroes equals a given value. The central result of this paper is an algorithm that solves this problem in linear time. The method involves (i) reformulating the problem as a constrained walk through a sparse matrix, and then (ii) developing a data structure for this sparse matrix that allows us to perform each step of the walk in amortised constant time. We also give a linear time algorithm to find the longest substring whose ratio of ones to zeroes is bounded below by a given value. Both problems have practical relevance to cryptography and bioinformatics.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 10:06:34 GMT" }, { "version": "v2", "created": "Mon, 7 Jun 2010 20:44:36 GMT" } ]
2011-08-22T00:00:00
[ [ "Burton", "Benjamin A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.3509
Mohammad Hossein Yassaee
Mohammad Hossein Yassaee, Mohammad Reza Aref
Slepian-Wolf Coding Over Cooperative Relay Networks
IEEE Transactions on Information Theory, accepted
null
10.1109/TIT.2011.2143990
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the problem of multicasting a set of discrete memoryless correlated sources (DMCS) over a cooperative relay network. Necessary conditions with cut-set interpretation are presented. A \emph{Joint source-Wyner-Ziv encoding/sliding window decoding} scheme is proposed, in which decoding at each receiver is done with respect to an ordered partition of other nodes. For each ordered partition a set of feasibility constraints is derived. Then, utilizing the sub-modular property of the entropy function and a novel geometrical approach, the results of different ordered partitions are consolidated, which lead to sufficient conditions for our problem. The proposed scheme achieves operational separation between source coding and channel coding. It is shown that sufficient conditions are indeed necessary conditions in two special cooperative networks, namely, Aref network and finite-field deterministic network. Also, in Gaussian cooperative networks, it is shown that reliable transmission of all DMCS whose Slepian-Wolf region intersects the cut-set bound region within a constant number of bits, is feasible. In particular, all results of the paper are specialized to obtain an achievable rate region for cooperative relay networks which includes relay networks and two-way relay networks.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 10:23:11 GMT" }, { "version": "v2", "created": "Mon, 6 Dec 2010 16:20:41 GMT" } ]
2016-11-17T00:00:00
[ [ "Yassaee", "Mohammad Hossein", "" ], [ "Aref", "Mohammad Reza", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.3511
Haya Shulman
Amir Herzberg and Haya Shulman
Stealth-MITM DoS Attacks on Secure Channels
14 figures; 21 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: First amplifying DoS attack on IPsec, when deployed without anti-replay window. First amplifying attack on IPsec, when deployed with a `small' anti-replay window, and analysis of `sufficient' window size. First amplifying attack on IPsec, when deployed with `sufficient' window size. This attack (as the previous) is realistic: attacker needs only to duplicate and speed-up few packets. We also suggest a solution designed to prevent the presented attacks, and to provide secure channel immune to degradation and other DoS attacks. Our solution involves changes (only) to the two gateway machines running IPsec. In addition to their practical importance, our results also raise the challenge of formally defining secure channels immune to DoS and degradation attacks, and providing provably-secure implementations.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 10:25:17 GMT" } ]
2015-03-13T00:00:00
[ [ "Herzberg", "Amir", "" ], [ "Shulman", "Haya", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0910.3529
Robert Adler
Robert Adler, John Ewing, Peter Taylor
Citation Statistics
This paper commented in: [arXiv:0910.3532], [arXiv:0910.3537], [arXiv:0910.3543], [arXiv:0910.3546]. Rejoinder in [arXiv:0910.3548]. Published in at http://dx.doi.org/10.1214/09-STS285 the Statistical Science (http://www.imstat.org/sts/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Statistical Science 2009, Vol. 24, No. 1, 1-14
10.1214/09-STS285
IMS-STS-STS285
stat.ME cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is a report about the use and misuse of citation data in the assessment of scientific research. The idea that research assessment must be done using ``simple and objective'' methods is increasingly prevalent today. The ``simple and objective'' methods are broadly interpreted as bibliometrics, that is, citation data and the statistics derived from them. There is a belief that citation statistics are inherently more accurate because they substitute simple numbers for complex judgments, and hence overcome the possible subjectivity of peer review. But this belief is unfounded.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 12:57:23 GMT" } ]
2009-10-20T00:00:00
[ [ "Adler", "Robert", "" ], [ "Ewing", "John", "" ], [ "Taylor", "Peter", "" ] ]
[ { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0910.3532
Bernard W. Silverman
Bernard W. Silverman
Comment: Bibliometrics in the Context of the UK Research Assessment Exercise
Published in at http://dx.doi.org/10.1214/09-STS285A the Statistical Science (http://www.imstat.org/sts/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Statistical Science 2009, Vol. 24, No. 1, 15-16
10.1214/09-STS285A
IMS-STS-STS285A
stat.ME cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research funding and reputation in the UK have, for over two decades, been increasingly dependent on a regular peer-review of all UK departments. This is to move to a system more based on bibliometrics. Assessment exercises of this kind influence the behavior of institutions, departments and individuals, and therefore bibliometrics will have effects beyond simple measurement. [arXiv:0910.3529]
[ { "version": "v1", "created": "Mon, 19 Oct 2009 11:49:52 GMT" } ]
2009-10-20T00:00:00
[ [ "Silverman", "Bernard W.", "" ] ]
[ { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0910.3537
Sune Lehmann
Sune Lehmann, Benny E. Lautrup, Andrew D. Jackson
Comment: Citation Statistics
Published in at http://dx.doi.org/10.1214/09-STS285B the Statistical Science (http://www.imstat.org/sts/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Statistical Science 2009, Vol. 24, No. 1, 17-20
10.1214/09-STS285B
IMS-STS-STS285B
stat.ME cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss the paper "Citation Statistics" by the Joint Committee on Quantitative Assessment of Research [arXiv:0910.3529]. In particular, we focus on a necessary feature of "good" measures for ranking scientific authors: that good measures must able to accurately distinguish between authors.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 12:02:16 GMT" } ]
2009-10-20T00:00:00
[ [ "Lehmann", "Sune", "" ], [ "Lautrup", "Benny E.", "" ], [ "Jackson", "Andrew D.", "" ] ]
[ { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0910.3543
Harvey Goldstein
David Spiegelhalter, Harvey Goldstein
Comment: Citation Statistics
Published in at http://dx.doi.org/10.1214/09-STS285C the Statistical Science (http://www.imstat.org/sts/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Statistical Science 2009, Vol. 24, No. 1, 21-24
10.1214/09-STS285C
IMS-STS-STS285C
stat.ME cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Comment on "Citation Statistics" [arXiv:0910.3529]
[ { "version": "v1", "created": "Mon, 19 Oct 2009 12:17:05 GMT" } ]
2009-10-20T00:00:00
[ [ "Spiegelhalter", "David", "" ], [ "Goldstein", "Harvey", "" ] ]
[ { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0910.3546
Peter Gavin Hall
Peter Gavin Hall
Comment: Citation Statistics
Published in at http://dx.doi.org/10.1214/09-STS285D the Statistical Science (http://www.imstat.org/sts/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Statistical Science 2009, Vol. 24, No. 1, 25-26
10.1214/09-STS285D
IMS-STS-STS285D
stat.ME cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Comment on "Citation Statistics" [arXiv:0910.3529]
[ { "version": "v1", "created": "Mon, 19 Oct 2009 12:31:00 GMT" } ]
2009-10-20T00:00:00
[ [ "Hall", "Peter Gavin", "" ] ]
[ { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0910.3548
Robert Adler
Robert Adler, John Ewing, Peter Taylor
Rejoinder: Citation Statistics
Published in at http://dx.doi.org/10.1214/09-STS285REJ the Statistical Science (http://www.imstat.org/sts/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Statistical Science 2009, Vol. 24, No. 1, 27-28
10.1214/09-STS285REJ
IMS-STS-STS285REJ
stat.ME cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rejoinder to "Citation Statistics" [arXiv:0910.3529]
[ { "version": "v1", "created": "Mon, 19 Oct 2009 12:48:32 GMT" } ]
2009-10-20T00:00:00
[ [ "Adler", "Robert", "" ], [ "Ewing", "John", "" ], [ "Taylor", "Peter", "" ] ]
[ { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0910.3580
Felix Brandt
Felix Brandt, Paul Harrenstein
Set-Rationalizable Choice and Self-Stability
20 pages, 2 figure, changed content
Journal of Economic Theory 146(4), 2011
10.1016/j.jet.2011.03.006
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A common assumption in modern microeconomic theory is that choice should be rationalizable via a binary preference relation, which \citeauthor{Sen71a} showed to be equivalent to two consistency conditions, namely $\alpha$ (contraction) and $\gamma$ (expansion). Within the context of \emph{social} choice, however, rationalizability and similar notions of consistency have proved to be highly problematic, as witnessed by a range of impossibility results, among which Arrow's is the most prominent. Since choice functions select \emph{sets} of alternatives rather than single alternatives, we propose to rationalize choice functions by preference relations over sets (set-rationalizability). We also introduce two consistency conditions, $\hat\alpha$ and $\hat\gamma$, which are defined in analogy to $\alpha$ and $\gamma$, and find that a choice function is set-rationalizable if and only if it satisfies $\hat\alpha$. Moreover, a choice function satisfies $\hat\alpha$ and $\hat\gamma$ if and only if it is \emph{self-stable}, a new concept based on earlier work by \citeauthor{Dutt88a}. The class of self-stable social choice functions contains a number of appealing Condorcet extensions such as the minimal covering set and the essential set.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 15:02:54 GMT" }, { "version": "v2", "created": "Mon, 23 Nov 2009 13:19:01 GMT" }, { "version": "v3", "created": "Wed, 24 Feb 2010 14:52:26 GMT" } ]
2015-02-06T00:00:00
[ [ "Brandt", "Felix", "" ], [ "Harrenstein", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0910.3603
Pavel Chigansky
Pavel Chigansky, Ramon van Handel
A complete solution to Blackwell's unique ergodicity problem for hidden Markov chains
Published in at http://dx.doi.org/10.1214/10-AAP688 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Probability 2010, Vol. 20, No. 6, 2318-2345
10.1214/10-AAP688
IMS-AAP-AAP688
math.PR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop necessary and sufficient conditions for uniqueness of the invariant measure of the filtering process associated to an ergodic hidden Markov model in a finite or countable state space. These results provide a complete solution to a problem posed by Blackwell (1957), and subsume earlier partial results due to Kaijser, Kochman and Reeds. The proofs of our main results are based on the stability theory of nonlinear filters.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 15:57:41 GMT" }, { "version": "v2", "created": "Mon, 15 Nov 2010 10:10:15 GMT" } ]
2010-11-16T00:00:00
[ [ "Chigansky", "Pavel", "" ], [ "van Handel", "Ramon", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.3658
Ghadamali Bagherikaram
Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani
Secrecy Rate Region of the Broadcast Channel with an Eavesdropper
18 Pages, Submitted to IEEE Transaction on Information Theory (Revised Version)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages to two receivers, while a wire-tapper also receives the transmitted signal. This model is motivated by wireless communications, where individual secure messages are broadcast over open media and can be received by any illegitimate receiver. The secrecy level is measured by the equivocation rate at the eavesdropper. We first study the general (non-degraded) broadcast channel with an eavesdropper. We present an inner bound on the secrecy capacity region for this model. This inner bound is based on a combination of random binning, and the Gelfand-Pinsker binning. We further study the situation in which the channels are degraded. For the degraded broadcast channel with an eavesdropper, we present the secrecy capacity region. Our achievable coding scheme is based on Covers superposition scheme and random binning. We refer to this scheme as the Secret Superposition Scheme. Our converse proof is based on a combination of the converse proof of the conventional degraded broadcast channel and Csiszar Lemma. We then assume that the channels are Additive White Gaussian Noise (AWGN) and show that the Secret Superposition Scheme with Gaussian codebook is optimal. The converse proof is based on Costas entropy power inequality. Finally, we use a broadcast strategy for the slowly fading wire-tap channel when only the eavesdroppers channel is fixed and known at the transmitter. We derive the optimum power allocation for the coding layers, which maximizes the total average rate.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 19:36:06 GMT" } ]
2009-10-20T00:00:00
[ [ "Bagherikaram", "Ghadamali", "" ], [ "Motahari", "Abolfazl S.", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.3713
Brendan Juba
Brendan Juba
On Learning Finite-State Quantum Sources
10 pages, 1 figure
null
null
null
quant-ph cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We examine the complexity of learning the distributions produced by finite-state quantum sources. We show how prior techniques for learning hidden Markov models can be adapted to the quantum generator model to find that the analogous state of affairs holds: information-theoretically, a polynomial number of samples suffice to approximately identify the distribution, but computationally, the problem is as hard as learning parities with noise, a notorious open question in computational learning theory.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 21:55:11 GMT" } ]
2009-10-21T00:00:00
[ [ "Juba", "Brendan", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0910.3719
Ilias Diakonikolas
Ilias Diakonikolas and Rocco A. Servedio
Improved Approximation of Linear Threshold Functions
full version of CCC'09 paper
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove two main results on how arbitrary linear threshold functions $f(x) = \sign(w\cdot x - \theta)$ over the $n$-dimensional Boolean hypercube can be approximated by simple threshold functions. Our first result shows that every $n$-variable threshold function $f$ is $\eps$-close to a threshold function depending only on $\Inf(f)^2 \cdot \poly(1/\eps)$ many variables, where $\Inf(f)$ denotes the total influence or average sensitivity of $f.$ This is an exponential sharpening of Friedgut's well-known theorem \cite{Friedgut:98}, which states that every Boolean function $f$ is $\eps$-close to a function depending only on $2^{O(\Inf(f)/\eps)}$ many variables, for the case of threshold functions. We complement this upper bound by showing that $\Omega(\Inf(f)^2 + 1/\epsilon^2)$ many variables are required for $\epsilon$-approximating threshold functions. Our second result is a proof that every $n$-variable threshold function is $\eps$-close to a threshold function with integer weights at most $\poly(n) \cdot 2^{\tilde{O}(1/\eps^{2/3})}.$ This is a significant improvement, in the dependence on the error parameter $\eps$, on an earlier result of \cite{Servedio:07cc} which gave a $\poly(n) \cdot 2^{\tilde{O}(1/\eps^{2})}$ bound. Our improvement is obtained via a new proof technique that uses strong anti-concentration bounds from probability theory. The new technique also gives a simple and modular proof of the original \cite{Servedio:07cc} result, and extends to give low-weight approximators for threshold functions under a range of probability distributions beyond just the uniform distribution.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 23:11:46 GMT" } ]
2009-10-21T00:00:00
[ [ "Diakonikolas", "Ilias", "" ], [ "Servedio", "Rocco A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.3736
Bingbing Xia
Bingbing Xia, Fei Qiao, Huazhong Yang, and Hui Wang
A Fault-tolerant Structure for Reliable Multi-core Systems Based on Hardware-Software Co-design
7 pages, 5 figures
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To cope with the soft errors and make full use of the multi-core system, this paper gives an efficient fault-tolerant hardware and software co-designed architecture for multi-core systems. And with a not large number of test patterns, it will use less than 33% hardware resources compared with the traditional hardware redundancy (TMR) and it will take less than 50% time compared with the traditional software redundancy (time redundant).Therefore, it will be a good choice for the fault-tolerant architecture for the future high-reliable multi-core systems.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 04:01:51 GMT" } ]
2016-09-08T00:00:00
[ [ "Xia", "Bingbing", "" ], [ "Qiao", "Fei", "" ], [ "Yang", "Huazhong", "" ], [ "Wang", "Hui", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0910.3765
Genge Bela
Bela Genge, Piroska Haller
Performance Evaluation of Security Protocols
null
19th International Conference on Computer Science and Energetics-Electrical Engineering, Romania (2009)
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a comparative performance evaluation of security protocols. The novelty of our approach lies in the use of a polynomial mathematical model that captures the performance of classes of cryptographic algorithms instead of capturing the performance of each algorithm separately, approach that is used in other papers. A major advantage of using such a model is that it does not require implementation-specific information, because the decision is based on comparing the estimated performances of protocols instead of actually evaluating them. The approach is validated by comparatively evaluating the performances of 1000 automatically generated security protocols against the performances of their actual implementations.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 08:19:42 GMT" } ]
2009-10-21T00:00:00
[ [ "Genge", "Bela", "" ], [ "Haller", "Piroska", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0910.3766
Andreas Gaiser
Andreas Gaiser, Stefan Schwoon
Comparison of Algorithms for Checking Emptiness on Buechi Automata
Technical Report, 15 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We re-investigate the problem of LTL model-checking for finite-state systems. Typical solutions, like in Spin, work on the fly, reducing the problem to Buechi emptiness. This can be done in linear time, and a variety of algorithms with this property exist. Nonetheless, subtle design decisions can make a great difference to their actual performance in practice, especially when used on-the-fly. We compare a number of algorithms experimentally on a large benchmark suite, measure their actual run-time performance, and propose improvements. Compared with the algorithm implemented in Spin, our best algorithm is faster by about 33 % on average. We therefore recommend that, for on-the-fly explicit-state model checking, nested DFS should be replaced by better solutions.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 11:25:20 GMT" } ]
2009-10-21T00:00:00
[ [ "Gaiser", "Andreas", "" ], [ "Schwoon", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.3768
Anas Chaaban
Anas Chaaban and Aydin Sezgin
On the transmit strategy for the interference MIMO relay channel in the low power regime
5 pages, accepted for 8th International ITG Conference on Source and Channel Coding, Siegen, Germany, 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the interference channel with two transmitters and two receivers in the presence of a MIMO relay in the low transmit power regime. A communication scheme combining block Markov encoding, beamforming, and Willems' backward decoding is used. With this scheme, we get an interference channel with channel gains dependent on the signal power. A power allocation for this scheme is proposed, and the achievable rate region with this power allocation is given. We show that, at low transmit powers, with equal power constraints at the relay and the transmitters, the interference channel with a MIMO relay achieves a sum rate that is linear in the power. This sum rate is determined by the channel setup. We also show that in the presence of abundant power at the relay, the transmit strategy is significantly simplified, and the MAC from the transmitters to the relay forms the bottle neck of the system from the sum rate point of view.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 08:31:48 GMT" } ]
2009-10-21T00:00:00
[ [ "Chaaban", "Anas", "" ], [ "Sezgin", "Aydin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.3811
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Stefan Staicu
Dynamics of the Orthoglide parallel robot
null
UPB Scientific Bulletin, Series D: Mechanical Engineering 71, 3 (2009) 3-16
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recursive matrix relations for kinematics and dynamics of the Orthoglide parallel robot having three concurrent prismatic actuators are established in this paper. These are arranged according to the Cartesian coordinate system with fixed orientation, which means that the actuating directions are normal to each other. Three identical legs connecting to the moving platform are located on three planes being perpendicular to each other too. Knowing the position and the translation motion of the platform, we develop the inverse kinematics problem and determine the position, velocity and acceleration of each element of the robot. Further, the principle of virtual work is used in the inverse dynamic problem. Some matrix equations offer iterative expressions and graphs for the input forces and the powers of the three actuators.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 11:18:55 GMT" } ]
2009-10-21T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Staicu", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0910.3840
Vaneet Aggarwal
Vaneet Aggarwal and Salman Avestimehr and Ashutosh Sabharwal
Distributed Universally Optimal Strategies for Interference Channels with Partial Message Passing
In Proc. Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, Sept-Oct 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In distributed wireless networks, nodes often do not know the topology (network size, connectivity and the channel gains) of the network. Thus, they have to compute their transmission and reception parameters in a distributed fashion. In this paper, we consider that each of the transmitter know the channel gains of all the links that are at-most two-hop distant from it and the receiver knows the channel gains of all the links that are three-hop distant from it in a deterministic interference channel. With this limited information, we find a condition on the network connectivity for which there exist a distributed strategy that can be chosen by the users with partial information about the network state, which achieves the same sum capacity as that achievable by the centralized server that knows all the channel gains. Specifically, distributed decisions are sum-rate optimal only if each connected component is in a one-to-many configuration or a fully-connected configuration. In all other cases of network connectivity, the loss can be arbitrarily large.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 13:27:31 GMT" } ]
2009-10-21T00:00:00
[ [ "Aggarwal", "Vaneet", "" ], [ "Avestimehr", "Salman", "" ], [ "Sabharwal", "Ashutosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.3848
Martin Mann
Martin Mann, Rolf Backofen, Sebastian Will
Equivalence Classes of Optimal Structures in HP Protein Models Including Side Chains
Published in Proceedings of the Fifth Workshop on Constraint Based Methods for Bioinformatics (WCB09), 2009, 9 pages
In Proceedings of the Fifth Workshop on Constraint Based Methods for Bioinformatics (WCB09), 2009, Lisbon
null
null
cs.CE q-bio.BM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Lattice protein models, as the Hydrophobic-Polar (HP) model, are a common abstraction to enable exhaustive studies on structure, function, or evolution of proteins. A main issue is the high number of optimal structures, resulting from the hydrophobicity-based energy function applied. We introduce an equivalence relation on protein structures that correlates to the energy function. We discuss the efficient enumeration of optimal representatives of the corresponding equivalence classes and the application of the results.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 15:18:27 GMT" } ]
2009-10-21T00:00:00
[ [ "Mann", "Martin", "" ], [ "Backofen", "Rolf", "" ], [ "Will", "Sebastian", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Quantitative Biology", "code": "q-bio.BM", "description": "DNA, RNA, proteins, lipids, etc.; molecular structures and folding kinetics; molecular interactions; single-molecule manipulation.", "span": "(Biomolecules)" } ]
0910.3880
Martin Mann
Martin Mann, Mohamed Abou Hamra, Kathleen Steinh\"ofel, Rolf Backofen
Constraint-based Local Move Definitions for Lattice Protein Models Including Side Chains
Published in Proceedings of the Fifth Workshop on Constraint Based Methods for Bioinformatics (WCB09), 2009, 10 pages
In Proceedings of the Fifth Workshop on Constraint Based Methods for Bioinformatics (WCB09), 2009, Lisbon
null
null
cs.CE q-bio.BM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The simulation of a protein's folding process is often done via stochastic local search, which requires a procedure to apply structural changes onto a given conformation. Here, we introduce a constraint-based approach to enumerate lattice protein structures according to k-local moves in arbitrary lattices. Our declarative description is much more flexible for extensions than standard operational formulations. It enables a generic calculation of k-local neighbors in backbone-only and side chain models. We exemplify the procedure using a simple hierarchical folding scheme.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 15:37:52 GMT" } ]
2009-10-21T00:00:00
[ [ "Mann", "Martin", "" ], [ "Hamra", "Mohamed Abou", "" ], [ "Steinhöfel", "Kathleen", "" ], [ "Backofen", "Rolf", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Quantitative Biology", "code": "q-bio.BM", "description": "DNA, RNA, proteins, lipids, etc.; molecular structures and folding kinetics; molecular interactions; single-molecule manipulation.", "span": "(Biomolecules)" } ]
0910.3883
Victor M. Preciado
Victor M. Preciado, Alireza Tahbaz-Salehi, and Ali Jadbabaie
Variance Analysis of Randomized Consensus in Switching Directed Networks
6 pages, 3 figures, submitted to American Control Conference 2010
null
null
null
cs.MA cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the asymptotic properties of distributed consensus algorithms over switching directed random networks. More specifically, we focus on consensus algorithms over independent and identically distributed, directed Erdos-Renyi random graphs, where each agent can communicate with any other agent with some exogenously specified probability $p$. While it is well-known that consensus algorithms over Erdos-Renyi random networks result in an asymptotic agreement over the network, an analytical characterization of the distribution of the asymptotic consensus value is still an open question. In this paper, we provide closed-form expressions for the mean and variance of the asymptotic random consensus value, in terms of the size of the network and the probability of communication $p$. We also provide numerical simulations that illustrate our results.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 16:05:58 GMT" } ]
2009-10-21T00:00:00
[ [ "Preciado", "Victor M.", "" ], [ "Tahbaz-Salehi", "Alireza", "" ], [ "Jadbabaie", "Ali", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.3913
Radu Grigore
Mikolas Janota, Goetz Botterweck, Radu Grigore, Joao Marques-Silva
How to Complete an Interactive Configuration Process?
to appear in SOFSEM 2010
null
null
null
cs.SE cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When configuring customizable software, it is useful to provide interactive tool-support that ensures that the configuration does not breach given constraints. But, when is a configuration complete and how can the tool help the user to complete it? We formalize this problem and relate it to concepts from non-monotonic reasoning well researched in Artificial Intelligence. The results are interesting for both practitioners and theoreticians. Practitioners will find a technique facilitating an interactive configuration process and experiments supporting feasibility of the approach. Theoreticians will find links between well-known formal concepts and a concrete practical application.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 17:30:33 GMT" } ]
2009-10-21T00:00:00
[ [ "Janota", "Mikolas", "" ], [ "Botterweck", "Goetz", "" ], [ "Grigore", "Radu", "" ], [ "Marques-Silva", "Joao", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.3928
Dimitris Katselis
Dimitris Katselis, Eleftherios Kofidis, Athanasios Rontogiannis and Sergios Theodoridis
Preamble-Based Channel Estimation for CP-OFDM and OFDM/OQAM Systems: A Comparative Study
null
null
10.1109/TSP.2010.2043129
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, preamble-based least squares (LS) channel estimation in OFDM systems of the QAM and offset QAM (OQAM) types is considered, in both the frequency and the time domains. The construction of optimal (in the mean squared error (MSE) sense) preambles is investigated, for both the cases of full (all tones carrying pilot symbols) and sparse (a subset of pilot tones, surrounded by nulls or data) preambles. The two OFDM systems are compared for the same transmit power, which, for cyclic prefix (CP) based OFDM/QAM, also includes the power spent for CP transmission. OFDM/OQAM, with a sparse preamble consisting of equipowered and equispaced pilots embedded in zeros, turns out to perform at least as well as CP-OFDM. Simulations results are presented that verify the analysis.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 18:10:54 GMT" } ]
2015-05-14T00:00:00
[ [ "Katselis", "Dimitris", "" ], [ "Kofidis", "Eleftherios", "" ], [ "Rontogiannis", "Athanasios", "" ], [ "Theodoridis", "Sergios", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.3959
Samson Abramsky
Samson Abramsky
Coalgebras, Chu Spaces, and Representations of Physical Systems
25 pages
null
null
null
quant-ph cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We revisit our earlier work on the representation of quantum systems as Chu spaces, and investigate the use of coalgebra as an alternative framework. On the one hand, coalgebras allow the dynamics of repeated measurement to be captured, and provide mathematical tools such as final coalgebras, bisimulation and coalgebraic logic. However, the standard coalgebraic framework does not accommodate contravariance, and is too rigid to allow physical symmetries to be represented. We introduce a fibrational structure on coalgebras in which contravariance is represented by indexing. We use this structure to give a universal semantics for quantum systems based on a final coalgebra construction. We characterize equality in this semantics as projective equivalence. We also define an analogous indexed structure for Chu spaces, and use this to obtain a novel categorical description of the category of Chu spaces. We use the indexed structures of Chu spaces and coalgebras over a common base to define a truncation functor from coalgebras to Chu spaces. This truncation functor is used to lift the full and faithful representation of the groupoid of physical symmetries on Hilbert spaces into Chu spaces, obtained in our previous work, to the coalgebraic semantics.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 20:26:35 GMT" } ]
2009-10-22T00:00:00
[ [ "Abramsky", "Samson", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
0910.3973
Jamshid Abouei
Jamshid Abouei, Alireza Bayesteh, and Amir K. Khandani
On the Delay-Throughput Tradeoff in Distributed Wireless Networks
Submitted to IEEE Transactions on Information Theory (34 pages)
null
10.1109/TIT.2011.2178138
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the delay-throughput analysis of a single-hop wireless network with $n$ transmitter/receiver pairs. All channels are assumed to be block Rayleigh fading with shadowing, described by parameters $(\alpha,\varpi)$, where $\alpha$ denotes the probability of shadowing and $\varpi$ represents the average cross-link gains. The analysis relies on the distributed on-off power allocation strategy (i.e., links with a direct channel gain above a certain threshold transmit at full power and the rest remain silent) for the deterministic and stochastic packet arrival processes. It is also assumed that each transmitter has a buffer size of one packet and dropping occurs once a packet arrives in the buffer while the previous packet has not been served. In the first part of the paper, we define a new notion of performance in the network, called effective throughput, which captures the effect of arrival process in the network throughput, and maximize it for different cases of packet arrival process. It is proved that the effective throughput of the network asymptotically scales as $\frac{\log n}{\hat{\alpha}}$, with $\hat{\alpha} \triangleq \alpha \varpi$, regardless of the packet arrival process. In the second part of the paper, we present the delay characteristics of the underlying network in terms of the packet dropping probability. We derive the sufficient conditions in the asymptotic case of $n \to \infty$ such that the packet dropping probability tend to zero, while achieving the maximum effective throughput of the network. Finally, we study the trade-off between the effective throughput, delay, and packet dropping probability of the network for different packet arrival processes.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 22:51:43 GMT" } ]
2016-11-17T00:00:00
[ [ "Abouei", "Jamshid", "" ], [ "Bayesteh", "Alireza", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.3975
Theodoros Dikaliotis
Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho, Michelle Effros
On the Delay of Network Coding over Line Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze a simple network where a source and a receiver are connected by a line of erasure channels of different reliabilities. Recent prior work has shown that random linear network coding can achieve the min-cut capacity and therefore the asymptotic rate is determined by the worst link of the line network. In this paper we investigate the delay for transmitting a batch of packets, which is a function of all the erasure probabilities and the number of packets in the batch. We show a monotonicity result on the delay function and derive simple expressions which characterize the expected delay behavior of line networks. Further, we use a martingale bounded differences argument to show that the actual delay is tightly concentrated around its expectation.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 23:47:06 GMT" } ]
2009-10-22T00:00:00
[ [ "Dikaliotis", "Theodoros K.", "" ], [ "Dimakis", "Alexandros G.", "" ], [ "Ho", "Tracey", "" ], [ "Effros", "Michelle", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.3991
Xiaowen Zhang
Chi Sing Chum and Xiaowen Zhang
Improved Latin Square based Secret Sharing Scheme
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper first reviews some basic properties of cryptographic hash function, secret sharing scheme, and Latin square. Then we discuss why Latin square or its critical set is a good choice for secret representation and its relationship with secret sharing scheme. Further we enumerate the limitations of Latin square in a secret sharing scheme. Finally we propose how to apply cryptographic hash functions, herding attack technique to a Latin square based secret sharing scheme to overcome these limitations.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 03:14:31 GMT" }, { "version": "v2", "created": "Sun, 10 Jul 2011 19:50:31 GMT" } ]
2011-07-12T00:00:00
[ [ "Chum", "Chi Sing", "" ], [ "Zhang", "Xiaowen", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0910.4000
Damien Chablat
Raza Ur-Rehman (IRCCyN), St\'ephane Caro (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Path placement optimization of manipulators based on energy consumption: application to the orthoglide 3-axis
null
Transactions of the canadian society for mechanical engineering (2009) 1-19
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the optimal path placement for a manipulator based on energy consumption. It proposes a methodology to determine the optimal location of a given test path within the workspace of a manipulator with minimal electric energy used by the actuators while taking into account the geometric, kinematic and dynamic constraints. The proposed methodology is applied to the Orthoglide~3-axis, a three-degree-of-freedom translational parallel kinematic machine (PKM), as an illustrative example.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 06:14:55 GMT" } ]
2009-10-22T00:00:00
[ [ "Ur-Rehman", "Raza", "", "IRCCyN" ], [ "Caro", "Stéphane", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0910.4012
Damien Chablat
Daniel Kanaan (IRCCyN), Philippe Wenger (IRCCyN), St\'ephane Caro (IRCCyN), Damien Chablat (IRCCyN)
Singularity Analysis of Lower-Mobility Parallel Manipulators Using Grassmann-Cayley Algebra
null
IEEE Transactions on Robotics 25, 5 (2009) 995-1004
10.1109/TRO.2009.2017132
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a methodology to analyze geometrically the singularities of manipulators, of which legs apply both actuation forces and constraint moments to their moving platform. Lower-mobility parallel manipulators and parallel manipulators, of which some legs do not have any spherical joint, are such manipulators. The geometric conditions associated with the dependency of six Pl\"ucker vectors of finite lines or lines at infinity constituting the rows of the inverse Jacobian matrix are formulated using Grassmann-Cayley Algebra. Accordingly, the singularity conditions are obtained in vector form. This study is illustrated with the singularity analysis of four manipulators.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 08:01:59 GMT" } ]
2009-10-22T00:00:00
[ [ "Kanaan", "Daniel", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Caro", "Stéphane", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0910.4024
Aubin Jarry
Florian Huc and Aubin Jarry
VRAC: Simulation Results #1
null
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to make full use of geographic routing techniques developed for large scale networks, nodes must be localized. However, localization and virtual localization techniques in sensor networks are dependent either on expensive and sometimes unavailable hardware (e.g. GPS) or on sophisticated localization calculus (e.g. triangulation) which are both error-prone and with a costly overhead. Instead of localizing nodes in a traditional 2-dimensional space, we use directly the raw distance to a set of anchors to route messages in a multi-dimensional space. This should enable us to use any geographic routing protocol in a robust and efficient manner in a very large range of scenarios. We test this technique for two different geographic routing algorithms, namely GRIC and ROAM. The simulation results show that using the raw coordinates does not decrease their efficiency.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 08:58:15 GMT" } ]
2009-10-22T00:00:00
[ [ "Huc", "Florian", "" ], [ "Jarry", "Aubin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0910.4033
EPTCS
Han Chen (School of Electronic Engineering and Computer Science, Queen Mary University of London), Pasquale Malacaria (School of Electronic Engineering and Computer Science, Queen Mary University of London)
Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions
null
EPTCS 7, 2009, pp. 1-15
10.4204/EPTCS.7.1
null
cs.CR cs.IT cs.LO cs.PL math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When studying the information leakage in programs or protocols, a natural question arises: "what is the worst case scenario?". This problem of identifying the maximal leakage can be seen as a channel capacity problem in the information theoretical sense. In this paper, by combining two powerful theories: Information Theory and Karush-Kuhn-Tucker conditions, we demonstrate a very general solution to the channel capacity problem. Examples are given to show how our solution can be applied to practical contexts of programs and anonymity protocols, and how this solution generalizes previous approaches to this problem.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 10:04:45 GMT" } ]
2009-10-22T00:00:00
[ [ "Chen", "Han", "", "School of Electronic Engineering and Computer Science, Queen\n Mary University of London" ], [ "Malacaria", "Pasquale", "", "School of Electronic\n Engineering and Computer Science, Queen Mary University of London" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.4042
Hector Zenil
Hector Zenil
Compression-based investigation of the dynamical properties of cellular automata and other systems
28 pages. This version includes the conjecture relating the transition coefficient to computational universality. Camera ready version
Journal of Complex Systems, 19(1), 2010
null
null
cs.CC nlin.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A method for studying the qualitative dynamical properties of abstract computing machines based on the approximation of their program-size complexity using a general lossless compression algorithm is presented. It is shown that the compression-based approach classifies cellular automata (CA) into clusters according to their heuristic behavior, with these clusters showing a correspondence with Wolfram's main classes of CA behavior. A compression based method to estimate a characteristic exponent to detect phase transitions and measure the resiliency or sensitivity of a system to its initial conditions is also proposed. A conjecture regarding the capability of a system to reach computational universality related to the values of this phase transition coefficient is formulated. These ideas constitute a compression-based framework for investigating the dynamical properties of cellular automata and other systems.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 10:33:50 GMT" }, { "version": "v2", "created": "Sat, 14 Aug 2010 04:54:31 GMT" }, { "version": "v3", "created": "Wed, 29 Sep 2010 18:46:45 GMT" }, { "version": "v4", "created": "Fri, 21 Jan 2011 18:17:18 GMT" } ]
2011-01-24T00:00:00
[ [ "Zenil", "Hector", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "nlin.CG", "description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases", "span": "(Cellular Automata and Lattice Gases)" } ]
0910.4044
EPTCS
Jun Pang (University of Luxembourg), Chenyi Zhang (University of Luxembourg)
How to Work with Honest but Curious Judges? (Preliminary Report)
null
EPTCS 7, 2009, pp. 31-45
10.4204/EPTCS.7.3
null
cs.CR cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The three-judges protocol, recently advocated by Mclver and Morgan as an example of stepwise refinement of security protocols, studies how to securely compute the majority function to reach a final verdict without revealing each individual judge's decision. We extend their protocol in two different ways for an arbitrary number of 2n+1 judges. The first generalisation is inherently centralised, in the sense that it requires a judge as a leader who collects information from others, computes the majority function, and announces the final result. A different approach can be obtained by slightly modifying the well-known dining cryptographers protocol, however it reveals the number of votes rather than the final verdict. We define a notion of conditional anonymity in order to analyse these two solutions. Both of them have been checked in the model checker MCMAS.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 10:53:36 GMT" } ]
2009-10-22T00:00:00
[ [ "Pang", "Jun", "", "University of Luxembourg" ], [ "Zhang", "Chenyi", "", "University of\n Luxembourg" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0910.4049
Nizami Gasilov
N. Gasilov, \c{S}ahin Emrah Amrahov, A. Golayoglu Fatullayev, H. I. Karakas, O. Akin
A Geometric Approach to Solve Fuzzy Linear Systems
null
CMES: Computer Modeling in Engineering & Sciences, Vol. 75, No. 3, pp. 189-204, 2011
10.3970/cmes.2011.075.189
null
cs.NA math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, linear systems with a crisp real coefficient matrix and with a vector of fuzzy triangular numbers on the right-hand side are studied. A new method, which is based on the geometric representations of linear transformations, is proposed to find solutions. The method uses the fact that a vector of fuzzy triangular numbers forms a rectangular prism in n-dimensional space and that the image of a parallelepiped is also a parallelepiped under a linear transformation. The suggested method clarifies why in general case different approaches do not generate solutions as fuzzy numbers. It is geometrically proved that if the coefficient matrix is a generalized permutation matrix, then the solution of a fuzzy linear system (FLS) is a vector of fuzzy numbers irrespective of the vector on the right-hand side. The most important difference between this and previous papers on FLS is that the solution is sought as a fuzzy set of vectors (with real components) rather than a vector of fuzzy numbers. Each vector in the solution set solves the given FLS with a certain possibility. The suggested method can also be applied in the case when the right-hand side is a vector of fuzzy numbers in parametric form. However, in this case, -cuts of the solution can not be determined by geometric similarity and additional computations are needed.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 11:20:37 GMT" }, { "version": "v2", "created": "Tue, 12 Apr 2011 08:06:58 GMT" } ]
2011-11-03T00:00:00
[ [ "Gasilov", "N.", "" ], [ "Amrahov", "Şahin Emrah", "" ], [ "Fatullayev", "A. Golayoglu", "" ], [ "Karakas", "H. I.", "" ], [ "Akin", "O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
0910.4052
Andrei Yafimau
Andrei I. Yafimau
Virtual-Threading: Advanced General Purpose Processors Architecture
56 pages, 5 PNG figures
null
null
null
cs.AR cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper describes the new computers architecture, the main features of which has been claimed in the Russian Federation patent 2312388 and in the US patent application 11/991331. This architecture is intended to effective support of the General Purpose Parallel Computing (GPPC), the essence of which is extremely frequent switching of threads between states of activity and states of viewed in the paper the algorithmic latency. To emphasize the same impact of the architectural latency and the algorithmic latency upon GPPC, is introduced the new notion of the generalized latency and is defined its quantitative measure - the Generalized Latency Tolerance (GLT). It is shown that a well suited for GPPC implementation architecture should have high level of GLT and is described such architecture, which is called the Virtual-Threaded Machine. This architecture originates a processor virtualization in the direction of activities virtualization, which is orthogonal to the well-known direction of memory virtualization. The key elements of the architecture are 1) the distributed fine grain representation of the architectural register file, which elements are hardware swapped through levels of a microarchitectural memory, 2) the prioritized fine grain direct hardware multiprogramming, 3) the access controlled virtual addressing and 4) the hardware driven semaphores. The composition of these features lets to introduce new styles of operating system (OS) programming, which is free of interruptions, and of applied programming with a very rare using the OS services.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 11:31:14 GMT" } ]
2009-10-22T00:00:00
[ [ "Yafimau", "Andrei I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0910.4053
EPTCS
Qurat ul Ain Nizamani (Department of Computer Science, University of Leicester, UK), Emilio Tuosto (Department of Computer Science, University of Leicester, UK)
Heuristic Methods for Security Protocols
null
EPTCS 7, 2009, pp. 61-75
10.4204/EPTCS.7.5
null
cs.CR cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 13:30:10 GMT" } ]
2009-10-22T00:00:00
[ [ "Nizamani", "Qurat ul Ain", "", "Department of Computer Science, University of\n Leicester, UK" ], [ "Tuosto", "Emilio", "", "Department of Computer Science, University of\n Leicester, UK" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0910.4056
EPTCS
Filippo Del Tedesco (Chalmers University of Technology, Gothenburg, Sweden), David Sands (Chalmers University of Technology, Gothenburg, Sweden)
A User Model for Information Erasure
null
EPTCS 7, 2009, pp. 16-30
10.4204/EPTCS.7.2
null
cs.CR cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hunt and Sands (ESOP'08) studied a notion of information erasure for systems which receive secrets intended for limited-time use. Erasure demands that once a secret has fulfilled its purpose the subsequent behaviour of the system should reveal no information about the erased data. In this paper we address a shortcoming in that work: for erasure to be possible the user who provides data must also play his part, but previously that role was only specified informally. Here we provide a formal model of the user and a collection of requirements called erasure friendliness. We prove that an erasure-friendly user can be composed with an erasing system (in the sense of Hunt and Sands) to obtain a combined system which is jointly erasing in an appropriate sense. In doing so we identify stronger requirements on the user than those informally described in the previous work.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 13:23:59 GMT" } ]
2009-10-22T00:00:00
[ [ "Del Tedesco", "Filippo", "", "Chalmers University of Technology, Gothenburg,\n Sweden" ], [ "Sands", "David", "", "Chalmers University of Technology, Gothenburg, Sweden" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0910.4081
Jakob Grue Simonsen Dr
Jeroen Ketema, Jakob Grue Simonsen
Infinitary Combinatory Reduction Systems: Confluence
null
Logical Methods in Computer Science, Volume 5, Issue 4 (December 20, 2009) lmcs:840
10.2168/LMCS-5(4:3)2009
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study confluence in the setting of higher-order infinitary rewriting, in particular for infinitary Combinatory Reduction Systems (iCRSs). We prove that fully-extended, orthogonal iCRSs are confluent modulo identification of hypercollapsing subterms. As a corollary, we obtain that fully-extended, orthogonal iCRSs have the normal form property and the unique normal form property (with respect to reduction). We also show that, unlike the case in first-order infinitary rewriting, almost non-collapsing iCRSs are not necessarily confluent.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 13:15:22 GMT" }, { "version": "v2", "created": "Sun, 20 Dec 2009 16:29:37 GMT" } ]
2015-07-01T00:00:00
[ [ "Ketema", "Jeroen", "" ], [ "Simonsen", "Jakob Grue", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0910.4084
Andrew Gillette
Chandrajit Bajaj, Andrew Gillette, Samrat Goswami, Bong June Kwon, and Jose Rivera
Complementary Space for Enhanced Uncertainty and Dynamics Visualization
12 pages. To appear as a chapter in "Topological Data Analysis and Visualization: Theory, Algorithms and Applications", Pascucci, Tricoche, Hagen, Tierny, Eds., Springer-Verlag, in publication, 2009
null
null
null
cs.CG cs.GR
http://creativecommons.org/licenses/by-nc-sa/3.0/
Given a computer model of a physical object, it is often quite difficult to visualize and quantify any global effects on the shape representation caused by local uncertainty and local errors in the data. This problem is further amplified when dealing with hierarchical representations containing varying levels of detail and / or shapes undergoing dynamic deformations. In this paper, we compute, quantify and visualize the complementary topological and geometrical features of 3D shape models, namely, the tunnels, pockets and internal voids of the object. We find that this approach sheds a unique light on how a model is affected by local uncertainty, errors or modifications and show how the presence or absence of complementary shape features can be essential to an object's structural form and function.
[ { "version": "v1", "created": "Tue, 20 Oct 2009 22:00:54 GMT" } ]
2009-10-22T00:00:00
[ [ "Bajaj", "Chandrajit", "" ], [ "Gillette", "Andrew", "" ], [ "Goswami", "Samrat", "" ], [ "Kwon", "Bong June", "" ], [ "Rivera", "Jose", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0910.4116
M Sabu THAMPI
Sabu M. Thampi
Swarm Intelligence
null
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Biologically inspired computing is an area of computer science which uses the advantageous properties of biological systems. It is the amalgamation of computational intelligence and collective intelligence. Biologically inspired mechanisms have already proved successful in achieving major advances in a wide range of problems in computing and communication systems. The consortium of bio-inspired computing are artificial neural networks, evolutionary algorithms, swarm intelligence, artificial immune systems, fractal geometry, DNA computing and quantum computing, etc. This article gives an introduction to swarm intelligence.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 15:02:12 GMT" } ]
2009-10-22T00:00:00
[ [ "Thampi", "Sabu M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.4122
Raghu Meka
Raghu Meka, David Zuckerman
Pseudorandom Generators for Polynomial Threshold Functions
Revision 5: Updated to the journal version to appear in SICOMP. Revision 4: Improves seed-length for halfspaces to O(log n + log^2(1/eps)) (the change in analysis is minor: use INW PRG instead of Nisan's PRG). Revision 3: Fixed some more minor errors (mainly in proof of Theorem 4.3). Revision 2: Corrected the non-explicit bound to O(d log n + log(1/eps)) and some minor typos
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the natural question of constructing pseudorandom generators (PRGs) for low-degree polynomial threshold functions (PTFs). We give a PRG with seed-length log n/eps^{O(d)} fooling degree d PTFs with error at most eps. Previously, no nontrivial constructions were known even for quadratic threshold functions and constant error eps. For the class of degree 1 threshold functions or halfspaces, we construct PRGs with much better dependence on the error parameter eps and obtain a PRG with seed-length O(log n + log^2(1/eps)). Previously, only PRGs with seed length O(log n log^2(1/eps)/eps^2) were known for halfspaces. We also obtain PRGs with similar seed lengths for fooling halfspaces over the n-dimensional unit sphere. The main theme of our constructions and analysis is the use of invariance principles to construct pseudorandom generators. We also introduce the notion of monotone read-once branching programs, which is key to improving the dependence on the error rate eps for halfspaces. These techniques may be of independent interest.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 15:48:00 GMT" }, { "version": "v2", "created": "Fri, 20 Nov 2009 21:50:20 GMT" }, { "version": "v3", "created": "Thu, 17 Dec 2009 17:16:04 GMT" }, { "version": "v4", "created": "Thu, 11 Nov 2010 18:25:40 GMT" }, { "version": "v5", "created": "Tue, 15 Nov 2011 14:41:26 GMT" } ]
2015-03-13T00:00:00
[ [ "Meka", "Raghu", "" ], [ "Zuckerman", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.4128
Mustafa Cenk Gursoy
Mustafa Cenk Gursoy
Secure Communication in the Low-SNR Regime
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Secrecy capacity of a multiple-antenna wiretap channel is studied in the low signal-to-noise ratio (SNR) regime. Expressions for the first and second derivatives of the secrecy capacity with respect to SNR at SNR = 0 are derived. Transmission strategies required to achieve these derivatives are identified. In particular, it is shown that it is optimal in the low-SNR regime to transmit in the maximal-eigenvalue eigenspace of Phi = H_m* H_m - N_m/N_e H_e* H_e where H_m and H_e denote the channel matrices associated with the legitimate receiver and eavesdropper, respectively, and N_m and N_e are the noise variances at the receiver and eavesdropper, respectively. Energy efficiency is analyzed by finding the minimum bit energy required for secure and reliable communications, and the wideband slope. Increased bit energy requirements under secrecy constraints are quantified. Finally, the impact of fading is investigated, and the benefits of fading in terms of energy efficiency are shown.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 16:15:50 GMT" } ]
2009-10-22T00:00:00
[ [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.4130
Mustafa Cenk Gursoy
Deli Qiao, Mustafa Cenk Gursoy, and Senem Velipasalar
On the Achievable Throughput Region of Multiple-Access Fading Channels with QoS Constraints
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Effective capacity, which provides the maximum constant arrival rate that a given service process can support while satisfying statistical delay constraints, is analyzed in a multiuser scenario. In particular, we study the achievable effective capacity region of the users in multiaccess fading channels (MAC) in the presence of quality of service (QoS) constraints. We assume that channel side information (CSI) is available at both the transmitters and the receiver, and superposition coding technique with successive decoding is used. When the power is fixed at the transmitters, we show that varying the decoding order with respect to the channel state can significantly increase the achievable throughput region. For a two-user case, we obtain the optimal decoding strategy when the users have the same QoS constraints. Meanwhile, it is shown that time-division multiple-access (TDMA) can achieve better performance than superposition coding with fixed successive decoding order at the receiver side for certain QoS constraints. For power and rate adaptation, we determine the optimal power allocation policy with fixed decoding order at the receiver side. Numerical results are provided to demonstrate our results.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 16:21:04 GMT" }, { "version": "v2", "created": "Thu, 22 Oct 2009 17:01:07 GMT" } ]
2009-10-22T00:00:00
[ [ "Qiao", "Deli", "" ], [ "Gursoy", "Mustafa Cenk", "" ], [ "Velipasalar", "Senem", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.4132
Mustafa Cenk Gursoy
Junwei Zhang and Mustafa Cenk Gursoy
Collaborative Relay Beamforming for Secrecy
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, collaborative use of relays to form a beamforming system with the aid of perfect channel state information (CSI) and to provide physical-layer security is investigated. In particular, a decode-and-forward-based relay beamforming design subject to total and individual relay power constraints is studied with the goal of maximizing the secrecy rate. It is shown that the total power constraint leads to a closed-form solution. The design under individual relay power constraints is formulated as an optimization problem which is shown to be easily solved using two different approaches, namely semidefinite programming and second-order cone programming. Furthermore, a simplified and suboptimal technique which reduces the computation complexity under individual power constraints is presented.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 16:24:34 GMT" } ]
2009-10-22T00:00:00
[ [ "Zhang", "Junwei", "" ], [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.4144
Li Chen
Li Chen, Soma Biswas
Digital Curvatures Applied to 3D Object Analysis and Recognition: A Case Study
10 pages, 11 figures
null
null
null
cs.CG cs.DM
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, we propose using curvatures in digital space for 3D object analysis and recognition. Since direct adjacency has only six types of digital surface points in local configurations, it is easy to determine and classify the discrete curvatures for every point on the boundary of a 3D object. Unlike the boundary simplicial decomposition (triangulation), the curvature can take any real value. It sometimes makes difficulties to find a right value for threshold. This paper focuses on the global properties of categorizing curvatures for small regions. We use both digital Gaussian curvatures and digital mean curvatures to 3D shapes. This paper proposes a multi-scale method for 3D object analysis and a vector method for 3D similarity classification. We use these methods for face recognition and shape classification. We have found that the Gaussian curvatures mainly describe the global features and average characteristics such as the five regions of a human face. However, mean curvatures can be used to find local features and extreme points such as nose in 3D facial data.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 18:15:04 GMT" } ]
2009-10-22T00:00:00
[ [ "Chen", "Li", "" ], [ "Biswas", "Soma", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.4172
Minghui Jiang
Adrian Dumitrescu and Minghui Jiang
Piercing translates and homothets of a convex body
An earlier version of this manuscript appeared in ESA 2009
null
null
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
According to a classical result of Gr\"unbaum, the transversal number $\tau(\F)$ of any family $\F$ of pairwise-intersecting translates or homothets of a convex body $C$ in $\RR^d$ is bounded by a function of $d$. Denote by $\alpha(C)$ (resp. $\beta(C)$) the supremum of the ratio of the transversal number $\tau(\F)$ to the packing number $\nu(\F)$ over all families $\F$ of translates (resp. homothets) of a convex body $C$ in $\RR^d$. Kim et al. recently showed that $\alpha(C)$ is bounded by a function of $d$ for any convex body $C$ in $\RR^d$, and gave the first bounds on $\alpha(C)$ for convex bodies $C$ in $\RR^d$ and on $\beta(C)$ for convex bodies $C$ in the plane. Here we show that $\beta(C)$ is also bounded by a function of $d$ for any convex body $C$ in $\RR^d$, and present new or improved bounds on both $\alpha(C)$ and $\beta(C)$ for various convex bodies $C$ in $\RR^d$ for all dimensions $d$. Our techniques explore interesting inequalities linking the covering and packing densities of a convex body. Our methods for obtaining upper bounds are constructive and lead to efficient constant-factor approximation algorithms for finding a minimum-cardinality point set that pierces a set of translates or homothets of a convex body.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 20:30:19 GMT" } ]
2009-10-23T00:00:00
[ [ "Dumitrescu", "Adrian", "" ], [ "Jiang", "Minghui", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.4179
Goutam Paul
Sounak Gupta and Goutam Paul
Revisiting Fermat's Factorization for the RSA Modulus
null
null
null
null
cs.CR cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We revisit Fermat's factorization method for a positive integer $n$ that is a product of two primes $p$ and $q$. Such an integer is used as the modulus for both encryption and decryption operations of an RSA cryptosystem. The security of RSA relies on the hardness of factoring this modulus. As a consequence of our analysis, two variants of Fermat's approach emerge. We also present a comparison between the two methods' effective regions. Though our study does not yield a new state-of-the-art algorithm for integer factorization, we believe that it reveals some interesting observations that are open for further analysis.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 21:13:55 GMT" } ]
2009-10-23T00:00:00
[ [ "Gupta", "Sounak", "" ], [ "Paul", "Goutam", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.4186
Hsien-Po Shiang
Hsien-Po Shiang, Mihaela van der Schaar
Media-TCP: A Quality-Centric TCP-Friendly Congestion Control for Multimedia Transmission
15 pages, 8 figures, 4 tables, and 2 algorithms
null
null
null
cs.NI cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a quality-centric congestion control for multimedia streaming over IP networks, which we refer to as media-TCP. Unlike existing congestion control schemes that adapt a user's sending rate merely to the network condition, our solution adapts the sending rate to both the network condition and the application characteristics by explicitly considering the distortion impacts, delay deadlines, and interdependencies of different video packet classes. Hence, our media-aware solution is able to provide differential services for transmitting various packet classes and thereby, further improves the multimedia streaming quality. We model this problem using a Finite-Horizon Markov Decision Process (FHMDP) and determine the optimal congestion control policy that maximizes the long-term multimedia quality, while adhering to the horizon- TCP-friendliness constraint, which ensures long-term fairness with existing TCP applications. We show that the FHMDP problem can be decomposed into multiple optimal stopping problems, which admit a low-complexity threshold-based solution. Moreover, unlike existing congestion control approaches, which focus on maintaining throughput-based fairness among users, the proposed media-TCP aims to achieve quality-based fairness among multimedia users. We also derive sufficient conditions for multiple multimedia users to achieve quality-based fairness using media-TCP congestion control. Our simulation results show that the proposed media-TCP achieves more than 3dB improvement in terms of PSNR over the conventional TCP congestion control approaches, with the largest improvements observed for real-time streaming applications requiring stringent playback delays.
[ { "version": "v1", "created": "Wed, 21 Oct 2009 21:53:25 GMT" } ]
2009-10-23T00:00:00
[ [ "Shiang", "Hsien-Po", "" ], [ "van der Schaar", "Mihaela", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0910.4214
Sahand Haji Ali Ahmad
Sahand Haji Ali Ahmad, Mingyan Liu, Yunnan Wu
Congestion games with resource reuse and applications in spectrum sharing
9 pages, 3 figures, International Conference on Game Theory for Networks (GameNets), May 2009, Istanbul, Turkey
null
null
null
cs.GT cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider an extension to the classical definition of congestion games (CG) in which multiple users share the same set of resources and their payoff for using any resource is a function of the total number of users sharing it. The classical congestion games enjoy some very appealing properties, including the existence of a Nash equilibrium and that every improvement path is finite and leads to such a NE (also called the finite improvement property or FIP), which is also a local optimum to a potential function. On the other hand, this class of games does not model well the congestion or resource sharing in a wireless context, a prominent feature of which is spatial reuse. What this translates to in the context of a congestion game is that a users payoff for using a resource (interpreted as a channel) is a function of the its number of its interfering users sharing that channel, rather than the total number among all users. This makes the problem quite different. We will call this the congestion game with resource reuse (CG-RR). In this paper we study intrinsic properties of such a game; in particular, we seek to address under what conditions on the underlying network this game possesses the FIP or NE. We also discuss the implications of these results when applied to wireless spectrum sharing
[ { "version": "v1", "created": "Thu, 22 Oct 2009 01:47:39 GMT" } ]
2009-10-23T00:00:00
[ [ "Ahmad", "Sahand Haji Ali", "" ], [ "Liu", "Mingyan", "" ], [ "Wu", "Yunnan", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0910.4224
Alexander A. Sherstov
Alexander A. Sherstov
Optimal bounds for sign-representing the intersection of two halfspaces by polynomials
A few minor simplifications added
In Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC 2010)
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The threshold degree of a function f:{0,1}^n->{-1,+1} is the least degree of a real polynomial p with f(x)=sgn p(x). We prove that the intersection of two halfspaces on {0,1}^n has threshold degree Omega(n), which matches the trivial upper bound and completely answers a question due to Klivans (2002). The best previous lower bound was Omega(sqrt n). Our result shows that the intersection of two halfspaces on {0,1}^n only admits a trivial 2^{Theta(n)}-time learning algorithm based on sign-representation by polynomials, unlike the advances achieved in PAC learning DNF formulas and read-once Boolean formulas. The proof introduces a new technique of independent interest, based on Fourier analysis and matrix theory.
[ { "version": "v1", "created": "Thu, 22 Oct 2009 04:05:31 GMT" }, { "version": "v2", "created": "Wed, 24 Feb 2010 22:27:37 GMT" } ]
2010-02-25T00:00:00
[ [ "Sherstov", "Alexander A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.4266
Hartmut Klauck
Rahul Jain, Hartmut Klauck
The Partition Bound for Classical Communication Complexity and Query Complexity
28 pages, ver. 2, added content
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe new lower bounds for randomized communication complexity and query complexity which we call the partition bounds. They are expressed as the optimum value of linear programs. For communication complexity we show that the partition bound is stronger than both the rectangle/corruption bound and the \gamma_2/generalized discrepancy bounds. In the model of query complexity we show that the partition bound is stronger than the approximate polynomial degree and classical adversary bounds. We also exhibit an example where the partition bound is quadratically larger than polynomial degree and classical adversary bounds.
[ { "version": "v1", "created": "Thu, 22 Oct 2009 09:40:58 GMT" }, { "version": "v2", "created": "Thu, 19 Nov 2009 03:53:09 GMT" } ]
2009-11-19T00:00:00
[ [ "Jain", "Rahul", "" ], [ "Klauck", "Hartmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.4292
Vassilis Kostakos
Vassilis Kostakos
An empirical study of spatial and transpatial social networks using Bluetooth and Facebook
17 pages,4 figures, 1 table
IEEE SocialCom, p. 587-594, 2010
10.1109/SocialCom.2010.181
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study provides insights into the quantitative similarities, differences and relationships between users' spatial, face-to-face, urban social networks and their transpatial, online counterparts. We explore and map the social ties within a cohort of 2602 users, and how those ties are mediated via physical co-presence and online tools. Our analysis focused on isolating two distinct segments of the social network: one mediated by physical co-presence, and the other mediated by Facebook. Our results suggest that as a whole the networks exhibit homogeneous characteristics, but individuals' involvement in those networks varies considerably. Furthermore this study provides a methodological approach for jointly analysing spatial & transpatial networks utilising pervasive and ubiquitous technology.
[ { "version": "v1", "created": "Thu, 22 Oct 2009 11:09:02 GMT" } ]
2013-06-06T00:00:00
[ [ "Kostakos", "Vassilis", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0910.4307
Nizami Gasilov
N. Gasilov, Sh. G. Amrahov, A. Golayoglu Fatullayev
A Geometric Approach to Solve Fuzzy Linear Systems of Differential Equations
13 pages, 3 figures
Appl. Math. Inf. Sci. 5, 3 (2011) pp. 484-499
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, systems of linear differential equations with crisp real coefficients and with initial condition described by a vector of fuzzy numbers are studied. A new method based on the geometric representations of linear transformations is proposed to find a solution. The most important difference between this method and methods offered in previous papers is that the solution is considered to be a fuzzy set of real vector-functions rather than a fuzzy vector-function. Each member of the set satisfies the given system with a certain possibility. It is shown that at any time the solution constitutes a fuzzy region in the coordinate space, alfa-cuts of which are nested parallelepipeds. Proposed method is illustrated on examples.
[ { "version": "v1", "created": "Thu, 22 Oct 2009 12:24:33 GMT" } ]
2011-11-03T00:00:00
[ [ "Gasilov", "N.", "" ], [ "Amrahov", "Sh. G.", "" ], [ "Fatullayev", "A. Golayoglu", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0910.4325
Simon Blackburn
Simon R. Blackburn, Maura B. Paterson and Douglas R. Stinson
Putting Dots in Triangles
10 pages Minor rephrasing: final version to submit to journal.
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a right-angled triangle of squares in a grid whose horizontal and vertical sides are $n$ squares long, let N(n) denote the maximum number of dots that can be placed into the cells of the triangle such that each row, each column, and each diagonal parallel to the long side of the triangle contains at most one dot. It has been proven that $N(n) = \lfloor \frac{2n+1}{3} \rfloor$. In this note, we give a new proof of this result using linear programming techniques.
[ { "version": "v1", "created": "Thu, 22 Oct 2009 13:35:51 GMT" }, { "version": "v2", "created": "Wed, 11 Nov 2009 14:10:14 GMT" }, { "version": "v3", "created": "Tue, 18 May 2010 14:27:23 GMT" } ]
2010-05-19T00:00:00
[ [ "Blackburn", "Simon R.", "" ], [ "Paterson", "Maura B.", "" ], [ "Stinson", "Douglas R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.4336
G David Forney Jr.
G. David Forney Jr
Minimal realizations of linear systems: The "shortest basis" approach
20 pages. Final version, to appear in special issue of IEEE Transactions on Information Theory on "Facets of coding theory: From algorithms to networks," dedicated to Ralf Koetter
null
null
null
cs.IT cs.SY math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a controllable discrete-time linear system C, a shortest basis for C is a set of linearly independent generators for C with the least possible lengths. A basis B is a shortest basis if and only if it has the predictable span property (i.e., has the predictable delay and degree properties, and is non-catastrophic), or alternatively if and only if it has the subsystem basis property (for any interval J, the generators in B whose span is in J is a basis for the subsystem C_J). The dimensions of the minimal state spaces and minimal transition spaces of C are simply the numbers of generators in a shortest basis B that are active at any given state or symbol time, respectively. A minimal linear realization for C in controller canonical form follows directly from a shortest basis for C, and a minimal linear realization for C in observer canonical form follows directly from a shortest basis for the orthogonal system C^\perp. This approach seems conceptually simpler than that of classical minimal realization theory.
[ { "version": "v1", "created": "Thu, 22 Oct 2009 14:23:28 GMT" }, { "version": "v2", "created": "Mon, 10 May 2010 18:15:57 GMT" }, { "version": "v3", "created": "Tue, 24 Aug 2010 18:41:44 GMT" } ]
2010-12-17T00:00:00
[ [ "Forney", "G. David", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0910.4342
Steve Kremer
Joshua D. Guttman (The MITRE Corporation and Worcester Polytechnic Institute)
Fair Exchange in Strand Spaces
null
EPTCS 7, 2009, pp. 46-60
10.4204/EPTCS.7.4
null
cs.CR cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols coordinate delivery of new values to the participants, e.g. additions to the set of values they possess. An exchange protocol is fair if it ensures that delivery of new values is balanced: If one participant obtains a new possession via the protocol, then all other participants will, too. Fair exchange requires progress assumptions, unlike some other protocol properties. The strand space model is a framework for design and verification of cryptographic protocols. A strand is a local behavior of a single principal in a single session of a protocol. A bundle is a partially ordered global execution built from protocol strands and adversary activities. The strand space model needs two additions for fair exchange protocols. First, we regard the state as a multiset of facts, and we allow strands to cause changes in this state via multiset rewriting. Second, progress assumptions stipulate that some channels are resilient-and guaranteed to deliver messages-and some principals are assumed not to stop at certain critical steps. This method leads to proofs of correctness that cleanly separate protocol properties, such as authentication and confidentiality, from invariants governing state evolution. G. Wang's recent fair exchange protocol illustrates the approach.
[ { "version": "v1", "created": "Thu, 22 Oct 2009 17:13:44 GMT" } ]
2009-10-23T00:00:00
[ [ "Guttman", "Joshua D.", "", "The MITRE Corporation and Worcester Polytechnic\n Institute" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0910.4353
Paul Vitanyi
Sebastiaan A. Terwijn (University of Amsterdam), Leen Torenvliet (University of Amsterdam), and Paul M.B. Vitanyi (CWI and University of Amsterdam)
Nonapproximablity of the Normalized Information Distance
LaTeX 8 pages, Submitted. 2nd version corrected some typos
null
null
null
cs.CC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Normalized information distance (NID) uses the theoretical notion of Kolmogorov complexity, which for practical purposes is approximated by the length of the compressed version of the file involved, using a real-world compression program. This practical application is called `normalized compression distance' and it is trivially computable. It is a parameter-free similarity measure based on compression, and is used in pattern recognition, data mining, phylogeny, clustering, and classification. The complexity properties of its theoretical precursor, the NID, have been open. We show that the NID is neither upper semicomputable nor lower semicomputable up to any reasonable precision.
[ { "version": "v1", "created": "Thu, 22 Oct 2009 16:06:34 GMT" }, { "version": "v2", "created": "Fri, 23 Oct 2009 16:26:40 GMT" } ]
2009-10-23T00:00:00
[ [ "Terwijn", "Sebastiaan A.", "", "University of Amsterdam" ], [ "Torenvliet", "Leen", "", "University of Amsterdam" ], [ "Vitanyi", "Paul M. B.", "", "CWI and University of\n Amsterdam" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.4397
Robert Nowak
Robert D. Nowak
The Geometry of Generalized Binary Search
corrected typo in Thm 3
null
null
null
stat.ML cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the problem of determining a binary-valued function through a sequence of strategically selected queries. The focus is an algorithm called Generalized Binary Search (GBS). GBS is a well-known greedy algorithm for determining a binary-valued function through a sequence of strategically selected queries. At each step, a query is selected that most evenly splits the hypotheses under consideration into two disjoint subsets, a natural generalization of the idea underlying classic binary search. This paper develops novel incoherence and geometric conditions under which GBS achieves the information-theoretically optimal query complexity; i.e., given a collection of N hypotheses, GBS terminates with the correct function after no more than a constant times log N queries. Furthermore, a noise-tolerant version of GBS is developed that also achieves the optimal query complexity. These results are applied to learning halfspaces, a problem arising routinely in image processing and machine learning.
[ { "version": "v1", "created": "Thu, 22 Oct 2009 20:21:49 GMT" }, { "version": "v2", "created": "Sun, 25 Oct 2009 14:45:30 GMT" }, { "version": "v3", "created": "Mon, 1 Aug 2011 19:46:15 GMT" }, { "version": "v4", "created": "Mon, 8 Aug 2011 18:39:47 GMT" }, { "version": "v5", "created": "Tue, 25 Jun 2013 15:59:32 GMT" } ]
2013-06-26T00:00:00
[ [ "Nowak", "Robert D.", "" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0910.4420
EPTCS
Michele Boreale, Steve Kremer
Proceedings 7th International Workshop on Security Issues in Concurrency
null
EPTCS 7, 2009
10.4204/EPTCS.7
null
cs.CR cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This volume contains the proceedings of the 7th Workshop on Security Issues in Concurrency (SecCo'09). The workshop was held in Bologna, Italy on September 5th 2009, as a satellite workshop of CONCUR'09. The aim of the SecCo workshop series is to cover the gap between the security and the concurrency communities. More precisely, the workshop promotes the exchange of ideas, trying to focus on common interests and stimulating discussions on central research questions. In particular, we called for papers dealing with security issues (such as authentication, integrity, privacy, confidentiality, access control, denial of service, service availability, safety aspects, fault tolerance, trust, language-based security, probabilistic and information theoretic models) in emerging fields like web services, mobile ad-hoc networks, agent-based infrastructures, peer-to-peer systems, context-aware computing, global/ubiquitous/pervasive computing.
[ { "version": "v1", "created": "Fri, 23 Oct 2009 02:08:49 GMT" } ]
2009-10-26T00:00:00
[ [ "Boreale", "Michele", "" ], [ "Kremer", "Steve", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0910.4432
Iyer Viswanathan K.
K.Viswanathan Iyer and K.R.Uday Kumar Reddy
Wiener index of binomial trees and Fibonacci trees
Accepted for publication in Int'l. J. Math. Engg. with Comp., Sept. 2009
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We obtain a closed-form expression for the Wiener index of binomial trees. We outline efficient algorithms for computing the Wiener indices of Fibonacci and binary Fibonacci trees.
[ { "version": "v1", "created": "Fri, 23 Oct 2009 04:13:55 GMT" } ]
2009-10-26T00:00:00
[ [ "Iyer", "K. Viswanathan", "" ], [ "Reddy", "K. R. Uday Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.4455
Emmanuel Lochin
Remi Diana and Emmanuel Lochin
ECN verbose mode: a statistical method for network path congestion estimation
null
null
10.1016/j.comnet.2011.04.001
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article introduces a simple and effective methodology to determine the level of congestion in a network with an ECN-like marking scheme. The purpose of the ECN bit is to notify TCP sources of an imminent congestion in order to react before losses occur. However, ECN is a binary indicator which does not reflect the congestion level (i.e. the percentage of queued packets) of the bottleneck, thus preventing any adapted reaction. In this study, we use a counter in place of the traditional ECN marking scheme to assess the number of times a packet has crossed a congested router. Thanks to this simple counter, we drive a statistical analysis to accurately estimate the congestion level of each router on a network path. We detail in this paper an analytical method validated by some preliminary simulations which demonstrate the feasibility and the accuracy of the concept proposed. We conclude this paper with possible applications and expected future work.
[ { "version": "v1", "created": "Fri, 23 Oct 2009 07:49:05 GMT" }, { "version": "v2", "created": "Mon, 15 Feb 2010 08:27:50 GMT" } ]
2012-04-03T00:00:00
[ [ "Diana", "Remi", "" ], [ "Lochin", "Emmanuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.4500
Marco Volpe
Andrea Masini, Luca Vigan\`o, Marco Volpe
A History of Until
24 pages, full version of paper at Methods for Modalities 2009 (M4M-6)
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Until is a notoriously difficult temporal operator as it is both existential and universal at the same time: A until B holds at the current time instant w iff either B holds at w or there exists a time instant w' in the future at which B holds and such that A holds in all the time instants between the current one and w'. This "ambivalent" nature poses a significant challenge when attempting to give deduction rules for until. In this paper, in contrast, we make explicit this duality of until to provide well-behaved natural deduction rules for linear-time logics by introducing a new temporal operator that allows us to formalize the "history" of until, i.e., the "internal" universal quantification over the time instants between the current one and w'. This approach provides the basis for formalizing deduction systems for temporal logics endowed with the until operator. For concreteness, we give here a labeled natural deduction system for a linear-time logic endowed with the new operator and show that, via a proper translation, such a system is also sound and complete with respect to the linear temporal logic LTL with until.
[ { "version": "v1", "created": "Fri, 23 Oct 2009 15:31:57 GMT" }, { "version": "v2", "created": "Sun, 25 Oct 2009 17:10:16 GMT" } ]
2009-10-26T00:00:00
[ [ "Masini", "Andrea", "" ], [ "Viganò", "Luca", "" ], [ "Volpe", "Marco", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.4507
Sam Skipsey
Sam Skipsey (1), David Ambrose-Griffith (2), Greig Cowan (3), Mike Kenyon (1), Orlando Richards (3), Phil Roffe (2), Graeme Stewart (1) ((1) University of Glasgow, UK, (2) University of Durham, UK, (3) University of Edinburgh, UK)
ScotGrid: Providing an Effective Distributed Tier-2 in the LHC Era
Preprint for 17th International Conference on Computing in High Energy and Nuclear Physics, 7 pages, 1 figure
J.Phys.Conf.Ser.219:052014,2010
10.1088/1742-6596/219/5/052014
GLAS-PPE/2009-07
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
ScotGrid is a distributed Tier-2 centre in the UK with sites in Durham, Edinburgh and Glasgow. ScotGrid has undergone a huge expansion in hardware in anticipation of the LHC and now provides more than 4MSI2K and 500TB to the LHC VOs. Scaling up to this level of provision has brought many challenges to the Tier-2 and we show in this paper how we have adopted new methods of organising the centres, from fabric management and monitoring to remote management of sites to management and operational procedures, to meet these challenges. We describe how we have coped with different operational models at the sites, where Glagsow and Durham sites are managed "in house" but resources at Edinburgh are managed as a central university resource. This required the adoption of a different fabric management model at Edinburgh and a special engagement with the cluster managers. Challenges arose from the different job models of local and grid submission that required special attention to resolve. We show how ScotGrid has successfully provided an infrastructure for ATLAS and LHCb Monte Carlo production. Special attention has been paid to ensuring that user analysis functions efficiently, which has required optimisation of local storage and networking to cope with the demands of user analysis. Finally, although these Tier-2 resources are pledged to the whole VO, we have established close links with our local physics user communities as being the best way to ensure that the Tier-2 functions effectively as a part of the LHC grid computing framework..
[ { "version": "v1", "created": "Fri, 23 Oct 2009 13:02:19 GMT" } ]
2010-05-25T00:00:00
[ [ "Skipsey", "Sam", "" ], [ "Ambrose-Griffith", "David", "" ], [ "Cowan", "Greig", "" ], [ "Kenyon", "Mike", "" ], [ "Richards", "Orlando", "" ], [ "Roffe", "Phil", "" ], [ "Stewart", "Graeme", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0910.4510
Sam Skipsey
Sam Skipsey (1), Greig Cowan (2), Mike Kenyon (1), Stuart Purdie (1), Graeme Stewart (1) ((1) University of Glasgow, UK, (2) University of Edinburgh, UK)
Optimised access to user analysis data using the gLite DPM
8 pages, 9 figures, preprint for 17th International Conference on Computing in High Energy and Nuclear Physics
J.Phys.Conf.Ser.219:062066,2010
10.1088/1742-6596/219/6/062066
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ScotGrid distributed Tier-2 now provides more that 4MSI2K and 500TB for LHC computing, which is spread across three sites at Durham, Edinburgh and Glasgow. Tier-2 sites have a dual role to play in the computing models of the LHC VOs. Firstly, their CPU resources are used for the generation of Monte Carlo event data. Secondly, the end user analysis data is distributed across the grid to the site's storage system and held on disk ready for processing by physicists' analysis jobs. In this paper we show how we have designed the ScotGrid storage and data management resources in order to optimise access by physicists to LHC data. Within ScotGrid, all sites use the gLite DPM storage manager middleware. Using the EGEE grid to submit real ATLAS analysis code to process VO data stored on the ScotGrid sites, we present an analysis of the performance of the architecture at one site, and procedures that may be undertaken to improve such. The results will be presented from the point of view of the end user (in terms of number of events processed/second) and from the point of view of the site, which wishes to minimise load and the impact that analysis activity has on other users of the system.
[ { "version": "v1", "created": "Fri, 23 Oct 2009 13:29:44 GMT" } ]
2010-05-25T00:00:00
[ [ "Skipsey", "Sam", "" ], [ "Cowan", "Greig", "" ], [ "Kenyon", "Mike", "" ], [ "Purdie", "Stuart", "" ], [ "Stewart", "Graeme", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0910.4518
Stefan Kratsch
Stefan Kratsch and Magnus Wahlstrom
Preprocessing of Min Ones Problems: A Dichotomy
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A parameterized problem consists of a classical problem and an additional component, the so-called parameter. This point of view allows a formal definition of preprocessing: Given a parameterized instance (I,k), a polynomial kernelization computes an equivalent instance (I',k') of size and parameter bounded by a polynomial in k. We give a complete classification of Min Ones Constraint Satisfaction problems, i.e., Min Ones SAT(\Gamma), with respect to admitting or not admitting a polynomial kernelization (unless NP \subseteq coNP/poly). For this we introduce the notion of mergeability. If all relations of the constraint language \Gamma are mergeable, then a new variant of sunflower kernelization applies, based on non-zero-closed cores. We obtain a kernel with O(k^{d+1}) variables and polynomial total size, where d is the maximum arity of a constraint in \Gamma, comparing nicely with the bound of O(k^{d-1}) vertices for the less general and arguably simpler d-Hitting Set problem. Otherwise, any relation in \Gamma that is not mergeable permits us to construct a log-cost selection formula, i.e., an n-ary selection formula with O(log n) true local variables. From this we can construct our lower bound using recent results by Bodlaender et al. as well as Fortnow and Santhanam, proving that there is no polynomial kernelization, unless NP \subseteq coNP/poly and the polynomial hierarchy collapses to the third level.
[ { "version": "v1", "created": "Fri, 23 Oct 2009 14:14:37 GMT" } ]
2009-10-26T00:00:00
[ [ "Kratsch", "Stefan", "" ], [ "Wahlstrom", "Magnus", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.4555
Jeffrey Shallit
Thomas Ang, Giovanni Pighizzini, Narad Rampersad, Jeffrey Shallit
Automata and Reduced Words in the Free Group
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider some questions about formal languages that arise when inverses of letters, words and languages are defined. The reduced representation of a language over the free monoid is its unique equivalent representation in the free group. We show that the class of regular languages is closed under taking the reduced representation, while the class of context-free languages is not. We also give an upper bound on the state complexity of the reduced representation of a regular language, and prove upper and lower bounds on the length of the shortest reducible string in a regular language. Finally we show that the set of all words which are equivalent to the words in a regular language can be nonregular, and that regular languages are not closed under taking a generalized form of the reduced representation.
[ { "version": "v1", "created": "Fri, 23 Oct 2009 17:28:20 GMT" } ]
2009-10-26T00:00:00
[ [ "Ang", "Thomas", "" ], [ "Pighizzini", "Giovanni", "" ], [ "Rampersad", "Narad", "" ], [ "Shallit", "Jeffrey", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0910.4565
Uri Abraham
Uri Abraham
Classification with Tarskian system executions (Bakery Algorithms as an example)
The paper is withdrawn since an improved version is being submitted
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We argue that predicate languages and their Tarskian structures have an important place for the study of concurrency. The argument in our paper is based on an example: we show that two seemingly dissimilar algorithms have a common set of high-level properties, which reveals their affinity. The algorithms are a variant of Lamport's Bakery Algorithm and the Ricart and Agrawala algorithm. They seem different because one uses shared memory and the other message passing for communication. Yet it is intuitively obvious that they are in some sense very similar, and they belong to the same "family of Bakery Algorithms". The aim of this paper is to express in a formal way this intuition that classifies the two algorithms together. For this aim of expressing the abstract high level properties that are shared by the two algorithms we use predicate languages and their Taskian structures. We find a set of properties expressed in quantification language which are satisfied by every Tarskian system execution that models a run by either one of the protocols, and which is strong enough to ensure that the mutual exclusion property holds in these runs.
[ { "version": "v1", "created": "Fri, 23 Oct 2009 18:39:49 GMT" }, { "version": "v2", "created": "Tue, 1 Jun 2010 09:38:30 GMT" } ]
2010-06-02T00:00:00
[ [ "Abraham", "Uri", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.4568
Ilango Sriram
Ilango Sriram
SPECI, a simulation tool exploring cloud-scale data centres
null
Ilango Sriram, SPECI, a Simulation Tool Exploring Cloud-Scale Data Centres, In: CloudCom 2009, LNCS 5931, pp. 381-392, 2009, M.G. Jaatun, G. Zhao, and C. Rong (Eds.), Springer-Verlag Berlin Heidelberg 2009
10.1007/978-3-642-10665-1_35
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is a rapid increase in the size of data centres (DCs) used to provide cloud computing services. It is commonly agreed that not all properties in the middleware that manages DCs will scale linearly with the number of components. Further, "normal failure" complicates the assessment of the per-formance of a DC. However, unlike in other engineering domains, there are no well established tools that allow the prediction of the performance and behav-iour of future generations of DCs. SPECI, Simulation Program for Elastic Cloud Infrastructures, is a simulation tool which allows exploration of aspects of scaling as well as performance properties of future DCs.
[ { "version": "v1", "created": "Fri, 23 Oct 2009 19:05:29 GMT" } ]
2015-05-14T00:00:00
[ [ "Sriram", "Ilango", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0910.4572
Paul Bunn
Paul Bunn, Rafail Ostrovsky
Throughput in Asynchronous Networks
null
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new, "worst-case" model for an asynchronous communication network and investigate the simplest (yet central) task in this model, namely the feasibility of end-to-end routing. Motivated by the question of how successful a protocol can hope to perform in a network whose reliability is guaranteed by as few assumptions as possible, we combine the main "unreliability" features encountered in network models in the literature, allowing our model to exhibit all of these characteristics simultaneously. In particular, our model captures networks that exhibit the following properties: 1) On-line; 2) Dynamic Topology; 3)Distributed/Local Control 4) Asynchronous Communication; 5) (Polynomially) Bounded Memory; 6) No Minimal Connectivity Assumptions. In the confines of this network, we evaluate throughput performance and prove matching upper and lower bounds. In particular, using competitive analysis (perhaps somewhat surprisingly) we prove that the optimal competitive ratio of any on-line protocol is 1/n (where n is the number of nodes in the network), and then we describe a specific protocol and prove that it is n-competitive. The model we describe in the paper and for which we achieve the above matching upper and lower bounds for throughput represents the "worst-case" network, in that it makes no reliability assumptions. In many practical applications, the optimal competitive ratio of 1/n may be unacceptable, and consequently stronger assumptions must be imposed on the network to improve performance. However, we believe that a fundamental starting point to understanding which assumptions are necessary to impose on a network model, given some desired throughput performance, is to understand what is achievable in the worst case for the simplest task (namely end-to-end routing).
[ { "version": "v1", "created": "Fri, 23 Oct 2009 19:35:26 GMT" } ]
2009-10-26T00:00:00
[ [ "Bunn", "Paul", "" ], [ "Ostrovsky", "Rafail", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0910.4613
Ruoheng Liu
Ruoheng Liu, Yingbin Liang and H. Vincent Poor
Fading Cognitive Multiple-Access Channels With Confidential Messages
Submitted to the IEEE Transactions on Information Theory, December 2009. The material in this paper was presented in part at the Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing, September 30-October 2, 2009, Monticello, Illinois
null
null
null
cs.IT cs.CR math.IT
http://creativecommons.org/licenses/by/3.0/
The fading cognitive multiple-access channel with confidential messages (CMAC-CM) is investigated, in which two users attempt to transmit common information to a destination and user 1 also has confidential information intended for the destination. User 1 views user 2 as an eavesdropper and wishes to keep its confidential information as secret as possible from user 2. The multiple-access channel (both the user-to-user channel and the user-to-destination channel) is corrupted by multiplicative fading gain coefficients in addition to additive white Gaussian noise. The channel state information (CSI) is assumed to be known at both the users and the destination. A parallel CMAC-CM with independent subchannels is first studied. The secrecy capacity region of the parallel CMAC-CM is established, which yields the secrecy capacity region of the parallel CMAC-CM with degraded subchannels. Next, the secrecy capacity region is established for the parallel Gaussian CMAC-CM, which is used to study the fading CMAC-CM. When both users know the CSI, they can dynamically change their transmission powers with the channel realization to achieve the optimal performance. The closed-form power allocation function that achieves every boundary point of the secrecy capacity region is derived.
[ { "version": "v1", "created": "Sat, 24 Oct 2009 02:43:30 GMT" }, { "version": "v2", "created": "Tue, 29 Dec 2009 20:55:37 GMT" } ]
2009-12-29T00:00:00
[ [ "Liu", "Ruoheng", "" ], [ "Liang", "Yingbin", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.4618
Jaeok Park
Jaeok Park and Mihaela van der Schaar
A Game Theoretic Analysis of Incentives in Content Production and Sharing over Peer-to-Peer Networks
31 pages, 3 figures, 1 table
IEEE Journal of Selected Topics in Signal Processing, vol. 4, no. 4, pp. 704-717, Aug. 2010
10.1109/JSTSP.2010.2048609
null
cs.NI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
User-generated content can be distributed at a low cost using peer-to-peer (P2P) networks, but the free-rider problem hinders the utilization of P2P networks. In order to achieve an efficient use of P2P networks, we investigate fundamental issues on incentives in content production and sharing using game theory. We build a basic model to analyze non-cooperative outcomes without an incentive scheme and then use different game formulations derived from the basic model to examine five incentive schemes: cooperative, payment, repeated interaction, intervention, and enforced full sharing. The results of this paper show that 1) cooperative peers share all produced content while non-cooperative peers do not share at all without an incentive scheme; 2) a cooperative scheme allows peers to consume more content than non-cooperative outcomes do; 3) a cooperative outcome can be achieved among non-cooperative peers by introducing an incentive scheme based on payment, repeated interaction, or intervention; and 4) enforced full sharing has ambiguous welfare effects on peers. In addition to describing the solutions of different formulations, we discuss enforcement and informational requirements to implement each solution, aiming to offer a guideline for protocol designers when designing incentive schemes for P2P networks.
[ { "version": "v1", "created": "Sat, 24 Oct 2009 04:50:31 GMT" }, { "version": "v2", "created": "Sat, 23 Jan 2010 19:04:00 GMT" } ]
2010-08-03T00:00:00
[ [ "Park", "Jaeok", "" ], [ "van der Schaar", "Mihaela", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0910.4624
{\O}yvind Ryan
{\O}. Ryan, M. Debbah
Convolution operations arising from Vandermonde matrices
Submitted to IEEE Transactions on Information Theory. 16 pages, 1 figure
null
10.1109/TIT.2011.2145990
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Different types of convolution operations involving large Vandermonde matrices are considered. The convolutions parallel those of large Gaussian matrices and additive and multiplicative free convolution. First additive and multiplicative convolution of Vandermonde matrices and deterministic diagonal matrices are considered. After this, several cases of additive and multiplicative convolution of two independent Vandermonde matrices are considered. It is also shown that the convergence of any combination of Vandermonde matrices is almost sure. We will divide the considered convolutions into two types: those which depend on the phase distribution of the Vandermonde matrices, and those which depend only on the spectra of the matrices. A general criterion is presented to find which type applies for any given convolution. A simulation is presented, verifying the results. Implementations of all considered convolutions are provided and discussed, together with the challenges in making these implementations efficient. The implementation is based on the technique of Fourier-Motzkin elimination, and is quite general as it can be applied to virtually any combination of Vandermonde matrices. Generalizations to related random matrices, such as Toeplitz and Hankel matrices, are also discussed.
[ { "version": "v1", "created": "Mon, 26 Oct 2009 17:50:29 GMT" } ]
2016-11-15T00:00:00
[ [ "Ryan", "Ø.", "" ], [ "Debbah", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.4627
Francis Bach
Francis Bach (INRIA Rocquencourt)
Self-concordant analysis for logistic regression
null
null
null
null
cs.LG math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most of the non-asymptotic theoretical work in regression is carried out for the square loss, where estimators can be obtained through closed-form expressions. In this paper, we use and extend tools from the convex optimization literature, namely self-concordant functions, to provide simple extensions of theoretical results for the square loss to the logistic loss. We apply the extension techniques to logistic regression with regularization by the $\ell_2$-norm and regularization by the $\ell_1$-norm, showing that new results for binary classification through logistic regression can be easily derived from corresponding results for least-squares regression.
[ { "version": "v1", "created": "Sat, 24 Oct 2009 07:10:24 GMT" } ]
2009-10-27T00:00:00
[ [ "Bach", "Francis", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0910.4632
Meicheng Liu
Meicheng Liu, Dongdai Lin
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions
13 pages, submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2145690
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Algebraic and fast algebraic attacks are power tools to analyze stream ciphers. A class of symmetric Boolean functions with maximum algebraic immunity were found vulnerable to fast algebraic attacks at EUROCRYPT'06. Recently, the notion of AAR (algebraic attack resistant) functions was introduced as a unified measure of protection against both classical algebraic and fast algebraic attacks. In this correspondence, we first give a decomposition of symmetric Boolean functions, then we show that almost all symmetric Boolean functions, including these functions with good algebraic immunity, behave badly against fast algebraic attacks, and we also prove that no symmetric Boolean functions are AAR functions. Besides, we improve the relations between algebraic degree and algebraic immunity of symmetric Boolean functions.
[ { "version": "v1", "created": "Sat, 24 Oct 2009 08:16:15 GMT" } ]
2016-11-15T00:00:00
[ [ "Liu", "Meicheng", "" ], [ "Lin", "Dongdai", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]