id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0910.3115
|
Uwe Aickelin
|
Amanda Whitbrook, Uwe Aickelin, Jonathan M Garibaldi
|
An Idiotypic Immune Network as a Short Term Learning Architecture for
Mobile Robots
|
13 pages, 5 tables, 4 figures, 7th International Conference on
Artificial Immune Systems (ICARIS2008), Phuket, Thailand
|
Proceedings of the 7th International Conference on Artificial
Imune Systems (ICARIS2008), Phuket, Thailand, 266-278, 2008
| null | null |
cs.AI cs.NE cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A combined Short-Term Learning (STL) and Long-Term Learning (LTL) approach to
solving mobile robot navigation problems is presented and tested in both real
and simulated environments. The LTL consists of rapid simulations that use a
Genetic Algorithm to derive diverse sets of behaviours. These sets are then
transferred to an idiotypic Artificial Immune System (AIS), which forms the STL
phase, and the system is said to be seeded. The combined LTL-STL approach is
compared with using STL only, and with using a handdesigned controller. In
addition, the STL phase is tested when the idiotypic mechanism is turned off.
The results provide substantial evidence that the best option is the seeded
idiotypic system, i.e. the architecture that merges LTL with an idiotypic AIS
for the STL. They also show that structurally different environments can be
used for the two phases without compromising transferability
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 13:40:49 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Whitbrook",
"Amanda",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Garibaldi",
"Jonathan M",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0910.3117
|
Uwe Aickelin
|
Jamie Twycross, Uwe Aickelin
|
An Immune Inspired Approach to Anomaly Detection
|
19 pages, 4 tables, 2 figures, Handbook of Research on Information
Security and Assurance
|
Handbook of Research on Information Security and Assurance,
Chapter X, 2008
| null | null |
cs.AI cs.CR cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The immune system provides a rich metaphor for computer security: anomaly
detection that works in nature should work for machines. However, early
artificial immune system approaches for computer security had only limited
success. Arguably, this was due to these artificial systems being based on too
simplistic a view of the immune system. We present here a second generation
artificial immune system for process anomaly detection. It improves on earlier
systems by having different artificial cell types that process information.
Following detailed information about how to build such second generation
systems, we find that communication between cells types is key to performance.
Through realistic testing and validation we show that second generation
artificial immune systems are capable of anomaly detection beyond generic
system policies. The paper concludes with a discussion and outline of the next
steps in this exciting area of computer security.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 13:44:37 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Twycross",
"Jamie",
""
],
[
"Aickelin",
"Uwe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0910.3119
|
Alexandre Soro
|
Alexandre Soro and Jerome Lacan
|
FFT-based Network Coding For Peer-To-Peer Content Delivery
|
Submitted to ICC 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a structured peer-to-peer (P2P) distribution scheme
based on Fast Fourier Transform (FFT) graphs. We build a peer-to-peer network
that reproduces the FFT graph initially designed for hardware FFT codecs. This
topology allows content delivery with a maximum diversity level for a minimum
global complexity. The resulting FFTbased network is a structured architecture
with an adapted network coding that brings flexibility upon content
distribution and robustness upon the dynamic nature of the network. This
structure can achieve optimal capacity in terms of content recovery while
solving the problem of last remaining blocks, even for large networks.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 13:48:35 GMT"
}
] | 2009-10-19T00:00:00 |
[
[
"Soro",
"Alexandre",
""
],
[
"Lacan",
"Jerome",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.3123
|
Johannes Fischer
|
Johannes Fischer
|
Wee LCP
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that longest common prefix (LCP) information can be stored in much
less space than previously known. More precisely, we show that in the presence
of the text and the suffix array, o(n) additional bits are sufficient to answer
LCP-queries asymptotically in the same time that is needed to retrieve an entry
from the suffix array. This yields the smallest compressed suffix tree with
sub-logarithmic navigation time.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 13:50:12 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Feb 2010 09:19:42 GMT"
}
] | 2010-02-19T00:00:00 |
[
[
"Fischer",
"Johannes",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.3124
|
Uwe Aickelin
|
Gianni Tedesco, Uwe Aickelin
|
An Immune Inspired Network Intrusion Detection System Utilising
Correlation Context
|
2 pages, Workshop on Artificial Immune Systems and Immune System
Modelling
| null | null | null |
cs.AI cs.CR cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Network Intrusion Detection Systems (NIDS) are computer systems which monitor
a network with the aim of discerning malicious from benign activity on that
network. While a wide range of approaches have met varying levels of success,
most IDSs rely on having access to a database of known attack signatures which
are written by security experts. Nowadays, in order to solve problems with
false positive alerts, correlation algorithms are used to add additional
structure to sequences of IDS alerts. However, such techniques are of no help
in discovering novel attacks or variations of known attacks, something the
human immune system (HIS) is capable of doing in its own specialised domain.
This paper presents a novel immune algorithm for application to the IDS
problem. The goal is to discover packets containing novel variations of attacks
covered by an existing signature base.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 13:55:41 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Tedesco",
"Gianni",
""
],
[
"Aickelin",
"Uwe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0910.3127
|
Jakob Nordstr\"om
|
Jakob Nordstr\"om, Alexander Razborov
|
On Minimal Unsatisfiability and Time-Space Trade-offs for k-DNF
Resolution
| null | null | null | null |
cs.DM cs.CC math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the context of proving lower bounds on proof space in k-DNF resolution,
[Ben-Sasson and Nordstrom 2009] introduced the concept of minimally
unsatisfiable sets of k-DNF formulas and proved that a minimally unsatisfiable
k-DNF set with m formulas can have at most O((mk)^(k+1)) variables. They also
gave an example of such sets with Omega(mk^2) variables.
In this paper we significantly improve the lower bound to Omega(m)^k, which
almost matches the upper bound above. Furthermore, we show that this implies
that the analysis of their technique for proving time-space separations and
trade-offs for k-DNF resolution is almost tight. This means that although it is
possible, or even plausible, that stronger results than in [Ben-Sasson and
Nordstrom 2009] should hold, a fundamentally different approach would be needed
to obtain such results.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 14:33:58 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Oct 2009 21:10:31 GMT"
}
] | 2016-09-08T00:00:00 |
[
[
"Nordström",
"Jakob",
""
],
[
"Razborov",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0910.3144
|
Samson Abramsky
|
Samson Abramsky and Bob Coecke
|
Abstract Physical Traces
|
14 pages
|
Theory and Applications of Categories, vol 14, pages 111--124,
2005
| null | null |
quant-ph cs.LO math.CT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We revise our "Physical Traces" paper in the light of the results in "A
Categorical Semantics of Quantum Protocols". The key fact is that the notion of
a strongly compact closed category allows abstract notions of adjoint,
bipartite projector and inner product to be defined, and their key properties
to be proved. In this paper we improve on the definition of strong compact
closure as compared to the one presented in Categorical Semantics of Quantum
Protocols. This modification enables an elegant characterization of strong
compact closure in terms of adjoints and a Yanking axiom, and a better
treatment of bipartite projectors.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 15:40:03 GMT"
}
] | 2009-10-19T00:00:00 |
[
[
"Abramsky",
"Samson",
""
],
[
"Coecke",
"Bob",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
0910.3148
|
Riccardo Dondi
|
Stefano Beretta, Paola Bonizzoni, Gianluca Della Vedova, Riccardo
Dondi and Yuri Pirola
|
Parameterized Complexity of the k-anonymity Problem
|
22 pages, 2 figures
|
J. of Combinatorial Optimization 26.1 (2013) 19-43
|
10.1007/s10878-011-9428-9
| null |
cs.DS cs.DB cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of publishing personal data without giving up privacy is becoming
increasingly important. An interesting formalization that has been recently
proposed is the $k$-anonymity. This approach requires that the rows of a table
are partitioned in clusters of size at least $k$ and that all the rows in a
cluster become the same tuple, after the suppression of some entries. The
natural optimization problem, where the goal is to minimize the number of
suppressed entries, is known to be APX-hard even when the records values are
over a binary alphabet and $k=3$, and when the records have length at most 8
and $k=4$ . In this paper we study how the complexity of the problem is
influenced by different parameters. In this paper we follow this direction of
research, first showing that the problem is W[1]-hard when parameterized by the
size of the solution (and the value $k$). Then we exhibit a fixed parameter
algorithm, when the problem is parameterized by the size of the alphabet and
the number of columns. Finally, we investigate the computational (and
approximation) complexity of the $k$-anonymity problem, when restricting the
instance to records having length bounded by 3 and $k=3$. We show that such a
restriction is APX-hard.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 16:01:33 GMT"
},
{
"version": "v2",
"created": "Mon, 17 May 2010 08:06:06 GMT"
}
] | 2013-11-20T00:00:00 |
[
[
"Beretta",
"Stefano",
""
],
[
"Bonizzoni",
"Paola",
""
],
[
"Della Vedova",
"Gianluca",
""
],
[
"Dondi",
"Riccardo",
""
],
[
"Pirola",
"Yuri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.3152
|
Robert McGrath
|
Robert E. McGrath, Jason Kastner, Alejandro Rodriguez, Jim Myers
|
Towards a Semantic Preservation System
| null | null | null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Preserving access to file content requires preserving not just bits but also
meaningful logical structures. The ongoing development of the Data Format
Description Language (DFDL) is a completely general standard that addresses
this need. The Defuddle parser is a generic parser that can use DFDL-style
format descriptions to extract logical structures from ASCII or binary files
written in those formats. DFDL and Defuddle provide a preservation capability
that has minimal format-specific software and cleanly separates issues related
to bits, formats, and logical content. Such a system has the potential to
greatly reduce overall system development and maintenance costs as well as the
per-file-format costs for long term preservation.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 16:22:12 GMT"
}
] | 2009-10-19T00:00:00 |
[
[
"McGrath",
"Robert E.",
""
],
[
"Kastner",
"Jason",
""
],
[
"Rodriguez",
"Alejandro",
""
],
[
"Myers",
"Jim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0910.3243
|
Krzysztof Onak
|
Krzysztof Onak
|
Testing Distribution Identity Efficiently
|
4 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of testing distribution identity. Given a sequence of
independent samples from an unknown distribution on a domain of size n, the
goal is to check if the unknown distribution approximately equals a known
distribution on the same domain. While Batu, Fortnow, Fischer, Kumar,
Rubinfeld, and White (FOCS 2001) proved that the sample complexity of the
problem is O~(sqrt(n) * poly(1/epsilon)), the running time of their tester is
much higher: O(n) + O~(sqrt(n) * poly(1/epsilon)). We modify their tester to
achieve a running time of O~(sqrt(n) * poly(1/epsilon)).
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 22:26:02 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Onak",
"Krzysztof",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.3275
|
Sang-Woon Jeon
|
Sang-Woon Jeon, Sae-Young Chung, Syed A. Jafar
|
Degrees of Freedom of Multi-Source Relay Networks
|
6 pages, 2 figures, presented at the 47-th Allerton Conference on
Communication, Control, and Computing, 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study a multi-source Gaussian relay network consisting of $K$
source--destination pairs having $K$ unicast sessions. We assume $M$ layers of
relays between the sources and the destinations. We find achievable degrees of
freedom of the network. Our schemes are based on interference alignment at the
transmitters and symbol extension and opportunistic interference cancellation
at the relays. For $K$-$L$-$K$ networks, i.e., 2-hop network with $L$ relays,
we show $\min\{K,K/2+L/(2(K-1))\}$ degrees of freedom are achievable. For
$K$-hop networks with $K$ relays in each layer, we show the full $K$ degrees of
freedom are achievable provided that $K$ is even and the channel distribution
satisfies a certain symmetry.
|
[
{
"version": "v1",
"created": "Sat, 17 Oct 2009 05:49:44 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Jeon",
"Sang-Woon",
""
],
[
"Chung",
"Sae-Young",
""
],
[
"Jafar",
"Syed A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.3282
|
Yunlei Zhao
|
Andrew C. Yao, Moti Yung, Yunlei Zhao
|
Adaptive Concurrent Non-Malleability with Bare Public-Keys
|
41 pages
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Concurrent non-malleability (CNM) is central for cryptographic protocols
running concurrently in environments such as the Internet. In this work, we
formulate CNM in the bare public-key (BPK) model, and show that round-efficient
concurrent non-malleable cryptography with full adaptive input selection can be
established, in general, with bare public-keys (where, in particular, no
trusted assumption is made). Along the way, we clarify the various subtleties
of adaptive concurrent non-malleability in the bare public-key model.
|
[
{
"version": "v1",
"created": "Sat, 17 Oct 2009 07:28:50 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Yao",
"Andrew C.",
""
],
[
"Yung",
"Moti",
""
],
[
"Zhao",
"Yunlei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.3292
|
Masud Hasan
|
Jesun Sahariar Firoz, Masud Hasan, Ashik Zinnat Khan, and M. Sohel
Rahman
|
The 1.375 Approximation Algorithm for Sorting by Transpositions Can Run
in $O(n\log n)$ Time
|
5 pages
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sorting a Permutation by Transpositions (SPbT) is an important problem in
Bioinformtics. In this paper, we improve the running time of the best known
approximation algorithm for SPbT. We use the permutation tree data structure of
Feng and Zhu and improve the running time of the 1.375 Approximation Algorithm
for SPbT of Elias and Hartman to $O(n\log n)$. The previous running time of EH
algorithm was $O(n^2)$.
|
[
{
"version": "v1",
"created": "Sat, 17 Oct 2009 10:16:48 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Firoz",
"Jesun Sahariar",
""
],
[
"Hasan",
"Masud",
""
],
[
"Khan",
"Ashik Zinnat",
""
],
[
"Rahman",
"M. Sohel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.3301
|
Julian McAuley
|
Julian J. McAuley, Tiberio S. Caetano
|
Faster Algorithms for Max-Product Message-Passing
|
34 pages, 22 figures
| null | null | null |
cs.AI cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Maximum A Posteriori inference in graphical models is often solved via
message-passing algorithms, such as the junction-tree algorithm, or loopy
belief-propagation. The exact solution to this problem is well known to be
exponential in the size of the model's maximal cliques after it is
triangulated, while approximate inference is typically exponential in the size
of the model's factors. In this paper, we take advantage of the fact that many
models have maximal cliques that are larger than their constituent factors, and
also of the fact that many factors consist entirely of latent variables (i.e.,
they do not depend on an observation). This is a common case in a wide variety
of applications, including grids, trees, and ring-structured models. In such
cases, we are able to decrease the exponent of complexity for message-passing
by 0.5 for both exact and approximate inference.
|
[
{
"version": "v1",
"created": "Sat, 17 Oct 2009 13:42:35 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Oct 2009 04:02:16 GMT"
},
{
"version": "v3",
"created": "Sat, 5 Dec 2009 03:41:24 GMT"
},
{
"version": "v4",
"created": "Thu, 8 Apr 2010 05:24:55 GMT"
}
] | 2010-04-09T00:00:00 |
[
[
"McAuley",
"Julian J.",
""
],
[
"Caetano",
"Tiberio S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.3321
|
Miguel Vilaca
|
Ian Mackie, Jorge Sousa Pinto and Miguel Vilaca
|
Iterators, Recursors and Interaction Nets
|
ISBN: 978-972-9348-18-1
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a method for encoding iterators (and recursion operators in
general) using interaction nets (INs). There are two main applications for
this: the method can be used to obtain a visual nota- tion for functional
programs; and it can be used to extend the existing translations of the
lambda-calculus into INs to languages with recursive types.
|
[
{
"version": "v1",
"created": "Sat, 17 Oct 2009 18:52:53 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Mackie",
"Ian",
""
],
[
"Pinto",
"Jorge Sousa",
""
],
[
"Vilaca",
"Miguel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0910.3348
|
Harris Georgiou
|
Harris Georgiou
|
Algorithms for Image Analysis and Combination of Pattern Classifiers
with Application to Medical Diagnosis
|
PhD thesis summary, 12 pages
| null | null | null |
cs.CV cs.AI cs.GT cs.NE
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Medical Informatics and the application of modern signal processing in the
assistance of the diagnostic process in medical imaging is one of the more
recent and active research areas today. This thesis addresses a variety of
issues related to the general problem of medical image analysis, specifically
in mammography, and presents a series of algorithms and design approaches for
all the intermediate levels of a modern system for computer-aided diagnosis
(CAD). The diagnostic problem is analyzed with a systematic approach, first
defining the imaging characteristics and features that are relevant to probable
pathology in mammo-grams. Next, these features are quantified and fused into
new, integrated radio-logical systems that exhibit embedded digital signal
processing, in order to improve the final result and minimize the radiological
dose for the patient. In a higher level, special algorithms are designed for
detecting and encoding these clinically interest-ing imaging features, in order
to be used as input to advanced pattern classifiers and machine learning
models. Finally, these approaches are extended in multi-classifier models under
the scope of Game Theory and optimum collective deci-sion, in order to produce
efficient solutions for combining classifiers with minimum computational costs
for advanced diagnostic systems. The material covered in this thesis is related
to a total of 18 published papers, 6 in scientific journals and 12 in
international conferences.
|
[
{
"version": "v1",
"created": "Sun, 18 Oct 2009 03:31:33 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Georgiou",
"Harris",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0910.3349
|
Ping Li
|
Ping Li, Arnd Christian Konig
|
b-Bit Minwise Hashing
| null | null | null | null |
cs.DS cs.DB cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper establishes the theoretical framework of b-bit minwise hashing.
The original minwise hashing method has become a standard technique for
estimating set similarity (e.g., resemblance) with applications in information
retrieval, data management, social networks and computational advertising.
By only storing the lowest $b$ bits of each (minwise) hashed value (e.g., b=1
or 2), one can gain substantial advantages in terms of computational efficiency
and storage space. We prove the basic theoretical results and provide an
unbiased estimator of the resemblance for any b. We demonstrate that, even in
the least favorable scenario, using b=1 may reduce the storage space at least
by a factor of 21.3 (or 10.7) compared to using b=64 (or b=32), if one is
interested in resemblance > 0.5.
|
[
{
"version": "v1",
"created": "Sun, 18 Oct 2009 03:39:56 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Li",
"Ping",
""
],
[
"Konig",
"Arnd Christian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0910.3372
|
Marcelo Arenas
|
Marcelo Arenas, Jorge Perez, Juan Reutter and Cristian Riveros
|
Composition and Inversion of Schema Mappings
| null | null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the recent years, a lot of attention has been paid to the development of
solid foundations for the composition and inversion of schema mappings. In this
paper, we review the proposals for the semantics of these crucial operators.
For each of these proposals, we concentrate on the three following problems:
the definition of the semantics of the operator, the language needed to express
the operator, and the algorithmic issues associated to the problem of computing
the operator. It should be pointed out that we primarily consider the
formalization of schema mappings introduced in the work on data exchange. In
particular, when studying the problem of computing the composition and inverse
of a schema mapping, we will be mostly interested in computing these operators
for mappings specified by source-to-target tuple-generating dependencies.
|
[
{
"version": "v1",
"created": "Sun, 18 Oct 2009 13:46:36 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Oct 2009 17:48:48 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Dec 2009 18:22:06 GMT"
},
{
"version": "v4",
"created": "Thu, 4 Mar 2010 18:36:16 GMT"
}
] | 2010-03-04T00:00:00 |
[
[
"Arenas",
"Marcelo",
""
],
[
"Perez",
"Jorge",
""
],
[
"Reutter",
"Juan",
""
],
[
"Riveros",
"Cristian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0910.3376
|
Andrew Drucker
|
Andrew Drucker (MIT), Ronald de Wolf (CWI Amsterdam)
|
Quantum Proofs for Classical Theorems
|
50 pages LaTeX. Updated based on journal version; the journal version
is open-access and has nicer typesetting
(http://theoryofcomputing.org/articles/gs002/)
|
Theory of Computing, Graduate surveys 2, 2011
| null | null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Alongside the development of quantum algorithms and quantum complexity theory
in recent years, quantum techniques have also proved instrumental in obtaining
results in classical (non-quantum) areas. In this paper we survey these results
and the quantum toolbox they use.
|
[
{
"version": "v1",
"created": "Sun, 18 Oct 2009 14:19:34 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Mar 2011 00:33:32 GMT"
}
] | 2011-03-15T00:00:00 |
[
[
"Drucker",
"Andrew",
"",
"MIT"
],
[
"de Wolf",
"Ronald",
"",
"CWI Amsterdam"
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.3383
|
David Baelde
|
David Baelde
|
Least and Greatest Fixed Points in Linear Logic
|
Accepted for publication at the ACM Transactions on Computational
Logic
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The first-order theory of MALL (multiplicative, additive linear logic) over
only equalities is an interesting but weak logic since it cannot capture
unbounded (infinite) behavior. Instead of accounting for unbounded behavior via
the addition of the exponentials (! and ?), we add least and greatest fixed
point operators. The resulting logic, which we call muMALL, satisfies two
fundamental proof theoretic properties: we establish weak normalization for it,
and we design a focused proof system that we prove complete. That second result
provides a strong normal form for cut-free proof structures that can be used,
for example, to help automate proof search. We show how these foundations can
be applied to intuitionistic logic.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 19:56:36 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Feb 2010 19:43:53 GMT"
},
{
"version": "v3",
"created": "Wed, 7 Jul 2010 05:38:57 GMT"
},
{
"version": "v4",
"created": "Tue, 30 Nov 2010 22:52:45 GMT"
}
] | 2010-12-02T00:00:00 |
[
[
"Baelde",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.3427
|
Ernst Martin Witte
|
Ernst Martin Witte, Filippo Borlenghi, Gerd Ascheid, Rainer Leupers,
Heinrich Meyr
|
A Scalable VLSI Architecture for Soft-Input Soft-Output Depth-First
Sphere Decoding
|
Accepted for IEEE Transactions on Circuits and Systems II Express
Briefs, May 2010. This draft from April 2010 will not be updated any more.
Please refer to IEEE Xplore for the final version. *) The final publication
will appear with the modified title "A Scalable VLSI Architecture for
Soft-Input Soft-Output Single Tree-Search Sphere Decoding"
|
IEEE Transactions on Circuits and Systems-Part II: Express Briefs,
vol. 57, no. 9, pp. 706-710, Sep 2010
|
10.1109/TCSII.2010.2056014
| null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multiple-input multiple-output (MIMO) wireless transmission imposes huge
challenges on the design of efficient hardware architectures for iterative
receivers. A major challenge is soft-input soft-output (SISO) MIMO demapping,
often approached by sphere decoding (SD). In this paper, we introduce the - to
our best knowledge - first VLSI architecture for SISO SD applying a single
tree-search approach. Compared with a soft-output-only base architecture
similar to the one proposed by Studer et al. in IEEE J-SAC 2008, the
architectural modifications for soft input still allow a one-node-per-cycle
execution. For a 4x4 16-QAM system, the area increases by 57% and the operating
frequency degrades by 34% only.
|
[
{
"version": "v1",
"created": "Sun, 18 Oct 2009 21:51:55 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Oct 2009 17:03:44 GMT"
},
{
"version": "v3",
"created": "Tue, 6 Apr 2010 11:55:31 GMT"
},
{
"version": "v4",
"created": "Mon, 7 Jun 2010 16:47:05 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Witte",
"Ernst Martin",
""
],
[
"Borlenghi",
"Filippo",
""
],
[
"Ascheid",
"Gerd",
""
],
[
"Leupers",
"Rainer",
""
],
[
"Meyr",
"Heinrich",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0910.3485
|
Yongzhi Cao
|
Yongzhi Cao and Guoqing Chen
|
A Fuzzy Petri Nets Model for Computing With Words
|
double columns 14 pages, 8 figures
|
IEEE Trans. Fuzzy Syst., vol. 18, no. 3, pp. 486-499, 2010
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by Zadeh's paradigm of computing with words rather than numbers,
several formal models of computing with words have recently been proposed.
These models are based on automata and thus are not well-suited for concurrent
computing. In this paper, we incorporate the well-known model of concurrent
computing, Petri nets, together with fuzzy set theory and thereby establish a
concurrency model of computing with words--fuzzy Petri nets for computing with
words (FPNCWs). The new feature of such fuzzy Petri nets is that the labels of
transitions are some special words modeled by fuzzy sets. By employing the
methodology of fuzzy reasoning, we give a faithful extension of an FPNCW which
makes it possible for computing with more words. The language expressiveness of
the two formal models of computing with words, fuzzy automata for computing
with words and FPNCWs, is compared as well. A few small examples are provided
to illustrate the theoretical development.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 09:09:43 GMT"
}
] | 2011-10-04T00:00:00 |
[
[
"Cao",
"Yongzhi",
""
],
[
"Chen",
"Guoqing",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.3490
|
Mat\'u\v{s} Medo
|
Matus Medo, Yi-Cheng Zhang, Tao Zhou
|
Adaptive model for recommendation of news
|
6 pages, 6 figures
|
EPL 88, 38005, 2009
|
10.1209/0295-5075/88/38005
| null |
cs.IR cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most news recommender systems try to identify users' interests and news'
attributes and use them to obtain recommendations. Here we propose an adaptive
model which combines similarities in users' rating patterns with epidemic-like
spreading of news on an evolving network. We study the model by computer
agent-based simulations, measure its performance and discuss its robustness
against bias and malicious behavior. Subject to the approval fraction of news
recommended, the proposed model outperforms the widely adopted recommendation
of news according to their absolute or relative popularity. This model provides
a general social mechanism for recommender systems and may find its
applications also in other types of recommendation.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 09:43:12 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Oct 2009 07:52:46 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Medo",
"Matus",
""
],
[
"Zhang",
"Yi-Cheng",
""
],
[
"Zhou",
"Tao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0910.3494
|
Vaneet Aggarwal
|
Vaneet Aggarwal and Youjian Liu and Ashutosh Sabharwal
|
Sum-capacity of Interference Channels with a Local View: Impact of
Distributed Decisions
|
Submitted to IEEE Transactions on Information Theory, October 2009
|
IEEE Transactions on Information Theory, vol.58, no.3,
pp.1630,1659, March 2012
|
10.1109/TIT.2011.2178132
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to the large size of wireless networks, it is often impractical for nodes
to track changes in the complete network state. As a result, nodes have to make
distributed decisions about their transmission and reception parameters based
on their local view of the network. In this paper, we characterize the impact
of distributed decisions on the global network performance in terms of
achievable sum-rates. We first formalize the concept of local view by proposing
a protocol abstraction using the concept of local message passing. In the
proposed protocol, nodes forward information about the network state to other
neighboring nodes, thereby allowing network state information to trickle to all
the nodes. The protocol proceeds in rounds, where all transmitters send a
message followed by a message by all receivers. The number of rounds then
provides a natural metric to quantify the extent of local information at each
node.
We next study three network connectivities, Z-channel, a three-user double
Z-channel and a reduced-parametrization $K$-user stacked Z-channel. In each
case, we characterize achievable sum-rate with partial message passing leading
to three main results. First, in many cases, nodes can make distributed
decisions with only local information about the network and can still achieve
the same sum-capacity as can be attained with global information irrespective
of the actual channel gains. Second, for the case of three-user double
Z-channel, we show that universal optimality is not achievable if the per node
information is below a threshold. Third, using reduced parametrization $K$-user
channel, we show that very few protocol rounds are needed for the case of very
weak or very strong interference.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 09:40:45 GMT"
}
] | 2014-07-15T00:00:00 |
[
[
"Aggarwal",
"Vaneet",
""
],
[
"Liu",
"Youjian",
""
],
[
"Sabharwal",
"Ashutosh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.3503
|
Benjamin Burton
|
Benjamin A. Burton
|
Searching a bitstream in linear time for the longest substring of any
given density
|
22 pages, 19 figures; v2: minor edits and enhancements
|
Algorithmica 61 (2011), no. 3, 555-579
|
10.1007/s00453-010-9424-y
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given an arbitrary bitstream, we consider the problem of finding the longest
substring whose ratio of ones to zeroes equals a given value. The central
result of this paper is an algorithm that solves this problem in linear time.
The method involves (i) reformulating the problem as a constrained walk through
a sparse matrix, and then (ii) developing a data structure for this sparse
matrix that allows us to perform each step of the walk in amortised constant
time. We also give a linear time algorithm to find the longest substring whose
ratio of ones to zeroes is bounded below by a given value. Both problems have
practical relevance to cryptography and bioinformatics.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 10:06:34 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Jun 2010 20:44:36 GMT"
}
] | 2011-08-22T00:00:00 |
[
[
"Burton",
"Benjamin A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.3509
|
Mohammad Hossein Yassaee
|
Mohammad Hossein Yassaee, Mohammad Reza Aref
|
Slepian-Wolf Coding Over Cooperative Relay Networks
|
IEEE Transactions on Information Theory, accepted
| null |
10.1109/TIT.2011.2143990
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper deals with the problem of multicasting a set of discrete
memoryless correlated sources (DMCS) over a cooperative relay network.
Necessary conditions with cut-set interpretation are presented. A \emph{Joint
source-Wyner-Ziv encoding/sliding window decoding} scheme is proposed, in which
decoding at each receiver is done with respect to an ordered partition of other
nodes. For each ordered partition a set of feasibility constraints is derived.
Then, utilizing the sub-modular property of the entropy function and a novel
geometrical approach, the results of different ordered partitions are
consolidated, which lead to sufficient conditions for our problem. The proposed
scheme achieves operational separation between source coding and channel
coding. It is shown that sufficient conditions are indeed necessary conditions
in two special cooperative networks, namely, Aref network and finite-field
deterministic network. Also, in Gaussian cooperative networks, it is shown that
reliable transmission of all DMCS whose Slepian-Wolf region intersects the
cut-set bound region within a constant number of bits, is feasible. In
particular, all results of the paper are specialized to obtain an achievable
rate region for cooperative relay networks which includes relay networks and
two-way relay networks.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 10:23:11 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Dec 2010 16:20:41 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Yassaee",
"Mohammad Hossein",
""
],
[
"Aref",
"Mohammad Reza",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.3511
|
Haya Shulman
|
Amir Herzberg and Haya Shulman
|
Stealth-MITM DoS Attacks on Secure Channels
|
14 figures; 21 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define stealth Man-in-the-Middle adversaries, and analyse their ability to
launch denial and degradation of service (DoS) attacks on secure channels. We
show realistic attacks, disrupting TCP communication over secure VPNs using
IPsec. We present:
First amplifying DoS attack on IPsec, when deployed without anti-replay
window.
First amplifying attack on IPsec, when deployed with a `small' anti-replay
window, and analysis of `sufficient' window size.
First amplifying attack on IPsec, when deployed with `sufficient' window
size. This attack (as the previous) is realistic: attacker needs only to
duplicate and speed-up few packets.
We also suggest a solution designed to prevent the presented attacks, and to
provide secure channel immune to degradation and other DoS attacks. Our
solution involves changes (only) to the two gateway machines running IPsec.
In addition to their practical importance, our results also raise the
challenge of formally defining secure channels immune to DoS and degradation
attacks, and providing provably-secure implementations.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 10:25:17 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Herzberg",
"Amir",
""
],
[
"Shulman",
"Haya",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0910.3529
|
Robert Adler
|
Robert Adler, John Ewing, Peter Taylor
|
Citation Statistics
|
This paper commented in: [arXiv:0910.3532], [arXiv:0910.3537],
[arXiv:0910.3543], [arXiv:0910.3546]. Rejoinder in [arXiv:0910.3548].
Published in at http://dx.doi.org/10.1214/09-STS285 the Statistical Science
(http://www.imstat.org/sts/) by the Institute of Mathematical Statistics
(http://www.imstat.org)
|
Statistical Science 2009, Vol. 24, No. 1, 1-14
|
10.1214/09-STS285
|
IMS-STS-STS285
|
stat.ME cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This is a report about the use and misuse of citation data in the assessment
of scientific research. The idea that research assessment must be done using
``simple and objective'' methods is increasingly prevalent today. The ``simple
and objective'' methods are broadly interpreted as bibliometrics, that is,
citation data and the statistics derived from them. There is a belief that
citation statistics are inherently more accurate because they substitute simple
numbers for complex judgments, and hence overcome the possible subjectivity of
peer review. But this belief is unfounded.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 12:57:23 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Adler",
"Robert",
""
],
[
"Ewing",
"John",
""
],
[
"Taylor",
"Peter",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0910.3532
|
Bernard W. Silverman
|
Bernard W. Silverman
|
Comment: Bibliometrics in the Context of the UK Research Assessment
Exercise
|
Published in at http://dx.doi.org/10.1214/09-STS285A the Statistical
Science (http://www.imstat.org/sts/) by the Institute of Mathematical
Statistics (http://www.imstat.org)
|
Statistical Science 2009, Vol. 24, No. 1, 15-16
|
10.1214/09-STS285A
|
IMS-STS-STS285A
|
stat.ME cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Research funding and reputation in the UK have, for over two decades, been
increasingly dependent on a regular peer-review of all UK departments. This is
to move to a system more based on bibliometrics. Assessment exercises of this
kind influence the behavior of institutions, departments and individuals, and
therefore bibliometrics will have effects beyond simple measurement.
[arXiv:0910.3529]
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 11:49:52 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Silverman",
"Bernard W.",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0910.3537
|
Sune Lehmann
|
Sune Lehmann, Benny E. Lautrup, Andrew D. Jackson
|
Comment: Citation Statistics
|
Published in at http://dx.doi.org/10.1214/09-STS285B the Statistical
Science (http://www.imstat.org/sts/) by the Institute of Mathematical
Statistics (http://www.imstat.org)
|
Statistical Science 2009, Vol. 24, No. 1, 17-20
|
10.1214/09-STS285B
|
IMS-STS-STS285B
|
stat.ME cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We discuss the paper "Citation Statistics" by the Joint Committee on
Quantitative Assessment of Research [arXiv:0910.3529]. In particular, we focus
on a necessary feature of "good" measures for ranking scientific authors: that
good measures must able to accurately distinguish between authors.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 12:02:16 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Lehmann",
"Sune",
""
],
[
"Lautrup",
"Benny E.",
""
],
[
"Jackson",
"Andrew D.",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0910.3543
|
Harvey Goldstein
|
David Spiegelhalter, Harvey Goldstein
|
Comment: Citation Statistics
|
Published in at http://dx.doi.org/10.1214/09-STS285C the Statistical
Science (http://www.imstat.org/sts/) by the Institute of Mathematical
Statistics (http://www.imstat.org)
|
Statistical Science 2009, Vol. 24, No. 1, 21-24
|
10.1214/09-STS285C
|
IMS-STS-STS285C
|
stat.ME cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Comment on "Citation Statistics" [arXiv:0910.3529]
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 12:17:05 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Spiegelhalter",
"David",
""
],
[
"Goldstein",
"Harvey",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0910.3546
|
Peter Gavin Hall
|
Peter Gavin Hall
|
Comment: Citation Statistics
|
Published in at http://dx.doi.org/10.1214/09-STS285D the Statistical
Science (http://www.imstat.org/sts/) by the Institute of Mathematical
Statistics (http://www.imstat.org)
|
Statistical Science 2009, Vol. 24, No. 1, 25-26
|
10.1214/09-STS285D
|
IMS-STS-STS285D
|
stat.ME cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Comment on "Citation Statistics" [arXiv:0910.3529]
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 12:31:00 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Hall",
"Peter Gavin",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0910.3548
|
Robert Adler
|
Robert Adler, John Ewing, Peter Taylor
|
Rejoinder: Citation Statistics
|
Published in at http://dx.doi.org/10.1214/09-STS285REJ the
Statistical Science (http://www.imstat.org/sts/) by the Institute of
Mathematical Statistics (http://www.imstat.org)
|
Statistical Science 2009, Vol. 24, No. 1, 27-28
|
10.1214/09-STS285REJ
|
IMS-STS-STS285REJ
|
stat.ME cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Rejoinder to "Citation Statistics" [arXiv:0910.3529]
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 12:48:32 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Adler",
"Robert",
""
],
[
"Ewing",
"John",
""
],
[
"Taylor",
"Peter",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0910.3580
|
Felix Brandt
|
Felix Brandt, Paul Harrenstein
|
Set-Rationalizable Choice and Self-Stability
|
20 pages, 2 figure, changed content
|
Journal of Economic Theory 146(4), 2011
|
10.1016/j.jet.2011.03.006
| null |
cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A common assumption in modern microeconomic theory is that choice should be
rationalizable via a binary preference relation, which \citeauthor{Sen71a}
showed to be equivalent to two consistency conditions, namely $\alpha$
(contraction) and $\gamma$ (expansion). Within the context of \emph{social}
choice, however, rationalizability and similar notions of consistency have
proved to be highly problematic, as witnessed by a range of impossibility
results, among which Arrow's is the most prominent. Since choice functions
select \emph{sets} of alternatives rather than single alternatives, we propose
to rationalize choice functions by preference relations over sets
(set-rationalizability). We also introduce two consistency conditions,
$\hat\alpha$ and $\hat\gamma$, which are defined in analogy to $\alpha$ and
$\gamma$, and find that a choice function is set-rationalizable if and only if
it satisfies $\hat\alpha$. Moreover, a choice function satisfies $\hat\alpha$
and $\hat\gamma$ if and only if it is \emph{self-stable}, a new concept based
on earlier work by \citeauthor{Dutt88a}. The class of self-stable social choice
functions contains a number of appealing Condorcet extensions such as the
minimal covering set and the essential set.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 15:02:54 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Nov 2009 13:19:01 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Feb 2010 14:52:26 GMT"
}
] | 2015-02-06T00:00:00 |
[
[
"Brandt",
"Felix",
""
],
[
"Harrenstein",
"Paul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0910.3603
|
Pavel Chigansky
|
Pavel Chigansky, Ramon van Handel
|
A complete solution to Blackwell's unique ergodicity problem for hidden
Markov chains
|
Published in at http://dx.doi.org/10.1214/10-AAP688 the Annals of
Applied Probability (http://www.imstat.org/aap/) by the Institute of
Mathematical Statistics (http://www.imstat.org)
|
Annals of Applied Probability 2010, Vol. 20, No. 6, 2318-2345
|
10.1214/10-AAP688
|
IMS-AAP-AAP688
|
math.PR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop necessary and sufficient conditions for uniqueness of the
invariant measure of the filtering process associated to an ergodic hidden
Markov model in a finite or countable state space. These results provide a
complete solution to a problem posed by Blackwell (1957), and subsume earlier
partial results due to Kaijser, Kochman and Reeds. The proofs of our main
results are based on the stability theory of nonlinear filters.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 15:57:41 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Nov 2010 10:10:15 GMT"
}
] | 2010-11-16T00:00:00 |
[
[
"Chigansky",
"Pavel",
""
],
[
"van Handel",
"Ramon",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.3658
|
Ghadamali Bagherikaram
|
Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani
|
Secrecy Rate Region of the Broadcast Channel with an Eavesdropper
|
18 Pages, Submitted to IEEE Transaction on Information Theory
(Revised Version)
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider a scenario where a source node wishes to broadcast
two confidential messages to two receivers, while a wire-tapper also receives
the transmitted signal. This model is motivated by wireless communications,
where individual secure messages are broadcast over open media and can be
received by any illegitimate receiver. The secrecy level is measured by the
equivocation rate at the eavesdropper. We first study the general
(non-degraded) broadcast channel with an eavesdropper. We present an inner
bound on the secrecy capacity region for this model. This inner bound is based
on a combination of random binning, and the Gelfand-Pinsker binning. We further
study the situation in which the channels are degraded. For the degraded
broadcast channel with an eavesdropper, we present the secrecy capacity region.
Our achievable coding scheme is based on Covers superposition scheme and random
binning. We refer to this scheme as the Secret Superposition Scheme. Our
converse proof is based on a combination of the converse proof of the
conventional degraded broadcast channel and Csiszar Lemma. We then assume that
the channels are Additive White Gaussian Noise (AWGN) and show that the Secret
Superposition Scheme with Gaussian codebook is optimal. The converse proof is
based on Costas entropy power inequality. Finally, we use a broadcast strategy
for the slowly fading wire-tap channel when only the eavesdroppers channel is
fixed and known at the transmitter. We derive the optimum power allocation for
the coding layers, which maximizes the total average rate.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 19:36:06 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Bagherikaram",
"Ghadamali",
""
],
[
"Motahari",
"Abolfazl S.",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.3713
|
Brendan Juba
|
Brendan Juba
|
On Learning Finite-State Quantum Sources
|
10 pages, 1 figure
| null | null | null |
quant-ph cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We examine the complexity of learning the distributions produced by
finite-state quantum sources. We show how prior techniques for learning hidden
Markov models can be adapted to the quantum generator model to find that the
analogous state of affairs holds: information-theoretically, a polynomial
number of samples suffice to approximately identify the distribution, but
computationally, the problem is as hard as learning parities with noise, a
notorious open question in computational learning theory.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 21:55:11 GMT"
}
] | 2009-10-21T00:00:00 |
[
[
"Juba",
"Brendan",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0910.3719
|
Ilias Diakonikolas
|
Ilias Diakonikolas and Rocco A. Servedio
|
Improved Approximation of Linear Threshold Functions
|
full version of CCC'09 paper
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove two main results on how arbitrary linear threshold functions $f(x) =
\sign(w\cdot x - \theta)$ over the $n$-dimensional Boolean hypercube can be
approximated by simple threshold functions.
Our first result shows that every $n$-variable threshold function $f$ is
$\eps$-close to a threshold function depending only on $\Inf(f)^2 \cdot
\poly(1/\eps)$ many variables, where $\Inf(f)$ denotes the total influence or
average sensitivity of $f.$ This is an exponential sharpening of Friedgut's
well-known theorem \cite{Friedgut:98}, which states that every Boolean function
$f$ is $\eps$-close to a function depending only on $2^{O(\Inf(f)/\eps)}$ many
variables, for the case of threshold functions. We complement this upper bound
by showing that $\Omega(\Inf(f)^2 + 1/\epsilon^2)$ many variables are required
for $\epsilon$-approximating threshold functions.
Our second result is a proof that every $n$-variable threshold function is
$\eps$-close to a threshold function with integer weights at most $\poly(n)
\cdot 2^{\tilde{O}(1/\eps^{2/3})}.$ This is a significant improvement, in the
dependence on the error parameter $\eps$, on an earlier result of
\cite{Servedio:07cc} which gave a $\poly(n) \cdot 2^{\tilde{O}(1/\eps^{2})}$
bound. Our improvement is obtained via a new proof technique that uses strong
anti-concentration bounds from probability theory. The new technique also gives
a simple and modular proof of the original \cite{Servedio:07cc} result, and
extends to give low-weight approximators for threshold functions under a range
of probability distributions beyond just the uniform distribution.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2009 23:11:46 GMT"
}
] | 2009-10-21T00:00:00 |
[
[
"Diakonikolas",
"Ilias",
""
],
[
"Servedio",
"Rocco A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.3736
|
Bingbing Xia
|
Bingbing Xia, Fei Qiao, Huazhong Yang, and Hui Wang
|
A Fault-tolerant Structure for Reliable Multi-core Systems Based on
Hardware-Software Co-design
|
7 pages, 5 figures
| null | null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To cope with the soft errors and make full use of the multi-core system, this
paper gives an efficient fault-tolerant hardware and software co-designed
architecture for multi-core systems. And with a not large number of test
patterns, it will use less than 33% hardware resources compared with the
traditional hardware redundancy (TMR) and it will take less than 50% time
compared with the traditional software redundancy (time redundant).Therefore,
it will be a good choice for the fault-tolerant architecture for the future
high-reliable multi-core systems.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 04:01:51 GMT"
}
] | 2016-09-08T00:00:00 |
[
[
"Xia",
"Bingbing",
""
],
[
"Qiao",
"Fei",
""
],
[
"Yang",
"Huazhong",
""
],
[
"Wang",
"Hui",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0910.3765
|
Genge Bela
|
Bela Genge, Piroska Haller
|
Performance Evaluation of Security Protocols
| null |
19th International Conference on Computer Science and
Energetics-Electrical Engineering, Romania (2009)
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a comparative performance evaluation of security protocols. The
novelty of our approach lies in the use of a polynomial mathematical model that
captures the performance of classes of cryptographic algorithms instead of
capturing the performance of each algorithm separately, approach that is used
in other papers. A major advantage of using such a model is that it does not
require implementation-specific information, because the decision is based on
comparing the estimated performances of protocols instead of actually
evaluating them. The approach is validated by comparatively evaluating the
performances of 1000 automatically generated security protocols against the
performances of their actual implementations.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 08:19:42 GMT"
}
] | 2009-10-21T00:00:00 |
[
[
"Genge",
"Bela",
""
],
[
"Haller",
"Piroska",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0910.3766
|
Andreas Gaiser
|
Andreas Gaiser, Stefan Schwoon
|
Comparison of Algorithms for Checking Emptiness on Buechi Automata
|
Technical Report, 15 pages
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We re-investigate the problem of LTL model-checking for finite-state systems.
Typical solutions, like in Spin, work on the fly, reducing the problem to
Buechi emptiness. This can be done in linear time, and a variety of algorithms
with this property exist. Nonetheless, subtle design decisions can make a great
difference to their actual performance in practice, especially when used
on-the-fly. We compare a number of algorithms experimentally on a large
benchmark suite, measure their actual run-time performance, and propose
improvements. Compared with the algorithm implemented in Spin, our best
algorithm is faster by about 33 % on average. We therefore recommend that, for
on-the-fly explicit-state model checking, nested DFS should be replaced by
better solutions.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 11:25:20 GMT"
}
] | 2009-10-21T00:00:00 |
[
[
"Gaiser",
"Andreas",
""
],
[
"Schwoon",
"Stefan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.3768
|
Anas Chaaban
|
Anas Chaaban and Aydin Sezgin
|
On the transmit strategy for the interference MIMO relay channel in the
low power regime
|
5 pages, accepted for 8th International ITG Conference on Source and
Channel Coding, Siegen, Germany, 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies the interference channel with two transmitters and two
receivers in the presence of a MIMO relay in the low transmit power regime. A
communication scheme combining block Markov encoding, beamforming, and Willems'
backward decoding is used. With this scheme, we get an interference channel
with channel gains dependent on the signal power. A power allocation for this
scheme is proposed, and the achievable rate region with this power allocation
is given. We show that, at low transmit powers, with equal power constraints at
the relay and the transmitters, the interference channel with a MIMO relay
achieves a sum rate that is linear in the power. This sum rate is determined by
the channel setup. We also show that in the presence of abundant power at the
relay, the transmit strategy is significantly simplified, and the MAC from the
transmitters to the relay forms the bottle neck of the system from the sum rate
point of view.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 08:31:48 GMT"
}
] | 2009-10-21T00:00:00 |
[
[
"Chaaban",
"Anas",
""
],
[
"Sezgin",
"Aydin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.3811
|
Damien Chablat
|
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Stefan Staicu
|
Dynamics of the Orthoglide parallel robot
| null |
UPB Scientific Bulletin, Series D: Mechanical Engineering 71, 3
(2009) 3-16
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recursive matrix relations for kinematics and dynamics of the Orthoglide
parallel robot having three concurrent prismatic actuators are established in
this paper. These are arranged according to the Cartesian coordinate system
with fixed orientation, which means that the actuating directions are normal to
each other. Three identical legs connecting to the moving platform are located
on three planes being perpendicular to each other too. Knowing the position and
the translation motion of the platform, we develop the inverse kinematics
problem and determine the position, velocity and acceleration of each element
of the robot. Further, the principle of virtual work is used in the inverse
dynamic problem. Some matrix equations offer iterative expressions and graphs
for the input forces and the powers of the three actuators.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 11:18:55 GMT"
}
] | 2009-10-21T00:00:00 |
[
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Staicu",
"Stefan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0910.3840
|
Vaneet Aggarwal
|
Vaneet Aggarwal and Salman Avestimehr and Ashutosh Sabharwal
|
Distributed Universally Optimal Strategies for Interference Channels
with Partial Message Passing
|
In Proc. Allerton Conference on Communication, Control, and
Computing, Monticello, IL, USA, Sept-Oct 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In distributed wireless networks, nodes often do not know the topology
(network size, connectivity and the channel gains) of the network. Thus, they
have to compute their transmission and reception parameters in a distributed
fashion. In this paper, we consider that each of the transmitter know the
channel gains of all the links that are at-most two-hop distant from it and the
receiver knows the channel gains of all the links that are three-hop distant
from it in a deterministic interference channel. With this limited information,
we find a condition on the network connectivity for which there exist a
distributed strategy that can be chosen by the users with partial information
about the network state, which achieves the same sum capacity as that
achievable by the centralized server that knows all the channel gains.
Specifically, distributed decisions are sum-rate optimal only if each connected
component is in a one-to-many configuration or a fully-connected configuration.
In all other cases of network connectivity, the loss can be arbitrarily large.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 13:27:31 GMT"
}
] | 2009-10-21T00:00:00 |
[
[
"Aggarwal",
"Vaneet",
""
],
[
"Avestimehr",
"Salman",
""
],
[
"Sabharwal",
"Ashutosh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.3848
|
Martin Mann
|
Martin Mann, Rolf Backofen, Sebastian Will
|
Equivalence Classes of Optimal Structures in HP Protein Models Including
Side Chains
|
Published in Proceedings of the Fifth Workshop on Constraint Based
Methods for Bioinformatics (WCB09), 2009, 9 pages
|
In Proceedings of the Fifth Workshop on Constraint Based Methods
for Bioinformatics (WCB09), 2009, Lisbon
| null | null |
cs.CE q-bio.BM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Lattice protein models, as the Hydrophobic-Polar (HP) model, are a common
abstraction to enable exhaustive studies on structure, function, or evolution
of proteins. A main issue is the high number of optimal structures, resulting
from the hydrophobicity-based energy function applied. We introduce an
equivalence relation on protein structures that correlates to the energy
function. We discuss the efficient enumeration of optimal representatives of
the corresponding equivalence classes and the application of the results.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 15:18:27 GMT"
}
] | 2009-10-21T00:00:00 |
[
[
"Mann",
"Martin",
""
],
[
"Backofen",
"Rolf",
""
],
[
"Will",
"Sebastian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.BM",
"description": "DNA, RNA, proteins, lipids, etc.; molecular structures and folding kinetics; molecular interactions; single-molecule manipulation.",
"span": "(Biomolecules)"
}
] |
0910.3880
|
Martin Mann
|
Martin Mann, Mohamed Abou Hamra, Kathleen Steinh\"ofel, Rolf Backofen
|
Constraint-based Local Move Definitions for Lattice Protein Models
Including Side Chains
|
Published in Proceedings of the Fifth Workshop on Constraint Based
Methods for Bioinformatics (WCB09), 2009, 10 pages
|
In Proceedings of the Fifth Workshop on Constraint Based Methods
for Bioinformatics (WCB09), 2009, Lisbon
| null | null |
cs.CE q-bio.BM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The simulation of a protein's folding process is often done via stochastic
local search, which requires a procedure to apply structural changes onto a
given conformation. Here, we introduce a constraint-based approach to enumerate
lattice protein structures according to k-local moves in arbitrary lattices.
Our declarative description is much more flexible for extensions than standard
operational formulations. It enables a generic calculation of k-local neighbors
in backbone-only and side chain models. We exemplify the procedure using a
simple hierarchical folding scheme.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 15:37:52 GMT"
}
] | 2009-10-21T00:00:00 |
[
[
"Mann",
"Martin",
""
],
[
"Hamra",
"Mohamed Abou",
""
],
[
"Steinhöfel",
"Kathleen",
""
],
[
"Backofen",
"Rolf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.BM",
"description": "DNA, RNA, proteins, lipids, etc.; molecular structures and folding kinetics; molecular interactions; single-molecule manipulation.",
"span": "(Biomolecules)"
}
] |
0910.3883
|
Victor M. Preciado
|
Victor M. Preciado, Alireza Tahbaz-Salehi, and Ali Jadbabaie
|
Variance Analysis of Randomized Consensus in Switching Directed Networks
|
6 pages, 3 figures, submitted to American Control Conference 2010
| null | null | null |
cs.MA cs.DC cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we study the asymptotic properties of distributed consensus
algorithms over switching directed random networks. More specifically, we focus
on consensus algorithms over independent and identically distributed, directed
Erdos-Renyi random graphs, where each agent can communicate with any other
agent with some exogenously specified probability $p$. While it is well-known
that consensus algorithms over Erdos-Renyi random networks result in an
asymptotic agreement over the network, an analytical characterization of the
distribution of the asymptotic consensus value is still an open question. In
this paper, we provide closed-form expressions for the mean and variance of the
asymptotic random consensus value, in terms of the size of the network and the
probability of communication $p$. We also provide numerical simulations that
illustrate our results.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 16:05:58 GMT"
}
] | 2009-10-21T00:00:00 |
[
[
"Preciado",
"Victor M.",
""
],
[
"Tahbaz-Salehi",
"Alireza",
""
],
[
"Jadbabaie",
"Ali",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.3913
|
Radu Grigore
|
Mikolas Janota, Goetz Botterweck, Radu Grigore, Joao Marques-Silva
|
How to Complete an Interactive Configuration Process?
|
to appear in SOFSEM 2010
| null | null | null |
cs.SE cs.AI cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When configuring customizable software, it is useful to provide interactive
tool-support that ensures that the configuration does not breach given
constraints.
But, when is a configuration complete and how can the tool help the user to
complete it?
We formalize this problem and relate it to concepts from non-monotonic
reasoning well researched in Artificial Intelligence. The results are
interesting for both practitioners and theoreticians. Practitioners will find a
technique facilitating an interactive configuration process and experiments
supporting feasibility of the approach. Theoreticians will find links between
well-known formal concepts and a concrete practical application.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 17:30:33 GMT"
}
] | 2009-10-21T00:00:00 |
[
[
"Janota",
"Mikolas",
""
],
[
"Botterweck",
"Goetz",
""
],
[
"Grigore",
"Radu",
""
],
[
"Marques-Silva",
"Joao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.3928
|
Dimitris Katselis
|
Dimitris Katselis, Eleftherios Kofidis, Athanasios Rontogiannis and
Sergios Theodoridis
|
Preamble-Based Channel Estimation for CP-OFDM and OFDM/OQAM Systems: A
Comparative Study
| null | null |
10.1109/TSP.2010.2043129
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, preamble-based least squares (LS) channel estimation in OFDM
systems of the QAM and offset QAM (OQAM) types is considered, in both the
frequency and the time domains. The construction of optimal (in the mean
squared error (MSE) sense) preambles is investigated, for both the cases of
full (all tones carrying pilot symbols) and sparse (a subset of pilot tones,
surrounded by nulls or data) preambles. The two OFDM systems are compared for
the same transmit power, which, for cyclic prefix (CP) based OFDM/QAM, also
includes the power spent for CP transmission. OFDM/OQAM, with a sparse preamble
consisting of equipowered and equispaced pilots embedded in zeros, turns out to
perform at least as well as CP-OFDM. Simulations results are presented that
verify the analysis.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 18:10:54 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Katselis",
"Dimitris",
""
],
[
"Kofidis",
"Eleftherios",
""
],
[
"Rontogiannis",
"Athanasios",
""
],
[
"Theodoridis",
"Sergios",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.3959
|
Samson Abramsky
|
Samson Abramsky
|
Coalgebras, Chu Spaces, and Representations of Physical Systems
|
25 pages
| null | null | null |
quant-ph cs.LO math.CT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We revisit our earlier work on the representation of quantum systems as Chu
spaces, and investigate the use of coalgebra as an alternative framework. On
the one hand, coalgebras allow the dynamics of repeated measurement to be
captured, and provide mathematical tools such as final coalgebras, bisimulation
and coalgebraic logic. However, the standard coalgebraic framework does not
accommodate contravariance, and is too rigid to allow physical symmetries to be
represented. We introduce a fibrational structure on coalgebras in which
contravariance is represented by indexing. We use this structure to give a
universal semantics for quantum systems based on a final coalgebra
construction. We characterize equality in this semantics as projective
equivalence. We also define an analogous indexed structure for Chu spaces, and
use this to obtain a novel categorical description of the category of Chu
spaces. We use the indexed structures of Chu spaces and coalgebras over a
common base to define a truncation functor from coalgebras to Chu spaces. This
truncation functor is used to lift the full and faithful representation of the
groupoid of physical symmetries on Hilbert spaces into Chu spaces, obtained in
our previous work, to the coalgebraic semantics.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 20:26:35 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Abramsky",
"Samson",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
0910.3973
|
Jamshid Abouei
|
Jamshid Abouei, Alireza Bayesteh, and Amir K. Khandani
|
On the Delay-Throughput Tradeoff in Distributed Wireless Networks
|
Submitted to IEEE Transactions on Information Theory (34 pages)
| null |
10.1109/TIT.2011.2178138
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper deals with the delay-throughput analysis of a single-hop wireless
network with $n$ transmitter/receiver pairs. All channels are assumed to be
block Rayleigh fading with shadowing, described by parameters
$(\alpha,\varpi)$, where $\alpha$ denotes the probability of shadowing and
$\varpi$ represents the average cross-link gains. The analysis relies on the
distributed on-off power allocation strategy (i.e., links with a direct channel
gain above a certain threshold transmit at full power and the rest remain
silent) for the deterministic and stochastic packet arrival processes. It is
also assumed that each transmitter has a buffer size of one packet and dropping
occurs once a packet arrives in the buffer while the previous packet has not
been served. In the first part of the paper, we define a new notion of
performance in the network, called effective throughput, which captures the
effect of arrival process in the network throughput, and maximize it for
different cases of packet arrival process. It is proved that the effective
throughput of the network asymptotically scales as $\frac{\log
n}{\hat{\alpha}}$, with $\hat{\alpha} \triangleq \alpha \varpi$, regardless of
the packet arrival process. In the second part of the paper, we present the
delay characteristics of the underlying network in terms of the packet dropping
probability. We derive the sufficient conditions in the asymptotic case of $n
\to \infty$ such that the packet dropping probability tend to zero, while
achieving the maximum effective throughput of the network. Finally, we study
the trade-off between the effective throughput, delay, and packet dropping
probability of the network for different packet arrival processes.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 22:51:43 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Abouei",
"Jamshid",
""
],
[
"Bayesteh",
"Alireza",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.3975
|
Theodoros Dikaliotis
|
Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tracey Ho, Michelle
Effros
|
On the Delay of Network Coding over Line Networks
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We analyze a simple network where a source and a receiver are connected by a
line of erasure channels of different reliabilities. Recent prior work has
shown that random linear network coding can achieve the min-cut capacity and
therefore the asymptotic rate is determined by the worst link of the line
network. In this paper we investigate the delay for transmitting a batch of
packets, which is a function of all the erasure probabilities and the number of
packets in the batch. We show a monotonicity result on the delay function and
derive simple expressions which characterize the expected delay behavior of
line networks. Further, we use a martingale bounded differences argument to
show that the actual delay is tightly concentrated around its expectation.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 23:47:06 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Dikaliotis",
"Theodoros K.",
""
],
[
"Dimakis",
"Alexandros G.",
""
],
[
"Ho",
"Tracey",
""
],
[
"Effros",
"Michelle",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.3991
|
Xiaowen Zhang
|
Chi Sing Chum and Xiaowen Zhang
|
Improved Latin Square based Secret Sharing Scheme
| null | null | null | null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
This paper first reviews some basic properties of cryptographic hash
function, secret sharing scheme, and Latin square. Then we discuss why Latin
square or its critical set is a good choice for secret representation and its
relationship with secret sharing scheme. Further we enumerate the limitations
of Latin square in a secret sharing scheme. Finally we propose how to apply
cryptographic hash functions, herding attack technique to a Latin square based
secret sharing scheme to overcome these limitations.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 03:14:31 GMT"
},
{
"version": "v2",
"created": "Sun, 10 Jul 2011 19:50:31 GMT"
}
] | 2011-07-12T00:00:00 |
[
[
"Chum",
"Chi Sing",
""
],
[
"Zhang",
"Xiaowen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0910.4000
|
Damien Chablat
|
Raza Ur-Rehman (IRCCyN), St\'ephane Caro (IRCCyN), Damien Chablat
(IRCCyN), Philippe Wenger (IRCCyN)
|
Path placement optimization of manipulators based on energy consumption:
application to the orthoglide 3-axis
| null |
Transactions of the canadian society for mechanical engineering
(2009) 1-19
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper deals with the optimal path placement for a manipulator based on
energy consumption. It proposes a methodology to determine the optimal location
of a given test path within the workspace of a manipulator with minimal
electric energy used by the actuators while taking into account the geometric,
kinematic and dynamic constraints. The proposed methodology is applied to the
Orthoglide~3-axis, a three-degree-of-freedom translational parallel kinematic
machine (PKM), as an illustrative example.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 06:14:55 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Ur-Rehman",
"Raza",
"",
"IRCCyN"
],
[
"Caro",
"Stéphane",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0910.4012
|
Damien Chablat
|
Daniel Kanaan (IRCCyN), Philippe Wenger (IRCCyN), St\'ephane Caro
(IRCCyN), Damien Chablat (IRCCyN)
|
Singularity Analysis of Lower-Mobility Parallel Manipulators Using
Grassmann-Cayley Algebra
| null |
IEEE Transactions on Robotics 25, 5 (2009) 995-1004
|
10.1109/TRO.2009.2017132
| null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a methodology to analyze geometrically the
singularities of manipulators, of which legs apply both actuation forces and
constraint moments to their moving platform. Lower-mobility parallel
manipulators and parallel manipulators, of which some legs do not have any
spherical joint, are such manipulators. The geometric conditions associated
with the dependency of six Pl\"ucker vectors of finite lines or lines at
infinity constituting the rows of the inverse Jacobian matrix are formulated
using Grassmann-Cayley Algebra. Accordingly, the singularity conditions are
obtained in vector form. This study is illustrated with the singularity
analysis of four manipulators.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 08:01:59 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Kanaan",
"Daniel",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Caro",
"Stéphane",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0910.4024
|
Aubin Jarry
|
Florian Huc and Aubin Jarry
|
VRAC: Simulation Results #1
| null | null | null | null |
cs.NI cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In order to make full use of geographic routing techniques developed for
large scale networks, nodes must be localized. However, localization and
virtual localization techniques in sensor networks are dependent either on
expensive and sometimes unavailable hardware (e.g. GPS) or on sophisticated
localization calculus (e.g. triangulation) which are both error-prone and with
a costly overhead.
Instead of localizing nodes in a traditional 2-dimensional space, we use
directly the raw distance to a set of anchors to route messages in a
multi-dimensional space. This should enable us to use any geographic routing
protocol in a robust and efficient manner in a very large range of scenarios.
We test this technique for two different geographic routing algorithms, namely
GRIC and ROAM. The simulation results show that using the raw coordinates does
not decrease their efficiency.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 08:58:15 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Huc",
"Florian",
""
],
[
"Jarry",
"Aubin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0910.4033
|
EPTCS
|
Han Chen (School of Electronic Engineering and Computer Science, Queen
Mary University of London), Pasquale Malacaria (School of Electronic
Engineering and Computer Science, Queen Mary University of London)
|
Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions
| null |
EPTCS 7, 2009, pp. 1-15
|
10.4204/EPTCS.7.1
| null |
cs.CR cs.IT cs.LO cs.PL math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When studying the information leakage in programs or protocols, a natural
question arises: "what is the worst case scenario?". This problem of
identifying the maximal leakage can be seen as a channel capacity problem in
the information theoretical sense. In this paper, by combining two powerful
theories: Information Theory and Karush-Kuhn-Tucker conditions, we demonstrate
a very general solution to the channel capacity problem. Examples are given to
show how our solution can be applied to practical contexts of programs and
anonymity protocols, and how this solution generalizes previous approaches to
this problem.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 10:04:45 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Chen",
"Han",
"",
"School of Electronic Engineering and Computer Science, Queen\n Mary University of London"
],
[
"Malacaria",
"Pasquale",
"",
"School of Electronic\n Engineering and Computer Science, Queen Mary University of London"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.4042
|
Hector Zenil
|
Hector Zenil
|
Compression-based investigation of the dynamical properties of cellular
automata and other systems
|
28 pages. This version includes the conjecture relating the
transition coefficient to computational universality. Camera ready version
|
Journal of Complex Systems, 19(1), 2010
| null | null |
cs.CC nlin.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A method for studying the qualitative dynamical properties of abstract
computing machines based on the approximation of their program-size complexity
using a general lossless compression algorithm is presented. It is shown that
the compression-based approach classifies cellular automata (CA) into clusters
according to their heuristic behavior, with these clusters showing a
correspondence with Wolfram's main classes of CA behavior. A compression based
method to estimate a characteristic exponent to detect phase transitions and
measure the resiliency or sensitivity of a system to its initial conditions is
also proposed. A conjecture regarding the capability of a system to reach
computational universality related to the values of this phase transition
coefficient is formulated. These ideas constitute a compression-based framework
for investigating the dynamical properties of cellular automata and other
systems.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 10:33:50 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Aug 2010 04:54:31 GMT"
},
{
"version": "v3",
"created": "Wed, 29 Sep 2010 18:46:45 GMT"
},
{
"version": "v4",
"created": "Fri, 21 Jan 2011 18:17:18 GMT"
}
] | 2011-01-24T00:00:00 |
[
[
"Zenil",
"Hector",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
}
] |
0910.4044
|
EPTCS
|
Jun Pang (University of Luxembourg), Chenyi Zhang (University of
Luxembourg)
|
How to Work with Honest but Curious Judges? (Preliminary Report)
| null |
EPTCS 7, 2009, pp. 31-45
|
10.4204/EPTCS.7.3
| null |
cs.CR cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The three-judges protocol, recently advocated by Mclver and Morgan as an
example of stepwise refinement of security protocols, studies how to securely
compute the majority function to reach a final verdict without revealing each
individual judge's decision. We extend their protocol in two different ways for
an arbitrary number of 2n+1 judges. The first generalisation is inherently
centralised, in the sense that it requires a judge as a leader who collects
information from others, computes the majority function, and announces the
final result. A different approach can be obtained by slightly modifying the
well-known dining cryptographers protocol, however it reveals the number of
votes rather than the final verdict. We define a notion of conditional
anonymity in order to analyse these two solutions. Both of them have been
checked in the model checker MCMAS.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 10:53:36 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Pang",
"Jun",
"",
"University of Luxembourg"
],
[
"Zhang",
"Chenyi",
"",
"University of\n Luxembourg"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0910.4049
|
Nizami Gasilov
|
N. Gasilov, \c{S}ahin Emrah Amrahov, A. Golayoglu Fatullayev, H. I.
Karakas, O. Akin
|
A Geometric Approach to Solve Fuzzy Linear Systems
| null |
CMES: Computer Modeling in Engineering & Sciences, Vol. 75, No. 3,
pp. 189-204, 2011
|
10.3970/cmes.2011.075.189
| null |
cs.NA math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, linear systems with a crisp real coefficient matrix and with a
vector of fuzzy triangular numbers on the right-hand side are studied. A new
method, which is based on the geometric representations of linear
transformations, is proposed to find solutions. The method uses the fact that a
vector of fuzzy triangular numbers forms a rectangular prism in n-dimensional
space and that the image of a parallelepiped is also a parallelepiped under a
linear transformation. The suggested method clarifies why in general case
different approaches do not generate solutions as fuzzy numbers. It is
geometrically proved that if the coefficient matrix is a generalized
permutation matrix, then the solution of a fuzzy linear system (FLS) is a
vector of fuzzy numbers irrespective of the vector on the right-hand side. The
most important difference between this and previous papers on FLS is that the
solution is sought as a fuzzy set of vectors (with real components) rather than
a vector of fuzzy numbers. Each vector in the solution set solves the given FLS
with a certain possibility. The suggested method can also be applied in the
case when the right-hand side is a vector of fuzzy numbers in parametric form.
However, in this case, -cuts of the solution can not be determined by geometric
similarity and additional computations are needed.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 11:20:37 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Apr 2011 08:06:58 GMT"
}
] | 2011-11-03T00:00:00 |
[
[
"Gasilov",
"N.",
""
],
[
"Amrahov",
"Şahin Emrah",
""
],
[
"Fatullayev",
"A. Golayoglu",
""
],
[
"Karakas",
"H. I.",
""
],
[
"Akin",
"O.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
0910.4052
|
Andrei Yafimau
|
Andrei I. Yafimau
|
Virtual-Threading: Advanced General Purpose Processors Architecture
|
56 pages, 5 PNG figures
| null | null | null |
cs.AR cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper describes the new computers architecture, the main features of
which has been claimed in the Russian Federation patent 2312388 and in the US
patent application 11/991331. This architecture is intended to effective
support of the General Purpose Parallel Computing (GPPC), the essence of which
is extremely frequent switching of threads between states of activity and
states of viewed in the paper the algorithmic latency. To emphasize the same
impact of the architectural latency and the algorithmic latency upon GPPC, is
introduced the new notion of the generalized latency and is defined its
quantitative measure - the Generalized Latency Tolerance (GLT). It is shown
that a well suited for GPPC implementation architecture should have high level
of GLT and is described such architecture, which is called the Virtual-Threaded
Machine. This architecture originates a processor virtualization in the
direction of activities virtualization, which is orthogonal to the well-known
direction of memory virtualization. The key elements of the architecture are 1)
the distributed fine grain representation of the architectural register file,
which elements are hardware swapped through levels of a microarchitectural
memory, 2) the prioritized fine grain direct hardware multiprogramming, 3) the
access controlled virtual addressing and 4) the hardware driven semaphores. The
composition of these features lets to introduce new styles of operating system
(OS) programming, which is free of interruptions, and of applied programming
with a very rare using the OS services.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 11:31:14 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Yafimau",
"Andrei I.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0910.4053
|
EPTCS
|
Qurat ul Ain Nizamani (Department of Computer Science, University of
Leicester, UK), Emilio Tuosto (Department of Computer Science, University of
Leicester, UK)
|
Heuristic Methods for Security Protocols
| null |
EPTCS 7, 2009, pp. 61-75
|
10.4204/EPTCS.7.5
| null |
cs.CR cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Model checking is an automatic verification technique to verify hardware and
software systems. However it suffers from state-space explosion problem. In
this paper we address this problem in the context of cryptographic protocols by
proposing a security property-dependent heuristic. The heuristic weights the
state space by exploiting the security formulae; the weights may then be used
to explore the state space when searching for attacks.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 13:30:10 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Nizamani",
"Qurat ul Ain",
"",
"Department of Computer Science, University of\n Leicester, UK"
],
[
"Tuosto",
"Emilio",
"",
"Department of Computer Science, University of\n Leicester, UK"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0910.4056
|
EPTCS
|
Filippo Del Tedesco (Chalmers University of Technology, Gothenburg,
Sweden), David Sands (Chalmers University of Technology, Gothenburg, Sweden)
|
A User Model for Information Erasure
| null |
EPTCS 7, 2009, pp. 16-30
|
10.4204/EPTCS.7.2
| null |
cs.CR cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hunt and Sands (ESOP'08) studied a notion of information erasure for systems
which receive secrets intended for limited-time use. Erasure demands that once
a secret has fulfilled its purpose the subsequent behaviour of the system
should reveal no information about the erased data. In this paper we address a
shortcoming in that work: for erasure to be possible the user who provides data
must also play his part, but previously that role was only specified
informally. Here we provide a formal model of the user and a collection of
requirements called erasure friendliness. We prove that an erasure-friendly
user can be composed with an erasing system (in the sense of Hunt and Sands) to
obtain a combined system which is jointly erasing in an appropriate sense. In
doing so we identify stronger requirements on the user than those informally
described in the previous work.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 13:23:59 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Del Tedesco",
"Filippo",
"",
"Chalmers University of Technology, Gothenburg,\n Sweden"
],
[
"Sands",
"David",
"",
"Chalmers University of Technology, Gothenburg, Sweden"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0910.4081
|
Jakob Grue Simonsen Dr
|
Jeroen Ketema, Jakob Grue Simonsen
|
Infinitary Combinatory Reduction Systems: Confluence
| null |
Logical Methods in Computer Science, Volume 5, Issue 4 (December
20, 2009) lmcs:840
|
10.2168/LMCS-5(4:3)2009
| null |
cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study confluence in the setting of higher-order infinitary rewriting, in
particular for infinitary Combinatory Reduction Systems (iCRSs). We prove that
fully-extended, orthogonal iCRSs are confluent modulo identification of
hypercollapsing subterms. As a corollary, we obtain that fully-extended,
orthogonal iCRSs have the normal form property and the unique normal form
property (with respect to reduction). We also show that, unlike the case in
first-order infinitary rewriting, almost non-collapsing iCRSs are not
necessarily confluent.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 13:15:22 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Dec 2009 16:29:37 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"Ketema",
"Jeroen",
""
],
[
"Simonsen",
"Jakob Grue",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0910.4084
|
Andrew Gillette
|
Chandrajit Bajaj, Andrew Gillette, Samrat Goswami, Bong June Kwon, and
Jose Rivera
|
Complementary Space for Enhanced Uncertainty and Dynamics Visualization
|
12 pages. To appear as a chapter in "Topological Data Analysis and
Visualization: Theory, Algorithms and Applications", Pascucci, Tricoche,
Hagen, Tierny, Eds., Springer-Verlag, in publication, 2009
| null | null | null |
cs.CG cs.GR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Given a computer model of a physical object, it is often quite difficult to
visualize and quantify any global effects on the shape representation caused by
local uncertainty and local errors in the data. This problem is further
amplified when dealing with hierarchical representations containing varying
levels of detail and / or shapes undergoing dynamic deformations. In this
paper, we compute, quantify and visualize the complementary topological and
geometrical features of 3D shape models, namely, the tunnels, pockets and
internal voids of the object. We find that this approach sheds a unique light
on how a model is affected by local uncertainty, errors or modifications and
show how the presence or absence of complementary shape features can be
essential to an object's structural form and function.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 22:00:54 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Bajaj",
"Chandrajit",
""
],
[
"Gillette",
"Andrew",
""
],
[
"Goswami",
"Samrat",
""
],
[
"Kwon",
"Bong June",
""
],
[
"Rivera",
"Jose",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0910.4116
|
M Sabu THAMPI
|
Sabu M. Thampi
|
Swarm Intelligence
| null | null | null | null |
cs.NE cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Biologically inspired computing is an area of computer science which uses the
advantageous properties of biological systems. It is the amalgamation of
computational intelligence and collective intelligence. Biologically inspired
mechanisms have already proved successful in achieving major advances in a wide
range of problems in computing and communication systems. The consortium of
bio-inspired computing are artificial neural networks, evolutionary algorithms,
swarm intelligence, artificial immune systems, fractal geometry, DNA computing
and quantum computing, etc. This article gives an introduction to swarm
intelligence.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 15:02:12 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Thampi",
"Sabu M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.4122
|
Raghu Meka
|
Raghu Meka, David Zuckerman
|
Pseudorandom Generators for Polynomial Threshold Functions
|
Revision 5: Updated to the journal version to appear in SICOMP.
Revision 4: Improves seed-length for halfspaces to O(log n + log^2(1/eps))
(the change in analysis is minor: use INW PRG instead of Nisan's PRG).
Revision 3: Fixed some more minor errors (mainly in proof of Theorem 4.3).
Revision 2: Corrected the non-explicit bound to O(d log n + log(1/eps)) and
some minor typos
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the natural question of constructing pseudorandom generators (PRGs)
for low-degree polynomial threshold functions (PTFs). We give a PRG with
seed-length log n/eps^{O(d)} fooling degree d PTFs with error at most eps.
Previously, no nontrivial constructions were known even for quadratic threshold
functions and constant error eps. For the class of degree 1 threshold functions
or halfspaces, we construct PRGs with much better dependence on the error
parameter eps and obtain a PRG with seed-length O(log n + log^2(1/eps)).
Previously, only PRGs with seed length O(log n log^2(1/eps)/eps^2) were known
for halfspaces. We also obtain PRGs with similar seed lengths for fooling
halfspaces over the n-dimensional unit sphere.
The main theme of our constructions and analysis is the use of invariance
principles to construct pseudorandom generators. We also introduce the notion
of monotone read-once branching programs, which is key to improving the
dependence on the error rate eps for halfspaces. These techniques may be of
independent interest.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 15:48:00 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Nov 2009 21:50:20 GMT"
},
{
"version": "v3",
"created": "Thu, 17 Dec 2009 17:16:04 GMT"
},
{
"version": "v4",
"created": "Thu, 11 Nov 2010 18:25:40 GMT"
},
{
"version": "v5",
"created": "Tue, 15 Nov 2011 14:41:26 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Meka",
"Raghu",
""
],
[
"Zuckerman",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.4128
|
Mustafa Cenk Gursoy
|
Mustafa Cenk Gursoy
|
Secure Communication in the Low-SNR Regime
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Secrecy capacity of a multiple-antenna wiretap channel is studied in the low
signal-to-noise ratio (SNR) regime. Expressions for the first and second
derivatives of the secrecy capacity with respect to SNR at SNR = 0 are derived.
Transmission strategies required to achieve these derivatives are identified.
In particular, it is shown that it is optimal in the low-SNR regime to transmit
in the maximal-eigenvalue eigenspace of Phi = H_m* H_m - N_m/N_e H_e* H_e where
H_m and H_e denote the channel matrices associated with the legitimate receiver
and eavesdropper, respectively, and N_m and N_e are the noise variances at the
receiver and eavesdropper, respectively. Energy efficiency is analyzed by
finding the minimum bit energy required for secure and reliable communications,
and the wideband slope. Increased bit energy requirements under secrecy
constraints are quantified. Finally, the impact of fading is investigated, and
the benefits of fading in terms of energy efficiency are shown.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 16:15:50 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Gursoy",
"Mustafa Cenk",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.4130
|
Mustafa Cenk Gursoy
|
Deli Qiao, Mustafa Cenk Gursoy, and Senem Velipasalar
|
On the Achievable Throughput Region of Multiple-Access Fading Channels
with QoS Constraints
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Effective capacity, which provides the maximum constant arrival rate that a
given service process can support while satisfying statistical delay
constraints, is analyzed in a multiuser scenario. In particular, we study the
achievable effective capacity region of the users in multiaccess fading
channels (MAC) in the presence of quality of service (QoS) constraints. We
assume that channel side information (CSI) is available at both the
transmitters and the receiver, and superposition coding technique with
successive decoding is used. When the power is fixed at the transmitters, we
show that varying the decoding order with respect to the channel state can
significantly increase the achievable throughput region. For a two-user case,
we obtain the optimal decoding strategy when the users have the same QoS
constraints. Meanwhile, it is shown that time-division multiple-access (TDMA)
can achieve better performance than superposition coding with fixed successive
decoding order at the receiver side for certain QoS constraints. For power and
rate adaptation, we determine the optimal power allocation policy with fixed
decoding order at the receiver side. Numerical results are provided to
demonstrate our results.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 16:21:04 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Oct 2009 17:01:07 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Qiao",
"Deli",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
],
[
"Velipasalar",
"Senem",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.4132
|
Mustafa Cenk Gursoy
|
Junwei Zhang and Mustafa Cenk Gursoy
|
Collaborative Relay Beamforming for Secrecy
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, collaborative use of relays to form a beamforming system with
the aid of perfect channel state information (CSI) and to provide
physical-layer security is investigated. In particular, a
decode-and-forward-based relay beamforming design subject to total and
individual relay power constraints is studied with the goal of maximizing the
secrecy rate. It is shown that the total power constraint leads to a
closed-form solution. The design under individual relay power constraints is
formulated as an optimization problem which is shown to be easily solved using
two different approaches, namely semidefinite programming and second-order cone
programming. Furthermore, a simplified and suboptimal technique which reduces
the computation complexity under individual power constraints is presented.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 16:24:34 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Zhang",
"Junwei",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.4144
|
Li Chen
|
Li Chen, Soma Biswas
|
Digital Curvatures Applied to 3D Object Analysis and Recognition: A Case
Study
|
10 pages, 11 figures
| null | null | null |
cs.CG cs.DM
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
In this paper, we propose using curvatures in digital space for 3D object
analysis and recognition. Since direct adjacency has only six types of digital
surface points in local configurations, it is easy to determine and classify
the discrete curvatures for every point on the boundary of a 3D object. Unlike
the boundary simplicial decomposition (triangulation), the curvature can take
any real value. It sometimes makes difficulties to find a right value for
threshold. This paper focuses on the global properties of categorizing
curvatures for small regions. We use both digital Gaussian curvatures and
digital mean curvatures to 3D shapes. This paper proposes a multi-scale method
for 3D object analysis and a vector method for 3D similarity classification. We
use these methods for face recognition and shape classification. We have found
that the Gaussian curvatures mainly describe the global features and average
characteristics such as the five regions of a human face. However, mean
curvatures can be used to find local features and extreme points such as nose
in 3D facial data.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 18:15:04 GMT"
}
] | 2009-10-22T00:00:00 |
[
[
"Chen",
"Li",
""
],
[
"Biswas",
"Soma",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.4172
|
Minghui Jiang
|
Adrian Dumitrescu and Minghui Jiang
|
Piercing translates and homothets of a convex body
|
An earlier version of this manuscript appeared in ESA 2009
| null | null | null |
cs.CG cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
According to a classical result of Gr\"unbaum, the transversal number
$\tau(\F)$ of any family $\F$ of pairwise-intersecting translates or homothets
of a convex body $C$ in $\RR^d$ is bounded by a function of $d$. Denote by
$\alpha(C)$ (resp. $\beta(C)$) the supremum of the ratio of the transversal
number $\tau(\F)$ to the packing number $\nu(\F)$ over all families $\F$ of
translates (resp. homothets) of a convex body $C$ in $\RR^d$. Kim et al.
recently showed that $\alpha(C)$ is bounded by a function of $d$ for any convex
body $C$ in $\RR^d$, and gave the first bounds on $\alpha(C)$ for convex bodies
$C$ in $\RR^d$ and on $\beta(C)$ for convex bodies $C$ in the plane.
Here we show that $\beta(C)$ is also bounded by a function of $d$ for any
convex body $C$ in $\RR^d$, and present new or improved bounds on both
$\alpha(C)$ and $\beta(C)$ for various convex bodies $C$ in $\RR^d$ for all
dimensions $d$. Our techniques explore interesting inequalities linking the
covering and packing densities of a convex body. Our methods for obtaining
upper bounds are constructive and lead to efficient constant-factor
approximation algorithms for finding a minimum-cardinality point set that
pierces a set of translates or homothets of a convex body.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 20:30:19 GMT"
}
] | 2009-10-23T00:00:00 |
[
[
"Dumitrescu",
"Adrian",
""
],
[
"Jiang",
"Minghui",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.4179
|
Goutam Paul
|
Sounak Gupta and Goutam Paul
|
Revisiting Fermat's Factorization for the RSA Modulus
| null | null | null | null |
cs.CR cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We revisit Fermat's factorization method for a positive integer $n$ that is a
product of two primes $p$ and $q$. Such an integer is used as the modulus for
both encryption and decryption operations of an RSA cryptosystem. The security
of RSA relies on the hardness of factoring this modulus. As a consequence of
our analysis, two variants of Fermat's approach emerge. We also present a
comparison between the two methods' effective regions. Though our study does
not yield a new state-of-the-art algorithm for integer factorization, we
believe that it reveals some interesting observations that are open for further
analysis.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 21:13:55 GMT"
}
] | 2009-10-23T00:00:00 |
[
[
"Gupta",
"Sounak",
""
],
[
"Paul",
"Goutam",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.4186
|
Hsien-Po Shiang
|
Hsien-Po Shiang, Mihaela van der Schaar
|
Media-TCP: A Quality-Centric TCP-Friendly Congestion Control for
Multimedia Transmission
|
15 pages, 8 figures, 4 tables, and 2 algorithms
| null | null | null |
cs.NI cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a quality-centric congestion control for multimedia
streaming over IP networks, which we refer to as media-TCP. Unlike existing
congestion control schemes that adapt a user's sending rate merely to the
network condition, our solution adapts the sending rate to both the network
condition and the application characteristics by explicitly considering the
distortion impacts, delay deadlines, and interdependencies of different video
packet classes. Hence, our media-aware solution is able to provide differential
services for transmitting various packet classes and thereby, further improves
the multimedia streaming quality. We model this problem using a Finite-Horizon
Markov Decision Process (FHMDP) and determine the optimal congestion control
policy that maximizes the long-term multimedia quality, while adhering to the
horizon- TCP-friendliness constraint, which ensures long-term fairness with
existing TCP applications. We show that the FHMDP problem can be decomposed
into multiple optimal stopping problems, which admit a low-complexity
threshold-based solution. Moreover, unlike existing congestion control
approaches, which focus on maintaining throughput-based fairness among users,
the proposed media-TCP aims to achieve quality-based fairness among multimedia
users. We also derive sufficient conditions for multiple multimedia users to
achieve quality-based fairness using media-TCP congestion control. Our
simulation results show that the proposed media-TCP achieves more than 3dB
improvement in terms of PSNR over the conventional TCP congestion control
approaches, with the largest improvements observed for real-time streaming
applications requiring stringent playback delays.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 21:53:25 GMT"
}
] | 2009-10-23T00:00:00 |
[
[
"Shiang",
"Hsien-Po",
""
],
[
"van der Schaar",
"Mihaela",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0910.4214
|
Sahand Haji Ali Ahmad
|
Sahand Haji Ali Ahmad, Mingyan Liu, Yunnan Wu
|
Congestion games with resource reuse and applications in spectrum
sharing
|
9 pages, 3 figures, International Conference on Game Theory for
Networks (GameNets), May 2009, Istanbul, Turkey
| null | null | null |
cs.GT cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we consider an extension to the classical definition of
congestion games (CG) in which multiple users share the same set of resources
and their payoff for using any resource is a function of the total number of
users sharing it. The classical congestion games enjoy some very appealing
properties, including the existence of a Nash equilibrium and that every
improvement path is finite and leads to such a NE (also called the finite
improvement property or FIP), which is also a local optimum to a potential
function. On the other hand, this class of games does not model well the
congestion or resource sharing in a wireless context, a prominent feature of
which is spatial reuse. What this translates to in the context of a congestion
game is that a users payoff for using a resource (interpreted as a channel) is
a function of the its number of its interfering users sharing that channel,
rather than the total number among all users. This makes the problem quite
different. We will call this the congestion game with resource reuse (CG-RR).
In this paper we study intrinsic properties of such a game; in particular, we
seek to address under what conditions on the underlying network this game
possesses the FIP or NE. We also discuss the implications of these results when
applied to wireless spectrum sharing
|
[
{
"version": "v1",
"created": "Thu, 22 Oct 2009 01:47:39 GMT"
}
] | 2009-10-23T00:00:00 |
[
[
"Ahmad",
"Sahand Haji Ali",
""
],
[
"Liu",
"Mingyan",
""
],
[
"Wu",
"Yunnan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0910.4224
|
Alexander A. Sherstov
|
Alexander A. Sherstov
|
Optimal bounds for sign-representing the intersection of two halfspaces
by polynomials
|
A few minor simplifications added
|
In Proceedings of the 42nd ACM Symposium on Theory of Computing
(STOC 2010)
| null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The threshold degree of a function f:{0,1}^n->{-1,+1} is the least degree of
a real polynomial p with f(x)=sgn p(x). We prove that the intersection of two
halfspaces on {0,1}^n has threshold degree Omega(n), which matches the trivial
upper bound and completely answers a question due to Klivans (2002). The best
previous lower bound was Omega(sqrt n). Our result shows that the intersection
of two halfspaces on {0,1}^n only admits a trivial 2^{Theta(n)}-time learning
algorithm based on sign-representation by polynomials, unlike the advances
achieved in PAC learning DNF formulas and read-once Boolean formulas. The proof
introduces a new technique of independent interest, based on Fourier analysis
and matrix theory.
|
[
{
"version": "v1",
"created": "Thu, 22 Oct 2009 04:05:31 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Feb 2010 22:27:37 GMT"
}
] | 2010-02-25T00:00:00 |
[
[
"Sherstov",
"Alexander A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.4266
|
Hartmut Klauck
|
Rahul Jain, Hartmut Klauck
|
The Partition Bound for Classical Communication Complexity and Query
Complexity
|
28 pages, ver. 2, added content
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe new lower bounds for randomized communication complexity and
query complexity which we call the partition bounds. They are expressed as the
optimum value of linear programs. For communication complexity we show that the
partition bound is stronger than both the rectangle/corruption bound and the
\gamma_2/generalized discrepancy bounds. In the model of query complexity we
show that the partition bound is stronger than the approximate polynomial
degree and classical adversary bounds. We also exhibit an example where the
partition bound is quadratically larger than polynomial degree and classical
adversary bounds.
|
[
{
"version": "v1",
"created": "Thu, 22 Oct 2009 09:40:58 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Nov 2009 03:53:09 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Jain",
"Rahul",
""
],
[
"Klauck",
"Hartmut",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.4292
|
Vassilis Kostakos
|
Vassilis Kostakos
|
An empirical study of spatial and transpatial social networks using
Bluetooth and Facebook
|
17 pages,4 figures, 1 table
|
IEEE SocialCom, p. 587-594, 2010
|
10.1109/SocialCom.2010.181
| null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This study provides insights into the quantitative similarities, differences
and relationships between users' spatial, face-to-face, urban social networks
and their transpatial, online counterparts. We explore and map the social ties
within a cohort of 2602 users, and how those ties are mediated via physical
co-presence and online tools. Our analysis focused on isolating two distinct
segments of the social network: one mediated by physical co-presence, and the
other mediated by Facebook. Our results suggest that as a whole the networks
exhibit homogeneous characteristics, but individuals' involvement in those
networks varies considerably. Furthermore this study provides a methodological
approach for jointly analysing spatial & transpatial networks utilising
pervasive and ubiquitous technology.
|
[
{
"version": "v1",
"created": "Thu, 22 Oct 2009 11:09:02 GMT"
}
] | 2013-06-06T00:00:00 |
[
[
"Kostakos",
"Vassilis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0910.4307
|
Nizami Gasilov
|
N. Gasilov, Sh. G. Amrahov, A. Golayoglu Fatullayev
|
A Geometric Approach to Solve Fuzzy Linear Systems of Differential
Equations
|
13 pages, 3 figures
|
Appl. Math. Inf. Sci. 5, 3 (2011) pp. 484-499
| null | null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, systems of linear differential equations with crisp real
coefficients and with initial condition described by a vector of fuzzy numbers
are studied. A new method based on the geometric representations of linear
transformations is proposed to find a solution. The most important difference
between this method and methods offered in previous papers is that the solution
is considered to be a fuzzy set of real vector-functions rather than a fuzzy
vector-function. Each member of the set satisfies the given system with a
certain possibility. It is shown that at any time the solution constitutes a
fuzzy region in the coordinate space, alfa-cuts of which are nested
parallelepipeds. Proposed method is illustrated on examples.
|
[
{
"version": "v1",
"created": "Thu, 22 Oct 2009 12:24:33 GMT"
}
] | 2011-11-03T00:00:00 |
[
[
"Gasilov",
"N.",
""
],
[
"Amrahov",
"Sh. G.",
""
],
[
"Fatullayev",
"A. Golayoglu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0910.4325
|
Simon Blackburn
|
Simon R. Blackburn, Maura B. Paterson and Douglas R. Stinson
|
Putting Dots in Triangles
|
10 pages Minor rephrasing: final version to submit to journal.
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a right-angled triangle of squares in a grid whose horizontal and
vertical sides are $n$ squares long, let N(n) denote the maximum number of dots
that can be placed into the cells of the triangle such that each row, each
column, and each diagonal parallel to the long side of the triangle contains at
most one dot. It has been proven that
$N(n) = \lfloor \frac{2n+1}{3} \rfloor$.
In this note, we give a new proof of this result using linear programming
techniques.
|
[
{
"version": "v1",
"created": "Thu, 22 Oct 2009 13:35:51 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Nov 2009 14:10:14 GMT"
},
{
"version": "v3",
"created": "Tue, 18 May 2010 14:27:23 GMT"
}
] | 2010-05-19T00:00:00 |
[
[
"Blackburn",
"Simon R.",
""
],
[
"Paterson",
"Maura B.",
""
],
[
"Stinson",
"Douglas R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.4336
|
G David Forney Jr.
|
G. David Forney Jr
|
Minimal realizations of linear systems: The "shortest basis" approach
|
20 pages. Final version, to appear in special issue of IEEE
Transactions on Information Theory on "Facets of coding theory: From
algorithms to networks," dedicated to Ralf Koetter
| null | null | null |
cs.IT cs.SY math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a controllable discrete-time linear system C, a shortest basis for C is
a set of linearly independent generators for C with the least possible lengths.
A basis B is a shortest basis if and only if it has the predictable span
property (i.e., has the predictable delay and degree properties, and is
non-catastrophic), or alternatively if and only if it has the subsystem basis
property (for any interval J, the generators in B whose span is in J is a basis
for the subsystem C_J). The dimensions of the minimal state spaces and minimal
transition spaces of C are simply the numbers of generators in a shortest basis
B that are active at any given state or symbol time, respectively. A minimal
linear realization for C in controller canonical form follows directly from a
shortest basis for C, and a minimal linear realization for C in observer
canonical form follows directly from a shortest basis for the orthogonal system
C^\perp. This approach seems conceptually simpler than that of classical
minimal realization theory.
|
[
{
"version": "v1",
"created": "Thu, 22 Oct 2009 14:23:28 GMT"
},
{
"version": "v2",
"created": "Mon, 10 May 2010 18:15:57 GMT"
},
{
"version": "v3",
"created": "Tue, 24 Aug 2010 18:41:44 GMT"
}
] | 2010-12-17T00:00:00 |
[
[
"Forney",
"G. David",
"Jr"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0910.4342
|
Steve Kremer
|
Joshua D. Guttman (The MITRE Corporation and Worcester Polytechnic
Institute)
|
Fair Exchange in Strand Spaces
| null |
EPTCS 7, 2009, pp. 46-60
|
10.4204/EPTCS.7.4
| null |
cs.CR cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many cryptographic protocols are intended to coordinate state changes among
principals. Exchange protocols coordinate delivery of new values to the
participants, e.g. additions to the set of values they possess. An exchange
protocol is fair if it ensures that delivery of new values is balanced: If one
participant obtains a new possession via the protocol, then all other
participants will, too. Fair exchange requires progress assumptions, unlike
some other protocol properties. The strand space model is a framework for
design and verification of cryptographic protocols. A strand is a local
behavior of a single principal in a single session of a protocol. A bundle is a
partially ordered global execution built from protocol strands and adversary
activities. The strand space model needs two additions for fair exchange
protocols. First, we regard the state as a multiset of facts, and we allow
strands to cause changes in this state via multiset rewriting. Second, progress
assumptions stipulate that some channels are resilient-and guaranteed to
deliver messages-and some principals are assumed not to stop at certain
critical steps. This method leads to proofs of correctness that cleanly
separate protocol properties, such as authentication and confidentiality, from
invariants governing state evolution. G. Wang's recent fair exchange protocol
illustrates the approach.
|
[
{
"version": "v1",
"created": "Thu, 22 Oct 2009 17:13:44 GMT"
}
] | 2009-10-23T00:00:00 |
[
[
"Guttman",
"Joshua D.",
"",
"The MITRE Corporation and Worcester Polytechnic\n Institute"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0910.4353
|
Paul Vitanyi
|
Sebastiaan A. Terwijn (University of Amsterdam), Leen Torenvliet
(University of Amsterdam), and Paul M.B. Vitanyi (CWI and University of
Amsterdam)
|
Nonapproximablity of the Normalized Information Distance
|
LaTeX 8 pages, Submitted. 2nd version corrected some typos
| null | null | null |
cs.CC cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Normalized information distance (NID) uses the theoretical notion of
Kolmogorov complexity, which for practical purposes is approximated by the
length of the compressed version of the file involved, using a real-world
compression program. This practical application is called `normalized
compression distance' and it is trivially computable. It is a parameter-free
similarity measure based on compression, and is used in pattern recognition,
data mining, phylogeny, clustering, and classification. The complexity
properties of its theoretical precursor, the NID, have been open. We show that
the NID is neither upper semicomputable nor lower semicomputable up to any
reasonable precision.
|
[
{
"version": "v1",
"created": "Thu, 22 Oct 2009 16:06:34 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Oct 2009 16:26:40 GMT"
}
] | 2009-10-23T00:00:00 |
[
[
"Terwijn",
"Sebastiaan A.",
"",
"University of Amsterdam"
],
[
"Torenvliet",
"Leen",
"",
"University of Amsterdam"
],
[
"Vitanyi",
"Paul M. B.",
"",
"CWI and University of\n Amsterdam"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.4397
|
Robert Nowak
|
Robert D. Nowak
|
The Geometry of Generalized Binary Search
|
corrected typo in Thm 3
| null | null | null |
stat.ML cs.IT math.IT math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper investigates the problem of determining a binary-valued function
through a sequence of strategically selected queries. The focus is an algorithm
called Generalized Binary Search (GBS). GBS is a well-known greedy algorithm
for determining a binary-valued function through a sequence of strategically
selected queries. At each step, a query is selected that most evenly splits the
hypotheses under consideration into two disjoint subsets, a natural
generalization of the idea underlying classic binary search. This paper
develops novel incoherence and geometric conditions under which GBS achieves
the information-theoretically optimal query complexity; i.e., given a
collection of N hypotheses, GBS terminates with the correct function after no
more than a constant times log N queries. Furthermore, a noise-tolerant version
of GBS is developed that also achieves the optimal query complexity. These
results are applied to learning halfspaces, a problem arising routinely in
image processing and machine learning.
|
[
{
"version": "v1",
"created": "Thu, 22 Oct 2009 20:21:49 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Oct 2009 14:45:30 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Aug 2011 19:46:15 GMT"
},
{
"version": "v4",
"created": "Mon, 8 Aug 2011 18:39:47 GMT"
},
{
"version": "v5",
"created": "Tue, 25 Jun 2013 15:59:32 GMT"
}
] | 2013-06-26T00:00:00 |
[
[
"Nowak",
"Robert D.",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0910.4420
|
EPTCS
|
Michele Boreale, Steve Kremer
|
Proceedings 7th International Workshop on Security Issues in Concurrency
| null |
EPTCS 7, 2009
|
10.4204/EPTCS.7
| null |
cs.CR cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This volume contains the proceedings of the 7th Workshop on Security Issues
in Concurrency (SecCo'09). The workshop was held in Bologna, Italy on September
5th 2009, as a satellite workshop of CONCUR'09. The aim of the SecCo workshop
series is to cover the gap between the security and the concurrency
communities. More precisely, the workshop promotes the exchange of ideas,
trying to focus on common interests and stimulating discussions on central
research questions. In particular, we called for papers dealing with security
issues (such as authentication, integrity, privacy, confidentiality, access
control, denial of service, service availability, safety aspects, fault
tolerance, trust, language-based security, probabilistic and information
theoretic models) in emerging fields like web services, mobile ad-hoc networks,
agent-based infrastructures, peer-to-peer systems, context-aware computing,
global/ubiquitous/pervasive computing.
|
[
{
"version": "v1",
"created": "Fri, 23 Oct 2009 02:08:49 GMT"
}
] | 2009-10-26T00:00:00 |
[
[
"Boreale",
"Michele",
""
],
[
"Kremer",
"Steve",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0910.4432
|
Iyer Viswanathan K.
|
K.Viswanathan Iyer and K.R.Uday Kumar Reddy
|
Wiener index of binomial trees and Fibonacci trees
|
Accepted for publication in Int'l. J. Math. Engg. with Comp., Sept.
2009
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We obtain a closed-form expression for the Wiener index of binomial trees. We
outline efficient algorithms for computing the Wiener indices of Fibonacci and
binary Fibonacci trees.
|
[
{
"version": "v1",
"created": "Fri, 23 Oct 2009 04:13:55 GMT"
}
] | 2009-10-26T00:00:00 |
[
[
"Iyer",
"K. Viswanathan",
""
],
[
"Reddy",
"K. R. Uday Kumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.4455
|
Emmanuel Lochin
|
Remi Diana and Emmanuel Lochin
|
ECN verbose mode: a statistical method for network path congestion
estimation
| null | null |
10.1016/j.comnet.2011.04.001
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article introduces a simple and effective methodology to determine the
level of congestion in a network with an ECN-like marking scheme. The purpose
of the ECN bit is to notify TCP sources of an imminent congestion in order to
react before losses occur. However, ECN is a binary indicator which does not
reflect the congestion level (i.e. the percentage of queued packets) of the
bottleneck, thus preventing any adapted reaction. In this study, we use a
counter in place of the traditional ECN marking scheme to assess the number of
times a packet has crossed a congested router. Thanks to this simple counter,
we drive a statistical analysis to accurately estimate the congestion level of
each router on a network path. We detail in this paper an analytical method
validated by some preliminary simulations which demonstrate the feasibility and
the accuracy of the concept proposed. We conclude this paper with possible
applications and expected future work.
|
[
{
"version": "v1",
"created": "Fri, 23 Oct 2009 07:49:05 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Feb 2010 08:27:50 GMT"
}
] | 2012-04-03T00:00:00 |
[
[
"Diana",
"Remi",
""
],
[
"Lochin",
"Emmanuel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.4500
|
Marco Volpe
|
Andrea Masini, Luca Vigan\`o, Marco Volpe
|
A History of Until
|
24 pages, full version of paper at Methods for Modalities 2009
(M4M-6)
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Until is a notoriously difficult temporal operator as it is both existential
and universal at the same time: A until B holds at the current time instant w
iff either B holds at w or there exists a time instant w' in the future at
which B holds and such that A holds in all the time instants between the
current one and w'. This "ambivalent" nature poses a significant challenge when
attempting to give deduction rules for until. In this paper, in contrast, we
make explicit this duality of until to provide well-behaved natural deduction
rules for linear-time logics by introducing a new temporal operator that allows
us to formalize the "history" of until, i.e., the "internal" universal
quantification over the time instants between the current one and w'. This
approach provides the basis for formalizing deduction systems for temporal
logics endowed with the until operator. For concreteness, we give here a
labeled natural deduction system for a linear-time logic endowed with the new
operator and show that, via a proper translation, such a system is also sound
and complete with respect to the linear temporal logic LTL with until.
|
[
{
"version": "v1",
"created": "Fri, 23 Oct 2009 15:31:57 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Oct 2009 17:10:16 GMT"
}
] | 2009-10-26T00:00:00 |
[
[
"Masini",
"Andrea",
""
],
[
"Viganò",
"Luca",
""
],
[
"Volpe",
"Marco",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.4507
|
Sam Skipsey
|
Sam Skipsey (1), David Ambrose-Griffith (2), Greig Cowan (3), Mike
Kenyon (1), Orlando Richards (3), Phil Roffe (2), Graeme Stewart (1) ((1)
University of Glasgow, UK, (2) University of Durham, UK, (3) University of
Edinburgh, UK)
|
ScotGrid: Providing an Effective Distributed Tier-2 in the LHC Era
|
Preprint for 17th International Conference on Computing in High
Energy and Nuclear Physics, 7 pages, 1 figure
|
J.Phys.Conf.Ser.219:052014,2010
|
10.1088/1742-6596/219/5/052014
|
GLAS-PPE/2009-07
|
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
ScotGrid is a distributed Tier-2 centre in the UK with sites in Durham,
Edinburgh and Glasgow. ScotGrid has undergone a huge expansion in hardware in
anticipation of the LHC and now provides more than 4MSI2K and 500TB to the LHC
VOs. Scaling up to this level of provision has brought many challenges to the
Tier-2 and we show in this paper how we have adopted new methods of organising
the centres, from fabric management and monitoring to remote management of
sites to management and operational procedures, to meet these challenges. We
describe how we have coped with different operational models at the sites,
where Glagsow and Durham sites are managed "in house" but resources at
Edinburgh are managed as a central university resource. This required the
adoption of a different fabric management model at Edinburgh and a special
engagement with the cluster managers. Challenges arose from the different job
models of local and grid submission that required special attention to resolve.
We show how ScotGrid has successfully provided an infrastructure for ATLAS and
LHCb Monte Carlo production. Special attention has been paid to ensuring that
user analysis functions efficiently, which has required optimisation of local
storage and networking to cope with the demands of user analysis. Finally,
although these Tier-2 resources are pledged to the whole VO, we have
established close links with our local physics user communities as being the
best way to ensure that the Tier-2 functions effectively as a part of the LHC
grid computing framework..
|
[
{
"version": "v1",
"created": "Fri, 23 Oct 2009 13:02:19 GMT"
}
] | 2010-05-25T00:00:00 |
[
[
"Skipsey",
"Sam",
""
],
[
"Ambrose-Griffith",
"David",
""
],
[
"Cowan",
"Greig",
""
],
[
"Kenyon",
"Mike",
""
],
[
"Richards",
"Orlando",
""
],
[
"Roffe",
"Phil",
""
],
[
"Stewart",
"Graeme",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0910.4510
|
Sam Skipsey
|
Sam Skipsey (1), Greig Cowan (2), Mike Kenyon (1), Stuart Purdie (1),
Graeme Stewart (1) ((1) University of Glasgow, UK, (2) University of
Edinburgh, UK)
|
Optimised access to user analysis data using the gLite DPM
|
8 pages, 9 figures, preprint for 17th International Conference on
Computing in High Energy and Nuclear Physics
|
J.Phys.Conf.Ser.219:062066,2010
|
10.1088/1742-6596/219/6/062066
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The ScotGrid distributed Tier-2 now provides more that 4MSI2K and 500TB for
LHC computing, which is spread across three sites at Durham, Edinburgh and
Glasgow. Tier-2 sites have a dual role to play in the computing models of the
LHC VOs. Firstly, their CPU resources are used for the generation of Monte
Carlo event data. Secondly, the end user analysis data is distributed across
the grid to the site's storage system and held on disk ready for processing by
physicists' analysis jobs. In this paper we show how we have designed the
ScotGrid storage and data management resources in order to optimise access by
physicists to LHC data. Within ScotGrid, all sites use the gLite DPM storage
manager middleware. Using the EGEE grid to submit real ATLAS analysis code to
process VO data stored on the ScotGrid sites, we present an analysis of the
performance of the architecture at one site, and procedures that may be
undertaken to improve such. The results will be presented from the point of
view of the end user (in terms of number of events processed/second) and from
the point of view of the site, which wishes to minimise load and the impact
that analysis activity has on other users of the system.
|
[
{
"version": "v1",
"created": "Fri, 23 Oct 2009 13:29:44 GMT"
}
] | 2010-05-25T00:00:00 |
[
[
"Skipsey",
"Sam",
""
],
[
"Cowan",
"Greig",
""
],
[
"Kenyon",
"Mike",
""
],
[
"Purdie",
"Stuart",
""
],
[
"Stewart",
"Graeme",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0910.4518
|
Stefan Kratsch
|
Stefan Kratsch and Magnus Wahlstrom
|
Preprocessing of Min Ones Problems: A Dichotomy
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A parameterized problem consists of a classical problem and an additional
component, the so-called parameter. This point of view allows a formal
definition of preprocessing: Given a parameterized instance (I,k), a polynomial
kernelization computes an equivalent instance (I',k') of size and parameter
bounded by a polynomial in k. We give a complete classification of Min Ones
Constraint Satisfaction problems, i.e., Min Ones SAT(\Gamma), with respect to
admitting or not admitting a polynomial kernelization (unless NP \subseteq
coNP/poly). For this we introduce the notion of mergeability. If all relations
of the constraint language \Gamma are mergeable, then a new variant of
sunflower kernelization applies, based on non-zero-closed cores. We obtain a
kernel with O(k^{d+1}) variables and polynomial total size, where d is the
maximum arity of a constraint in \Gamma, comparing nicely with the bound of
O(k^{d-1}) vertices for the less general and arguably simpler d-Hitting Set
problem. Otherwise, any relation in \Gamma that is not mergeable permits us to
construct a log-cost selection formula, i.e., an n-ary selection formula with
O(log n) true local variables. From this we can construct our lower bound using
recent results by Bodlaender et al. as well as Fortnow and Santhanam, proving
that there is no polynomial kernelization, unless NP \subseteq coNP/poly and
the polynomial hierarchy collapses to the third level.
|
[
{
"version": "v1",
"created": "Fri, 23 Oct 2009 14:14:37 GMT"
}
] | 2009-10-26T00:00:00 |
[
[
"Kratsch",
"Stefan",
""
],
[
"Wahlstrom",
"Magnus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.4555
|
Jeffrey Shallit
|
Thomas Ang, Giovanni Pighizzini, Narad Rampersad, Jeffrey Shallit
|
Automata and Reduced Words in the Free Group
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider some questions about formal languages that arise when inverses of
letters, words and languages are defined. The reduced representation of a
language over the free monoid is its unique equivalent representation in the
free group. We show that the class of regular languages is closed under taking
the reduced representation, while the class of context-free languages is not.
We also give an upper bound on the state complexity of the reduced
representation of a regular language, and prove upper and lower bounds on the
length of the shortest reducible string in a regular language. Finally we show
that the set of all words which are equivalent to the words in a regular
language can be nonregular, and that regular languages are not closed under
taking a generalized form of the reduced representation.
|
[
{
"version": "v1",
"created": "Fri, 23 Oct 2009 17:28:20 GMT"
}
] | 2009-10-26T00:00:00 |
[
[
"Ang",
"Thomas",
""
],
[
"Pighizzini",
"Giovanni",
""
],
[
"Rampersad",
"Narad",
""
],
[
"Shallit",
"Jeffrey",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0910.4565
|
Uri Abraham
|
Uri Abraham
|
Classification with Tarskian system executions (Bakery Algorithms as an
example)
|
The paper is withdrawn since an improved version is being submitted
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We argue that predicate languages and their Tarskian structures have an
important place for the study of concurrency. The argument in our paper is
based on an example: we show that two seemingly dissimilar algorithms have a
common set of high-level properties, which reveals their affinity. The
algorithms are a variant of Lamport's Bakery Algorithm and the Ricart and
Agrawala algorithm. They seem different because one uses shared memory and the
other message passing for communication. Yet it is intuitively obvious that
they are in some sense very similar, and they belong to the same "family of
Bakery Algorithms". The aim of this paper is to express in a formal way this
intuition that classifies the two algorithms together. For this aim of
expressing the abstract high level properties that are shared by the two
algorithms we use predicate languages and their Taskian structures. We find a
set of properties expressed in quantification language which are satisfied by
every Tarskian system execution that models a run by either one of the
protocols, and which is strong enough to ensure that the mutual exclusion
property holds in these runs.
|
[
{
"version": "v1",
"created": "Fri, 23 Oct 2009 18:39:49 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Jun 2010 09:38:30 GMT"
}
] | 2010-06-02T00:00:00 |
[
[
"Abraham",
"Uri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.4568
|
Ilango Sriram
|
Ilango Sriram
|
SPECI, a simulation tool exploring cloud-scale data centres
| null |
Ilango Sriram, SPECI, a Simulation Tool Exploring Cloud-Scale Data
Centres, In: CloudCom 2009, LNCS 5931, pp. 381-392, 2009, M.G. Jaatun, G.
Zhao, and C. Rong (Eds.), Springer-Verlag Berlin Heidelberg 2009
|
10.1007/978-3-642-10665-1_35
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There is a rapid increase in the size of data centres (DCs) used to provide
cloud computing services. It is commonly agreed that not all properties in the
middleware that manages DCs will scale linearly with the number of components.
Further, "normal failure" complicates the assessment of the per-formance of a
DC. However, unlike in other engineering domains, there are no well established
tools that allow the prediction of the performance and behav-iour of future
generations of DCs. SPECI, Simulation Program for Elastic Cloud
Infrastructures, is a simulation tool which allows exploration of aspects of
scaling as well as performance properties of future DCs.
|
[
{
"version": "v1",
"created": "Fri, 23 Oct 2009 19:05:29 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Sriram",
"Ilango",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0910.4572
|
Paul Bunn
|
Paul Bunn, Rafail Ostrovsky
|
Throughput in Asynchronous Networks
| null | null | null | null |
cs.NI cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new, "worst-case" model for an asynchronous communication
network and investigate the simplest (yet central) task in this model, namely
the feasibility of end-to-end routing. Motivated by the question of how
successful a protocol can hope to perform in a network whose reliability is
guaranteed by as few assumptions as possible, we combine the main
"unreliability" features encountered in network models in the literature,
allowing our model to exhibit all of these characteristics simultaneously. In
particular, our model captures networks that exhibit the following properties:
1) On-line; 2) Dynamic Topology; 3)Distributed/Local Control 4) Asynchronous
Communication; 5) (Polynomially) Bounded Memory; 6) No Minimal Connectivity
Assumptions. In the confines of this network, we evaluate throughput
performance and prove matching upper and lower bounds. In particular, using
competitive analysis (perhaps somewhat surprisingly) we prove that the optimal
competitive ratio of any on-line protocol is 1/n (where n is the number of
nodes in the network), and then we describe a specific protocol and prove that
it is n-competitive. The model we describe in the paper and for which we
achieve the above matching upper and lower bounds for throughput represents the
"worst-case" network, in that it makes no reliability assumptions. In many
practical applications, the optimal competitive ratio of 1/n may be
unacceptable, and consequently stronger assumptions must be imposed on the
network to improve performance. However, we believe that a fundamental starting
point to understanding which assumptions are necessary to impose on a network
model, given some desired throughput performance, is to understand what is
achievable in the worst case for the simplest task (namely end-to-end routing).
|
[
{
"version": "v1",
"created": "Fri, 23 Oct 2009 19:35:26 GMT"
}
] | 2009-10-26T00:00:00 |
[
[
"Bunn",
"Paul",
""
],
[
"Ostrovsky",
"Rafail",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0910.4613
|
Ruoheng Liu
|
Ruoheng Liu, Yingbin Liang and H. Vincent Poor
|
Fading Cognitive Multiple-Access Channels With Confidential Messages
|
Submitted to the IEEE Transactions on Information Theory, December
2009. The material in this paper was presented in part at the Forty-Seventh
Annual Allerton Conference on Communication, Control, and Computing,
September 30-October 2, 2009, Monticello, Illinois
| null | null | null |
cs.IT cs.CR math.IT
|
http://creativecommons.org/licenses/by/3.0/
|
The fading cognitive multiple-access channel with confidential messages
(CMAC-CM) is investigated, in which two users attempt to transmit common
information to a destination and user 1 also has confidential information
intended for the destination. User 1 views user 2 as an eavesdropper and wishes
to keep its confidential information as secret as possible from user 2. The
multiple-access channel (both the user-to-user channel and the
user-to-destination channel) is corrupted by multiplicative fading gain
coefficients in addition to additive white Gaussian noise. The channel state
information (CSI) is assumed to be known at both the users and the destination.
A parallel CMAC-CM with independent subchannels is first studied. The secrecy
capacity region of the parallel CMAC-CM is established, which yields the
secrecy capacity region of the parallel CMAC-CM with degraded subchannels.
Next, the secrecy capacity region is established for the parallel Gaussian
CMAC-CM, which is used to study the fading CMAC-CM. When both users know the
CSI, they can dynamically change their transmission powers with the channel
realization to achieve the optimal performance. The closed-form power
allocation function that achieves every boundary point of the secrecy capacity
region is derived.
|
[
{
"version": "v1",
"created": "Sat, 24 Oct 2009 02:43:30 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Dec 2009 20:55:37 GMT"
}
] | 2009-12-29T00:00:00 |
[
[
"Liu",
"Ruoheng",
""
],
[
"Liang",
"Yingbin",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.4618
|
Jaeok Park
|
Jaeok Park and Mihaela van der Schaar
|
A Game Theoretic Analysis of Incentives in Content Production and
Sharing over Peer-to-Peer Networks
|
31 pages, 3 figures, 1 table
|
IEEE Journal of Selected Topics in Signal Processing, vol. 4, no.
4, pp. 704-717, Aug. 2010
|
10.1109/JSTSP.2010.2048609
| null |
cs.NI cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
User-generated content can be distributed at a low cost using peer-to-peer
(P2P) networks, but the free-rider problem hinders the utilization of P2P
networks. In order to achieve an efficient use of P2P networks, we investigate
fundamental issues on incentives in content production and sharing using game
theory. We build a basic model to analyze non-cooperative outcomes without an
incentive scheme and then use different game formulations derived from the
basic model to examine five incentive schemes: cooperative, payment, repeated
interaction, intervention, and enforced full sharing. The results of this paper
show that 1) cooperative peers share all produced content while non-cooperative
peers do not share at all without an incentive scheme; 2) a cooperative scheme
allows peers to consume more content than non-cooperative outcomes do; 3) a
cooperative outcome can be achieved among non-cooperative peers by introducing
an incentive scheme based on payment, repeated interaction, or intervention;
and 4) enforced full sharing has ambiguous welfare effects on peers. In
addition to describing the solutions of different formulations, we discuss
enforcement and informational requirements to implement each solution, aiming
to offer a guideline for protocol designers when designing incentive schemes
for P2P networks.
|
[
{
"version": "v1",
"created": "Sat, 24 Oct 2009 04:50:31 GMT"
},
{
"version": "v2",
"created": "Sat, 23 Jan 2010 19:04:00 GMT"
}
] | 2010-08-03T00:00:00 |
[
[
"Park",
"Jaeok",
""
],
[
"van der Schaar",
"Mihaela",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0910.4624
|
{\O}yvind Ryan
|
{\O}. Ryan, M. Debbah
|
Convolution operations arising from Vandermonde matrices
|
Submitted to IEEE Transactions on Information Theory. 16 pages, 1
figure
| null |
10.1109/TIT.2011.2145990
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Different types of convolution operations involving large Vandermonde
matrices are considered. The convolutions parallel those of large Gaussian
matrices and additive and multiplicative free convolution. First additive and
multiplicative convolution of Vandermonde matrices and deterministic diagonal
matrices are considered. After this, several cases of additive and
multiplicative convolution of two independent Vandermonde matrices are
considered. It is also shown that the convergence of any combination of
Vandermonde matrices is almost sure. We will divide the considered convolutions
into two types: those which depend on the phase distribution of the Vandermonde
matrices, and those which depend only on the spectra of the matrices. A general
criterion is presented to find which type applies for any given convolution. A
simulation is presented, verifying the results. Implementations of all
considered convolutions are provided and discussed, together with the
challenges in making these implementations efficient. The implementation is
based on the technique of Fourier-Motzkin elimination, and is quite general as
it can be applied to virtually any combination of Vandermonde matrices.
Generalizations to related random matrices, such as Toeplitz and Hankel
matrices, are also discussed.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 17:50:29 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Ryan",
"Ø.",
""
],
[
"Debbah",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.4627
|
Francis Bach
|
Francis Bach (INRIA Rocquencourt)
|
Self-concordant analysis for logistic regression
| null | null | null | null |
cs.LG math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most of the non-asymptotic theoretical work in regression is carried out for
the square loss, where estimators can be obtained through closed-form
expressions. In this paper, we use and extend tools from the convex
optimization literature, namely self-concordant functions, to provide simple
extensions of theoretical results for the square loss to the logistic loss. We
apply the extension techniques to logistic regression with regularization by
the $\ell_2$-norm and regularization by the $\ell_1$-norm, showing that new
results for binary classification through logistic regression can be easily
derived from corresponding results for least-squares regression.
|
[
{
"version": "v1",
"created": "Sat, 24 Oct 2009 07:10:24 GMT"
}
] | 2009-10-27T00:00:00 |
[
[
"Bach",
"Francis",
"",
"INRIA Rocquencourt"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0910.4632
|
Meicheng Liu
|
Meicheng Liu, Dongdai Lin
|
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions
|
13 pages, submitted to IEEE Transactions on Information Theory
| null |
10.1109/TIT.2011.2145690
| null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Algebraic and fast algebraic attacks are power tools to analyze stream
ciphers. A class of symmetric Boolean functions with maximum algebraic immunity
were found vulnerable to fast algebraic attacks at EUROCRYPT'06. Recently, the
notion of AAR (algebraic attack resistant) functions was introduced as a
unified measure of protection against both classical algebraic and fast
algebraic attacks. In this correspondence, we first give a decomposition of
symmetric Boolean functions, then we show that almost all symmetric Boolean
functions, including these functions with good algebraic immunity, behave badly
against fast algebraic attacks, and we also prove that no symmetric Boolean
functions are AAR functions. Besides, we improve the relations between
algebraic degree and algebraic immunity of symmetric Boolean functions.
|
[
{
"version": "v1",
"created": "Sat, 24 Oct 2009 08:16:15 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Liu",
"Meicheng",
""
],
[
"Lin",
"Dongdai",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.