id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0910.4664
|
Adam Yedidia
|
Adam B. Yedidia
|
Counting Independent Sets and Kernels of Regular Graphs
| null | null | null | null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Chandrasekaran, Chertkov, Gamarnik, Shah, and Shin recently proved that the
average number of independent sets of random regular graphs of size n and
degree 3 approaches w^n for large n, where w is approximately 1.54563,
consistent with the Bethe approximation. They also made the surprising
conjecture that the fluctuations of the logarithm of the number of independent
sets were only O(1) as n grew large, which would mean that the Bethe
approximation is amazingly accurate for all 3-regular graphs. Here, I provide
numerical evidence supporting this conjecture obtained from exact counts of
independent sets using binary decision diagrams. I also provide numerical
evidence that supports the novel conjectures that the number of kernels of
3-regular graphs of size n is given by y^n, where y is approximately 1.299, and
that the fluctuations in the logarithm of the number of kernels is also only
O(1).
|
[
{
"version": "v1",
"created": "Sat, 24 Oct 2009 17:33:53 GMT"
}
] | 2009-10-27T00:00:00 |
[
[
"Yedidia",
"Adam B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.4667
|
Sinan Gezici
|
Fatih Kocak, Hasari Celebi, Sinan Gezici, Khalid A. Qaraqe, Huseyin
Arslan, H. Vincent Poor
|
Time Delay Estimation in Cognitive Radio Systems
|
To appear at CAMSAP 2009
| null |
10.1155/2010/675959
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In cognitive radio systems, secondary users can utilize multiple dispersed
bands that are not used by primary users. In this paper, time delay estimation
of signals that occupy multiple dispersed bands is studied. First, theoretical
limits on time delay estimation are reviewed. Then, two-step time delay
estimators that provide trade-offs between computational complexity and
performance are investigated. In addition, asymptotic optimality properties of
the two-step time delay estimators are discussed. Finally, simulation results
are presented to explain the theoretical results.
|
[
{
"version": "v1",
"created": "Sat, 24 Oct 2009 17:27:04 GMT"
}
] | 2016-02-17T00:00:00 |
[
[
"Kocak",
"Fatih",
""
],
[
"Celebi",
"Hasari",
""
],
[
"Gezici",
"Sinan",
""
],
[
"Qaraqe",
"Khalid A.",
""
],
[
"Arslan",
"Huseyin",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.4668
|
Damien Robert
|
Jean-Charles Faug\`ere (INRIA Rocquencourt), David Lubicz (IRMAR),
Damien Robert (INRIA Lorraine - LORIA)
|
Computing modular correspondences for abelian varieties
| null | null |
10.1016/j.jalgebra.2011.06.031
| null |
cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The aim of this paper is to give a higher dimensional equivalent of the
classical modular polynomials $\Phi_\ell(X,Y)$. If $j$ is the $j$-invariant
associated to an elliptic curve $E_k$ over a field $k$ then the roots of
$\Phi_\ell(j,X)$ correspond to the $j$-invariants of the curves which are
$\ell$-isogeneous to $E_k$. Denote by $X_0(N)$ the modular curve which
parametrizes the set of elliptic curves together with a $N$-torsion subgroup.
It is possible to interpret $\Phi_\ell(X,Y)$ as an equation cutting out the
image of a certain modular correspondence $X_0(\ell) \to X_0(1) \times X_0(1)$
in the product $X_0(1) \times X_0(1)$. Let $g$ be a positive integer and
$\overn \in \N^g$. We are interested in the moduli space that we denote by
$\Mn$ of abelian varieties of dimension $g$ over a field $k$ together with an
ample symmetric line bundle $\pol$ and a symmetric theta structure of type
$\overn$. If $\ell$ is a prime and let $\overl=(\ell, ..., \ell)$, there exists
a modular correspondence $\Mln \to \Mn \times \Mn$. We give a system of
algebraic equations defining the image of this modular correspondence.
|
[
{
"version": "v1",
"created": "Sat, 24 Oct 2009 17:34:54 GMT"
}
] | 2012-08-13T00:00:00 |
[
[
"Faugère",
"Jean-Charles",
"",
"INRIA Rocquencourt"
],
[
"Lubicz",
"David",
"",
"IRMAR"
],
[
"Robert",
"Damien",
"",
"INRIA Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0910.4681
|
Alexander Kelmans
|
Alexander Kelmans
|
Packing 3-vertex paths in claw-free graphs and related topics
|
29 pages
|
Discrete Applied Mathematics, 159 (2011) 112-127
|
10.1016/j.dam.2010.05.001
| null |
math.CO cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An L-factor of a graph G is a spanning subgraph of G whose every component is
a 3-vertex path. Let v(G) be the number of vertices of G and d(G) the
domination number of G. A claw is a graph with four vertices and three edges
incident to the same vertex. A graph is claw-free if it has no induced subgraph
isomorphic to a claw. Our results include the following. Let G be a 3-connected
claw-free graph, x a vertex in G, e = xy an edge in G, and P a 3-vertex path in
G. Then
(a1) if v(G) = 0 mod 3, then G has an L-factor containing (avoiding) e, (a2)
if v(G) = 1 mod 3, then G - x has an L-factor, (a3) if v(G) = 2 mod 3, then G -
{x,y} has an L-factor, (a4) if v(G) = 0 mod 3 and G is either cubic or
4-connected, then G - P has an L-factor, (a5) if G is cubic with v(G) > 5 and E
is a set of three edges in G, then G - E has an L-factor if and only if the
subgraph induced by E in G is not a claw and not a triangle, (a6) if v(G) = 1
mod 3, then G - {v,e} has an L-factor for every vertex v and every edge e in G,
(a7) if v(G) = 1 mod 3, then there exist a 4-vertex path N and a claw Y in G
such that G - N and G - Y have L-factors, and (a8) d(G) < v(G)/3 +1 and if in
addition G is not a cycle and v(G) = 1 mod 3, then d(G) < v(G)/3.
We explore the relations between packing problems of a graph and its line
graph to obtain some results on different types of packings. We also discuss
relations between L-packing and domination problems as well as between induced
L-packings and the Hadwiger conjecture.
Keywords: claw-free graph, cubic graph, vertex disjoint packing, edge
disjoint packing, 3-vertex factor, 3-vertex packing, path-factor, induced
packing, graph domination, graph minor, the Hadwiger conjecture.
|
[
{
"version": "v1",
"created": "Sat, 24 Oct 2009 21:07:20 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Jul 2011 17:32:28 GMT"
}
] | 2011-07-26T00:00:00 |
[
[
"Kelmans",
"Alexander",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.4683
|
Fedor Zhdanov
|
Fedor Zhdanov and Vladimir Vovk
|
Competing with Gaussian linear experts
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the problem of online regression. We prove a theoretical bound on
the square loss of Ridge Regression. We do not make any assumptions about input
vectors or outcomes. We also show that Bayesian Ridge Regression can be thought
of as an online algorithm competing with all the Gaussian linear experts.
|
[
{
"version": "v1",
"created": "Sat, 24 Oct 2009 22:40:40 GMT"
},
{
"version": "v2",
"created": "Mon, 10 May 2010 23:01:30 GMT"
}
] | 2010-05-12T00:00:00 |
[
[
"Zhdanov",
"Fedor",
""
],
[
"Vovk",
"Vladimir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0910.4686
|
Soummya Kar
|
Soummya Kar and Jose Moura
|
Moderate Deviations of the Random Riccati Equation
|
Revised Version, 35 pages
| null | null | null |
math.PR cs.IT math.DS math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We characterize the invariant filtering measures resulting from Kalman
filtering with intermittent observations (\cite{Bruno}), where the observation
arrival is modeled as a Bernoulli process. In \cite{Riccati-weakconv}, it was
shown that there exists a $\overline{\gamma}^{\{\scriptsize{sb}}}>0$ such that
for every observation packet arrival probability $\overline{\gamma}$,
$\overline{\gamma}>\overline{\gamma}^{\{\scriptsize{sb}}}>0$, the sequence of
random conditional error covariance matrices converges in distribution to a
unique invariant distribution $\mathbb{\mu}^{\overline{\gamma}}$ (independent
of the filter initialization.) In this paper, we prove that, for controllable
and observable systems, $\overline{\gamma}^{\{\scriptsize{sb}}}=0$ and that, as
$\overline{\gamma}\uparrow 1$, the family
$\{\mathbb{\mu}^{\overline{\gamma}}\}_{\overline{\gamma}>0}$ of invariant
distributions satisfies a moderate deviations principle (MDP) with a good rate
function $I$. The rate function $I$ is explicitly identified. In particular,
our results show:
|
[
{
"version": "v1",
"created": "Sat, 24 Oct 2009 23:21:50 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Jun 2010 17:47:10 GMT"
}
] | 2010-06-04T00:00:00 |
[
[
"Kar",
"Soummya",
""
],
[
"Moura",
"Jose",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0910.4688
|
Olympia Hadjiliadis
|
Olympia Hadjiliadis, Tobias Schaefer and H. Vincent Poor
|
Quickest detection in coupled systems
|
6 pages, 48th IEEE Conference on Decision and Control, Shanghai 2009
December 16 - 18
| null |
10.1109/CDC.2009.5400871
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work considers the problem of quickest detection of signals in a coupled
system of N sensors, which receive continuous sequential observations from the
environment. It is assumed that the signals, which are modeled a general Ito
processes, are coupled across sensors, but that their onset times may differ
from sensor to sensor. The objective is the optimal detection of the first time
at which any sensor in the system receives a signal. The problem is formulated
as a stochastic optimization problem in which an extended average Kullback-
Leibler divergence criterion is used as a measure of detection delay, with a
constraint on the mean time between false alarms. The case in which the sensors
employ cumulative sum (CUSUM) strategies is considered, and it is proved that
the minimum of N CUSUMs is asymptotically optimal as the mean time between
false alarms increases without bound.
|
[
{
"version": "v1",
"created": "Sat, 24 Oct 2009 23:29:03 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Hadjiliadis",
"Olympia",
""
],
[
"Schaefer",
"Tobias",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.4698
|
Scott Aaronson
|
Scott Aaronson
|
BQP and the Polynomial Hierarchy
| null | null | null | null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The relationship between BQP and PH has been an open problem since the
earliest days of quantum computing. We present evidence that quantum computers
can solve problems outside the entire polynomial hierarchy, by relating this
question to topics in circuit complexity, pseudorandomness, and Fourier
analysis.
First, we show that there exists an oracle relation problem (i.e., a problem
with many valid outputs) that is solvable in BQP, but not in PH. This also
yields a non-oracle relation problem that is solvable in quantum logarithmic
time, but not in AC0.
Second, we show that an oracle decision problem separating BQP from PH would
follow from the Generalized Linial-Nisan Conjecture, which we formulate here
and which is likely of independent interest. The original Linial-Nisan
Conjecture (about pseudorandomness against constant-depth circuits) was
recently proved by Braverman, after being open for twenty years.
|
[
{
"version": "v1",
"created": "Sun, 25 Oct 2009 17:23:15 GMT"
}
] | 2009-10-27T00:00:00 |
[
[
"Aaronson",
"Scott",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0910.4699
|
Ariel Procaccia
|
Noga Alon, Felix Fischer, Ariel D. Procaccia, Moshe Tennenholtz
|
Sum of Us: Strategyproof Selection from the Selectors
| null | null | null | null |
cs.GT cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider directed graphs over a set of n agents, where an edge (i,j) is
taken to mean that agent i supports or trusts agent j. Given such a graph and
an integer k\leq n, we wish to select a subset of k agents that maximizes the
sum of indegrees, i.e., a subset of k most popular or most trusted agents. At
the same time we assume that each individual agent is only interested in being
selected, and may misreport its outgoing edges to this end. This problem
formulation captures realistic scenarios where agents choose among themselves,
which can be found in the context of Internet search, social networks like
Twitter, or reputation systems like Epinions.
Our goal is to design mechanisms without payments that map each graph to a
k-subset of agents to be selected and satisfy the following two constraints:
strategyproofness, i.e., agents cannot benefit from misreporting their outgoing
edges, and approximate optimality, i.e., the sum of indegrees of the selected
subset of agents is always close to optimal. Our first main result is a
surprising impossibility: for k \in {1,...,n-1}, no deterministic strategyproof
mechanism can provide a finite approximation ratio. Our second main result is a
randomized strategyproof mechanism with an approximation ratio that is bounded
from above by four for any value of k, and approaches one as k grows.
|
[
{
"version": "v1",
"created": "Sun, 25 Oct 2009 02:01:09 GMT"
}
] | 2009-10-27T00:00:00 |
[
[
"Alon",
"Noga",
""
],
[
"Fischer",
"Felix",
""
],
[
"Procaccia",
"Ariel D.",
""
],
[
"Tennenholtz",
"Moshe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.4704
|
Przemyslaw Pawelczak
|
Jihoon Park, Przemys{\l}aw Pawe{\l}czak, and Danijela \v{C}abri\'c
|
Performance of Joint Spectrum Sensing and MAC Algorithms for
Multichannel Opportunistic Spectrum Access Ad Hoc Networks
|
43 pages, 14 figures. Includes a concluding discussion on the
validity of the analytical model in P. Pawelczak, S. Pollin, H-S. W. So, A.
Bahai, R.V. Prasad, R. Hekmat, Performance Analysis of Multichannel Medium
Access Control Algorithms for Opportunistic Spectrum Access, IEEE
Transactions on Vehicular Technology, vol. 58, no. 6, pp. 3014-3031, Jul.
2009
|
IEEE Transactions on Mobile Computing, vol. 10, no. 7, pp.
1011-1027, 2011
|
10.1109/TMC.2010.255
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an analytical framework to assess the link layer throughput of
multichannel Opportunistic Spectrum Access (OSA) ad hoc networks. Specifically,
we focus on analyzing various combinations of collaborative spectrum sensing
and Medium Access Control (MAC) protocol abstractions. We decompose
collaborative spectrum sensing into layers, parametrize each layer, classify
existing solutions, and propose a new protocol called Truncated Time Division
Multiple Access (TTDMA) that supports efficient distribution of sensing results
in "k out of N" fusion rule. In case of multichannel MAC protocols we evaluate
two main approaches of control channel design with (i) dedicated and (ii)
hopping channel. We propose to augment these protocols with options of handling
secondary user (SU) connections preempted by primary user (PU) by (i)
connection buffering until PU departure and (ii) connection switching to a
vacant PU channel. By comparing and optimizing different design combinations we
show that (i) it is generally better to buffer preempted SU connections than to
switch them to PU vacant channels and (ii) TTDMA is a promising design option
for collaborative spectrum sensing process when k does not change over time.
|
[
{
"version": "v1",
"created": "Sun, 25 Oct 2009 03:35:53 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Oct 2009 02:52:54 GMT"
},
{
"version": "v3",
"created": "Mon, 14 Jun 2010 22:37:02 GMT"
},
{
"version": "v4",
"created": "Wed, 29 Aug 2012 08:29:10 GMT"
},
{
"version": "v5",
"created": "Thu, 29 Nov 2012 18:03:40 GMT"
}
] | 2012-11-30T00:00:00 |
[
[
"Park",
"Jihoon",
""
],
[
"Pawełczak",
"Przemysław",
""
],
[
"Čabrić",
"Danijela",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.4711
|
Shrisha Rao
|
Rajashekar Annaji, Shrisha Rao
|
Parallelization of the LBG Vector Quantization Algorithm for Shared
Memory Systems
|
14 pages
|
International Journal of Image Processing, vol. 3, no. 4,
July/August 2009, pp. 170-183
| null | null |
cs.CV cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a parallel approach for the Vector Quantization (VQ)
problem in image processing. VQ deals with codebook generation from the input
training data set and replacement of any arbitrary data with the nearest
codevector. Most of the efforts in VQ have been directed towards designing
parallel search algorithms for the codebook, and little has hitherto been done
in evolving a parallelized procedure to obtain an optimum codebook. This
parallel algorithm addresses the problem of designing an optimum codebook using
the traditional LBG type of vector quantization algorithm for shared memory
systems and for the efficient usage of parallel processors. Using the codebook
formed from a training set, any arbitrary input data is replaced with the
nearest codevector from the codebook. The effectiveness of the proposed
algorithm is indicated.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 04:46:56 GMT"
}
] | 2009-10-27T00:00:00 |
[
[
"Annaji",
"Rajashekar",
""
],
[
"Rao",
"Shrisha",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0910.4738
|
Debasish Chatterjee
|
Federico Ramponi, Debasish Chatterjee, Sean Summers, and John Lygeros
|
On the connections between PCTL and Dynamic Programming
|
Submitted
|
HSCC Stockholm, 2010, pages 253-262
|
10.1145/1755952.1755988
| null |
math.OC cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Probabilistic Computation Tree Logic (PCTL) is a well-known modal logic which
has become a standard for expressing temporal properties of finite-state Markov
chains in the context of automated model checking. In this paper, we give a
definition of PCTL for noncountable-space Markov chains, and we show that there
is a substantial affinity between certain of its operators and problems of
Dynamic Programming. After proving some uniqueness properties of the solutions
to the latter, we conclude the paper with two examples to show that some
recovery strategies in practical applications, which are naturally stated as
reach-avoid problems, can be actually viewed as particular cases of PCTL
formulas.
|
[
{
"version": "v1",
"created": "Sun, 25 Oct 2009 14:59:37 GMT"
}
] | 2012-02-22T00:00:00 |
[
[
"Ramponi",
"Federico",
""
],
[
"Chatterjee",
"Debasish",
""
],
[
"Summers",
"Sean",
""
],
[
"Lygeros",
"John",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
}
] |
0910.4748
|
Francesco Ranzato
|
Roberto Giacobazzi and Francesco Ranzato
|
Correctness Kernels of Abstract Interpretations
|
An extended abstract of this paper appeared in Proceedings of the
37th International Colloquium on Automata, Languages, and Programming (ICALP
'10), Bordeaux, France. LNCS vol. 6199, pages 211-222, Springer, 2010
| null | null | null |
cs.PL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In abstract interpretation-based static analysis, approximation is encoded by
abstract domains. They provide systematic guidelines for designing abstract
semantic functions that approximate some concrete system behaviors under
analysis. It may happen that an abstract domain contains redundant information
for the specific purpose of approximating a given concrete semantic function.
This paper introduces the notion of correctness kernel of abstract
interpretations, a methodology for simplifying abstract domains, i.e. removing
abstract values from them, in a maximal way while retaining exactly the same
approximate behavior of the system under analysis. We show that in abstract
model checking correctness kernels provide a simplification paradigm of the
abstract state space that is guided by examples, meaning that this
simplification preserves spuriousness of examples (i.e., abstract paths). In
particular, we show how correctness kernels can be integrated with the
well-known CEGAR (CounterExample-Guided Abstraction Refinement) methodology.
|
[
{
"version": "v1",
"created": "Sun, 25 Oct 2009 15:05:07 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Jun 2011 13:21:28 GMT"
},
{
"version": "v3",
"created": "Fri, 19 Apr 2013 08:29:03 GMT"
}
] | 2013-04-22T00:00:00 |
[
[
"Giacobazzi",
"Roberto",
""
],
[
"Ranzato",
"Francesco",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.4769
|
Sahbi Sidhom
|
Azza Harbaoui (ENSI-Riadi-GDL), Malek Ghenima (ENSI-Riadi-GDL), Sahbi
Sidhom (LORIA, Loria)
|
Enrichissement des contenus par la r\'eindexation des usagers : un
\'etat de l'art sur la probl\'ematique
| null |
conf\'erence internationale sur les Syst\`emes d'information et
Intelligence \'economique, Hammamet : Tunisie (2009)
| null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Information retrieval (IR) is a user approach to obtain relevant information
which meets needs with the help of a IR system (IRS). However, the IRS shows
certain differences between user relevance and system relevance. These gaps are
essentially related to the imperfection of the indexing process (as approach
related to the IR), to problems related to the misunderstanding of the natural
language and the non correspondence between the real needs of the user and the
results of his query. As idea is to think about an ?intellectual? indexing that
takes into account the point of view of the user. By consulting the document,
user can build information as added-value on the existing content: new
information which grows contents and allows the semantic visibility or
facilitates the reading by the annotations, by links to other content, by new
descriptors, specific new abstracts of users: it is the reindexing of the
contents by the contribution or the vote of the uses
|
[
{
"version": "v1",
"created": "Sun, 25 Oct 2009 21:22:04 GMT"
}
] | 2009-10-27T00:00:00 |
[
[
"Harbaoui",
"Azza",
"",
"ENSI-Riadi-GDL"
],
[
"Ghenima",
"Malek",
"",
"ENSI-Riadi-GDL"
],
[
"Sidhom",
"Sahbi",
"",
"LORIA, Loria"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0910.4836
|
Georg Hager
|
Gerald Schubert and Georg Hager and Holger Fehske
|
Performance limitations for sparse matrix-vector multiplications on
current multicore environments
|
16 pages, 9 figures
|
High Performance Computing in Science and Engineering,
Garching/Munich 2009. Springer, (2010), 13-26
|
10.1007/978-3-642-13872-0_2
| null |
cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The increasing importance of multicore processors calls for a reevaluation of
established numerical algorithms in view of their ability to profit from this
new hardware concept. In order to optimize the existent algorithms, a detailed
knowledge of the different performance-limiting factors is mandatory. In this
contribution we investigate sparse matrix-vector multiplication, which is the
dominant operation in many sparse eigenvalue solvers. Two conceptually
different storage schemes and computational kernels have been conceived in the
past to target cache-based and vector architectures, respectively. Starting
from a series of microbenchmarks we apply the gained insight on optimized
sparse MVM implementations, whose serial and OpenMP-parallel performance we
review on state-of-the-art multicore systems.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 09:31:38 GMT"
}
] | 2012-03-01T00:00:00 |
[
[
"Schubert",
"Gerald",
""
],
[
"Hager",
"Georg",
""
],
[
"Fehske",
"Holger",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0910.4839
|
Patrick Erik Bradley
|
Patrick Erik Bradley
|
A $p$-adic RanSaC algorithm for stereo vision using Hensel lifting
|
15 pages; typos removed, abstract changed, computation error removed
|
p-Adic Numbers, Ultrametric Analysis, and Applications, Vol. 2,
No. 1 (2010), 55-67
|
10.1134/S2070046610010048
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A $p$-adic variation of the Ran(dom) Sa(mple) C(onsensus) method for solving
the relative pose problem in stereo vision is developped. From two 2-adically
encoded images a random sample of five pairs of corresponding points is taken,
and the equations for the essential matrix are solved by lifting solutions
modulo 2 to the 2-adic integers. A recently devised $p$-adic hierarchical
classification algorithm imitating the known LBG quantisation method classifies
the solutions for all the samples after having determined the number of
clusters using the known intra-inter validity of clusterings. In the successful
case, a cluster ranking will determine the cluster containing a 2-adic
approximation to the "true" solution of the problem.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 09:34:29 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Nov 2009 17:24:27 GMT"
}
] | 2010-02-15T00:00:00 |
[
[
"Bradley",
"Patrick Erik",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0910.4854
|
Serguei Mokhov
|
Serguei A. Mokhov and Yingying She
|
Yet Another Pacman 3D Adventures
|
31 pages, 8 figures. A 2006 report, corresponding to the open source
project here: http://sourceforge.net/projects/yap3dad/
| null | null | null |
cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This game is meant to be extension of the overly-beaten pacman-style game
(code-named "Yet Another Pacman 3D Adventures", or YAP3DAD) from the proposed
ideas and other projects with advance visual and computer graphics features,
including a-game-in-a-game approach. The project is an open-source project
published on SourceForge.net for possible future development and extension.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 10:55:16 GMT"
}
] | 2009-10-27T00:00:00 |
[
[
"Mokhov",
"Serguei A.",
""
],
[
"She",
"Yingying",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0910.4865
|
Jan Treibig
|
Jan Treibig, Georg Hager, Gerhard Wellein
|
Multi-core architectures: Complexities of performance prediction and the
impact of cache topology
|
18 pages
| null | null | null |
cs.PF cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The balance metric is a simple approach to estimate the performance of
bandwidth-limited loop kernels. However, applying the method to in-cache
situations and modern multi-core architectures yields unsatisfactory results.
This paper analyzes the in uence of cache hierarchy design on performance
predictions for bandwidth-limited loop kernels on current mainstream
processors. We present a diagnostic model with improved predictive power,
correcting the limitations of the simple balance metric. The importance of code
execution overhead even in bandwidth-bound situations is emphasized. Finally we
analyze the impact of synchronization overhead on multi-threaded performance
with a special emphasis on the in uence of cache topology.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 12:48:02 GMT"
}
] | 2009-10-27T00:00:00 |
[
[
"Treibig",
"Jan",
""
],
[
"Hager",
"Georg",
""
],
[
"Wellein",
"Gerhard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0910.4874
|
Lalitha Sankar
|
Lalitha Sankar, Jan Vondrak, and H. Vincent Poor
|
K-User Fading Interference Channels: The Ergodic Very Strong Case
|
Presented at the Forty-Seventh Annual Allerton Conference on
Communication, Control, and Computing, Sep. 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sufficient conditions required to achieve the interference-free capacity
region of ergodic fading K-user interference channels (IFCs) are obtained. In
particular, this capacity region is shown to be achieved when every receiver
decodes all K transmitted messages such that the channel statistics and the
waterfilling power policies for all K (interference-free) links satisfy a set
of K(K-1) ergodic very strong conditions. The result is also of independent
interest in combinatorics.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 13:30:17 GMT"
}
] | 2009-10-27T00:00:00 |
[
[
"Sankar",
"Lalitha",
""
],
[
"Vondrak",
"Jan",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.4899
|
Uwe Aickelin
|
Uwe Aickelin, Dipankar Dasgupta
|
Artificial Immune Systems
|
29 pages,4 figures,
|
Search Methodologies: Introductory Tutorials in Optimisation and
Decision Support Techniques, 375-399, 2005
| null | null |
cs.AI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The biological immune system is a robust, complex, adaptive system that
defends the body from foreign pathogens. It is able to categorize all cells (or
molecules) within the body as self-cells or non-self cells. It does this with
the help of a distributed task force that has the intelligence to take action
from a local and also a global perspective using its network of chemical
messengers for communication. There are two major branches of the immune
system. The innate immune system is an unchanging mechanism that detects and
destroys certain invading organisms, whilst the adaptive immune system responds
to previously unknown foreign cells and builds a response to them that can
remain in the body over a long period of time. This remarkable information
processing biological system has caught the attention of computer science in
recent years. A novel computational intelligence technique, inspired by
immunology, has emerged, called Artificial Immune Systems. Several concepts
from the immune have been extracted and applied for solution to real world
science and engineering problems. In this tutorial, we briefly describe the
immune system metaphors that are relevant to existing Artificial Immune Systems
methods. We will then show illustrative real-world problems suitable for
Artificial Immune Systems and give a step-by-step algorithm walkthrough for one
such problem. A comparison of the Artificial Immune Systems to other well-known
algorithms, areas for future work, tips & tricks and a list of resources will
round this tutorial off. It should be noted that as Artificial Immune Systems
is still a young and evolving field, there is not yet a fixed algorithm
template and hence actual implementations might differ somewhat from time to
time and from those examples given here.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 14:54:46 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Aickelin",
"Uwe",
""
],
[
"Dasgupta",
"Dipankar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0910.4901
|
Deniz Gunduz
|
Deniz Gunduz, Andrea Goldsmith, H. Vincent Poor
|
Distortion Exponent in MIMO Channels with Feedback
|
Presented at the IEEE Information Theory Workshop (ITW), Taormina,
Italy, Oct. 2009
| null |
10.1109/ITW.2009.5351220
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The transmission of a Gaussian source over a block-fading multiple antenna
channel in the presence of a feedback link is considered. The feedback link is
assumed to be an error and delay free link of capacity 1 bit per channel use.
Under the short-term power constraint, the optimal exponential behavior of the
end-to-end average distortion is characterized for all source-channel bandwidth
ratios. It is shown that the optimal transmission strategy is successive
refinement source coding followed by progressive transmission over the channel,
in which the channel block is allocated dynamically among the layers based on
the channel state using the feedback link as an instantaneous automatic repeat
request (ARQ) signal.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 15:09:47 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Gunduz",
"Deniz",
""
],
[
"Goldsmith",
"Andrea",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.4903
|
Uwe Aickelin
|
Julie Greensmith, Uwe Aickelin, Jamie Twycross
|
Articulation and Clarification of the Dendritic Cell Algorithm
|
14 pages, 4 figures, 5th International Conference on Artificial
Immune Systems (ICARIS2006)
|
Proceedings of 5th International Conference on Artificial Immune
Systems (ICARIS2006), 404-417, 2006
| null | null |
cs.AI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Dendritic Cell algorithm (DCA) is inspired by recent work in innate
immunity. In this paper a formal description of the DCA is given. The DCA is
described in detail, and its use as an anomaly detector is illustrated within
the context of computer security. A port scan detection task is performed to
substantiate the influence of signal selection on the behaviour of the
algorithm. Experimental results provide a comparison of differing input signal
mappings.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 15:13:04 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Greensmith",
"Julie",
""
],
[
"Aickelin",
"Uwe",
""
],
[
"Twycross",
"Jamie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0910.4932
|
Anthony Widjaja To
|
Anthony Widjaja To and Leonid Libkin
|
Algorithmic metatheorems for decidable LTL model checking over infinite
systems
|
Conference submission
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
By algorithmic metatheorems for a model checking problem P over
infinite-state systems we mean generic results that can be used to infer
decidability (possibly complexity) of P not only over a specific class of
infinite systems, but over a large family of classes of infinite systems. Such
results normally start with a powerful formalism of infinite-state systems,
over which P is undecidable, and assert decidability when is restricted by
means of an extra "semantic condition" C. We prove various algorithmic
metatheorems for the problems of model checking LTL and its two common
fragments LTL(Fs,Gs) and LTLdet over the expressive class of word/tree
automatic transition systems, which are generated by synchronized finite-state
transducers operating on finite words and trees. We present numerous
applications, where we derive (in a unified manner) many known and previously
unknown decidability and complexity results of model checking LTL and its
fragments over specific classes of infinite-state systems including pushdown
systems; prefix-recognizable systems; reversal-bounded counter systems with
discrete clocks and a free counter; concurrent pushdown systems with a bounded
number of context-switches; various subclasses of Petri nets; weakly extended
PA-processes; and weakly extended ground-tree rewrite systems. In all cases,we
are able to derive optimal (or near optimal) complexity. Finally, we pinpoint
the exact locations in the arithmetic and analytic hierarchies of the problem
of checking a relevant semantic condition and the LTL model checking problems
over all word/tree automatic systems.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 19:56:07 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Oct 2009 20:40:18 GMT"
}
] | 2009-10-28T00:00:00 |
[
[
"To",
"Anthony Widjaja",
""
],
[
"Libkin",
"Leonid",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.4955
|
Ashutosh Nayyar
|
Ashutosh Nayyar and Demosthenis Teneketzis
|
On the Structure of Real-Time Encoders and Decoders in a Multi-Terminal
Communication System
| null | null | null | null |
cs.IT math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A real-time communication system with two encoders communicating with a
single receiver over separate noisy channels is considered. The two encoders
make distinct partial observations of a Markov source. Each encoder must encode
its observations into a sequence of discrete symbols. The symbols are
transmitted over noisy channels to a finite memory receiver that attempts to
reconstruct some function of the state of the Markov source. Encoding and
decoding must be done in real-time, that is, the distortion measure does not
tolerate delays. Under the assumption that the encoders' observations are
conditionally independent Markov chains given an unobserved time-invariant
random variable, results on the structure of optimal real-time encoders and the
receiver are obtained. It is shown that there exist finite-dimensional
sufficient statistics for the encoders. The problem with noiseless channels and
perfect memory at the receiver is then considered. A new methodology to find
the structure of optimal real-time encoders is employed. A sufficient statistic
with a time-invariant domain is found for this problem. This methodology
exploits the presence of common information between the encoders and the
receiver when communication is over noiseless channels.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 19:16:23 GMT"
}
] | 2009-10-27T00:00:00 |
[
[
"Nayyar",
"Ashutosh",
""
],
[
"Teneketzis",
"Demosthenis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0910.5001
|
Gordana Dodig Crnkovic
|
Gordana Dodig-Crnkovic and Vincent C. M\"uller
|
A Dialogue Concerning Two World Systems: Info-Computational vs.
Mechanistic
| null | null | null | null |
cs.GL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The dialogue develops arguments for and against adopting a new world system,
info-computationalist naturalism, that is poised to replace the traditional
mechanistic world system. We try to figure out what the info-computational
paradigm would mean, in particular its pancomputationalism. We make some steps
towards developing the notion of computing that is necessary here, especially
in relation to traditional notions. We investigate whether pancomputationalism
can possibly provide the basic causal structure to the world, whether the
overall research programme appears productive and whether it can revigorate
computationalism in the philosophy of mind.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 22:50:08 GMT"
}
] | 2015-10-23T00:00:00 |
[
[
"Dodig-Crnkovic",
"Gordana",
""
],
[
"Müller",
"Vincent C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
0910.5002
|
Oleg Michailovich
|
Oleg Michailovich
|
An Iterative Shrinkage Approach to Total-Variation Image Restoration
|
The paper was submitted to the IEEE Transactions on Image Processing
on October 22nd, 2009
| null |
10.1109/TIP.2010.2090532
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of restoration of digital images from their degraded measurements
plays a central role in a multitude of practically important applications. A
particularly challenging instance of this problem occurs in the case when the
degradation phenomenon is modeled by an ill-conditioned operator. In such a
case, the presence of noise makes it impossible to recover a valuable
approximation of the image of interest without using some a priori information
about its properties. Such a priori information is essential for image
restoration, rendering it stable and robust to noise. Particularly, if the
original image is known to be a piecewise smooth function, one of the standard
priors used in this case is defined by the Rudin-Osher-Fatemi model, which
results in total variation (TV) based image restoration. The current arsenal of
algorithms for TV-based image restoration is vast. In the present paper, a
different approach to the solution of the problem is proposed based on the
method of iterative shrinkage (aka iterated thresholding). In the proposed
method, the TV-based image restoration is performed through a recursive
application of two simple procedures, viz. linear filtering and soft
thresholding. Therefore, the method can be identified as belonging to the group
of first-order algorithms which are efficient in dealing with images of
relatively large sizes. Another valuable feature of the proposed method
consists in its working directly with the TV functional, rather then with its
smoothed versions. Moreover, the method provides a single solution for both
isotropic and anisotropic definitions of the TV functional, thereby
establishing a useful connection between the two formulae.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 22:50:18 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Michailovich",
"Oleg",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0910.5027
|
Suhas Mathur
|
Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah, Wade Trappe and
Narayan Mandayam
|
Information-theoretically Secret Key Generation for Fading Wireless
Channels
|
32 pages, 9 figures. Manuscript first submitted to the IEEE
Transactions on Information Forensics and Security on 23 February,
2009.Portions of this work have been previous presented at the IEEE
International Symposium on Information Theory, Seattle, WA, July 2006 and ACM
Conference on Mobile Computing and Networking, San Francisco, CA, Sept. 2008
| null | null | null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The multipath-rich wireless environment associated with typical wireless
usage scenarios is characterized by a fading channel response that is
time-varying, location-sensitive, and uniquely shared by a given
transmitter-receiver pair. The complexity associated with a richly scattering
environment implies that the short-term fading process is inherently hard to
predict and best modeled stochastically, with rapid decorrelation properties in
space, time and frequency. In this paper, we demonstrate how the channel state
between a wireless transmitter and receiver can be used as the basis for
building practical secret key generation protocols between two entities. We
begin by presenting a scheme based on level crossings of the fading process,
which is well-suited for the Rayleigh and Rician fading models associated with
a richly scattering environment. Our level crossing algorithm is simple, and
incorporates a self-authenticating mechanism to prevent adversarial
manipulation of message exchanges during the protocol. Since the level crossing
algorithm is best suited for fading processes that exhibit symmetry in their
underlying distribution, we present a second and more powerful approach that is
suited for more general channel state distributions. This second approach is
motivated by observations from quantizing jointly Gaussian processes, but
exploits empirical measurements to set quantization boundaries and a heuristic
log likelihood ratio estimate to achieve an improved secret key generation
rate. We validate both proposed protocols through experimentations using a
customized 802.11a platform, and show for the typical WiFi channel that
reliable secret key establishment can be accomplished at rates on the order of
10 bits/second.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2009 02:01:52 GMT"
}
] | 2009-10-28T00:00:00 |
[
[
"Ye",
"Chunxuan",
""
],
[
"Mathur",
"Suhas",
""
],
[
"Reznik",
"Alex",
""
],
[
"Shah",
"Yogendra",
""
],
[
"Trappe",
"Wade",
""
],
[
"Mandayam",
"Narayan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.5040
|
Li Chen
|
Li Chen, Yong Liu, Feng Luo
|
A Note on Gradually Varied Functions and Harmonic Functions
|
7 pages and 2 figures
| null | null | null |
cs.DM math.CA
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Any constructive continuous function must have a gradually varied
approximation in compact space. However, the refinement of domain for
$\sigma-$-net might be very small. Keeping the original discretization (square
or triangulation), can we get some interesting properties related to gradual
variation? In this note, we try to prove that many harmonic functions are
gradually varied or near gradually varied; this means that the value of the
center point differs from that of its neighbor at most by 2. It is obvious that
most of the gradually varied functions are not harmonic.This note discusses
some of the basic harmonic functions in relation to gradually varied functions.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2009 04:11:04 GMT"
}
] | 2009-10-28T00:00:00 |
[
[
"Chen",
"Li",
""
],
[
"Liu",
"Yong",
""
],
[
"Luo",
"Feng",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
}
] |
0910.5046
|
Gene Cooperman
|
Ana Maria Visan, Artem Polyakov, Praveen S. Solanki, Kapil Arya, Tyler
Denniston, Gene Cooperman
|
Temporal Debugging using URDB
|
20 pages, 3 figures, 5 tables; software at urdb.sourceforge.net
| null | null | null |
cs.OS cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new style of temporal debugging is proposed. The new URDB debugger can
employ such techniques as temporal search for finding an underlying fault that
is causing a bug. This improves on the standard iterative debugging style,
which iteratively re-executes a program under debugger control in the search
for the underlying fault. URDB acts as a meta-debugger, with current support
for four widely used debuggers: gdb, MATLAB, python, and perl. Support for a
new debugger can be added in a few hours. Among its points of novelty are: (i)
the first reversible debuggers for MATLAB, python, and perl; (ii) support for
today's multi-core architectures; (iii) reversible debugging of multi-process
and distributed computations; and (iv) temporal search on changes in program
expressions. URDB gains its reversibility and temporal abilities through the
fast checkpoint-restart capability of DMTCP (Distributed MultiThreaded
CheckPointing). The recently enhanced DMTCP also adds ptrace support, enabling
one to freeze, migrate, and replicate debugging sessions.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2009 17:31:02 GMT"
}
] | 2009-10-28T00:00:00 |
[
[
"Visan",
"Ana Maria",
""
],
[
"Polyakov",
"Artem",
""
],
[
"Solanki",
"Praveen S.",
""
],
[
"Arya",
"Kapil",
""
],
[
"Denniston",
"Tyler",
""
],
[
"Cooperman",
"Gene",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0910.5073
|
Kenneth Shum
|
Kenneth W. Shum, Wing Shing Wong and Chung Shue Chen
|
A General Upper Bound on the Size of Constant-Weight Conflict-Avoiding
Codes
|
10 pages, 1 figure
|
IEEE Trans. Inform. Theory, vol. 56, no.7, p.3265-3276, Jul, 2010
|
10.1109/TIT.2010.2048508
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Conflict-avoiding codes are used in the multiple-access collision channel
without feedback. The number of codewords in a conflict-avoiding code is the
number of potential users that can be supported in the system. In this paper, a
new upper bound on the size of conflict-avoiding codes is proved. This upper
bound is general in the sense that it is applicable to all code lengths and all
Hamming weights. Several existing constructions for conflict-avoiding codes,
which are known to be optimal for Hamming weights equal to four and five, are
shown to be optimal for all Hamming weights in general.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2009 09:29:18 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Jun 2010 03:51:57 GMT"
},
{
"version": "v3",
"created": "Sat, 6 Nov 2010 09:32:23 GMT"
}
] | 2010-11-09T00:00:00 |
[
[
"Shum",
"Kenneth W.",
""
],
[
"Wong",
"Wing Shing",
""
],
[
"Chen",
"Chung Shue",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.5076
|
Hayato Takahashi
|
Hayato Takahashi
|
Algorithmic randomness and monotone complexity on product space
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study algorithmic randomness and monotone complexity on product of the set
of infinite binary sequences. We explore the following problems: monotone
complexity on product space, Lambalgen's theorem for correlated probability,
classification of random sets by likelihood ratio tests, decomposition of
complexity and independence, Bayesian statistics for individual random
sequences. Formerly Lambalgen's theorem for correlated probability is shown
under a uniform computability assumption in [H. Takahashi Inform. Comp. 2008].
In this paper we show the theorem without the assumption.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2009 10:10:09 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jun 2010 09:45:43 GMT"
}
] | 2010-06-29T00:00:00 |
[
[
"Takahashi",
"Hayato",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.5099
|
Yannick Chevalier
|
Yannick Chevalier (INRIA Lorraine - LORIA / LIFC), Michael Rusinowitch
(INRIA Lorraine - LORIA / LIFC)
|
Compiling and securing cryptographic protocols
|
A short version was submitted to IPL
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Protocol narrations are widely used in security as semi-formal notations to
specify conversations between roles. We define a translation from a protocol
narration to the sequences of operations to be performed by each role. Unlike
previous works, we reduce this compilation process to well-known decision
problems in formal protocol analysis. This allows one to define a natural
notion of prudent translation and to reuse many known results from the
literature in order to cover more crypto-primitives. In particular this work is
the first one to show how to compile protocols parameterised by the properties
of the available operations.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2009 11:46:50 GMT"
}
] | 2009-10-28T00:00:00 |
[
[
"Chevalier",
"Yannick",
"",
"INRIA Lorraine - LORIA / LIFC"
],
[
"Rusinowitch",
"Michael",
"",
"INRIA Lorraine - LORIA / LIFC"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.5107
|
Arno Pauly
|
Arno Pauly
|
The Complexity of Iterated Strategy Elimination
| null | null | null | null |
cs.CC cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the computational complexity of the question whether a certain
strategy can be removed from a game by means of iterated elimination of
dominated strategies. In particular, we study the influence of different
definitions of domination and of the number of different payoff values. In
addition, the consequence of restriction to constant-sum games is shown.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2009 12:40:17 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jan 2010 12:12:28 GMT"
}
] | 2010-01-20T00:00:00 |
[
[
"Pauly",
"Arno",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0910.5135
|
Matilde Marcolli
|
Yuri I. Manin, Matilde Marcolli
|
Error-correcting codes and phase transitions
|
amstex 57 pages, 3 eps figures
| null | null | null |
cs.IT math.IT math.QA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The theory of error-correcting codes is concerned with constructing codes
that optimize simultaneously transmission rate and relative minimum distance.
These conflicting requirements determine an asymptotic bound, which is a
continuous curve in the space of parameters. The main goal of this paper is to
relate the asymptotic bound to phase diagrams of quantum statistical mechanical
systems. We first identify the code parameters with Hausdorff and von Neumann
dimensions, by considering fractals consisting of infinite sequences of code
words. We then construct operator algebras associated to individual codes.
These are Toeplitz algebras with a time evolution for which the KMS state at
critical temperature gives the Hausdorff measure on the corresponding fractal.
We extend this construction to algebras associated to limit points of codes,
with non-uniform multi-fractal measures, and to tensor products over varying
parameters.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2009 14:40:50 GMT"
}
] | 2009-10-28T00:00:00 |
[
[
"Manin",
"Yuri I.",
""
],
[
"Marcolli",
"Matilde",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.QA",
"description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory",
"span": "(Quantum Algebra)"
}
] |
0910.5146
|
Maxim Raginsky
|
Maxim Raginsky, Rebecca M. Willett, Zachary T. Harmany, Roummel F.
Marcia
|
Compressed sensing performance bounds under Poisson noise
|
12 pages, 3 pdf figures; accepted for publication in IEEE
Transactions on Signal Processing
| null |
10.1109/TSP.2010.2049997
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes performance bounds for compressed sensing (CS) where the
underlying sparse or compressible (sparsely approximable) signal is a vector of
nonnegative intensities whose measurements are corrupted by Poisson noise. In
this setting, standard CS techniques cannot be applied directly for several
reasons. First, the usual signal-independent and/or bounded noise models do not
apply to Poisson noise, which is non-additive and signal-dependent. Second, the
CS matrices typically considered are not feasible in real optical systems
because they do not adhere to important constraints, such as nonnegativity and
photon flux preservation. Third, the typical $\ell_2$--$\ell_1$ minimization
leads to overfitting in the high-intensity regions and oversmoothing in the
low-intensity areas. In this paper, we describe how a feasible positivity- and
flux-preserving sensing matrix can be constructed, and then analyze the
performance of a CS reconstruction approach for Poisson data that minimizes an
objective function consisting of a negative Poisson log likelihood term and a
penalty term which measures signal sparsity. We show that, as the overall
intensity of the underlying signal increases, an upper bound on the
reconstruction error decays at an appropriate rate (depending on the
compressibility of the signal), but that for a fixed signal intensity, the
signal-dependent part of the error bound actually grows with the number of
measurements or sensors. This surprising fact is both proved theoretically and
justified based on physical intuition.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2009 15:34:31 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Mar 2010 14:50:09 GMT"
},
{
"version": "v3",
"created": "Sat, 1 May 2010 22:44:36 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Raginsky",
"Maxim",
""
],
[
"Willett",
"Rebecca M.",
""
],
[
"Harmany",
"Zachary T.",
""
],
[
"Marcia",
"Roummel F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.5147
|
Nikolaos Fountoulakis
|
Nikolaos Fountoulakis and Konstantinos Panagiotou
|
Sharp Load Thresholds for Cuckoo Hashing
|
26 pages
| null | null | null |
cs.DS cs.DM math.CO math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paradigm of many choices has influenced significantly the design of
efficient data structures and, most notably, hash tables. Cuckoo hashing is a
technique that extends this concept. There,we are given a table with $n$
locations, and we assume that each location can hold one item. Each item to be
inserted chooses randomly k>1 locations and has to be placed in any one of
them. How much load can cuckoo hashing handle before collisions prevent the
successful assignment of the available items to the chosen locations? Practical
evaluations of this method have shown that one can allocate a number of
elements that is a large proportion of the size of the table, being very close
to 1 even for small values of k such as 4 or 5.
In this paper we show that there is a critical value for this proportion:
with high probability, when the amount of available items is below this value,
then these can be allocated successfully, but when it exceeds this value, the
allocation becomes impossible. We give explicitly for each k>1 this critical
value. This answers an open question posed by Mitzenmacher (ESA '09) and
underpins theoretically the experimental results. Our proofs are based on the
translation of the question into a hypergraph setting, and the study of the
related typical properties of random k-uniform hypergraphs.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2009 15:37:28 GMT"
}
] | 2009-10-28T00:00:00 |
[
[
"Fountoulakis",
"Nikolaos",
""
],
[
"Panagiotou",
"Konstantinos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0910.5215
|
Shuai Fan
|
Shuai Fan, Lin Zhang and Yong Ren
|
Approximation Algorithms for Link Scheduling with Physical Interference
Model in Wireless Multi-hop Networks
|
9 pages
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The link scheduling in wireless multi-hop networks is addressed. Different
from most of work that adopt the protocol interference model which merely take
consideration of packet collisions, our proposed algorithms use the physical
interference model to reflect the aggregated signal to interference and noise
ratio (SINR), which is a more accurate abstraction of the real scenario. We
first propose a centralized scheduling method based on the Integer Linear
Programming (ILP) and resolve it by an approximate solution based on the
randomized rounding method. The probability bound of getting a guaranteed
approximate factor is given. We then extend the centralized algorithm to a
distributed solution, which is favorable in wireless networks. It is proven
that with the distributed scheduling method, all links can transmit without
interference, and the approximate ratio of the algorithm is also given.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2009 19:30:45 GMT"
}
] | 2009-10-28T00:00:00 |
[
[
"Fan",
"Shuai",
""
],
[
"Zhang",
"Lin",
""
],
[
"Ren",
"Yong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0910.5260
|
Sewoong Oh
|
Raghunandan H. Keshavan, Sewoong Oh
|
A Gradient Descent Algorithm on the Grassman Manifold for Matrix
Completion
|
26 pages, 15 figures
| null |
10.1016/j.trc.2012.12.007
| null |
cs.NA cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of reconstructing a low-rank matrix from a small
subset of its entries. In this paper, we describe the implementation of an
efficient algorithm called OptSpace, based on singular value decomposition
followed by local manifold optimization, for solving the low-rank matrix
completion problem. It has been shown that if the number of revealed entries is
large enough, the output of singular value decomposition gives a good estimate
for the original matrix, so that local optimization reconstructs the correct
matrix with high probability. We present numerical results which show that this
algorithm can reconstruct the low rank matrix exactly from a very small subset
of its entries. We further study the robustness of the algorithm with respect
to noise, and its performance on actual collaborative filtering datasets.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2009 22:19:31 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Nov 2009 23:35:13 GMT"
}
] | 2013-01-30T00:00:00 |
[
[
"Keshavan",
"Raghunandan H.",
""
],
[
"Oh",
"Sewoong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0910.5261
|
M. Kivanc Mihcak
|
Onur Ozyesil, M. Kivanc Mihcak, Yucel Altug
|
On Detection With Partial Information In The Gaussian Setup
|
Proceedings of the Forty-Seventh Annual Allerton Conference on
Communication, Control, and Computing, September 30-October 2, 2009,
Monticello, Illinois; 8 pages
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the problem of communication with partial information, where
there is an asymmetry between the transmitter and the receiver codebooks.
Practical applications of the proposed setup include the robust signal hashing
problem within the context of multimedia security and asymmetric communications
with resource-lacking receivers. We study this setup in a binary detection
theoretic context for the additive colored Gaussian noise channel. In our
proposed setup, the partial information available at the detector consists of
dimensionality-reduced versions of the transmitter codewords, where the
dimensionality reduction is achieved via a linear transform. We first derive
the corresponding MAP-optimal detection rule and the corresponding conditional
probability of error (conditioned on the partial information the detector
possesses). Then, we constructively quantify an optimal class of linear
transforms, where the cost function is the expected Chernoff bound on the
conditional probability of error of the MAP-optimal detector.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2009 22:15:48 GMT"
}
] | 2009-10-29T00:00:00 |
[
[
"Ozyesil",
"Onur",
""
],
[
"Mihcak",
"M. Kivanc",
""
],
[
"Altug",
"Yucel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.5264
|
Ashutosh Nayyar
|
Ashutosh Nayyar and Demosthenis Teneketzis
|
A Sequential Problem in Decentralized Detection with Communication
| null | null | null | null |
math.OC cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A sequential problem in decentralized detection is considered. Two observers
can make repeated noisy observations of a binary hypothesis on the state of the
environment. At any time, observer 1 can stop and send a final binary message
to observer 2 or it may continue to take more measurements. Every time observer
1 postpones its final message to observer 2, it incurs a penalty. Observer 2's
operation under two different scenarios is explored. In the first scenario,
observer 2 waits to receive the final message from observer 1 and then starts
taking measurements of its own. It is then faced with a stopping problem on
whether to stop and declare a decision on the hypothesis or to continue taking
measurements. In the second scenario, observer 2 starts taking measurements
from the beginning. It is then faced with a different stopping problem. At any
time, observer 2 can decide whether to stop and declare a decision on the
hypothesis or to continue to take more measurements and wait for observer 1 to
send its final message. Parametric characterization of optimal policies for the
two observers are obtained under both scenarios. A sequential methodology for
finding the optimal policies is presented. The parametric characterizations are
then extended to problem with increased communication alphabet for the final
message from observer 1 to observer 2; and to the case of multiple peripheral
sensors that each send a single final message to a coordinating sensor who
makes the final decision on the hypothesis.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2009 23:07:50 GMT"
}
] | 2009-10-29T00:00:00 |
[
[
"Nayyar",
"Ashutosh",
""
],
[
"Teneketzis",
"Demosthenis",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.5301
|
Abhinav Kumar
|
Abhinav Kumar, Satyanarayana V. Lokam, Vijay M. Patankar, Jayalal
Sarma M. N
|
Using Elimination Theory to construct Rigid Matrices
|
25 Pages, minor typos corrected
|
Computational Complexity 23 (2014), 531-563
|
10.1007/s00037-013-0061-0
| null |
cs.CC math.AG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The rigidity of a matrix A for target rank r is the minimum number of entries
of A that must be changed to ensure that the rank of the altered matrix is at
most r. Since its introduction by Valiant (1977), rigidity and similar
rank-robustness functions of matrices have found numerous applications in
circuit complexity, communication complexity, and learning complexity. Almost
all nxn matrices over an infinite field have a rigidity of (n-r)^2. It is a
long-standing open question to construct infinite families of explicit matrices
even with superlinear rigidity when r = Omega(n).
In this paper, we construct an infinite family of complex matrices with the
largest possible, i.e., (n-r)^2, rigidity. The entries of an n x n matrix in
this family are distinct primitive roots of unity of orders roughly exp(n^2 log
n). To the best of our knowledge, this is the first family of concrete (but not
entirely explicit) matrices having maximal rigidity and a succinct algebraic
description.
Our construction is based on elimination theory of polynomial ideals. In
particular, we use results on the existence of polynomials in elimination
ideals with effective degree upper bounds (effective Nullstellensatz). Using
elementary algebraic geometry, we prove that the dimension of the affine
variety of matrices of rigidity at most k is exactly n^2-(n-r)^2+k. Finally, we
use elimination theory to examine whether the rigidity function is
semi-continuous.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 07:56:23 GMT"
},
{
"version": "v2",
"created": "Sun, 23 Sep 2012 18:03:25 GMT"
},
{
"version": "v3",
"created": "Wed, 16 Apr 2014 04:17:57 GMT"
}
] | 2015-01-27T00:00:00 |
[
[
"Kumar",
"Abhinav",
""
],
[
"Lokam",
"Satyanarayana V.",
""
],
[
"Patankar",
"Vijay M.",
""
],
[
"N",
"Jayalal Sarma M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
0910.5339
|
Yunus Sarikaya
|
Yunus Sarikaya, Ozgur Ercetin
|
On Physically Secure and Stable Slotted ALOHA System
|
7 Pages, 8 Figures, Allerton 2009
| null | null | null |
cs.IT math.IT
|
http://creativecommons.org/licenses/by/3.0/
|
In this paper, we consider the standard discrete-time slotted ALOHA with a
finite number of terminals with infinite size buffers. In our study, we jointly
consider the stability of this system together with the physical layer
security. We conduct our studies on both dominant and original systems, where
in a dominant system each terminal always has a packet in its buffer unlike in
the original system. For N = 2, we obtain the secrecy-stability regions for
both dominant and original systems. Furthermore, we obtain the transmission
probabilities, which optimize system throughput. Lastly, this paper proposes a
new methodology in terms of obtaining the joint stability and secrecy regions.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 10:55:14 GMT"
}
] | 2009-10-29T00:00:00 |
[
[
"Sarikaya",
"Yunus",
""
],
[
"Ercetin",
"Ozgur",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.5370
|
Daniel Shumow
|
Daniel Shumow
|
Isogenies of Elliptic Curves: A Computational Approach
|
Submitted as a Masters Thesis in the Mathematics department of the
University of Washington
| null | null | null |
cs.CR cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Isogenies, the mappings of elliptic curves, have become a useful tool in
cryptology. These mathematical objects have been proposed for use in computing
pairings, constructing hash functions and random number generators, and
analyzing the reducibility of the elliptic curve discrete logarithm problem.
With such diverse uses, understanding these objects is important for anyone
interested in the field of elliptic curve cryptography. This paper, targeted at
an audience with a knowledge of the basic theory of elliptic curves, provides
an introduction to the necessary theoretical background for understanding what
isogenies are and their basic properties. This theoretical background is used
to explain some of the basic computational tasks associated with isogenies.
Herein, algorithms for computing isogenies are collected and presented with
proofs of correctness and complexity analyses. As opposed to the complex
analytic approach provided in most texts on the subject, the proofs in this
paper are primarily algebraic in nature. This provides alternate explanations
that some with a more concrete or computational bias may find more clear.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 01:48:42 GMT"
}
] | 2009-10-29T00:00:00 |
[
[
"Shumow",
"Daniel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0910.5380
|
Rajesh Chitnis
|
L. Sunil Chandran, Rajesh Chitnis, Ramanjit Kumar
|
On the SIG dimension of trees under $L_{\infty}$ metric
|
24 pages, 8 figures
| null | null | null |
math.CO cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the $SIG$ dimension of trees under $L_{\infty}$ metric and answer an
open problem posed by Michael and Quint (Discrete Applied Mathematics: 127,
pages 447-460, 2003). Let $T$ be a tree with atleast two vertices. For each
$v\in V(T)$, let leaf-degree$(v)$ denote the number of neighbours of $v$ that
are leaves. We define the maximum leaf-degree as $\alpha(T) = \max_{x \in
V(T)}$ leaf-degree$(x)$. Let $S = \{v\in V(T) |$ leaf-degree$(v) = \alpha\}$.
If $|S| = 1$, we define $\beta(T) = \alpha(T) - 1$. Otherwise define $\beta(T)
= \alpha(T)$. We show that for a tree $T$, $SIG_\infty(T) = \lceil \log_2(\beta
+ 2)\rceil$ where $\beta = \beta (T)$, provided $\beta$ is not of the form $2^k
- 1$, for some positive integer $k \geq 1$. If $\beta = 2^k - 1$, then
$SIG_\infty (T) \in \{k, k+1\}$. We show that both values are possible.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 13:55:42 GMT"
},
{
"version": "v2",
"created": "Sun, 9 Oct 2011 16:51:33 GMT"
}
] | 2011-10-11T00:00:00 |
[
[
"Chandran",
"L. Sunil",
""
],
[
"Chitnis",
"Rajesh",
""
],
[
"Kumar",
"Ramanjit",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.5386
|
Arijit Laha Ph.D.
|
Arijit Laha
|
A theoretical foundation for building Knowledge-work Support Systems
|
40 pages, Created June 2008
| null | null | null |
cs.HC cs.DL cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we propose a novel approach aimed at building a new class of
information system platforms which we call the "Knowledge-work Support Systems"
or KwSS. KwSS can play a significant role in enhancing the IS support for
knowledge management processes, including those customarily identified as less
amenable to IS support. In our approach we try to enhance basic functionalities
provided by the computer-based information systems, namely, that of improving
the efficiency of the knowledge workers in accessing, processing and creating
useful information. The improvement, along with proper focus on cultural,
social and other aspects of the knowledge management processes, can enhance the
workers' efficiency significantly in performing high quality knowledge works.
In order to build the proposed approach, we develop several new concepts. The
approach analyzes the information availability and usage from the knowledge
workers and their works' perspectives and consequently brings forth more
transparency in various aspects of information life-cycle with respect to
knowledge management. KsSSes are technology platforms, which can be implemented
independently as well as in conjunction with other knowledge management and
data management technology platforms, to provide significant boost in the
knowledge capabilities of organizations.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 14:31:53 GMT"
}
] | 2009-10-29T00:00:00 |
[
[
"Laha",
"Arijit",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0910.5399
|
Guy McCusker
|
Guy McCusker
|
A Graph Model for Imperative Computation
| null |
Logical Methods in Computer Science, Volume 6, Issue 1 (January
12, 2010) lmcs:919
|
10.2168/LMCS-6(1:2)2010
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Scott's graph model is a lambda-algebra based on the observation that
continuous endofunctions on the lattice of sets of natural numbers can be
represented via their graphs. A graph is a relation mapping finite sets of
input values to output values.
We consider a similar model based on relations whose input values are finite
sequences rather than sets. This alteration means that we are taking into
account the order in which observations are made. This new notion of graph
gives rise to a model of affine lambda-calculus that admits an interpretation
of imperative constructs including variable assignment, dereferencing and
allocation.
Extending this untyped model, we construct a category that provides a model
of typed higher-order imperative computation with an affine type system. An
appropriate language of this kind is Reynolds's Syntactic Control of
Interference. Our model turns out to be fully abstract for this language. At a
concrete level, it is the same as Reddy's object spaces model, which was the
first "state-free" model of a higher-order imperative programming language and
an important precursor of games models. The graph model can therefore be seen
as a universal domain for Reddy's model.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 15:09:12 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Jan 2010 22:51:53 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"McCusker",
"Guy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0910.5405
|
Uwe Aickelin
|
Jan Feyereisl, Uwe Aickelin
|
Artificial Immune Tissue using Self-Orgamizing Networks
|
2 pages, 1 figure, Workshop on Artificial Immune Systems and Immune
Systems Modelling (AISB06)
| null | null | null |
cs.AI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As introduced by Bentley et al. (2005), artificial immune systems (AIS) are
lacking tissue, which is present in one form or another in all living
multi-cellular organisms. Some have argued that this concept in the context of
AIS brings little novelty to the already saturated field of the immune inspired
computational research. This article aims to show that such a component of an
AIS has the potential to bring an advantage to a data processing algorithm in
terms of data pre-processing, clustering and extraction of features desired by
the immune inspired system. The proposed tissue algorithm is based on
self-organizing networks, such as self-organizing maps (SOM) developed by
Kohonen (1996) and an analogy of the so called Toll-Like Receptors (TLR)
affecting the activation function of the clusters developed by the SOM.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 15:36:33 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Feyereisl",
"Jan",
""
],
[
"Aickelin",
"Uwe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0910.5410
|
David Fernandez-Amoros
|
David Fernandez-Amoros, Julio Gonzalo, Felisa Verdejo
|
The Uned systems at Senseval-2
|
latex2e, 5 pages, appeared in SENSEVAL-2, held with ACL-02
|
In Proceedings of the Second International Workshop on Evaluating
Word Sense Disambiguation Systems (SENSEVAL), Toulouse 2002
| null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We have participated in the SENSEVAL-2 English tasks (all words and lexical
sample) with an unsupervised system based on mutual information measured over a
large corpus (277 million words) and some additional heuristics. A supervised
extension of the system was also presented to the lexical sample task.
Our system scored first among unsupervised systems in both tasks: 56.9%
recall in all words, 40.2% in lexical sample. This is slightly worse than the
first sense heuristic for all words and 3.6% better for the lexical sample, a
strong indication that unsupervised Word Sense Disambiguation remains being a
strong challenge.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 16:58:27 GMT"
}
] | 2009-10-29T00:00:00 |
[
[
"Fernandez-Amoros",
"David",
""
],
[
"Gonzalo",
"Julio",
""
],
[
"Verdejo",
"Felisa",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.5419
|
David Fernandez-Amoros
|
David Fernandez-Amoros
|
Word Sense Disambiguation Based on Mutual Information and Syntactic
Patterns
|
latex2e, 5 pages, appeared in SENSEVAL-3, Barcelona 2004
|
In proceedings of the Third International Workshop on Evaluating
Word Sense Disambiguation Systems (SENSEVAL) 2004, Barcelona
| null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes a hybrid system for WSD, presented to the English
all-words and lexical-sample tasks, that relies on two different unsupervised
approaches. The first one selects the senses according to mutual information
proximity between a context word a variant of the sense. The second heuristic
analyzes the examples of use in the glosses of the senses so that simple
syntactic patterns are inferred. This patterns are matched against the
disambiguation contexts. We show that the first heuristic obtains a precision
and recall of .58 and .35 respectively in the all words task while the second
obtains .80 and .25. The high precision obtained recommends deeper research of
the techniques. Results for the lexical sample task are also provided.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 17:03:00 GMT"
}
] | 2009-10-29T00:00:00 |
[
[
"Fernandez-Amoros",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.5426
|
Alonso Silva Allende
|
Alonso Silva, Eitan Altman, Pierre Bernhard, Merouane Debbah
|
Continuum Equilibria and Global Optimization for Routing in Dense Static
Ad Hoc Networks
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider massively dense ad hoc networks and study their continuum limits
as the node density increases and as the graph providing the available routes
becomes a continuous area with location and congestion dependent costs. We
study both the global optimal solution as well as the non-cooperative routing
problem among a large population of users where each user seeks a path from its
origin to its destination so as to minimize its individual cost. Finally, we
seek for a (continuum version of the) Wardrop equilibrium. We first show how to
derive meaningful cost models as a function of the scaling properties of the
capacity of the network and of the density of nodes. We present various
solution methodologies for the problem: (1) the viscosity solution of the
Hamilton-Jacobi-Bellman equation, for the global optimization problem, (2) a
method based on Green's Theorem for the least cost problem of an individual,
and (3) a solution of the Wardrop equilibrium problem using a transformation
into an equivalent global optimization problem.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 16:47:51 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Oct 2009 14:11:52 GMT"
}
] | 2009-10-29T00:00:00 |
[
[
"Silva",
"Alonso",
""
],
[
"Altman",
"Eitan",
""
],
[
"Bernhard",
"Pierre",
""
],
[
"Debbah",
"Merouane",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0910.5434
|
Edoardo Di Napoli
|
Matthias Petschow, Edoardo Di Napoli and Paolo Bientinesi
|
An Example of Symmetry Exploitation for Energy-related Eigencomputations
|
To appear in the proceedings of the 7th International Conference on
Computational Methods in Science and Engineering (ICCMSE '09)
| null | null |
AICES-2009-18
|
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the most used approaches in simulating materials is the tight-binding
approximation. When using this method in a material simulation, it is necessary
to compute the eigenvalues and eigenvectors of the Hamiltonian describing the
system. In general, the system possesses few explicit symmetries. Due to them,
the problem has many degenerate eigenvalues. The ambiguity in choosing a
orthonormal basis of the invariant subspaces, associated with degenerate
eigenvalues, will result in eigenvectors which are not invariant under the
action of the symmetry operators in matrix form. A meaningful computation of
the eigenvectors needs to take those symmetries into account. A natural choice
is a set of eigenvectors, which simultaneously diagonalizes the Hamiltonian and
the symmetry matrices. This is possible because all the matrices commute with
each other. The simultaneous eigenvectors and the corresponding eigenvalues
will be in a parametrized form in terms of the lattice momentum components.
This functional dependence of the eigenvalues is the dispersion relation and
describes the band structure of a material. Therefore it is important to find
this functional dependence in any numerical computation related to material
properties.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 17:02:17 GMT"
}
] | 2009-10-29T00:00:00 |
[
[
"Petschow",
"Matthias",
""
],
[
"Di Napoli",
"Edoardo",
""
],
[
"Bientinesi",
"Paolo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0910.5435
|
Mark Tygert
|
Mark Tygert
|
Fast algorithms for spherical harmonic expansions, III
|
14 pages, 1 figure, 6 tables
|
Fast algorithms for spherical harmonic expansions, III, Journal of
Computational Physics, 229 (18): 6181-6192, 2010
|
10.1016/j.jcp.2010.05.004
| null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We accelerate the computation of spherical harmonic transforms, using what is
known as the butterfly scheme. This provides a convenient alternative to the
approach taken in the second paper from this series on "Fast algorithms for
spherical harmonic expansions." The requisite precomputations become manageable
when organized as a "depth-first traversal" of the program's control-flow
graph, rather than as the perhaps more natural "breadth-first traversal" that
processes one-by-one each level of the multilevel procedure. We illustrate the
results via several numerical examples.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 17:03:05 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Oct 2009 16:57:59 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Oct 2009 19:19:55 GMT"
},
{
"version": "v4",
"created": "Tue, 17 Nov 2009 19:23:19 GMT"
},
{
"version": "v5",
"created": "Sun, 13 Dec 2009 18:48:39 GMT"
},
{
"version": "v6",
"created": "Mon, 5 Apr 2010 17:16:54 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Tygert",
"Mark",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0910.5454
|
Patrick C. McGuire
|
P.C. McGuire, C. Gross, L. Wendt, A. Bonnici, V. Souza-Egipsy, J.
Ormo, E. Diaz-Martinez, B.H. Foing, R. Bose, S. Walter, M. Oesker, J. Ontrup,
R. Haschke, H. Ritter
|
The Cyborg Astrobiologist: Testing a Novelty-Detection Algorithm on Two
Mobile Exploration Systems at Rivas Vaciamadrid in Spain and at the Mars
Desert Research Station in Utah
|
28 pages, 12 figures, accepted for publication in the International
Journal of Astrobiology
|
International Journal of Astrobiology, Vol. 9, pp. 11-27 (2010).
|
10.1017/S1473550409990358
| null |
cs.CV astro-ph.EP astro-ph.IM cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
(ABRIDGED) In previous work, two platforms have been developed for testing
computer-vision algorithms for robotic planetary exploration (McGuire et al.
2004b,2005; Bartolo et al. 2007). The wearable-computer platform has been
tested at geological and astrobiological field sites in Spain (Rivas
Vaciamadrid and Riba de Santiuste), and the phone-camera has been tested at a
geological field site in Malta. In this work, we (i) apply a Hopfield
neural-network algorithm for novelty detection based upon color, (ii) integrate
a field-capable digital microscope on the wearable computer platform, (iii)
test this novelty detection with the digital microscope at Rivas Vaciamadrid,
(iv) develop a Bluetooth communication mode for the phone-camera platform, in
order to allow access to a mobile processing computer at the field sites, and
(v) test the novelty detection on the Bluetooth-enabled phone-camera connected
to a netbook computer at the Mars Desert Research Station in Utah. This systems
engineering and field testing have together allowed us to develop a real-time
computer-vision system that is capable, for example, of identifying lichens as
novel within a series of images acquired in semi-arid desert environments. We
acquired sequences of images of geologic outcrops in Utah and Spain consisting
of various rock types and colors to test this algorithm. The algorithm robustly
recognized previously-observed units by their color, while requiring only a
single image or a few images to learn colors as familiar, demonstrating its
fast learning capability.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 18:26:39 GMT"
}
] | 2010-01-08T00:00:00 |
[
[
"McGuire",
"P. C.",
""
],
[
"Gross",
"C.",
""
],
[
"Wendt",
"L.",
""
],
[
"Bonnici",
"A.",
""
],
[
"Souza-Egipsy",
"V.",
""
],
[
"Ormo",
"J.",
""
],
[
"Diaz-Martinez",
"E.",
""
],
[
"Foing",
"B. H.",
""
],
[
"Bose",
"R.",
""
],
[
"Walter",
"S.",
""
],
[
"Oesker",
"M.",
""
],
[
"Ontrup",
"J.",
""
],
[
"Haschke",
"R.",
""
],
[
"Ritter",
"H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Physics",
"code": "astro-ph.EP",
"description": "Interplanetary medium, planetary physics, planetary astrobiology, extrasolar planets, comets, asteroids, meteorites. Structure and formation of the solar system",
"span": "(Earth and Planetary Astrophysics)"
},
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0910.5461
|
Manqi Zhao
|
Manqi Zhao and Venkatesh Saligrama
|
Anomaly Detection with Score functions based on Nearest Neighbor Graphs
|
10 pages, 10 figures, accepted by NIPS 2009
| null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a novel non-parametric adaptive anomaly detection algorithm for
high dimensional data based on score functions derived from nearest neighbor
graphs on $n$-point nominal data. Anomalies are declared whenever the score of
a test sample falls below $\alpha$, which is supposed to be the desired false
alarm level. The resulting anomaly detector is shown to be asymptotically
optimal in that it is uniformly most powerful for the specified false alarm
level, $\alpha$, for the case when the anomaly density is a mixture of the
nominal and a known density. Our algorithm is computationally efficient, being
linear in dimension and quadratic in data size. It does not require choosing
complicated tuning parameters or function approximation classes and it can
adapt to local structure such as local change in dimensionality. We demonstrate
the algorithm on both artificial and real data sets in high dimensional feature
spaces.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 18:46:41 GMT"
}
] | 2009-10-29T00:00:00 |
[
[
"Zhao",
"Manqi",
""
],
[
"Saligrama",
"Venkatesh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0910.5516
|
Steve Gregory
|
Steve Gregory
|
Finding overlapping communities in networks by label propagation
| null |
New J. Phys. 12 103018 (2010)
|
10.1088/1367-2630/12/10/103018
| null |
physics.soc-ph cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose an algorithm for finding overlapping community structure in very
large networks. The algorithm is based on the label propagation technique of
Raghavan, Albert, and Kumara, but is able to detect communities that overlap.
Like the original algorithm, vertices have labels that propagate between
neighbouring vertices so that members of a community reach a consensus on their
community membership. Our main contribution is to extend the label and
propagation step to include information about more than one community: each
vertex can now belong to up to v communities, where v is the parameter of the
algorithm. Our algorithm can also handle weighted and bipartite networks. Tests
on an independently designed set of benchmarks, and on real networks, show the
algorithm to be highly effective in recovering overlapping communities. It is
also very fast and can process very large and dense networks in a short time.
|
[
{
"version": "v1",
"created": "Wed, 28 Oct 2009 22:52:11 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Feb 2010 20:47:51 GMT"
},
{
"version": "v3",
"created": "Thu, 14 Oct 2010 18:25:42 GMT"
}
] | 2010-10-15T00:00:00 |
[
[
"Gregory",
"Steve",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
}
] |
0910.5535
|
P\'all Melsted
|
Alan Frieze, P\'all Melsted
|
Maximum Matchings in Random Bipartite Graphs and the Space Utilization
of Cuckoo Hashtables
| null | null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the the following question in Random Graphs. We are given two
disjoint sets $L,R$ with $|L|=n=\alpha m$ and $|R|=m$. We construct a random
graph $G$ by allowing each $x\in L$ to choose $d$ random neighbours in $R$. The
question discussed is as to the size $\mu(G)$ of the largest matching in $G$.
When considered in the context of Cuckoo Hashing, one key question is as to
when is $\mu(G)=n$ whp? We answer this question exactly when $d$ is at least
four. We also establish a precise threshold for when Phase 1 of the Karp-Sipser
Greedy matching algorithm suffices to compute a maximum matching whp.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 02:29:42 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Nov 2009 16:16:33 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Nov 2009 19:49:44 GMT"
}
] | 2009-11-17T00:00:00 |
[
[
"Frieze",
"Alan",
""
],
[
"Melsted",
"Páll",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0910.5537
|
Hana Godrich
|
Hana Godrich, Alexander M. Haimovich, and H. Vincent Poor
|
An Analysis of Phase Synchronization Mismatch Sensitivity for Coherent
MIMO Radar Systems
|
To be presented at CAMSAP 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this study, the hybrid Cramer-Rao bound (CRB) is developed for target
localization, to establish the sensitivity of the estimation mean-square error
(MSE) to the level of phase synchronization mismatch in coherent Multiple-Input
Multiple-Output (MIMO) radar systems with widely distributed antennas. The
lower bound on the MSE is derived for the joint estimation of the vector of
unknown parameters, consisting of the target location and the mismatch of the
allegedly known system parameters, i.e., phase offsets at the radars.
Synchronization errors are modeled as being random and Gaussian. A closed-form
expression for the hybrid CRB is derived for the case of orthogonal
waveforms.The bound on the target localization MSE is expressed as the sum of
two terms - the first represents the CRB with no phase mismatch, and the second
captures the mismatch effect. The latter is shown to depend on the phase error
variance, the number of mismatched transmitting and receiving sensors and the
system geometry. For a given phase synchronization error variance, this
expression offers the means to analyze the achievable localization accuracy.
Alternatively, for a predetermined localization MSE target value, the derived
expression may be used to determine the necessary phase synchronization level
in the distributed system.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 02:31:43 GMT"
}
] | 2009-10-30T00:00:00 |
[
[
"Godrich",
"Hana",
""
],
[
"Haimovich",
"Alexander M.",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.5542
|
Alexander Spirov
|
Alexander V. Spirov, Alexander B. Kazansky, Leonid Zamdborg, Juan J.
Merelo and Vladimir F. Levchenko
|
Forced Evolution in Silico by Artificial Transposons and their Genetic
Operators: The John Muir Ant Problem
|
33 pages
| null | null | null |
cs.NE cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modern evolutionary computation utilizes heuristic optimizations based upon
concepts borrowed from the Darwinian theory of natural selection. We believe
that a vital direction in this field must be algorithms that model the activity
of genomic parasites, such as transposons, in biological evolution. This
publication is our first step in the direction of developing a minimal
assortment of algorithms that simulate the role of genomic parasites.
Specifically, we started in the domain of genetic algorithms (GA) and selected
the Artificial Ant Problem as a test case. We define these artificial
transposons as a fragment of an ant's code that possesses properties that cause
it to stand apart from the rest. We concluded that artificial transposons,
analogous to real transposons, are truly capable of acting as intelligent
mutators that adapt in response to an evolutionary problem in the course of
co-evolution with their hosts.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 03:11:12 GMT"
}
] | 2009-10-30T00:00:00 |
[
[
"Spirov",
"Alexander V.",
""
],
[
"Kazansky",
"Alexander B.",
""
],
[
"Zamdborg",
"Leonid",
""
],
[
"Merelo",
"Juan J.",
""
],
[
"Levchenko",
"Vladimir F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.5559
|
Damien Chablat
|
Damien Chablat (IRCCyN, CIM), Philippe Wenger (IRCCyN)
|
On the characterization of the regions of feasible trajectories in the
workspace of parallel manipulators
| null |
Tenth World Congress On The Theory Of Machines And Mechanisms,
Oulu : Finland (1999)
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It was shown recently that parallel manipulators with several inverse
kinematic solutions have the ability to avoid parallel singularities [Chablat
1998a] and self-collisions [Chablat 1998b] by choosing appropriate joint
configurations for the legs. In effect, depending on the joint configurations
of the legs, a given configuration of the end-effector may or may not be free
of singularity and collision. Characterization of the
collision/singularity-free workspace is useful but may be insufficient since
two configurations can be accessible without collisions nor singularities but
it may not exist a feasible trajectory between them. The goal of this paper is
to define the maximal regions of the workspace where it is possible to execute
trajectories. Twodifferent families of regions are defined : 1. those regions
where the end-effector can move between any set of points, and 2. the regions
where any continuous path can be tracked. These regions are characterized from
the notion of aspects and free-aspects recently defined for parallel
manipulators [Chablat 1998b]. The construction of these regions is achieved by
enrichment techniques and using an extension of the octree structures to spaces
of dimension greater than three. Illustrative examples show the interest of
this study to the optimization of trajectories and the design of parallel
manipulators.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 06:59:32 GMT"
}
] | 2009-10-30T00:00:00 |
[
[
"Chablat",
"Damien",
"",
"IRCCyN, CIM"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0910.5564
|
Kees Middelburg
|
J. A. Bergstra, C. A. Middelburg
|
Instruction sequence processing operators
|
37 pages; missing equations in table 3 added; combined with
arXiv:0911.1851 [cs.PL] and arXiv:0911.5018 [cs.LO]; introduction and
concluding remarks rewritten; remarks and examples added; minor error in
proof of theorem 4 corrected
|
Acta Informatica, 49(3):139--172, 2012
|
10.1007/s00236-012-0154-2
| null |
cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Instruction sequence is a key concept in practice, but it has as yet not come
prominently into the picture in theoretical circles. This paper concerns
instruction sequences, the behaviours produced by them under execution, the
interaction between these behaviours and components of the execution
environment, and two issues relating to computability theory. Positioning
Turing's result regarding the undecidability of the halting problem as a result
about programs rather than machines, and taking instruction sequences as
programs, we analyse the autosolvability requirement that a program of a
certain kind must solve the halting problem for all programs of that kind. We
present novel results concerning this autosolvability requirement. The analysis
is streamlined by using the notion of a functional unit, which is an abstract
state-based model of a machine. In the case where the behaviours exhibited by a
component of an execution environment can be viewed as the behaviours of a
machine in its different states, the behaviours concerned are completely
determined by a functional unit. The above-mentioned analysis involves
functional units whose possible states represent the possible contents of the
tapes of Turing machines with a particular tape alphabet. We also investigate
functional units whose possible states are the natural numbers. This
investigation yields a novel computability result, viz. the existence of a
universal computable functional unit for natural numbers.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 07:41:27 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Nov 2009 08:01:30 GMT"
},
{
"version": "v3",
"created": "Sun, 17 Oct 2010 20:17:01 GMT"
},
{
"version": "v4",
"created": "Mon, 26 Dec 2011 13:43:37 GMT"
},
{
"version": "v5",
"created": "Wed, 7 Mar 2012 08:40:16 GMT"
}
] | 2012-05-07T00:00:00 |
[
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0910.5577
|
Ilkka Norros
|
Ilkka Norros, Hannu Reittu, Timo Eirola
|
On the stability of two-chunk file-sharing systems
|
19 pages, 7 figures
|
Queueing Systems (2011) 67: 183
|
10.1007/s11134-011-9209-2
| null |
cs.OS math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider five different peer-to-peer file sharing systems with two chunks,
with the aim of finding chunk selection algorithms that have provably stable
performance with any input rate and assuming non-altruistic peers who leave the
system immediately after downloading the second chunk. We show that many
algorithms that first looked promising lead to unstable or oscillating
behavior. However, we end up with a system with desirable properties. Most of
our rigorous results concern the corresponding deterministic large system
limits, but in two simplest cases we provide proofs for the stochastic systems
also.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 08:38:32 GMT"
}
] | 2018-10-24T00:00:00 |
[
[
"Norros",
"Ilkka",
""
],
[
"Reittu",
"Hannu",
""
],
[
"Eirola",
"Timo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0910.5595
|
Shohreh Sharif Mansouri
|
Shohreh Sharif Mansouri and Elena Dubrova
|
An Improved Implementation of Grain
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A common approach to protect confidential information is to use a stream
cipher which combines plain text bits with a pseudo-random bit sequence. Among
the existing stream ciphers, Non-Linear Feedback Shift Register (NLFSR)-based
ones provide the best trade-off between cryptographic security and hardware
efficiency. In this paper, we show how to further improve the hardware
efficiency of Grain stream cipher. By transforming the NLFSR of Grain from its
original Fibonacci configuration to the Galois configuration and by introducing
a clock division block, we double the throughput of the 80 and 128-bit key
1bit/cycle architectures of Grain with no area penalty.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 09:44:02 GMT"
}
] | 2009-10-30T00:00:00 |
[
[
"Mansouri",
"Shohreh Sharif",
""
],
[
"Dubrova",
"Elena",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0910.5599
|
Dror Rawitz
|
Boaz Patt-Shamir, Dror Rawitz
|
Vector Bin Packing with Multiple-Choice
| null | null |
10.1007/978-3-642-13731-0_24
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a variant of bin packing called multiple-choice vector bin
packing. In this problem we are given a set of items, where each item can be
selected in one of several $D$-dimensional incarnations. We are also given $T$
bin types, each with its own cost and $D$-dimensional size. Our goal is to pack
the items in a set of bins of minimum overall cost. The problem is motivated by
scheduling in networks with guaranteed quality of service (QoS), but due to its
general formulation it has many other applications as well. We present an
approximation algorithm that is guaranteed to produce a solution whose cost is
about $\ln D$ times the optimum. For the running time to be polynomial we
require $D=O(1)$ and $T=O(\log n)$. This extends previous results for vector
bin packing, in which each item has a single incarnation and there is only one
bin type. To obtain our result we also present a PTAS for the multiple-choice
version of multidimensional knapsack, where we are given only one bin and the
goal is to pack a maximum weight set of (incarnations of) items in that bin.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 10:00:37 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Patt-Shamir",
"Boaz",
""
],
[
"Rawitz",
"Dror",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.5643
|
Alonso Silva Allende
|
Alonso Silva, Eitan Altman, Merouane Debbah, Giuseppa Alfano
|
Magnetworks: how mobility impacts the design of Mobile Networks
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we study the optimal placement and optimal number of active
relay nodes through the traffic density in mobile sensor ad-hoc networks. We
consider a setting in which a set of mobile sensor sources is creating data and
a set of mobile sensor destinations receiving that data. We make the assumption
that the network is massively dense, i.e., there are so many sources,
destinations, and relay nodes, that it is best to describe the network in terms
of macroscopic parameters, such as their spatial density, rather than in terms
of microscopic parameters, such as their individual placements.
We focus on a particular physical layer model that is characterized by the
following assumptions: i) the nodes must only transport the data from the
sources to the destinations, and do not need to sense the data at the sources,
or deliver them at the destinations once the data arrive at their physical
locations, and ii) the nodes have limited bandwidth available to them, but they
use it optimally to locally achieve the network capacity.
In this setting, the optimal distribution of nodes induces a traffic density
that resembles the electric displacement that will be created if we substitute
the sources and destinations with positive and negative charges respectively.
The analogy between the two settings is very tight and have a direct
interpretation in wireless sensor networks.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 14:02:45 GMT"
}
] | 2009-10-30T00:00:00 |
[
[
"Silva",
"Alonso",
""
],
[
"Altman",
"Eitan",
""
],
[
"Debbah",
"Merouane",
""
],
[
"Alfano",
"Giuseppa",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0910.5673
|
Florian D\"orfler
|
Florian Dorfler and Francesco Bullo
|
Synchronization and Transient Stability in Power Networks and
Non-Uniform Kuramoto Oscillators
| null | null | null | null |
math.OC cs.SY math-ph math.DS math.MP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by recent interest for multi-agent systems and smart power grid
architectures, we discuss the synchronization problem for the network-reduced
model of a power system with non-trivial transfer conductances. Our key insight
is to exploit the relationship between the power network model and a
first-order model of coupled oscillators. Assuming overdamped generators
(possibly due to local excitation controllers), a singular perturbation
analysis shows the equivalence between the classic swing equations and a
non-uniform Kuramoto model. Here, non-uniform Kuramoto oscillators are
characterized by multiple time constants, non-homogeneous coupling, and
non-uniform phase shifts. Extending methods from transient stability,
synchronization theory, and consensus protocols, we establish sufficient
conditions for synchronization of non-uniform Kuramoto oscillators. These
conditions reduce to and improve upon previously-available tests for the
standard Kuramoto model. Combining our singular perturbation and Kuramoto
analyses, we derive concise and purely algebraic conditions that relate
synchronization and transient stability of a power network to the underlying
system parameters and initial conditions.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 16:32:56 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Jan 2010 23:55:51 GMT"
},
{
"version": "v3",
"created": "Sat, 2 Oct 2010 19:11:11 GMT"
},
{
"version": "v4",
"created": "Mon, 27 Jun 2011 17:44:11 GMT"
}
] | 2011-06-28T00:00:00 |
[
[
"Dorfler",
"Florian",
""
],
[
"Bullo",
"Francesco",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
0910.5682
|
David Fernandez-Amoros
|
David Fernandez-Amoros
|
Word Sense Disambiguation Using English-Spanish Aligned Phrases over
Comparable Corpora
|
latex2e, 8 pages, 1 figure, published in the Proceedings of
Cross-Language Knowledge Induction Workshop, 2005 Cluj-Napoca, held during
the summer school EUROLAN 2005
| null | null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we describe a WSD experiment based on bilingual English-Spanish
comparable corpora in which individual noun phrases have been identified and
aligned with their respective counterparts in the other language. The
evaluation of the experiment has been carried out against SemCor.
We show that, with the alignment algorithm employed, potential precision is
high (74.3%), however the coverage of the method is low (2.7%), due to
alignments being far less frequent than we expected.
Contrary to our intuition, precision does not rise consistently with the
number of alignments. The coverage is low due to several factors; there are
important domain differences, and English and Spanish are too close languages
for this approach to be able to discriminate efficiently between senses,
rendering it unsuitable for WSD, although the method may prove more productive
in machine translation.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 17:19:01 GMT"
}
] | 2009-10-30T00:00:00 |
[
[
"Fernandez-Amoros",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0910.5697
|
Eitan Yaakobi
|
Eitan Yaakobi and Tuvi Etzion
|
High Dimensional Error-Correcting Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we construct multidimensional codes with high dimension. The
codes can correct high dimensional errors which have the form of either small
clusters, or confined to an area with a small radius. We also consider small
number of errors in a small area. The clusters which are discussed are mainly
spheres such as semi-crosses and crosses. Also considered are clusters with
small number of errors such as 2-bursts, two errors in various clusters, and
three errors on a line. Our main focus is on the redundancy of the codes when
the most dominant parameter is the dimension of the code.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 18:06:41 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Apr 2010 08:35:15 GMT"
}
] | 2010-04-27T00:00:00 |
[
[
"Yaakobi",
"Eitan",
""
],
[
"Etzion",
"Tuvi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.5714
|
Aaron D. Jaggard
|
Joan Feigenbaum, Aaron D. Jaggard, and Michael Schapira
|
Approximate Privacy: Foundations and Quantification
|
33 pages, seven figures, two tables. Changes in version 2 include an
expanded discussion of other approaches to approximate privacy and added
acknowledgements
| null | null |
DIMACS TR 2009-14
|
cs.CR cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Increasing use of computers and networks in business, government, recreation,
and almost all aspects of daily life has led to a proliferation of online
sensitive data about individuals and organizations. Consequently, concern about
the privacy of these data has become a top priority, particularly those data
that are created and used in electronic commerce. There have been many
formulations of privacy and, unfortunately, many negative results about the
feasibility of maintaining privacy of sensitive data in realistic networked
environments. We formulate communication-complexity-based definitions, both
worst-case and average-case, of a problem's privacy-approximation ratio. We use
our definitions to investigate the extent to which approximate privacy is
achievable in two standard problems: the second-price Vickrey auction and the
millionaires problem of Yao.
For both the second-price Vickrey auction and the millionaires problem, we
show that not only is perfect privacy impossible or infeasibly costly to
achieve, but even close approximations of perfect privacy suffer from the same
lower bounds. By contrast, we show that, if the values of the parties are drawn
uniformly at random from {0,...,2^k-1}, then, for both problems, simple and
natural communication protocols have privacy-approximation ratios that are
linear in k (i.e., logarithmic in the size of the space of possible inputs). We
conjecture that this improved privacy-approximation ratio is achievable for any
probability distribution.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 19:48:17 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Jun 2010 19:06:59 GMT"
}
] | 2010-06-10T00:00:00 |
[
[
"Feigenbaum",
"Joan",
""
],
[
"Jaggard",
"Aaron D.",
""
],
[
"Schapira",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0910.5744
|
Olivier Spanjaard
|
Lucie Galand and Olivier Spanjaard
|
Exact algorithms for OWA-optimization in multiobjective spanning tree
problems
|
17 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper deals with the multiobjective version of the optimal spanning tree
problem. More precisely, we are interested in determining the optimal spanning
tree according to an Ordered Weighted Average (OWA) of its objective values. We
first show that the problem is weakly NP-hard. In the case where the weights of
the OWA are strictly decreasing, we then propose a mixed integer programming
formulation, and provide dedicated optimality conditions yielding an important
reduction of the size of the program. Next, we present two bounds that can be
used to prune subspaces of solutions either in a shaving phase or in a branch
and bound procedure. The validity of these bounds does not depend on specific
properties of the weights (apart from non-negativity). All these exact
resolution algorithms are compared on the basis of numerical experiments,
according to their respective validity scopes.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 23:17:24 GMT"
}
] | 2009-11-02T00:00:00 |
[
[
"Galand",
"Lucie",
""
],
[
"Spanjaard",
"Olivier",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.5745
|
Dusko Pavlovic
|
Dusko Pavlovic and Catherine Meadows
|
Quantifying pervasive authentication: the case of the Hancke-Kuhn
protocol
|
31 pages, 2 figures; short version of this paper appeared in the
Proceedings of MFPS 2010
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As mobile devices pervade physical space, the familiar authentication
patterns are becoming insufficient: besides entity authentication, many
applications require, e.g., location authentication. Many interesting protocols
have been proposed and implemented to provide such strengthened forms of
authentication, but there are very few proofs that such protocols satisfy the
required security properties. The logical formalisms, devised for reasoning
about security protocols on standard computer networks, turn out to be
difficult to adapt for reasoning about hybrid protocols, used in pervasive and
heterogenous networks. <p>
We refine the Dolev-Yao-style algebraic method for protocol analysis by a
probabilistic model of guessing, needed to analyze protocols that mix weak
cryptography with physical properties of nonstandard communication channels.
Applying this model, we provide a precise security proof for a proximity
authentication protocol, due to Hancke and Kuhn, that uses a subtle form of
probabilistic reasoning to achieve its goals.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 23:49:37 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Feb 2010 02:40:59 GMT"
},
{
"version": "v3",
"created": "Wed, 14 Jul 2010 21:47:13 GMT"
}
] | 2010-07-16T00:00:00 |
[
[
"Pavlovic",
"Dusko",
""
],
[
"Meadows",
"Catherine",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0910.5759
|
Ravi Tandon
|
Ravi Tandon, Sennur Ulukus, Kannan Ramchandran
|
Secure Source Coding with a Helper
|
IEEE Transactions on Information Theory, to appear
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a secure source coding problem with a rate-limited helper. In
particular, Alice observes an independent and identically distributed (i.i.d.)
source X and wishes to transmit this source losslessly to Bob over a
rate-limited link. A helper (Helen), observes an i.i.d. correlated source Y and
can transmit information to Bob over a separate rate-limited link. A passive
eavesdropper (Eve) can observe the coded output of Alice, i.e., the link from
Alice to Bob is public. The uncertainty about the source X at Eve, is measured
by the conditional entropy of the source given the coded output of Alice. We
completely characterize the rate-equivocation region for this secure source
coding model, where we show that Slepian-Wolf binning of X with respect to the
coded side information received at Bob is optimal. We next consider a
modification of this model in which Alice also has access to the coded output
of Helen. For the two-sided helper model, we characterize the rate-equivocation
region. While the availability of side information at Alice does not reduce the
rate of transmission from Alice, it significantly enhances the resulting
equivocation at Eve. In particular, the resulting equivocation for the
two-sided helper case is shown to be min(H(X),R_y), i.e., one bit from the
two-sided helper provides one bit of uncertainty at Eve. From this result, we
infer that Slepian-Wolf binning of X is suboptimal and one can further decrease
the information leakage to the eavesdropper by utilizing the side information
at Alice. We finally generalize these results to the case in which there is
additional un-coded side information W available at Bob and characterize the
rate-equivocation regions under the assumption that Y-X-W forms a Markov chain.
|
[
{
"version": "v1",
"created": "Fri, 30 Oct 2009 00:35:15 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Nov 2009 00:07:13 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Dec 2012 01:03:15 GMT"
}
] | 2012-12-10T00:00:00 |
[
[
"Tandon",
"Ravi",
""
],
[
"Ulukus",
"Sennur",
""
],
[
"Ramchandran",
"Kannan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.5761
|
Jose Bento
|
Jose Bento, Andrea Montanari
|
Which graphical models are difficult to learn?
| null | null | null | null |
stat.ML cond-mat.stat-mech cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of learning the structure of Ising models (pairwise
binary Markov random fields) from i.i.d. samples. While several methods have
been proposed to accomplish this task, their relative merits and limitations
remain somewhat obscure. By analyzing a number of concrete examples, we show
that low-complexity algorithms systematically fail when the Markov random field
develops long-range correlations. More precisely, this phenomenon appears to be
related to the Ising model phase transition (although it does not coincide with
it).
|
[
{
"version": "v1",
"created": "Fri, 30 Oct 2009 01:10:44 GMT"
}
] | 2009-11-07T00:00:00 |
[
[
"Bento",
"Jose",
""
],
[
"Montanari",
"Andrea",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0910.5765
|
Frank Vallentin
|
Jop Briet, Fernando Mario de Oliveira Filho, Frank Vallentin
|
The positive semidefinite Grothendieck problem with rank constraint
|
(v3) to appear in Proceedings of the 37th International Colloquium on
Automata, Languages and Programming, 12 pages
|
ICALP, Part I, LNCS 6198, 2010, pages 31-42
|
10.1007/978-3-642-14165-2_4
| null |
math.OC cs.DS math.CO math.FA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a positive integer n and a positive semidefinite matrix A = (A_{ij}) of
size m x m, the positive semidefinite Grothendieck problem with
rank-n-constraint (SDP_n) is
maximize \sum_{i=1}^m \sum_{j=1}^m A_{ij} x_i \cdot x_j, where x_1, ..., x_m
\in S^{n-1}.
In this paper we design a polynomial time approximation algorithm for SDP_n
achieving an approximation ratio of
\gamma(n) = \frac{2}{n}(\frac{\Gamma((n+1)/2)}{\Gamma(n/2)})^2 = 1 -
\Theta(1/n).
We show that under the assumption of the unique games conjecture the achieved
approximation ratio is optimal: There is no polynomial time algorithm which
approximates SDP_n with a ratio greater than \gamma(n). We improve the
approximation ratio of the best known polynomial time algorithm for SDP_1 from
2/\pi to 2/(\pi\gamma(m)) = 2/\pi + \Theta(1/m), and we show a tighter
approximation ratio for SDP_n when A is the Laplacian matrix of a graph with
nonnegative edge weights.
|
[
{
"version": "v1",
"created": "Fri, 30 Oct 2009 04:49:10 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Nov 2009 02:09:03 GMT"
},
{
"version": "v3",
"created": "Mon, 3 May 2010 11:58:34 GMT"
}
] | 2010-09-17T00:00:00 |
[
[
"Briet",
"Jop",
""
],
[
"Filho",
"Fernando Mario de Oliveira",
""
],
[
"Vallentin",
"Frank",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
}
] |
0910.5794
|
Damien Chablat
|
Anatoly Pashkevich (ROBOTIC Laboratory, Irccyn), Damien Chablat
(IRCCyN), Philippe Wenger (IRCCyN), Roman Gomolitsky (ROBOTIC Laboratory)
|
Calibration of 3-d.o.f. Translational Parallel Manipulators Using Leg
Observations
|
ISBN: 978-3-902613-20-2
|
Parallel Manipulators, New Developments, Jee-Hwan Ryu (Ed.) (2008)
225-240
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper proposes a novel approach for the geometrical model calibration of
quasi-isotropic parallel kinematic mechanisms of the Orthoglide family. It is
based on the observations of the manipulator leg parallelism during motions
between the specific test postures and employs a low-cost measuring system
composed of standard comparator indicators attached to the universal magnetic
stands. They are sequentially used for measuring the deviation of the relevant
leg location while the manipulator moves the TCP along the Cartesian axes.
Using the measured differences, the developed algorithm estimates the joint
offsets and the leg lengths that are treated as the most essential parameters.
Validity of the proposed calibration technique is confirmed by the experimental
results.
|
[
{
"version": "v1",
"created": "Fri, 30 Oct 2009 05:43:56 GMT"
}
] | 2009-11-02T00:00:00 |
[
[
"Pashkevich",
"Anatoly",
"",
"ROBOTIC Laboratory, Irccyn"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Gomolitsky",
"Roman",
"",
"ROBOTIC Laboratory"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0910.5816
|
Giuseppe Notarstefano
|
Giuseppe Notarstefano and Francesco Bullo
|
Distributed Abstract Optimization via Constraints Consensus: Theory and
Applications
| null | null | null | null |
cs.DC cs.CG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distributed abstract programs are a novel class of distributed optimization
problems where (i) the number of variables is much smaller than the number of
constraints and (ii) each constraint is associated to a network node. Abstract
optimization programs are a generalization of linear programs that captures
numerous geometric optimization problems. We propose novel constraints
consensus algorithms for distributed abstract programs: as each node
iteratively identifies locally active constraints and exchanges them with its
neighbors, the network computes the active constraints determining the global
optimum. The proposed algorithms are appropriate for networks with weak
time-dependent connectivity requirements and tight memory constraints. We show
how suitable target localization and formation control problems can be tackled
via constraints consensus.
|
[
{
"version": "v1",
"created": "Fri, 30 Oct 2009 09:06:19 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Nov 2009 13:39:28 GMT"
}
] | 2009-11-02T00:00:00 |
[
[
"Notarstefano",
"Giuseppe",
""
],
[
"Bullo",
"Francesco",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0910.5819
|
S{\l}awomir Lasota
|
Slawomir Lasota, Marcin Poturalski
|
Undecidability of performance equivalence of Petri nets
| null | null | null | null |
cs.CC cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate bisimulation equivalence on Petri nets under durational
semantics. Our motivation was to verify the conjecture that in durational
setting, the bisimulation equivalence checking problem becomes more tractable
than in ordinary setting (which is the case, e.g., over communication-free
nets). We disprove this conjecture in three of four proposed variants of
durational semantics. The fourth variant remains an intriguing open problem.
|
[
{
"version": "v1",
"created": "Fri, 30 Oct 2009 09:25:43 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Jun 2015 20:38:29 GMT"
}
] | 2015-06-29T00:00:00 |
[
[
"Lasota",
"Slawomir",
""
],
[
"Poturalski",
"Marcin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0910.5833
|
Jean-Loup Carr\'e
|
Jean-Loup Carre and Charles Hymans
|
From Single-thread to Multithreaded: An Efficient Static Analysis
Algorithm
| null | null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A great variety of static analyses that compute safety properties of
single-thread programs have now been developed. This paper presents a
systematic method to extend a class of such static analyses, so that they
handle programs with multiple POSIX-style threads. Starting from a pragmatic
operational semantics, we build a denotational semantics that expresses
reasoning a la assume-guarantee. The final algorithm is then derived by
abstract interpretation. It analyses each thread in turn, propagating
interferences between threads, in addition to other semantic information. The
combinatorial explosion, ensued from the explicit consideration of all
interleavings, is thus avoided. The worst case complexity is only increased by
a factor n compared to the single-thread case, where n is the number of
instructions in the program. We have implemented prototype tools, demonstrating
the practicality of the approach.
|
[
{
"version": "v1",
"created": "Fri, 30 Oct 2009 10:27:23 GMT"
}
] | 2009-11-02T00:00:00 |
[
[
"Carre",
"Jean-Loup",
""
],
[
"Hymans",
"Charles",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0910.5844
|
Tony Tan
|
Tony Tan
|
On Pebble Automata for Data Languages with Decidable Emptiness Problem
|
An extended abstract of this work has been published in the
proceedings of the 34th International Symposium on Mathematical Foundations
of Computer Science (MFCS) 2009}, Springer, Lecture Notes in Computer Science
5734, pages 712-723
| null |
10.1007/978-3-642-03816-7_60
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we study a subclass of pebble automata (PA) for data languages
for which the emptiness problem is decidable. Namely, we introduce the
so-called top view weak PA. Roughly speaking, top view weak PA are weak PA
where the equality test is performed only between the data values seen by the
two most recently placed pebbles. The emptiness problem for this model is
decidable. We also show that it is robust: alternating, nondeterministic and
deterministic top view weak PA have the same recognition power. Moreover, this
model is strong enough to accept all data languages expressible in Linear
Temporal Logic with the future-time operators, augmented with one register
freeze quantifier.
|
[
{
"version": "v1",
"created": "Fri, 30 Oct 2009 11:14:03 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Tan",
"Tony",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0910.5904
|
Bernhard G. Bodmann
|
Bernhard G. Bodmann, Peter G. Casazza and Gitta Kutyniok
|
A quantitative notion of redundancy for finite frames
|
19 pages, LateX with AMS macros; corrections addressing complications
due to zero vectors and spark
| null | null | null |
math.FA cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The objective of this paper is to improve the customary definition of
redundancy by providing quantitative measures in its place, which we coin upper
and lower redundancies, that match better with an intuitive understanding of
redundancy for finite frames in a Hilbert space. This motivates a carefully
chosen list of desired properties for upper and lower redundancies. The means
to achieve these properties is to consider the maximum and minimum of a
redundancy function, which is interesting in itself. The redundancy function is
defined on the sphere of the Hilbert space and measures the concentration of
frame vectors around each point. A complete characterization of functions on
the sphere which coincide with a redundancy function for some frame is given.
The upper and lower redundancies obtained from this function are shown to
satisfy all of the intuitively desirable properties. In addition, the range of
values they assume is characterized.
|
[
{
"version": "v1",
"created": "Fri, 30 Oct 2009 16:10:35 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Nov 2009 02:11:10 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Bodmann",
"Bernhard G.",
""
],
[
"Casazza",
"Peter G.",
""
],
[
"Kutyniok",
"Gitta",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0910.5920
|
David O'Callaghan
|
David O'Callaghan, Louise Doran and Brian Coghlan
|
Evaluating Trust in Grid Certificates
|
5 pages, 1 figure, accepted for ACM SAC 2010
| null | null | null |
cs.CR cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Digital certificates are used to secure international computation and data
storage grids used for e-Science projects, like the Worldwide Large Hadron
Collider Computing Grid. The International Grid Trust Federation has defined
the Grid Certificate Profile: a set of guidelines for digital certificates used
for grid authentication. We have designed and implemented a program and related
test suites for checking X.509 certificates against the certificate profiles
and policies relevant for use on the Grid. The result is a practical tool that
assists implementers and users of public key infrastructures to reach
appropriate trust decisions.
|
[
{
"version": "v1",
"created": "Fri, 30 Oct 2009 17:30:10 GMT"
}
] | 2009-11-02T00:00:00 |
[
[
"O'Callaghan",
"David",
""
],
[
"Doran",
"Louise",
""
],
[
"Coghlan",
"Brian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0910.5932
|
Prateek Jain
|
Prateek Jain, Brian Kulis, Jason V. Davis, Inderjit S. Dhillon
|
Metric and Kernel Learning using a Linear Transformation
| null | null | null | null |
cs.LG cs.CV cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Metric and kernel learning are important in several machine learning
applications. However, most existing metric learning algorithms are limited to
learning metrics over low-dimensional data, while existing kernel learning
algorithms are often limited to the transductive setting and do not generalize
to new data points. In this paper, we study metric learning as a problem of
learning a linear transformation of the input data. We show that for
high-dimensional data, a particular framework for learning a linear
transformation of the data based on the LogDet divergence can be efficiently
kernelized to learn a metric (or equivalently, a kernel function) over an
arbitrarily high dimensional space. We further demonstrate that a wide class of
convex loss functions for learning linear transformations can similarly be
kernelized, thereby considerably expanding the potential applications of metric
learning. We demonstrate our learning approach by applying it to large-scale
real world problems in computer vision and text mining.
|
[
{
"version": "v1",
"created": "Fri, 30 Oct 2009 18:19:03 GMT"
}
] | 2009-11-02T00:00:00 |
[
[
"Jain",
"Prateek",
""
],
[
"Kulis",
"Brian",
""
],
[
"Davis",
"Jason V.",
""
],
[
"Dhillon",
"Inderjit S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0910.5947
|
Jennifer Kloke
|
Jennifer Kloke and Gunnar Carlsson
|
Topological De-Noising: Strengthening the Topological Signal
|
13 pages, 37 figures, content added
| null | null | null |
cs.CG cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Topological methods, including persistent homology, are powerful tools for
analysis of high-dimensional data sets but these methods rely almost
exclusively on thresholding techniques. In noisy data sets, thresholding does
not always allow for the recovery of topological information. We present an
easy to implement, computationally efficient pre-processing algorithm to
prepare noisy point cloud data sets for topological data analysis. The
topological de-noising algorithm allows for the recovery of topological
information that is inaccessible by thresholding methods. We apply the
algorithm to synthetically-generated noisy data sets and show the recovery of
topological information which is impossible to obtain by thresholding. We also
apply the algorithm to natural image data in R^8 and show a very clean recovery
of topological information previously only available with large amounts of
thresholding. Finally, we discuss future directions for improving this
algorithm using zig-zag persistence methods.
|
[
{
"version": "v1",
"created": "Fri, 30 Oct 2009 19:08:44 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Feb 2010 23:50:41 GMT"
}
] | 2016-09-08T00:00:00 |
[
[
"Kloke",
"Jennifer",
""
],
[
"Carlsson",
"Gunnar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0910.5950
|
Mahmoud Taherzadeh
|
Mahmoud Taherzadeh and H. Vincent Poor
|
Limits on the Robustness of MIMO Joint Source-Channel Codes
|
presented at Allerton Conference 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, the theoretical limits on the robustness of MIMO joint source
channel codes is investigated. The case in which a single joint source channel
code is used for the entire range of SNRs and for all levels of required
fidelity is considered. Limits on the asymptotic performance of such a system
are characterized in terms of upper bounds on the diversity-fidelity tradeoff,
which can be viewed as an analog version of the diversity-multiplexing
tradeoff. In particular, it is shown that there is a considerable gap between
the diversity-fidelity tradeoff of robust joint source-channel codes and the
optimum tradeoff (without the constraint of robustness).
|
[
{
"version": "v1",
"created": "Fri, 30 Oct 2009 19:20:27 GMT"
}
] | 2009-11-02T00:00:00 |
[
[
"Taherzadeh",
"Mahmoud",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0028
|
Rdv Ijcsis
|
A. E. E. Elalfi, M. E. Elalami, Y. M . Asem
|
Knowledge Extraction for Discriminating Male and Female in Logical
Reasoning from Student Model
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 006-015, October 2009, USA
| null |
ISSN 1947 5500
|
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The learning process is a process of communication and interaction between
the teacher and his students on one side and between the students and each
others on the other side. Interaction of the teacher with his students has a
great importance in the process of learning and education. The pattern and
style of this interaction is determined by the educational situation, trends
and concerns, and educational characteristics. Classroom interaction has an
importance and a big role in increasing the efficiency of the learning process
and raising the achievement levels of students. Students need to learn skills
and habits of study, especially at the university level. The effectiveness of
learning is affected by several factors that include the prevailing patterns of
interactive behavior in the classroom. These patterns are reflected in the
activities of teacher and learners during the learning process. The
effectiveness of learning is also influenced by the cognitive and non cognitive
characteristics of teacher that help him to succeed, the characteristics of
learners, teaching subject, and the teaching methods. This paper presents a
machine learning algorithm for extracting knowledge from student model. The
proposed algorithm utilizes the inherent characteristic of genetic algorithm
and neural network for extracting comprehensible rules from the student
database. The knowledge is used for discriminating male and female levels in
logical reasoning as a part of an expert system course.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 19:30:52 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Elalfi",
"A. E. E.",
""
],
[
"Elalami",
"M. E.",
""
],
[
"Asem",
"Y. M .",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0911.0039
|
Gene Golovchinsky
|
Gene Golovchinsky, Scott Carter, Jacob Biehl
|
Beyond the Drawing Board: Toward More Effective Use of Whiteboard
Content
|
Modified acknowledgments
| null | null |
FXPAL-TR-09-004
|
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We developed a system that augments traditional office whiteboards with
computation for the purposes of retrieving, reusing, and sharing whiteboard
content. Our system automatically captures changes to whiteboard images,
detects significant changes, and identifies potential collaborative activities.
Users then browse and search the collection of images captured from their
camera or shared from other users' cameras based on aspects such as location,
time, collaboration, etc. We report on the results of a formative study and on
an evaluation of effectiveness of our system, and discuss additional
functionality that can be built on our framework.
|
[
{
"version": "v1",
"created": "Fri, 30 Oct 2009 23:31:38 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Dec 2009 05:35:43 GMT"
}
] | 2009-12-09T00:00:00 |
[
[
"Golovchinsky",
"Gene",
""
],
[
"Carter",
"Scott",
""
],
[
"Biehl",
"Jacob",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0911.0050
|
Hyoungshick Kim
|
Hyoungshick Kim and Ji Won Yoon
|
How to Compare the Scientific Contributions between Research Groups
| null | null | null |
0911.0049
|
cs.IR cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a method to analyse the scientific contributions between research
groups. Given multiple research groups, we construct their journal/proceeding
graphs and then compute the similarity/gap between them using network analysis.
This analysis can be used for measuring similarity/gap of the topics/qualities
between research groups' scientific contributions. We demonstrate the
practicality of our method by comparing the scientific contributions by Korean
researchers with those by the global researchers for information security in
2006 - 2008. The empirical analysis shows that the current security research in
South Korea has been isolated from the global research trend.
|
[
{
"version": "v1",
"created": "Sat, 31 Oct 2009 01:03:27 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Kim",
"Hyoungshick",
""
],
[
"Yoon",
"Ji Won",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0911.0054
|
Ambuj Tewari
|
Sham M. Kakade, Ohad Shamir, Karthik Sridharan, Ambuj Tewari
|
Learning Exponential Families in High-Dimensions: Strong Convexity and
Sparsity
|
Errata added. Incorrect claim about cumulants of the Bernoulli
distribution fixed
| null | null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The versatility of exponential families, along with their attendant convexity
properties, make them a popular and effective statistical model. A central
issue is learning these models in high-dimensions, such as when there is some
sparsity pattern of the optimal parameter. This work characterizes a certain
strong convexity property of general exponential families, which allow their
generalization ability to be quantified. In particular, we show how this
property can be used to analyze generic exponential families under L_1
regularization.
|
[
{
"version": "v1",
"created": "Sat, 31 Oct 2009 02:56:18 GMT"
},
{
"version": "v2",
"created": "Sat, 16 May 2015 22:45:35 GMT"
}
] | 2015-05-19T00:00:00 |
[
[
"Kakade",
"Sham M.",
""
],
[
"Shamir",
"Ohad",
""
],
[
"Sridharan",
"Karthik",
""
],
[
"Tewari",
"Ambuj",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0911.0086
|
Gwena\"el Joret
|
Jean Cardinal, Samuel Fiorini, Gwena\"el Joret, Rapha\"el Jungers and
J. Ian Munro
|
Sorting under Partial Information (without the Ellipsoid Algorithm)
|
v3: Minor changes. A preliminary version appeared in the proceedings
of the 42th ACM Symposium on Theory of Computing (STOC 2010)
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We revisit the well-known problem of sorting under partial information: sort
a finite set given the outcomes of comparisons between some pairs of elements.
The input is a partially ordered set P, and solving the problem amounts to
discovering an unknown linear extension of P, using pairwise comparisons. The
information-theoretic lower bound on the number of comparisons needed in the
worst case is log e(P), the binary logarithm of the number of linear extensions
of P. In a breakthrough paper, Jeff Kahn and Jeong Han Kim (J. Comput. System
Sci. 51 (3), 390-399, 1995) showed that there exists a polynomial-time
algorithm for the problem achieving this bound up to a constant factor. Their
algorithm invokes the ellipsoid algorithm at each iteration for determining the
next comparison, making it impractical.
We develop efficient algorithms for sorting under partial information. Like
Kahn and Kim, our approach relies on graph entropy. However, our algorithms
differ in essential ways from theirs. Rather than resorting to convex
programming for computing the entropy, we approximate the entropy, or make sure
it is computed only once, in a restricted class of graphs, permitting the use
of a simpler algorithm. Specifically, we present:
- an O(n^2) algorithm performing O(log n log e(P)) comparisons;
- an O(n^2.5) algorithm performing at most (1+ epsilon) log e(P) + O_epsilon
(n) comparisons;
- an O(n^2.5) algorithm performing O(log e(P)) comparisons.
All our algorithms can be implemented in such a way that their computational
bottleneck is confined in a preprocessing phase, while the sorting phase is
completed in O(q) + O(n) time, where q denotes the number of comparisons
performed.
|
[
{
"version": "v1",
"created": "Sat, 31 Oct 2009 14:36:36 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Sep 2010 12:58:11 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Jan 2013 13:56:44 GMT"
}
] | 2013-01-22T00:00:00 |
[
[
"Cardinal",
"Jean",
""
],
[
"Fiorini",
"Samuel",
""
],
[
"Joret",
"Gwenaël",
""
],
[
"Jungers",
"Raphaël",
""
],
[
"Munro",
"J. Ian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.0089
|
Melda Yuksel
|
Melda Yuksel, Xi Liu, Elza Erkip
|
A Secure Communication Game with a Relay Helping the Eavesdropper
|
5 pages, 4 figures, published in proceedings of IEEE Information
Theory Workshop, Taormina, Italy, October 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work a four terminal Gaussian network composed of a source, a
destination, an eavesdropper and a jammer relay is studied. The jammer relay
does not hear the source transmission. It assists the eavesdropper and aims to
decrease the achievable secrecy rates. The source, on the other hand, aims to
increase the achievable secrecy rates. Assuming Gaussian strategies at the
source and the jammer relay, this problem is formulated as a two-player
zero-sum continuous game, where the payoff is the achieved secrecy rate. For
this game the Nash Equilibrium is generally achieved with mixed strategies. The
optimal cumulative distribution functions for the source and the jammer relay
that achieve the value of the game, which is the equilibrium secrecy rate, are
found.
|
[
{
"version": "v1",
"created": "Sat, 31 Oct 2009 15:58:08 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Yuksel",
"Melda",
""
],
[
"Liu",
"Xi",
""
],
[
"Erkip",
"Elza",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0090
|
Tullio Ceccherini-Silberstein
|
Tullio Ceccherini-Silberstein and Wolfgang Woess
|
Context-free pairs of groups I: Context-free pairs and graphs
| null |
European J. Combin. 33 (2012) 1449-1466
|
10.1016/j.ejc.2012.03.011
| null |
math.GR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $G$ be a finitely generated group, $A$ a finite set of generators and $K$
a subgroup of $G$. We call the pair $(G,K)$ context-free if the set of all
words over $A$ that reduce in $G$ to an element of $K$ is a context-free
language. When $K$ is trivial, $G$ itself is called context-free; context-free
groups have been classified more than 20 years ago in celebrated work of Muller
and Schupp as the virtually free groups.
Here, we derive some basic properties of such group pairs. Context-freeness
is independent of the choice of the generating set. It is preserved under
finite index modifications of $G$ and finite index enlargements of $K$. If $G$
is virtually free and $K$ is finitely generated then $(G,K)$ is context-free. A
basic tool is the following: $(G,K)$ is context-free if and only if the
Schreier graph of $(G,K)$ with respect to $A$ is a context-free graph.
|
[
{
"version": "v1",
"created": "Sat, 31 Oct 2009 16:03:41 GMT"
}
] | 2012-12-05T00:00:00 |
[
[
"Ceccherini-Silberstein",
"Tullio",
""
],
[
"Woess",
"Wolfgang",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0105
|
Ian Pratt-Hartmann
|
Ian Pratt-Hartmann and Ivo D\"untsch
|
Functions Definable by Numerical Set-Expressions
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A "numerical set-expression" is a term specifying a cascade of arithmetic and
logical operations to be performed on sets of non-negative integers. If these
operations are confined to the usual Boolean operations together with the
result of lifting addition to the level of sets, we speak of "additive
circuits". If they are confined to the usual Boolean operations together with
the result of lifting addition and multiplication to the level of sets, we
speak of "arithmetic circuits". In this paper, we investigate the definability
of sets and functions by means of additive and arithmetic circuits,
occasionally augmented with additional operations.
|
[
{
"version": "v1",
"created": "Sat, 31 Oct 2009 23:17:49 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Pratt-Hartmann",
"Ian",
""
],
[
"Düntsch",
"Ivo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.0121
|
Rdv Ijcsis
|
Boseung Kim, Joohyun Lee, Yongtae Shin
|
(RCFT) ReClustering Formation Technique in Hierarchical Sensor Network
|
4 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 052-055, October 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
TBecause of limited energy of nodes, an important issue for sensor network is
efficient use of the energy. The clustering technique reduces energy
consumption as cluster head sends sensed information to a sink node. Because of
such character of clustering technique, electing cluster head is an important
element for networks. This paper proposes RCFT (ReClustering Formation
Technique) that reconstruct clusters in hierarchical sensor networks. RCFT is a
protocol that reconstructed clusters considering position of a cluster head and
nodes in randomly constructed clusters. And this paper demonstrated that
clusters are composed evenly through simulation, accordingly this simulation
shows the result reducing energy consumption.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 20:37:14 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Nov 2009 18:03:22 GMT"
}
] | 2009-11-26T00:00:00 |
[
[
"Kim",
"Boseung",
""
],
[
"Lee",
"Joohyun",
""
],
[
"Shin",
"Yongtae",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.0130
|
Graham Norton
|
Graham H. Norton
|
Minimal Polynomial Algorithms for Finite Sequences
|
Section 2 added, remarks and references expanded. To appear in IEEE
Transactions on Information Theory.
| null |
10.1109/TIT.2010.2054150
| null |
cs.IT cs.DM cs.SC math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that a straightforward rewrite of a known minimal polynomial
algorithm yields a simpler version of a recent algorithm of A. Salagean.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 04:06:37 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Nov 2009 01:45:52 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Mar 2010 05:12:49 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Norton",
"Graham H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0136
|
Yu Huang
|
Yu Huang, Jianping Yu, Jiannong Cao, Xiaoxing Ma, Xianping Tao, Jian
Lu
|
Checking Behavioral Consistency Constraints for Pervasive Context in
Asynchronous Environments
|
9 pages, 9 figures
| null | null | null |
cs.SE cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Context consistency checking, the checking of specified constraint on
properties of contexts, is essential to context-aware applications. In order to
delineate and adapt to dynamic changes in the pervasive computing environment,
context-aware applications often need to specify and check behavioral
consistency constraints over the contexts. This problem is challenging mainly
due to the distributed and asynchronous nature of pervasive computing
environments. Specifically, the critical issue in checking behavioral
constraints is the temporal ordering of contextual activities. The contextual
activities usually involve multiple context collecting devices, which are
fully-decentralized and interact in an asynchronous manner. However, existing
context consistency checking schemes do not work in asynchronous environments,
since they implicitly assume the availability of a global clock or relay on
synchronized interactions.
To this end, we propose the Ordering Global Activity (OGA) algorithm, which
detects the ordering of the global activities based on predicate detection in
asynchronous environments. The essence of our approach is the message causality
and its on-the-fly coding as logic vector clocks in asynchronous environments.
We implement the Middleware Infrastructure for Predicate detection in
Asynchronous environments (MIPA), over which the OGA algorithm is implemented
and evaluated. The evaluation results show the impact of asynchrony on the
checking of behavioral consistency constraints, which justifies the primary
motivation of our work. They also show that OGA can achieve accurate checking
of behavioral consistency constraints in dynamic pervasive computing
environments.
|
[
{
"version": "v1",
"created": "Sun, 1 Nov 2009 07:20:55 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Huang",
"Yu",
""
],
[
"Yu",
"Jianping",
""
],
[
"Cao",
"Jiannong",
""
],
[
"Ma",
"Xiaoxing",
""
],
[
"Tao",
"Xianping",
""
],
[
"Lu",
"Jian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.0137
|
Kalyana Babu Nakshatrala
|
S. Darbha, K. B. Nakshatrala, and K. R. Rajagopal
|
On the vibrations of lumped parameter systems governed by
differential-algebraic equations
| null | null | null | null |
cs.NA physics.class-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider the vibratory motions of lumped parameter systems
wherein the components of the system cannot be described by constitutive
expressions for the force in terms of appropriate kinematical quantities. Such
physical systems reduce to a system of differential-algebraic equations, which
invariably need to be solved numerically. To illustrate the issues with
clarity, we consider a simple system in which the dashpot is assumed to contain
a "Bingham" fluid for which one cannot describe the force in the dashpot as a
function of the velocity. On the other hand, one can express the velocity as a
function of the force.
|
[
{
"version": "v1",
"created": "Sun, 1 Nov 2009 07:23:03 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Nov 2009 22:31:10 GMT"
},
{
"version": "v3",
"created": "Mon, 9 Nov 2009 22:40:52 GMT"
},
{
"version": "v4",
"created": "Wed, 16 Dec 2009 06:16:55 GMT"
},
{
"version": "v5",
"created": "Tue, 20 Jul 2010 19:28:36 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Darbha",
"S.",
""
],
[
"Nakshatrala",
"K. B.",
""
],
[
"Rajagopal",
"K. R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
] |
0911.0141
|
Yoann Pigne
|
C\'edric Ga\"el Aboue-Nze (LITIS), Fr\'ed\'eric Guinand (LITIS), Yoann
Pign\'e (LITIS)
|
Impact of Obstacles on the Degree of Mobile Ad Hoc Connection Graphs
| null |
International Conference on Networking and Services, Valence :
Spain (2009)
|
10.1109/ICNS.2009.36
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
What is the impact of obstacles on the graphs of connections between stations
in Mobile Ad hoc Networks? In order to answer, at least partially, this
question, the first step is to define both an environment with obstacles and a
mobility model for the stations in such an environment. The present paper
focuses on a new way of considering the mobility within environments with
obstacles, while keeping the core ideas of the well-known Random WayPoint
mobility model (a.k.a RWP). Based on a mesh-partitioning of the space, we
propose a new model called RSP-O-G for which we compute the spatial
distribution of stations and analyse how the presence of obstacles impacts this
distribution compared to the distribution when no obstacles are present.
Coupled with a simple model of radio propagation, and according to the density
of stations in the environment, we study the mean degree of the connection
graphs corresponding to such mobile ad hoc networks.
|
[
{
"version": "v1",
"created": "Sun, 1 Nov 2009 07:49:51 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Aboue-Nze",
"Cédric Gaël",
"",
"LITIS"
],
[
"Guinand",
"Frédéric",
"",
"LITIS"
],
[
"Pigné",
"Yoann",
"",
"LITIS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.0142
|
Sava Ecaterina
|
Wilfried Huss, Ecaterina Sava, Wolfgang Woess
|
Entropy sensitivity of languages defined by infinite automata, via
Markov chains with forbidden transitions
|
to appear in Theoretical Computer Science, 2010
|
Theoretical Computer Science 411 (2010), 3917-3922
|
10.1016/j.tcs.2010.07.020
| null |
cs.FL math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A language L over a finite alphabet is growth-sensitive (or entropy
sensitive) if forbidding any set of subwords F yields a sub-language L^F whose
exponential growth rate (entropy) is smaller than that of L. Let (X, E, l) be
an infinite, oriented, labelled graph. Considering the graph as an (infinite)
automaton, we associate with any pair of vertices x,y in X the language
consisting of all words that can be read as the labels along some path from x
to y. Under suitable, general assumptions we prove that these languages are
growth-sensitive. This is based on using Markov chains with forbidden
transitions.
|
[
{
"version": "v1",
"created": "Sun, 1 Nov 2009 07:58:52 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Jul 2010 09:38:18 GMT"
}
] | 2010-12-14T00:00:00 |
[
[
"Huss",
"Wilfried",
""
],
[
"Sava",
"Ecaterina",
""
],
[
"Woess",
"Wolfgang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0911.0143
|
Gagan Garg
|
Reza Omrani, Gagan Garg, P. Vijay Kumar, Petros Elia, and Pankaj
Bhambhani
|
Large Families of Optimal Two-Dimensional Optical Orthogonal Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nine new 2-D OOCs are presented here, all sharing the common feature of a
code size that is much larger in relation to the number of time slots than
those of constructions appearing previously in the literature. Each of these
constructions is either optimal or asymptotically optimal with respect to
either the original Johnson bound or else a non-binary version of the Johnson
bound introduced in this paper.
The first 5 codes are constructed using polynomials over finite fields - the
first construction is optimal while the remaining 4 are asymptotically optimal.
The next two codes are constructed using rational functions in place of
polynomials and these are asymptotically optimal. The last two codes, also
asymptotically optimal, are constructed by composing two of the above codes
with a constant weight binary code.
Also presented, is a three-dimensional OOC that exploits the polarization
dimension.
Finally, phase-encoded optical CDMA is considered and construction of two
efficient codes are provided.
|
[
{
"version": "v1",
"created": "Sun, 1 Nov 2009 09:27:29 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Omrani",
"Reza",
""
],
[
"Garg",
"Gagan",
""
],
[
"Kumar",
"P. Vijay",
""
],
[
"Elia",
"Petros",
""
],
[
"Bhambhani",
"Pankaj",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0151
|
Rdv Ijcsis
|
Rares Vasilescu
|
An Alternative To Common Content Management Techniques
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 056-060, October 2009, USA
| null |
ISSN 1947 5500
|
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Content management systems use various strategies to store and manage
information. One of the most usual methods encountered in commercial products
is to make use of the file system to store the raw content information, while
the associated metadata is kept synchronized in a relational database
management system. This strategy has its advantages but we believe it also has
significant limitations which should be addressed and eventually solved. In
this paper we propose an alternative method of storing and managing content
aiming at finding solutions for current limitations both in terms of functional
and nonfunctional requirements.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 20:43:18 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Vasilescu",
"Rares",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0911.0174
|
Rdv Ijcsis
|
Muhammad Aasim Qureshi, Dr. Fadzil B. Hassan, Sohail Safdar, Rehan
Akbar
|
A O(E) Time Shortest Path Algorithm For Non Negative Weighted Undirected
Graphs
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 040-046, October 2009, USA
| null |
ISSN 1947 5500
|
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In most of the shortest path problems like vehicle routing problems and
network routing problems, we only need an efficient path between two points
source and destination, and it is not necessary to calculate the shortest path
from source to all other nodes. This paper concentrates on this very idea and
presents an algorithm for calculating shortest path for (i) nonnegative
weighted undirected graphs (ii) unweighted undirected graphs. The algorithm
completes its execution in O(E) for all graphs except few in which longer path
(in terms of number of edges) from source to some node makes it best selection
for that node. The main advantage of the algorithms is its simplicity and it
does not need complex data structures for implementations.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 20:24:05 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Qureshi",
"Muhammad Aasim",
""
],
[
"Hassan",
"Dr. Fadzil B.",
""
],
[
"Safdar",
"Sohail",
""
],
[
"Akbar",
"Rehan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.