id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0910.4664
Adam Yedidia
Adam B. Yedidia
Counting Independent Sets and Kernels of Regular Graphs
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Chandrasekaran, Chertkov, Gamarnik, Shah, and Shin recently proved that the average number of independent sets of random regular graphs of size n and degree 3 approaches w^n for large n, where w is approximately 1.54563, consistent with the Bethe approximation. They also made the surprising conjecture that the fluctuations of the logarithm of the number of independent sets were only O(1) as n grew large, which would mean that the Bethe approximation is amazingly accurate for all 3-regular graphs. Here, I provide numerical evidence supporting this conjecture obtained from exact counts of independent sets using binary decision diagrams. I also provide numerical evidence that supports the novel conjectures that the number of kernels of 3-regular graphs of size n is given by y^n, where y is approximately 1.299, and that the fluctuations in the logarithm of the number of kernels is also only O(1).
[ { "version": "v1", "created": "Sat, 24 Oct 2009 17:33:53 GMT" } ]
2009-10-27T00:00:00
[ [ "Yedidia", "Adam B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.4667
Sinan Gezici
Fatih Kocak, Hasari Celebi, Sinan Gezici, Khalid A. Qaraqe, Huseyin Arslan, H. Vincent Poor
Time Delay Estimation in Cognitive Radio Systems
To appear at CAMSAP 2009
null
10.1155/2010/675959
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In cognitive radio systems, secondary users can utilize multiple dispersed bands that are not used by primary users. In this paper, time delay estimation of signals that occupy multiple dispersed bands is studied. First, theoretical limits on time delay estimation are reviewed. Then, two-step time delay estimators that provide trade-offs between computational complexity and performance are investigated. In addition, asymptotic optimality properties of the two-step time delay estimators are discussed. Finally, simulation results are presented to explain the theoretical results.
[ { "version": "v1", "created": "Sat, 24 Oct 2009 17:27:04 GMT" } ]
2016-02-17T00:00:00
[ [ "Kocak", "Fatih", "" ], [ "Celebi", "Hasari", "" ], [ "Gezici", "Sinan", "" ], [ "Qaraqe", "Khalid A.", "" ], [ "Arslan", "Huseyin", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.4668
Damien Robert
Jean-Charles Faug\`ere (INRIA Rocquencourt), David Lubicz (IRMAR), Damien Robert (INRIA Lorraine - LORIA)
Computing modular correspondences for abelian varieties
null
null
10.1016/j.jalgebra.2011.06.031
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this paper is to give a higher dimensional equivalent of the classical modular polynomials $\Phi_\ell(X,Y)$. If $j$ is the $j$-invariant associated to an elliptic curve $E_k$ over a field $k$ then the roots of $\Phi_\ell(j,X)$ correspond to the $j$-invariants of the curves which are $\ell$-isogeneous to $E_k$. Denote by $X_0(N)$ the modular curve which parametrizes the set of elliptic curves together with a $N$-torsion subgroup. It is possible to interpret $\Phi_\ell(X,Y)$ as an equation cutting out the image of a certain modular correspondence $X_0(\ell) \to X_0(1) \times X_0(1)$ in the product $X_0(1) \times X_0(1)$. Let $g$ be a positive integer and $\overn \in \N^g$. We are interested in the moduli space that we denote by $\Mn$ of abelian varieties of dimension $g$ over a field $k$ together with an ample symmetric line bundle $\pol$ and a symmetric theta structure of type $\overn$. If $\ell$ is a prime and let $\overl=(\ell, ..., \ell)$, there exists a modular correspondence $\Mln \to \Mn \times \Mn$. We give a system of algebraic equations defining the image of this modular correspondence.
[ { "version": "v1", "created": "Sat, 24 Oct 2009 17:34:54 GMT" } ]
2012-08-13T00:00:00
[ [ "Faugère", "Jean-Charles", "", "INRIA Rocquencourt" ], [ "Lubicz", "David", "", "IRMAR" ], [ "Robert", "Damien", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0910.4681
Alexander Kelmans
Alexander Kelmans
Packing 3-vertex paths in claw-free graphs and related topics
29 pages
Discrete Applied Mathematics, 159 (2011) 112-127
10.1016/j.dam.2010.05.001
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An L-factor of a graph G is a spanning subgraph of G whose every component is a 3-vertex path. Let v(G) be the number of vertices of G and d(G) the domination number of G. A claw is a graph with four vertices and three edges incident to the same vertex. A graph is claw-free if it has no induced subgraph isomorphic to a claw. Our results include the following. Let G be a 3-connected claw-free graph, x a vertex in G, e = xy an edge in G, and P a 3-vertex path in G. Then (a1) if v(G) = 0 mod 3, then G has an L-factor containing (avoiding) e, (a2) if v(G) = 1 mod 3, then G - x has an L-factor, (a3) if v(G) = 2 mod 3, then G - {x,y} has an L-factor, (a4) if v(G) = 0 mod 3 and G is either cubic or 4-connected, then G - P has an L-factor, (a5) if G is cubic with v(G) > 5 and E is a set of three edges in G, then G - E has an L-factor if and only if the subgraph induced by E in G is not a claw and not a triangle, (a6) if v(G) = 1 mod 3, then G - {v,e} has an L-factor for every vertex v and every edge e in G, (a7) if v(G) = 1 mod 3, then there exist a 4-vertex path N and a claw Y in G such that G - N and G - Y have L-factors, and (a8) d(G) < v(G)/3 +1 and if in addition G is not a cycle and v(G) = 1 mod 3, then d(G) < v(G)/3. We explore the relations between packing problems of a graph and its line graph to obtain some results on different types of packings. We also discuss relations between L-packing and domination problems as well as between induced L-packings and the Hadwiger conjecture. Keywords: claw-free graph, cubic graph, vertex disjoint packing, edge disjoint packing, 3-vertex factor, 3-vertex packing, path-factor, induced packing, graph domination, graph minor, the Hadwiger conjecture.
[ { "version": "v1", "created": "Sat, 24 Oct 2009 21:07:20 GMT" }, { "version": "v2", "created": "Mon, 25 Jul 2011 17:32:28 GMT" } ]
2011-07-26T00:00:00
[ [ "Kelmans", "Alexander", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.4683
Fedor Zhdanov
Fedor Zhdanov and Vladimir Vovk
Competing with Gaussian linear experts
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of online regression. We prove a theoretical bound on the square loss of Ridge Regression. We do not make any assumptions about input vectors or outcomes. We also show that Bayesian Ridge Regression can be thought of as an online algorithm competing with all the Gaussian linear experts.
[ { "version": "v1", "created": "Sat, 24 Oct 2009 22:40:40 GMT" }, { "version": "v2", "created": "Mon, 10 May 2010 23:01:30 GMT" } ]
2010-05-12T00:00:00
[ [ "Zhdanov", "Fedor", "" ], [ "Vovk", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0910.4686
Soummya Kar
Soummya Kar and Jose Moura
Moderate Deviations of the Random Riccati Equation
Revised Version, 35 pages
null
null
null
math.PR cs.IT math.DS math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We characterize the invariant filtering measures resulting from Kalman filtering with intermittent observations (\cite{Bruno}), where the observation arrival is modeled as a Bernoulli process. In \cite{Riccati-weakconv}, it was shown that there exists a $\overline{\gamma}^{\{\scriptsize{sb}}}>0$ such that for every observation packet arrival probability $\overline{\gamma}$, $\overline{\gamma}>\overline{\gamma}^{\{\scriptsize{sb}}}>0$, the sequence of random conditional error covariance matrices converges in distribution to a unique invariant distribution $\mathbb{\mu}^{\overline{\gamma}}$ (independent of the filter initialization.) In this paper, we prove that, for controllable and observable systems, $\overline{\gamma}^{\{\scriptsize{sb}}}=0$ and that, as $\overline{\gamma}\uparrow 1$, the family $\{\mathbb{\mu}^{\overline{\gamma}}\}_{\overline{\gamma}>0}$ of invariant distributions satisfies a moderate deviations principle (MDP) with a good rate function $I$. The rate function $I$ is explicitly identified. In particular, our results show:
[ { "version": "v1", "created": "Sat, 24 Oct 2009 23:21:50 GMT" }, { "version": "v2", "created": "Thu, 3 Jun 2010 17:47:10 GMT" } ]
2010-06-04T00:00:00
[ [ "Kar", "Soummya", "" ], [ "Moura", "Jose", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0910.4688
Olympia Hadjiliadis
Olympia Hadjiliadis, Tobias Schaefer and H. Vincent Poor
Quickest detection in coupled systems
6 pages, 48th IEEE Conference on Decision and Control, Shanghai 2009 December 16 - 18
null
10.1109/CDC.2009.5400871
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work considers the problem of quickest detection of signals in a coupled system of N sensors, which receive continuous sequential observations from the environment. It is assumed that the signals, which are modeled a general Ito processes, are coupled across sensors, but that their onset times may differ from sensor to sensor. The objective is the optimal detection of the first time at which any sensor in the system receives a signal. The problem is formulated as a stochastic optimization problem in which an extended average Kullback- Leibler divergence criterion is used as a measure of detection delay, with a constraint on the mean time between false alarms. The case in which the sensors employ cumulative sum (CUSUM) strategies is considered, and it is proved that the minimum of N CUSUMs is asymptotically optimal as the mean time between false alarms increases without bound.
[ { "version": "v1", "created": "Sat, 24 Oct 2009 23:29:03 GMT" } ]
2016-11-15T00:00:00
[ [ "Hadjiliadis", "Olympia", "" ], [ "Schaefer", "Tobias", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.4698
Scott Aaronson
Scott Aaronson
BQP and the Polynomial Hierarchy
null
null
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The relationship between BQP and PH has been an open problem since the earliest days of quantum computing. We present evidence that quantum computers can solve problems outside the entire polynomial hierarchy, by relating this question to topics in circuit complexity, pseudorandomness, and Fourier analysis. First, we show that there exists an oracle relation problem (i.e., a problem with many valid outputs) that is solvable in BQP, but not in PH. This also yields a non-oracle relation problem that is solvable in quantum logarithmic time, but not in AC0. Second, we show that an oracle decision problem separating BQP from PH would follow from the Generalized Linial-Nisan Conjecture, which we formulate here and which is likely of independent interest. The original Linial-Nisan Conjecture (about pseudorandomness against constant-depth circuits) was recently proved by Braverman, after being open for twenty years.
[ { "version": "v1", "created": "Sun, 25 Oct 2009 17:23:15 GMT" } ]
2009-10-27T00:00:00
[ [ "Aaronson", "Scott", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0910.4699
Ariel Procaccia
Noga Alon, Felix Fischer, Ariel D. Procaccia, Moshe Tennenholtz
Sum of Us: Strategyproof Selection from the Selectors
null
null
null
null
cs.GT cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider directed graphs over a set of n agents, where an edge (i,j) is taken to mean that agent i supports or trusts agent j. Given such a graph and an integer k\leq n, we wish to select a subset of k agents that maximizes the sum of indegrees, i.e., a subset of k most popular or most trusted agents. At the same time we assume that each individual agent is only interested in being selected, and may misreport its outgoing edges to this end. This problem formulation captures realistic scenarios where agents choose among themselves, which can be found in the context of Internet search, social networks like Twitter, or reputation systems like Epinions. Our goal is to design mechanisms without payments that map each graph to a k-subset of agents to be selected and satisfy the following two constraints: strategyproofness, i.e., agents cannot benefit from misreporting their outgoing edges, and approximate optimality, i.e., the sum of indegrees of the selected subset of agents is always close to optimal. Our first main result is a surprising impossibility: for k \in {1,...,n-1}, no deterministic strategyproof mechanism can provide a finite approximation ratio. Our second main result is a randomized strategyproof mechanism with an approximation ratio that is bounded from above by four for any value of k, and approaches one as k grows.
[ { "version": "v1", "created": "Sun, 25 Oct 2009 02:01:09 GMT" } ]
2009-10-27T00:00:00
[ [ "Alon", "Noga", "" ], [ "Fischer", "Felix", "" ], [ "Procaccia", "Ariel D.", "" ], [ "Tennenholtz", "Moshe", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.4704
Przemyslaw Pawelczak
Jihoon Park, Przemys{\l}aw Pawe{\l}czak, and Danijela \v{C}abri\'c
Performance of Joint Spectrum Sensing and MAC Algorithms for Multichannel Opportunistic Spectrum Access Ad Hoc Networks
43 pages, 14 figures. Includes a concluding discussion on the validity of the analytical model in P. Pawelczak, S. Pollin, H-S. W. So, A. Bahai, R.V. Prasad, R. Hekmat, Performance Analysis of Multichannel Medium Access Control Algorithms for Opportunistic Spectrum Access, IEEE Transactions on Vehicular Technology, vol. 58, no. 6, pp. 3014-3031, Jul. 2009
IEEE Transactions on Mobile Computing, vol. 10, no. 7, pp. 1011-1027, 2011
10.1109/TMC.2010.255
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an analytical framework to assess the link layer throughput of multichannel Opportunistic Spectrum Access (OSA) ad hoc networks. Specifically, we focus on analyzing various combinations of collaborative spectrum sensing and Medium Access Control (MAC) protocol abstractions. We decompose collaborative spectrum sensing into layers, parametrize each layer, classify existing solutions, and propose a new protocol called Truncated Time Division Multiple Access (TTDMA) that supports efficient distribution of sensing results in "k out of N" fusion rule. In case of multichannel MAC protocols we evaluate two main approaches of control channel design with (i) dedicated and (ii) hopping channel. We propose to augment these protocols with options of handling secondary user (SU) connections preempted by primary user (PU) by (i) connection buffering until PU departure and (ii) connection switching to a vacant PU channel. By comparing and optimizing different design combinations we show that (i) it is generally better to buffer preempted SU connections than to switch them to PU vacant channels and (ii) TTDMA is a promising design option for collaborative spectrum sensing process when k does not change over time.
[ { "version": "v1", "created": "Sun, 25 Oct 2009 03:35:53 GMT" }, { "version": "v2", "created": "Fri, 30 Oct 2009 02:52:54 GMT" }, { "version": "v3", "created": "Mon, 14 Jun 2010 22:37:02 GMT" }, { "version": "v4", "created": "Wed, 29 Aug 2012 08:29:10 GMT" }, { "version": "v5", "created": "Thu, 29 Nov 2012 18:03:40 GMT" } ]
2012-11-30T00:00:00
[ [ "Park", "Jihoon", "" ], [ "Pawełczak", "Przemysław", "" ], [ "Čabrić", "Danijela", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.4711
Shrisha Rao
Rajashekar Annaji, Shrisha Rao
Parallelization of the LBG Vector Quantization Algorithm for Shared Memory Systems
14 pages
International Journal of Image Processing, vol. 3, no. 4, July/August 2009, pp. 170-183
null
null
cs.CV cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a parallel approach for the Vector Quantization (VQ) problem in image processing. VQ deals with codebook generation from the input training data set and replacement of any arbitrary data with the nearest codevector. Most of the efforts in VQ have been directed towards designing parallel search algorithms for the codebook, and little has hitherto been done in evolving a parallelized procedure to obtain an optimum codebook. This parallel algorithm addresses the problem of designing an optimum codebook using the traditional LBG type of vector quantization algorithm for shared memory systems and for the efficient usage of parallel processors. Using the codebook formed from a training set, any arbitrary input data is replaced with the nearest codevector from the codebook. The effectiveness of the proposed algorithm is indicated.
[ { "version": "v1", "created": "Mon, 26 Oct 2009 04:46:56 GMT" } ]
2009-10-27T00:00:00
[ [ "Annaji", "Rajashekar", "" ], [ "Rao", "Shrisha", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0910.4738
Debasish Chatterjee
Federico Ramponi, Debasish Chatterjee, Sean Summers, and John Lygeros
On the connections between PCTL and Dynamic Programming
Submitted
HSCC Stockholm, 2010, pages 253-262
10.1145/1755952.1755988
null
math.OC cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Probabilistic Computation Tree Logic (PCTL) is a well-known modal logic which has become a standard for expressing temporal properties of finite-state Markov chains in the context of automated model checking. In this paper, we give a definition of PCTL for noncountable-space Markov chains, and we show that there is a substantial affinity between certain of its operators and problems of Dynamic Programming. After proving some uniqueness properties of the solutions to the latter, we conclude the paper with two examples to show that some recovery strategies in practical applications, which are naturally stated as reach-avoid problems, can be actually viewed as particular cases of PCTL formulas.
[ { "version": "v1", "created": "Sun, 25 Oct 2009 14:59:37 GMT" } ]
2012-02-22T00:00:00
[ [ "Ramponi", "Federico", "" ], [ "Chatterjee", "Debasish", "" ], [ "Summers", "Sean", "" ], [ "Lygeros", "John", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" } ]
0910.4748
Francesco Ranzato
Roberto Giacobazzi and Francesco Ranzato
Correctness Kernels of Abstract Interpretations
An extended abstract of this paper appeared in Proceedings of the 37th International Colloquium on Automata, Languages, and Programming (ICALP '10), Bordeaux, France. LNCS vol. 6199, pages 211-222, Springer, 2010
null
null
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In abstract interpretation-based static analysis, approximation is encoded by abstract domains. They provide systematic guidelines for designing abstract semantic functions that approximate some concrete system behaviors under analysis. It may happen that an abstract domain contains redundant information for the specific purpose of approximating a given concrete semantic function. This paper introduces the notion of correctness kernel of abstract interpretations, a methodology for simplifying abstract domains, i.e. removing abstract values from them, in a maximal way while retaining exactly the same approximate behavior of the system under analysis. We show that in abstract model checking correctness kernels provide a simplification paradigm of the abstract state space that is guided by examples, meaning that this simplification preserves spuriousness of examples (i.e., abstract paths). In particular, we show how correctness kernels can be integrated with the well-known CEGAR (CounterExample-Guided Abstraction Refinement) methodology.
[ { "version": "v1", "created": "Sun, 25 Oct 2009 15:05:07 GMT" }, { "version": "v2", "created": "Wed, 22 Jun 2011 13:21:28 GMT" }, { "version": "v3", "created": "Fri, 19 Apr 2013 08:29:03 GMT" } ]
2013-04-22T00:00:00
[ [ "Giacobazzi", "Roberto", "" ], [ "Ranzato", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.4769
Sahbi Sidhom
Azza Harbaoui (ENSI-Riadi-GDL), Malek Ghenima (ENSI-Riadi-GDL), Sahbi Sidhom (LORIA, Loria)
Enrichissement des contenus par la r\'eindexation des usagers : un \'etat de l'art sur la probl\'ematique
null
conf\'erence internationale sur les Syst\`emes d'information et Intelligence \'economique, Hammamet : Tunisie (2009)
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information retrieval (IR) is a user approach to obtain relevant information which meets needs with the help of a IR system (IRS). However, the IRS shows certain differences between user relevance and system relevance. These gaps are essentially related to the imperfection of the indexing process (as approach related to the IR), to problems related to the misunderstanding of the natural language and the non correspondence between the real needs of the user and the results of his query. As idea is to think about an ?intellectual? indexing that takes into account the point of view of the user. By consulting the document, user can build information as added-value on the existing content: new information which grows contents and allows the semantic visibility or facilitates the reading by the annotations, by links to other content, by new descriptors, specific new abstracts of users: it is the reindexing of the contents by the contribution or the vote of the uses
[ { "version": "v1", "created": "Sun, 25 Oct 2009 21:22:04 GMT" } ]
2009-10-27T00:00:00
[ [ "Harbaoui", "Azza", "", "ENSI-Riadi-GDL" ], [ "Ghenima", "Malek", "", "ENSI-Riadi-GDL" ], [ "Sidhom", "Sahbi", "", "LORIA, Loria" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0910.4836
Georg Hager
Gerald Schubert and Georg Hager and Holger Fehske
Performance limitations for sparse matrix-vector multiplications on current multicore environments
16 pages, 9 figures
High Performance Computing in Science and Engineering, Garching/Munich 2009. Springer, (2010), 13-26
10.1007/978-3-642-13872-0_2
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing importance of multicore processors calls for a reevaluation of established numerical algorithms in view of their ability to profit from this new hardware concept. In order to optimize the existent algorithms, a detailed knowledge of the different performance-limiting factors is mandatory. In this contribution we investigate sparse matrix-vector multiplication, which is the dominant operation in many sparse eigenvalue solvers. Two conceptually different storage schemes and computational kernels have been conceived in the past to target cache-based and vector architectures, respectively. Starting from a series of microbenchmarks we apply the gained insight on optimized sparse MVM implementations, whose serial and OpenMP-parallel performance we review on state-of-the-art multicore systems.
[ { "version": "v1", "created": "Mon, 26 Oct 2009 09:31:38 GMT" } ]
2012-03-01T00:00:00
[ [ "Schubert", "Gerald", "" ], [ "Hager", "Georg", "" ], [ "Fehske", "Holger", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0910.4839
Patrick Erik Bradley
Patrick Erik Bradley
A $p$-adic RanSaC algorithm for stereo vision using Hensel lifting
15 pages; typos removed, abstract changed, computation error removed
p-Adic Numbers, Ultrametric Analysis, and Applications, Vol. 2, No. 1 (2010), 55-67
10.1134/S2070046610010048
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A $p$-adic variation of the Ran(dom) Sa(mple) C(onsensus) method for solving the relative pose problem in stereo vision is developped. From two 2-adically encoded images a random sample of five pairs of corresponding points is taken, and the equations for the essential matrix are solved by lifting solutions modulo 2 to the 2-adic integers. A recently devised $p$-adic hierarchical classification algorithm imitating the known LBG quantisation method classifies the solutions for all the samples after having determined the number of clusters using the known intra-inter validity of clusterings. In the successful case, a cluster ranking will determine the cluster containing a 2-adic approximation to the "true" solution of the problem.
[ { "version": "v1", "created": "Mon, 26 Oct 2009 09:34:29 GMT" }, { "version": "v2", "created": "Tue, 3 Nov 2009 17:24:27 GMT" } ]
2010-02-15T00:00:00
[ [ "Bradley", "Patrick Erik", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0910.4854
Serguei Mokhov
Serguei A. Mokhov and Yingying She
Yet Another Pacman 3D Adventures
31 pages, 8 figures. A 2006 report, corresponding to the open source project here: http://sourceforge.net/projects/yap3dad/
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This game is meant to be extension of the overly-beaten pacman-style game (code-named "Yet Another Pacman 3D Adventures", or YAP3DAD) from the proposed ideas and other projects with advance visual and computer graphics features, including a-game-in-a-game approach. The project is an open-source project published on SourceForge.net for possible future development and extension.
[ { "version": "v1", "created": "Mon, 26 Oct 2009 10:55:16 GMT" } ]
2009-10-27T00:00:00
[ [ "Mokhov", "Serguei A.", "" ], [ "She", "Yingying", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0910.4865
Jan Treibig
Jan Treibig, Georg Hager, Gerhard Wellein
Multi-core architectures: Complexities of performance prediction and the impact of cache topology
18 pages
null
null
null
cs.PF cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The balance metric is a simple approach to estimate the performance of bandwidth-limited loop kernels. However, applying the method to in-cache situations and modern multi-core architectures yields unsatisfactory results. This paper analyzes the in uence of cache hierarchy design on performance predictions for bandwidth-limited loop kernels on current mainstream processors. We present a diagnostic model with improved predictive power, correcting the limitations of the simple balance metric. The importance of code execution overhead even in bandwidth-bound situations is emphasized. Finally we analyze the impact of synchronization overhead on multi-threaded performance with a special emphasis on the in uence of cache topology.
[ { "version": "v1", "created": "Mon, 26 Oct 2009 12:48:02 GMT" } ]
2009-10-27T00:00:00
[ [ "Treibig", "Jan", "" ], [ "Hager", "Georg", "" ], [ "Wellein", "Gerhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0910.4874
Lalitha Sankar
Lalitha Sankar, Jan Vondrak, and H. Vincent Poor
K-User Fading Interference Channels: The Ergodic Very Strong Case
Presented at the Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing, Sep. 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sufficient conditions required to achieve the interference-free capacity region of ergodic fading K-user interference channels (IFCs) are obtained. In particular, this capacity region is shown to be achieved when every receiver decodes all K transmitted messages such that the channel statistics and the waterfilling power policies for all K (interference-free) links satisfy a set of K(K-1) ergodic very strong conditions. The result is also of independent interest in combinatorics.
[ { "version": "v1", "created": "Mon, 26 Oct 2009 13:30:17 GMT" } ]
2009-10-27T00:00:00
[ [ "Sankar", "Lalitha", "" ], [ "Vondrak", "Jan", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.4899
Uwe Aickelin
Uwe Aickelin, Dipankar Dasgupta
Artificial Immune Systems
29 pages,4 figures,
Search Methodologies: Introductory Tutorials in Optimisation and Decision Support Techniques, 375-399, 2005
null
null
cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or non-self cells. It does this with the help of a distributed task force that has the intelligence to take action from a local and also a global perspective using its network of chemical messengers for communication. There are two major branches of the immune system. The innate immune system is an unchanging mechanism that detects and destroys certain invading organisms, whilst the adaptive immune system responds to previously unknown foreign cells and builds a response to them that can remain in the body over a long period of time. This remarkable information processing biological system has caught the attention of computer science in recent years. A novel computational intelligence technique, inspired by immunology, has emerged, called Artificial Immune Systems. Several concepts from the immune have been extracted and applied for solution to real world science and engineering problems. In this tutorial, we briefly describe the immune system metaphors that are relevant to existing Artificial Immune Systems methods. We will then show illustrative real-world problems suitable for Artificial Immune Systems and give a step-by-step algorithm walkthrough for one such problem. A comparison of the Artificial Immune Systems to other well-known algorithms, areas for future work, tips & tricks and a list of resources will round this tutorial off. It should be noted that as Artificial Immune Systems is still a young and evolving field, there is not yet a fixed algorithm template and hence actual implementations might differ somewhat from time to time and from those examples given here.
[ { "version": "v1", "created": "Mon, 26 Oct 2009 14:54:46 GMT" } ]
2010-07-05T00:00:00
[ [ "Aickelin", "Uwe", "" ], [ "Dasgupta", "Dipankar", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0910.4901
Deniz Gunduz
Deniz Gunduz, Andrea Goldsmith, H. Vincent Poor
Distortion Exponent in MIMO Channels with Feedback
Presented at the IEEE Information Theory Workshop (ITW), Taormina, Italy, Oct. 2009
null
10.1109/ITW.2009.5351220
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The transmission of a Gaussian source over a block-fading multiple antenna channel in the presence of a feedback link is considered. The feedback link is assumed to be an error and delay free link of capacity 1 bit per channel use. Under the short-term power constraint, the optimal exponential behavior of the end-to-end average distortion is characterized for all source-channel bandwidth ratios. It is shown that the optimal transmission strategy is successive refinement source coding followed by progressive transmission over the channel, in which the channel block is allocated dynamically among the layers based on the channel state using the feedback link as an instantaneous automatic repeat request (ARQ) signal.
[ { "version": "v1", "created": "Mon, 26 Oct 2009 15:09:47 GMT" } ]
2016-11-17T00:00:00
[ [ "Gunduz", "Deniz", "" ], [ "Goldsmith", "Andrea", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.4903
Uwe Aickelin
Julie Greensmith, Uwe Aickelin, Jamie Twycross
Articulation and Clarification of the Dendritic Cell Algorithm
14 pages, 4 figures, 5th International Conference on Artificial Immune Systems (ICARIS2006)
Proceedings of 5th International Conference on Artificial Immune Systems (ICARIS2006), 404-417, 2006
null
null
cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer security. A port scan detection task is performed to substantiate the influence of signal selection on the behaviour of the algorithm. Experimental results provide a comparison of differing input signal mappings.
[ { "version": "v1", "created": "Mon, 26 Oct 2009 15:13:04 GMT" } ]
2010-07-05T00:00:00
[ [ "Greensmith", "Julie", "" ], [ "Aickelin", "Uwe", "" ], [ "Twycross", "Jamie", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0910.4932
Anthony Widjaja To
Anthony Widjaja To and Leonid Libkin
Algorithmic metatheorems for decidable LTL model checking over infinite systems
Conference submission
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
By algorithmic metatheorems for a model checking problem P over infinite-state systems we mean generic results that can be used to infer decidability (possibly complexity) of P not only over a specific class of infinite systems, but over a large family of classes of infinite systems. Such results normally start with a powerful formalism of infinite-state systems, over which P is undecidable, and assert decidability when is restricted by means of an extra "semantic condition" C. We prove various algorithmic metatheorems for the problems of model checking LTL and its two common fragments LTL(Fs,Gs) and LTLdet over the expressive class of word/tree automatic transition systems, which are generated by synchronized finite-state transducers operating on finite words and trees. We present numerous applications, where we derive (in a unified manner) many known and previously unknown decidability and complexity results of model checking LTL and its fragments over specific classes of infinite-state systems including pushdown systems; prefix-recognizable systems; reversal-bounded counter systems with discrete clocks and a free counter; concurrent pushdown systems with a bounded number of context-switches; various subclasses of Petri nets; weakly extended PA-processes; and weakly extended ground-tree rewrite systems. In all cases,we are able to derive optimal (or near optimal) complexity. Finally, we pinpoint the exact locations in the arithmetic and analytic hierarchies of the problem of checking a relevant semantic condition and the LTL model checking problems over all word/tree automatic systems.
[ { "version": "v1", "created": "Mon, 26 Oct 2009 19:56:07 GMT" }, { "version": "v2", "created": "Mon, 26 Oct 2009 20:40:18 GMT" } ]
2009-10-28T00:00:00
[ [ "To", "Anthony Widjaja", "" ], [ "Libkin", "Leonid", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.4955
Ashutosh Nayyar
Ashutosh Nayyar and Demosthenis Teneketzis
On the Structure of Real-Time Encoders and Decoders in a Multi-Terminal Communication System
null
null
null
null
cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A real-time communication system with two encoders communicating with a single receiver over separate noisy channels is considered. The two encoders make distinct partial observations of a Markov source. Each encoder must encode its observations into a sequence of discrete symbols. The symbols are transmitted over noisy channels to a finite memory receiver that attempts to reconstruct some function of the state of the Markov source. Encoding and decoding must be done in real-time, that is, the distortion measure does not tolerate delays. Under the assumption that the encoders' observations are conditionally independent Markov chains given an unobserved time-invariant random variable, results on the structure of optimal real-time encoders and the receiver are obtained. It is shown that there exist finite-dimensional sufficient statistics for the encoders. The problem with noiseless channels and perfect memory at the receiver is then considered. A new methodology to find the structure of optimal real-time encoders is employed. A sufficient statistic with a time-invariant domain is found for this problem. This methodology exploits the presence of common information between the encoders and the receiver when communication is over noiseless channels.
[ { "version": "v1", "created": "Mon, 26 Oct 2009 19:16:23 GMT" } ]
2009-10-27T00:00:00
[ [ "Nayyar", "Ashutosh", "" ], [ "Teneketzis", "Demosthenis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0910.5001
Gordana Dodig Crnkovic
Gordana Dodig-Crnkovic and Vincent C. M\"uller
A Dialogue Concerning Two World Systems: Info-Computational vs. Mechanistic
null
null
null
null
cs.GL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dialogue develops arguments for and against adopting a new world system, info-computationalist naturalism, that is poised to replace the traditional mechanistic world system. We try to figure out what the info-computational paradigm would mean, in particular its pancomputationalism. We make some steps towards developing the notion of computing that is necessary here, especially in relation to traditional notions. We investigate whether pancomputationalism can possibly provide the basic causal structure to the world, whether the overall research programme appears productive and whether it can revigorate computationalism in the philosophy of mind.
[ { "version": "v1", "created": "Mon, 26 Oct 2009 22:50:08 GMT" } ]
2015-10-23T00:00:00
[ [ "Dodig-Crnkovic", "Gordana", "" ], [ "Müller", "Vincent C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
0910.5002
Oleg Michailovich
Oleg Michailovich
An Iterative Shrinkage Approach to Total-Variation Image Restoration
The paper was submitted to the IEEE Transactions on Image Processing on October 22nd, 2009
null
10.1109/TIP.2010.2090532
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of restoration of digital images from their degraded measurements plays a central role in a multitude of practically important applications. A particularly challenging instance of this problem occurs in the case when the degradation phenomenon is modeled by an ill-conditioned operator. In such a case, the presence of noise makes it impossible to recover a valuable approximation of the image of interest without using some a priori information about its properties. Such a priori information is essential for image restoration, rendering it stable and robust to noise. Particularly, if the original image is known to be a piecewise smooth function, one of the standard priors used in this case is defined by the Rudin-Osher-Fatemi model, which results in total variation (TV) based image restoration. The current arsenal of algorithms for TV-based image restoration is vast. In the present paper, a different approach to the solution of the problem is proposed based on the method of iterative shrinkage (aka iterated thresholding). In the proposed method, the TV-based image restoration is performed through a recursive application of two simple procedures, viz. linear filtering and soft thresholding. Therefore, the method can be identified as belonging to the group of first-order algorithms which are efficient in dealing with images of relatively large sizes. Another valuable feature of the proposed method consists in its working directly with the TV functional, rather then with its smoothed versions. Moreover, the method provides a single solution for both isotropic and anisotropic definitions of the TV functional, thereby establishing a useful connection between the two formulae.
[ { "version": "v1", "created": "Mon, 26 Oct 2009 22:50:18 GMT" } ]
2016-11-17T00:00:00
[ [ "Michailovich", "Oleg", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0910.5027
Suhas Mathur
Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah, Wade Trappe and Narayan Mandayam
Information-theoretically Secret Key Generation for Fading Wireless Channels
32 pages, 9 figures. Manuscript first submitted to the IEEE Transactions on Information Forensics and Security on 23 February, 2009.Portions of this work have been previous presented at the IEEE International Symposium on Information Theory, Seattle, WA, July 2006 and ACM Conference on Mobile Computing and Networking, San Francisco, CA, Sept. 2008
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the short-term fading process is inherently hard to predict and best modeled stochastically, with rapid decorrelation properties in space, time and frequency. In this paper, we demonstrate how the channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We begin by presenting a scheme based on level crossings of the fading process, which is well-suited for the Rayleigh and Rician fading models associated with a richly scattering environment. Our level crossing algorithm is simple, and incorporates a self-authenticating mechanism to prevent adversarial manipulation of message exchanges during the protocol. Since the level crossing algorithm is best suited for fading processes that exhibit symmetry in their underlying distribution, we present a second and more powerful approach that is suited for more general channel state distributions. This second approach is motivated by observations from quantizing jointly Gaussian processes, but exploits empirical measurements to set quantization boundaries and a heuristic log likelihood ratio estimate to achieve an improved secret key generation rate. We validate both proposed protocols through experimentations using a customized 802.11a platform, and show for the typical WiFi channel that reliable secret key establishment can be accomplished at rates on the order of 10 bits/second.
[ { "version": "v1", "created": "Tue, 27 Oct 2009 02:01:52 GMT" } ]
2009-10-28T00:00:00
[ [ "Ye", "Chunxuan", "" ], [ "Mathur", "Suhas", "" ], [ "Reznik", "Alex", "" ], [ "Shah", "Yogendra", "" ], [ "Trappe", "Wade", "" ], [ "Mandayam", "Narayan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.5040
Li Chen
Li Chen, Yong Liu, Feng Luo
A Note on Gradually Varied Functions and Harmonic Functions
7 pages and 2 figures
null
null
null
cs.DM math.CA
http://creativecommons.org/licenses/by-nc-sa/3.0/
Any constructive continuous function must have a gradually varied approximation in compact space. However, the refinement of domain for $\sigma-$-net might be very small. Keeping the original discretization (square or triangulation), can we get some interesting properties related to gradual variation? In this note, we try to prove that many harmonic functions are gradually varied or near gradually varied; this means that the value of the center point differs from that of its neighbor at most by 2. It is obvious that most of the gradually varied functions are not harmonic.This note discusses some of the basic harmonic functions in relation to gradually varied functions.
[ { "version": "v1", "created": "Tue, 27 Oct 2009 04:11:04 GMT" } ]
2009-10-28T00:00:00
[ [ "Chen", "Li", "" ], [ "Liu", "Yong", "" ], [ "Luo", "Feng", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" } ]
0910.5046
Gene Cooperman
Ana Maria Visan, Artem Polyakov, Praveen S. Solanki, Kapil Arya, Tyler Denniston, Gene Cooperman
Temporal Debugging using URDB
20 pages, 3 figures, 5 tables; software at urdb.sourceforge.net
null
null
null
cs.OS cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new style of temporal debugging is proposed. The new URDB debugger can employ such techniques as temporal search for finding an underlying fault that is causing a bug. This improves on the standard iterative debugging style, which iteratively re-executes a program under debugger control in the search for the underlying fault. URDB acts as a meta-debugger, with current support for four widely used debuggers: gdb, MATLAB, python, and perl. Support for a new debugger can be added in a few hours. Among its points of novelty are: (i) the first reversible debuggers for MATLAB, python, and perl; (ii) support for today's multi-core architectures; (iii) reversible debugging of multi-process and distributed computations; and (iv) temporal search on changes in program expressions. URDB gains its reversibility and temporal abilities through the fast checkpoint-restart capability of DMTCP (Distributed MultiThreaded CheckPointing). The recently enhanced DMTCP also adds ptrace support, enabling one to freeze, migrate, and replicate debugging sessions.
[ { "version": "v1", "created": "Tue, 27 Oct 2009 17:31:02 GMT" } ]
2009-10-28T00:00:00
[ [ "Visan", "Ana Maria", "" ], [ "Polyakov", "Artem", "" ], [ "Solanki", "Praveen S.", "" ], [ "Arya", "Kapil", "" ], [ "Denniston", "Tyler", "" ], [ "Cooperman", "Gene", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0910.5073
Kenneth Shum
Kenneth W. Shum, Wing Shing Wong and Chung Shue Chen
A General Upper Bound on the Size of Constant-Weight Conflict-Avoiding Codes
10 pages, 1 figure
IEEE Trans. Inform. Theory, vol. 56, no.7, p.3265-3276, Jul, 2010
10.1109/TIT.2010.2048508
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conflict-avoiding codes are used in the multiple-access collision channel without feedback. The number of codewords in a conflict-avoiding code is the number of potential users that can be supported in the system. In this paper, a new upper bound on the size of conflict-avoiding codes is proved. This upper bound is general in the sense that it is applicable to all code lengths and all Hamming weights. Several existing constructions for conflict-avoiding codes, which are known to be optimal for Hamming weights equal to four and five, are shown to be optimal for all Hamming weights in general.
[ { "version": "v1", "created": "Tue, 27 Oct 2009 09:29:18 GMT" }, { "version": "v2", "created": "Wed, 30 Jun 2010 03:51:57 GMT" }, { "version": "v3", "created": "Sat, 6 Nov 2010 09:32:23 GMT" } ]
2010-11-09T00:00:00
[ [ "Shum", "Kenneth W.", "" ], [ "Wong", "Wing Shing", "" ], [ "Chen", "Chung Shue", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.5076
Hayato Takahashi
Hayato Takahashi
Algorithmic randomness and monotone complexity on product space
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study algorithmic randomness and monotone complexity on product of the set of infinite binary sequences. We explore the following problems: monotone complexity on product space, Lambalgen's theorem for correlated probability, classification of random sets by likelihood ratio tests, decomposition of complexity and independence, Bayesian statistics for individual random sequences. Formerly Lambalgen's theorem for correlated probability is shown under a uniform computability assumption in [H. Takahashi Inform. Comp. 2008]. In this paper we show the theorem without the assumption.
[ { "version": "v1", "created": "Tue, 27 Oct 2009 10:10:09 GMT" }, { "version": "v2", "created": "Mon, 28 Jun 2010 09:45:43 GMT" } ]
2010-06-29T00:00:00
[ [ "Takahashi", "Hayato", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.5099
Yannick Chevalier
Yannick Chevalier (INRIA Lorraine - LORIA / LIFC), Michael Rusinowitch (INRIA Lorraine - LORIA / LIFC)
Compiling and securing cryptographic protocols
A short version was submitted to IPL
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequences of operations to be performed by each role. Unlike previous works, we reduce this compilation process to well-known decision problems in formal protocol analysis. This allows one to define a natural notion of prudent translation and to reuse many known results from the literature in order to cover more crypto-primitives. In particular this work is the first one to show how to compile protocols parameterised by the properties of the available operations.
[ { "version": "v1", "created": "Tue, 27 Oct 2009 11:46:50 GMT" } ]
2009-10-28T00:00:00
[ [ "Chevalier", "Yannick", "", "INRIA Lorraine - LORIA / LIFC" ], [ "Rusinowitch", "Michael", "", "INRIA Lorraine - LORIA / LIFC" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.5107
Arno Pauly
Arno Pauly
The Complexity of Iterated Strategy Elimination
null
null
null
null
cs.CC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the computational complexity of the question whether a certain strategy can be removed from a game by means of iterated elimination of dominated strategies. In particular, we study the influence of different definitions of domination and of the number of different payoff values. In addition, the consequence of restriction to constant-sum games is shown.
[ { "version": "v1", "created": "Tue, 27 Oct 2009 12:40:17 GMT" }, { "version": "v2", "created": "Wed, 20 Jan 2010 12:12:28 GMT" } ]
2010-01-20T00:00:00
[ [ "Pauly", "Arno", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0910.5135
Matilde Marcolli
Yuri I. Manin, Matilde Marcolli
Error-correcting codes and phase transitions
amstex 57 pages, 3 eps figures
null
null
null
cs.IT math.IT math.QA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The theory of error-correcting codes is concerned with constructing codes that optimize simultaneously transmission rate and relative minimum distance. These conflicting requirements determine an asymptotic bound, which is a continuous curve in the space of parameters. The main goal of this paper is to relate the asymptotic bound to phase diagrams of quantum statistical mechanical systems. We first identify the code parameters with Hausdorff and von Neumann dimensions, by considering fractals consisting of infinite sequences of code words. We then construct operator algebras associated to individual codes. These are Toeplitz algebras with a time evolution for which the KMS state at critical temperature gives the Hausdorff measure on the corresponding fractal. We extend this construction to algebras associated to limit points of codes, with non-uniform multi-fractal measures, and to tensor products over varying parameters.
[ { "version": "v1", "created": "Tue, 27 Oct 2009 14:40:50 GMT" } ]
2009-10-28T00:00:00
[ [ "Manin", "Yuri I.", "" ], [ "Marcolli", "Matilde", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.QA", "description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory", "span": "(Quantum Algebra)" } ]
0910.5146
Maxim Raginsky
Maxim Raginsky, Rebecca M. Willett, Zachary T. Harmany, Roummel F. Marcia
Compressed sensing performance bounds under Poisson noise
12 pages, 3 pdf figures; accepted for publication in IEEE Transactions on Signal Processing
null
10.1109/TSP.2010.2049997
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes performance bounds for compressed sensing (CS) where the underlying sparse or compressible (sparsely approximable) signal is a vector of nonnegative intensities whose measurements are corrupted by Poisson noise. In this setting, standard CS techniques cannot be applied directly for several reasons. First, the usual signal-independent and/or bounded noise models do not apply to Poisson noise, which is non-additive and signal-dependent. Second, the CS matrices typically considered are not feasible in real optical systems because they do not adhere to important constraints, such as nonnegativity and photon flux preservation. Third, the typical $\ell_2$--$\ell_1$ minimization leads to overfitting in the high-intensity regions and oversmoothing in the low-intensity areas. In this paper, we describe how a feasible positivity- and flux-preserving sensing matrix can be constructed, and then analyze the performance of a CS reconstruction approach for Poisson data that minimizes an objective function consisting of a negative Poisson log likelihood term and a penalty term which measures signal sparsity. We show that, as the overall intensity of the underlying signal increases, an upper bound on the reconstruction error decays at an appropriate rate (depending on the compressibility of the signal), but that for a fixed signal intensity, the signal-dependent part of the error bound actually grows with the number of measurements or sensors. This surprising fact is both proved theoretically and justified based on physical intuition.
[ { "version": "v1", "created": "Tue, 27 Oct 2009 15:34:31 GMT" }, { "version": "v2", "created": "Thu, 11 Mar 2010 14:50:09 GMT" }, { "version": "v3", "created": "Sat, 1 May 2010 22:44:36 GMT" } ]
2015-05-14T00:00:00
[ [ "Raginsky", "Maxim", "" ], [ "Willett", "Rebecca M.", "" ], [ "Harmany", "Zachary T.", "" ], [ "Marcia", "Roummel F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.5147
Nikolaos Fountoulakis
Nikolaos Fountoulakis and Konstantinos Panagiotou
Sharp Load Thresholds for Cuckoo Hashing
26 pages
null
null
null
cs.DS cs.DM math.CO math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paradigm of many choices has influenced significantly the design of efficient data structures and, most notably, hash tables. Cuckoo hashing is a technique that extends this concept. There,we are given a table with $n$ locations, and we assume that each location can hold one item. Each item to be inserted chooses randomly k>1 locations and has to be placed in any one of them. How much load can cuckoo hashing handle before collisions prevent the successful assignment of the available items to the chosen locations? Practical evaluations of this method have shown that one can allocate a number of elements that is a large proportion of the size of the table, being very close to 1 even for small values of k such as 4 or 5. In this paper we show that there is a critical value for this proportion: with high probability, when the amount of available items is below this value, then these can be allocated successfully, but when it exceeds this value, the allocation becomes impossible. We give explicitly for each k>1 this critical value. This answers an open question posed by Mitzenmacher (ESA '09) and underpins theoretically the experimental results. Our proofs are based on the translation of the question into a hypergraph setting, and the study of the related typical properties of random k-uniform hypergraphs.
[ { "version": "v1", "created": "Tue, 27 Oct 2009 15:37:28 GMT" } ]
2009-10-28T00:00:00
[ [ "Fountoulakis", "Nikolaos", "" ], [ "Panagiotou", "Konstantinos", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0910.5215
Shuai Fan
Shuai Fan, Lin Zhang and Yong Ren
Approximation Algorithms for Link Scheduling with Physical Interference Model in Wireless Multi-hop Networks
9 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The link scheduling in wireless multi-hop networks is addressed. Different from most of work that adopt the protocol interference model which merely take consideration of packet collisions, our proposed algorithms use the physical interference model to reflect the aggregated signal to interference and noise ratio (SINR), which is a more accurate abstraction of the real scenario. We first propose a centralized scheduling method based on the Integer Linear Programming (ILP) and resolve it by an approximate solution based on the randomized rounding method. The probability bound of getting a guaranteed approximate factor is given. We then extend the centralized algorithm to a distributed solution, which is favorable in wireless networks. It is proven that with the distributed scheduling method, all links can transmit without interference, and the approximate ratio of the algorithm is also given.
[ { "version": "v1", "created": "Tue, 27 Oct 2009 19:30:45 GMT" } ]
2009-10-28T00:00:00
[ [ "Fan", "Shuai", "" ], [ "Zhang", "Lin", "" ], [ "Ren", "Yong", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0910.5260
Sewoong Oh
Raghunandan H. Keshavan, Sewoong Oh
A Gradient Descent Algorithm on the Grassman Manifold for Matrix Completion
26 pages, 15 figures
null
10.1016/j.trc.2012.12.007
null
cs.NA cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of reconstructing a low-rank matrix from a small subset of its entries. In this paper, we describe the implementation of an efficient algorithm called OptSpace, based on singular value decomposition followed by local manifold optimization, for solving the low-rank matrix completion problem. It has been shown that if the number of revealed entries is large enough, the output of singular value decomposition gives a good estimate for the original matrix, so that local optimization reconstructs the correct matrix with high probability. We present numerical results which show that this algorithm can reconstruct the low rank matrix exactly from a very small subset of its entries. We further study the robustness of the algorithm with respect to noise, and its performance on actual collaborative filtering datasets.
[ { "version": "v1", "created": "Tue, 27 Oct 2009 22:19:31 GMT" }, { "version": "v2", "created": "Tue, 3 Nov 2009 23:35:13 GMT" } ]
2013-01-30T00:00:00
[ [ "Keshavan", "Raghunandan H.", "" ], [ "Oh", "Sewoong", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0910.5261
M. Kivanc Mihcak
Onur Ozyesil, M. Kivanc Mihcak, Yucel Altug
On Detection With Partial Information In The Gaussian Setup
Proceedings of the Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing, September 30-October 2, 2009, Monticello, Illinois; 8 pages
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the problem of communication with partial information, where there is an asymmetry between the transmitter and the receiver codebooks. Practical applications of the proposed setup include the robust signal hashing problem within the context of multimedia security and asymmetric communications with resource-lacking receivers. We study this setup in a binary detection theoretic context for the additive colored Gaussian noise channel. In our proposed setup, the partial information available at the detector consists of dimensionality-reduced versions of the transmitter codewords, where the dimensionality reduction is achieved via a linear transform. We first derive the corresponding MAP-optimal detection rule and the corresponding conditional probability of error (conditioned on the partial information the detector possesses). Then, we constructively quantify an optimal class of linear transforms, where the cost function is the expected Chernoff bound on the conditional probability of error of the MAP-optimal detector.
[ { "version": "v1", "created": "Tue, 27 Oct 2009 22:15:48 GMT" } ]
2009-10-29T00:00:00
[ [ "Ozyesil", "Onur", "" ], [ "Mihcak", "M. Kivanc", "" ], [ "Altug", "Yucel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.5264
Ashutosh Nayyar
Ashutosh Nayyar and Demosthenis Teneketzis
A Sequential Problem in Decentralized Detection with Communication
null
null
null
null
math.OC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A sequential problem in decentralized detection is considered. Two observers can make repeated noisy observations of a binary hypothesis on the state of the environment. At any time, observer 1 can stop and send a final binary message to observer 2 or it may continue to take more measurements. Every time observer 1 postpones its final message to observer 2, it incurs a penalty. Observer 2's operation under two different scenarios is explored. In the first scenario, observer 2 waits to receive the final message from observer 1 and then starts taking measurements of its own. It is then faced with a stopping problem on whether to stop and declare a decision on the hypothesis or to continue taking measurements. In the second scenario, observer 2 starts taking measurements from the beginning. It is then faced with a different stopping problem. At any time, observer 2 can decide whether to stop and declare a decision on the hypothesis or to continue to take more measurements and wait for observer 1 to send its final message. Parametric characterization of optimal policies for the two observers are obtained under both scenarios. A sequential methodology for finding the optimal policies is presented. The parametric characterizations are then extended to problem with increased communication alphabet for the final message from observer 1 to observer 2; and to the case of multiple peripheral sensors that each send a single final message to a coordinating sensor who makes the final decision on the hypothesis.
[ { "version": "v1", "created": "Tue, 27 Oct 2009 23:07:50 GMT" } ]
2009-10-29T00:00:00
[ [ "Nayyar", "Ashutosh", "" ], [ "Teneketzis", "Demosthenis", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.5301
Abhinav Kumar
Abhinav Kumar, Satyanarayana V. Lokam, Vijay M. Patankar, Jayalal Sarma M. N
Using Elimination Theory to construct Rigid Matrices
25 Pages, minor typos corrected
Computational Complexity 23 (2014), 531-563
10.1007/s00037-013-0061-0
null
cs.CC math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rigidity of a matrix A for target rank r is the minimum number of entries of A that must be changed to ensure that the rank of the altered matrix is at most r. Since its introduction by Valiant (1977), rigidity and similar rank-robustness functions of matrices have found numerous applications in circuit complexity, communication complexity, and learning complexity. Almost all nxn matrices over an infinite field have a rigidity of (n-r)^2. It is a long-standing open question to construct infinite families of explicit matrices even with superlinear rigidity when r = Omega(n). In this paper, we construct an infinite family of complex matrices with the largest possible, i.e., (n-r)^2, rigidity. The entries of an n x n matrix in this family are distinct primitive roots of unity of orders roughly exp(n^2 log n). To the best of our knowledge, this is the first family of concrete (but not entirely explicit) matrices having maximal rigidity and a succinct algebraic description. Our construction is based on elimination theory of polynomial ideals. In particular, we use results on the existence of polynomials in elimination ideals with effective degree upper bounds (effective Nullstellensatz). Using elementary algebraic geometry, we prove that the dimension of the affine variety of matrices of rigidity at most k is exactly n^2-(n-r)^2+k. Finally, we use elimination theory to examine whether the rigidity function is semi-continuous.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 07:56:23 GMT" }, { "version": "v2", "created": "Sun, 23 Sep 2012 18:03:25 GMT" }, { "version": "v3", "created": "Wed, 16 Apr 2014 04:17:57 GMT" } ]
2015-01-27T00:00:00
[ [ "Kumar", "Abhinav", "" ], [ "Lokam", "Satyanarayana V.", "" ], [ "Patankar", "Vijay M.", "" ], [ "N", "Jayalal Sarma M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
0910.5339
Yunus Sarikaya
Yunus Sarikaya, Ozgur Ercetin
On Physically Secure and Stable Slotted ALOHA System
7 Pages, 8 Figures, Allerton 2009
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
In this paper, we consider the standard discrete-time slotted ALOHA with a finite number of terminals with infinite size buffers. In our study, we jointly consider the stability of this system together with the physical layer security. We conduct our studies on both dominant and original systems, where in a dominant system each terminal always has a packet in its buffer unlike in the original system. For N = 2, we obtain the secrecy-stability regions for both dominant and original systems. Furthermore, we obtain the transmission probabilities, which optimize system throughput. Lastly, this paper proposes a new methodology in terms of obtaining the joint stability and secrecy regions.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 10:55:14 GMT" } ]
2009-10-29T00:00:00
[ [ "Sarikaya", "Yunus", "" ], [ "Ercetin", "Ozgur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.5370
Daniel Shumow
Daniel Shumow
Isogenies of Elliptic Curves: A Computational Approach
Submitted as a Masters Thesis in the Mathematics department of the University of Washington
null
null
null
cs.CR cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Isogenies, the mappings of elliptic curves, have become a useful tool in cryptology. These mathematical objects have been proposed for use in computing pairings, constructing hash functions and random number generators, and analyzing the reducibility of the elliptic curve discrete logarithm problem. With such diverse uses, understanding these objects is important for anyone interested in the field of elliptic curve cryptography. This paper, targeted at an audience with a knowledge of the basic theory of elliptic curves, provides an introduction to the necessary theoretical background for understanding what isogenies are and their basic properties. This theoretical background is used to explain some of the basic computational tasks associated with isogenies. Herein, algorithms for computing isogenies are collected and presented with proofs of correctness and complexity analyses. As opposed to the complex analytic approach provided in most texts on the subject, the proofs in this paper are primarily algebraic in nature. This provides alternate explanations that some with a more concrete or computational bias may find more clear.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 01:48:42 GMT" } ]
2009-10-29T00:00:00
[ [ "Shumow", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0910.5380
Rajesh Chitnis
L. Sunil Chandran, Rajesh Chitnis, Ramanjit Kumar
On the SIG dimension of trees under $L_{\infty}$ metric
24 pages, 8 figures
null
null
null
math.CO cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the $SIG$ dimension of trees under $L_{\infty}$ metric and answer an open problem posed by Michael and Quint (Discrete Applied Mathematics: 127, pages 447-460, 2003). Let $T$ be a tree with atleast two vertices. For each $v\in V(T)$, let leaf-degree$(v)$ denote the number of neighbours of $v$ that are leaves. We define the maximum leaf-degree as $\alpha(T) = \max_{x \in V(T)}$ leaf-degree$(x)$. Let $S = \{v\in V(T) |$ leaf-degree$(v) = \alpha\}$. If $|S| = 1$, we define $\beta(T) = \alpha(T) - 1$. Otherwise define $\beta(T) = \alpha(T)$. We show that for a tree $T$, $SIG_\infty(T) = \lceil \log_2(\beta + 2)\rceil$ where $\beta = \beta (T)$, provided $\beta$ is not of the form $2^k - 1$, for some positive integer $k \geq 1$. If $\beta = 2^k - 1$, then $SIG_\infty (T) \in \{k, k+1\}$. We show that both values are possible.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 13:55:42 GMT" }, { "version": "v2", "created": "Sun, 9 Oct 2011 16:51:33 GMT" } ]
2011-10-11T00:00:00
[ [ "Chandran", "L. Sunil", "" ], [ "Chitnis", "Rajesh", "" ], [ "Kumar", "Ramanjit", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.5386
Arijit Laha Ph.D.
Arijit Laha
A theoretical foundation for building Knowledge-work Support Systems
40 pages, Created June 2008
null
null
null
cs.HC cs.DL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a novel approach aimed at building a new class of information system platforms which we call the "Knowledge-work Support Systems" or KwSS. KwSS can play a significant role in enhancing the IS support for knowledge management processes, including those customarily identified as less amenable to IS support. In our approach we try to enhance basic functionalities provided by the computer-based information systems, namely, that of improving the efficiency of the knowledge workers in accessing, processing and creating useful information. The improvement, along with proper focus on cultural, social and other aspects of the knowledge management processes, can enhance the workers' efficiency significantly in performing high quality knowledge works. In order to build the proposed approach, we develop several new concepts. The approach analyzes the information availability and usage from the knowledge workers and their works' perspectives and consequently brings forth more transparency in various aspects of information life-cycle with respect to knowledge management. KsSSes are technology platforms, which can be implemented independently as well as in conjunction with other knowledge management and data management technology platforms, to provide significant boost in the knowledge capabilities of organizations.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 14:31:53 GMT" } ]
2009-10-29T00:00:00
[ [ "Laha", "Arijit", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0910.5399
Guy McCusker
Guy McCusker
A Graph Model for Imperative Computation
null
Logical Methods in Computer Science, Volume 6, Issue 1 (January 12, 2010) lmcs:919
10.2168/LMCS-6(1:2)2010
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scott's graph model is a lambda-algebra based on the observation that continuous endofunctions on the lattice of sets of natural numbers can be represented via their graphs. A graph is a relation mapping finite sets of input values to output values. We consider a similar model based on relations whose input values are finite sequences rather than sets. This alteration means that we are taking into account the order in which observations are made. This new notion of graph gives rise to a model of affine lambda-calculus that admits an interpretation of imperative constructs including variable assignment, dereferencing and allocation. Extending this untyped model, we construct a category that provides a model of typed higher-order imperative computation with an affine type system. An appropriate language of this kind is Reynolds's Syntactic Control of Interference. Our model turns out to be fully abstract for this language. At a concrete level, it is the same as Reddy's object spaces model, which was the first "state-free" model of a higher-order imperative programming language and an important precursor of games models. The graph model can therefore be seen as a universal domain for Reddy's model.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 15:09:12 GMT" }, { "version": "v2", "created": "Tue, 12 Jan 2010 22:51:53 GMT" } ]
2015-07-01T00:00:00
[ [ "McCusker", "Guy", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0910.5405
Uwe Aickelin
Jan Feyereisl, Uwe Aickelin
Artificial Immune Tissue using Self-Orgamizing Networks
2 pages, 1 figure, Workshop on Artificial Immune Systems and Immune Systems Modelling (AISB06)
null
null
null
cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As introduced by Bentley et al. (2005), artificial immune systems (AIS) are lacking tissue, which is present in one form or another in all living multi-cellular organisms. Some have argued that this concept in the context of AIS brings little novelty to the already saturated field of the immune inspired computational research. This article aims to show that such a component of an AIS has the potential to bring an advantage to a data processing algorithm in terms of data pre-processing, clustering and extraction of features desired by the immune inspired system. The proposed tissue algorithm is based on self-organizing networks, such as self-organizing maps (SOM) developed by Kohonen (1996) and an analogy of the so called Toll-Like Receptors (TLR) affecting the activation function of the clusters developed by the SOM.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 15:36:33 GMT" } ]
2010-07-05T00:00:00
[ [ "Feyereisl", "Jan", "" ], [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0910.5410
David Fernandez-Amoros
David Fernandez-Amoros, Julio Gonzalo, Felisa Verdejo
The Uned systems at Senseval-2
latex2e, 5 pages, appeared in SENSEVAL-2, held with ACL-02
In Proceedings of the Second International Workshop on Evaluating Word Sense Disambiguation Systems (SENSEVAL), Toulouse 2002
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have participated in the SENSEVAL-2 English tasks (all words and lexical sample) with an unsupervised system based on mutual information measured over a large corpus (277 million words) and some additional heuristics. A supervised extension of the system was also presented to the lexical sample task. Our system scored first among unsupervised systems in both tasks: 56.9% recall in all words, 40.2% in lexical sample. This is slightly worse than the first sense heuristic for all words and 3.6% better for the lexical sample, a strong indication that unsupervised Word Sense Disambiguation remains being a strong challenge.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 16:58:27 GMT" } ]
2009-10-29T00:00:00
[ [ "Fernandez-Amoros", "David", "" ], [ "Gonzalo", "Julio", "" ], [ "Verdejo", "Felisa", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.5419
David Fernandez-Amoros
David Fernandez-Amoros
Word Sense Disambiguation Based on Mutual Information and Syntactic Patterns
latex2e, 5 pages, appeared in SENSEVAL-3, Barcelona 2004
In proceedings of the Third International Workshop on Evaluating Word Sense Disambiguation Systems (SENSEVAL) 2004, Barcelona
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a hybrid system for WSD, presented to the English all-words and lexical-sample tasks, that relies on two different unsupervised approaches. The first one selects the senses according to mutual information proximity between a context word a variant of the sense. The second heuristic analyzes the examples of use in the glosses of the senses so that simple syntactic patterns are inferred. This patterns are matched against the disambiguation contexts. We show that the first heuristic obtains a precision and recall of .58 and .35 respectively in the all words task while the second obtains .80 and .25. The high precision obtained recommends deeper research of the techniques. Results for the lexical sample task are also provided.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 17:03:00 GMT" } ]
2009-10-29T00:00:00
[ [ "Fernandez-Amoros", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.5426
Alonso Silva Allende
Alonso Silva, Eitan Altman, Pierre Bernhard, Merouane Debbah
Continuum Equilibria and Global Optimization for Routing in Dense Static Ad Hoc Networks
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider massively dense ad hoc networks and study their continuum limits as the node density increases and as the graph providing the available routes becomes a continuous area with location and congestion dependent costs. We study both the global optimal solution as well as the non-cooperative routing problem among a large population of users where each user seeks a path from its origin to its destination so as to minimize its individual cost. Finally, we seek for a (continuum version of the) Wardrop equilibrium. We first show how to derive meaningful cost models as a function of the scaling properties of the capacity of the network and of the density of nodes. We present various solution methodologies for the problem: (1) the viscosity solution of the Hamilton-Jacobi-Bellman equation, for the global optimization problem, (2) a method based on Green's Theorem for the least cost problem of an individual, and (3) a solution of the Wardrop equilibrium problem using a transformation into an equivalent global optimization problem.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 16:47:51 GMT" }, { "version": "v2", "created": "Thu, 29 Oct 2009 14:11:52 GMT" } ]
2009-10-29T00:00:00
[ [ "Silva", "Alonso", "" ], [ "Altman", "Eitan", "" ], [ "Bernhard", "Pierre", "" ], [ "Debbah", "Merouane", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0910.5434
Edoardo Di Napoli
Matthias Petschow, Edoardo Di Napoli and Paolo Bientinesi
An Example of Symmetry Exploitation for Energy-related Eigencomputations
To appear in the proceedings of the 7th International Conference on Computational Methods in Science and Engineering (ICCMSE '09)
null
null
AICES-2009-18
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most used approaches in simulating materials is the tight-binding approximation. When using this method in a material simulation, it is necessary to compute the eigenvalues and eigenvectors of the Hamiltonian describing the system. In general, the system possesses few explicit symmetries. Due to them, the problem has many degenerate eigenvalues. The ambiguity in choosing a orthonormal basis of the invariant subspaces, associated with degenerate eigenvalues, will result in eigenvectors which are not invariant under the action of the symmetry operators in matrix form. A meaningful computation of the eigenvectors needs to take those symmetries into account. A natural choice is a set of eigenvectors, which simultaneously diagonalizes the Hamiltonian and the symmetry matrices. This is possible because all the matrices commute with each other. The simultaneous eigenvectors and the corresponding eigenvalues will be in a parametrized form in terms of the lattice momentum components. This functional dependence of the eigenvalues is the dispersion relation and describes the band structure of a material. Therefore it is important to find this functional dependence in any numerical computation related to material properties.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 17:02:17 GMT" } ]
2009-10-29T00:00:00
[ [ "Petschow", "Matthias", "" ], [ "Di Napoli", "Edoardo", "" ], [ "Bientinesi", "Paolo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0910.5435
Mark Tygert
Mark Tygert
Fast algorithms for spherical harmonic expansions, III
14 pages, 1 figure, 6 tables
Fast algorithms for spherical harmonic expansions, III, Journal of Computational Physics, 229 (18): 6181-6192, 2010
10.1016/j.jcp.2010.05.004
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We accelerate the computation of spherical harmonic transforms, using what is known as the butterfly scheme. This provides a convenient alternative to the approach taken in the second paper from this series on "Fast algorithms for spherical harmonic expansions." The requisite precomputations become manageable when organized as a "depth-first traversal" of the program's control-flow graph, rather than as the perhaps more natural "breadth-first traversal" that processes one-by-one each level of the multilevel procedure. We illustrate the results via several numerical examples.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 17:03:05 GMT" }, { "version": "v2", "created": "Thu, 29 Oct 2009 16:57:59 GMT" }, { "version": "v3", "created": "Fri, 30 Oct 2009 19:19:55 GMT" }, { "version": "v4", "created": "Tue, 17 Nov 2009 19:23:19 GMT" }, { "version": "v5", "created": "Sun, 13 Dec 2009 18:48:39 GMT" }, { "version": "v6", "created": "Mon, 5 Apr 2010 17:16:54 GMT" } ]
2015-05-14T00:00:00
[ [ "Tygert", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0910.5454
Patrick C. McGuire
P.C. McGuire, C. Gross, L. Wendt, A. Bonnici, V. Souza-Egipsy, J. Ormo, E. Diaz-Martinez, B.H. Foing, R. Bose, S. Walter, M. Oesker, J. Ontrup, R. Haschke, H. Ritter
The Cyborg Astrobiologist: Testing a Novelty-Detection Algorithm on Two Mobile Exploration Systems at Rivas Vaciamadrid in Spain and at the Mars Desert Research Station in Utah
28 pages, 12 figures, accepted for publication in the International Journal of Astrobiology
International Journal of Astrobiology, Vol. 9, pp. 11-27 (2010).
10.1017/S1473550409990358
null
cs.CV astro-ph.EP astro-ph.IM cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
(ABRIDGED) In previous work, two platforms have been developed for testing computer-vision algorithms for robotic planetary exploration (McGuire et al. 2004b,2005; Bartolo et al. 2007). The wearable-computer platform has been tested at geological and astrobiological field sites in Spain (Rivas Vaciamadrid and Riba de Santiuste), and the phone-camera has been tested at a geological field site in Malta. In this work, we (i) apply a Hopfield neural-network algorithm for novelty detection based upon color, (ii) integrate a field-capable digital microscope on the wearable computer platform, (iii) test this novelty detection with the digital microscope at Rivas Vaciamadrid, (iv) develop a Bluetooth communication mode for the phone-camera platform, in order to allow access to a mobile processing computer at the field sites, and (v) test the novelty detection on the Bluetooth-enabled phone-camera connected to a netbook computer at the Mars Desert Research Station in Utah. This systems engineering and field testing have together allowed us to develop a real-time computer-vision system that is capable, for example, of identifying lichens as novel within a series of images acquired in semi-arid desert environments. We acquired sequences of images of geologic outcrops in Utah and Spain consisting of various rock types and colors to test this algorithm. The algorithm robustly recognized previously-observed units by their color, while requiring only a single image or a few images to learn colors as familiar, demonstrating its fast learning capability.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 18:26:39 GMT" } ]
2010-01-08T00:00:00
[ [ "McGuire", "P. C.", "" ], [ "Gross", "C.", "" ], [ "Wendt", "L.", "" ], [ "Bonnici", "A.", "" ], [ "Souza-Egipsy", "V.", "" ], [ "Ormo", "J.", "" ], [ "Diaz-Martinez", "E.", "" ], [ "Foing", "B. H.", "" ], [ "Bose", "R.", "" ], [ "Walter", "S.", "" ], [ "Oesker", "M.", "" ], [ "Ontrup", "J.", "" ], [ "Haschke", "R.", "" ], [ "Ritter", "H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Physics", "code": "astro-ph.EP", "description": "Interplanetary medium, planetary physics, planetary astrobiology, extrasolar planets, comets, asteroids, meteorites. Structure and formation of the solar system", "span": "(Earth and Planetary Astrophysics)" }, { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0910.5461
Manqi Zhao
Manqi Zhao and Venkatesh Saligrama
Anomaly Detection with Score functions based on Nearest Neighbor Graphs
10 pages, 10 figures, accepted by NIPS 2009
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel non-parametric adaptive anomaly detection algorithm for high dimensional data based on score functions derived from nearest neighbor graphs on $n$-point nominal data. Anomalies are declared whenever the score of a test sample falls below $\alpha$, which is supposed to be the desired false alarm level. The resulting anomaly detector is shown to be asymptotically optimal in that it is uniformly most powerful for the specified false alarm level, $\alpha$, for the case when the anomaly density is a mixture of the nominal and a known density. Our algorithm is computationally efficient, being linear in dimension and quadratic in data size. It does not require choosing complicated tuning parameters or function approximation classes and it can adapt to local structure such as local change in dimensionality. We demonstrate the algorithm on both artificial and real data sets in high dimensional feature spaces.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 18:46:41 GMT" } ]
2009-10-29T00:00:00
[ [ "Zhao", "Manqi", "" ], [ "Saligrama", "Venkatesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0910.5516
Steve Gregory
Steve Gregory
Finding overlapping communities in networks by label propagation
null
New J. Phys. 12 103018 (2010)
10.1088/1367-2630/12/10/103018
null
physics.soc-ph cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an algorithm for finding overlapping community structure in very large networks. The algorithm is based on the label propagation technique of Raghavan, Albert, and Kumara, but is able to detect communities that overlap. Like the original algorithm, vertices have labels that propagate between neighbouring vertices so that members of a community reach a consensus on their community membership. Our main contribution is to extend the label and propagation step to include information about more than one community: each vertex can now belong to up to v communities, where v is the parameter of the algorithm. Our algorithm can also handle weighted and bipartite networks. Tests on an independently designed set of benchmarks, and on real networks, show the algorithm to be highly effective in recovering overlapping communities. It is also very fast and can process very large and dense networks in a short time.
[ { "version": "v1", "created": "Wed, 28 Oct 2009 22:52:11 GMT" }, { "version": "v2", "created": "Thu, 11 Feb 2010 20:47:51 GMT" }, { "version": "v3", "created": "Thu, 14 Oct 2010 18:25:42 GMT" } ]
2010-10-15T00:00:00
[ [ "Gregory", "Steve", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" } ]
0910.5535
P\'all Melsted
Alan Frieze, P\'all Melsted
Maximum Matchings in Random Bipartite Graphs and the Space Utilization of Cuckoo Hashtables
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the the following question in Random Graphs. We are given two disjoint sets $L,R$ with $|L|=n=\alpha m$ and $|R|=m$. We construct a random graph $G$ by allowing each $x\in L$ to choose $d$ random neighbours in $R$. The question discussed is as to the size $\mu(G)$ of the largest matching in $G$. When considered in the context of Cuckoo Hashing, one key question is as to when is $\mu(G)=n$ whp? We answer this question exactly when $d$ is at least four. We also establish a precise threshold for when Phase 1 of the Karp-Sipser Greedy matching algorithm suffices to compute a maximum matching whp.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 02:29:42 GMT" }, { "version": "v2", "created": "Wed, 11 Nov 2009 16:16:33 GMT" }, { "version": "v3", "created": "Tue, 17 Nov 2009 19:49:44 GMT" } ]
2009-11-17T00:00:00
[ [ "Frieze", "Alan", "" ], [ "Melsted", "Páll", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0910.5537
Hana Godrich
Hana Godrich, Alexander M. Haimovich, and H. Vincent Poor
An Analysis of Phase Synchronization Mismatch Sensitivity for Coherent MIMO Radar Systems
To be presented at CAMSAP 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this study, the hybrid Cramer-Rao bound (CRB) is developed for target localization, to establish the sensitivity of the estimation mean-square error (MSE) to the level of phase synchronization mismatch in coherent Multiple-Input Multiple-Output (MIMO) radar systems with widely distributed antennas. The lower bound on the MSE is derived for the joint estimation of the vector of unknown parameters, consisting of the target location and the mismatch of the allegedly known system parameters, i.e., phase offsets at the radars. Synchronization errors are modeled as being random and Gaussian. A closed-form expression for the hybrid CRB is derived for the case of orthogonal waveforms.The bound on the target localization MSE is expressed as the sum of two terms - the first represents the CRB with no phase mismatch, and the second captures the mismatch effect. The latter is shown to depend on the phase error variance, the number of mismatched transmitting and receiving sensors and the system geometry. For a given phase synchronization error variance, this expression offers the means to analyze the achievable localization accuracy. Alternatively, for a predetermined localization MSE target value, the derived expression may be used to determine the necessary phase synchronization level in the distributed system.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 02:31:43 GMT" } ]
2009-10-30T00:00:00
[ [ "Godrich", "Hana", "" ], [ "Haimovich", "Alexander M.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.5542
Alexander Spirov
Alexander V. Spirov, Alexander B. Kazansky, Leonid Zamdborg, Juan J. Merelo and Vladimir F. Levchenko
Forced Evolution in Silico by Artificial Transposons and their Genetic Operators: The John Muir Ant Problem
33 pages
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern evolutionary computation utilizes heuristic optimizations based upon concepts borrowed from the Darwinian theory of natural selection. We believe that a vital direction in this field must be algorithms that model the activity of genomic parasites, such as transposons, in biological evolution. This publication is our first step in the direction of developing a minimal assortment of algorithms that simulate the role of genomic parasites. Specifically, we started in the domain of genetic algorithms (GA) and selected the Artificial Ant Problem as a test case. We define these artificial transposons as a fragment of an ant's code that possesses properties that cause it to stand apart from the rest. We concluded that artificial transposons, analogous to real transposons, are truly capable of acting as intelligent mutators that adapt in response to an evolutionary problem in the course of co-evolution with their hosts.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 03:11:12 GMT" } ]
2009-10-30T00:00:00
[ [ "Spirov", "Alexander V.", "" ], [ "Kazansky", "Alexander B.", "" ], [ "Zamdborg", "Leonid", "" ], [ "Merelo", "Juan J.", "" ], [ "Levchenko", "Vladimir F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.5559
Damien Chablat
Damien Chablat (IRCCyN, CIM), Philippe Wenger (IRCCyN)
On the characterization of the regions of feasible trajectories in the workspace of parallel manipulators
null
Tenth World Congress On The Theory Of Machines And Mechanisms, Oulu : Finland (1999)
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It was shown recently that parallel manipulators with several inverse kinematic solutions have the ability to avoid parallel singularities [Chablat 1998a] and self-collisions [Chablat 1998b] by choosing appropriate joint configurations for the legs. In effect, depending on the joint configurations of the legs, a given configuration of the end-effector may or may not be free of singularity and collision. Characterization of the collision/singularity-free workspace is useful but may be insufficient since two configurations can be accessible without collisions nor singularities but it may not exist a feasible trajectory between them. The goal of this paper is to define the maximal regions of the workspace where it is possible to execute trajectories. Twodifferent families of regions are defined : 1. those regions where the end-effector can move between any set of points, and 2. the regions where any continuous path can be tracked. These regions are characterized from the notion of aspects and free-aspects recently defined for parallel manipulators [Chablat 1998b]. The construction of these regions is achieved by enrichment techniques and using an extension of the octree structures to spaces of dimension greater than three. Illustrative examples show the interest of this study to the optimization of trajectories and the design of parallel manipulators.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 06:59:32 GMT" } ]
2009-10-30T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN, CIM" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0910.5564
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Instruction sequence processing operators
37 pages; missing equations in table 3 added; combined with arXiv:0911.1851 [cs.PL] and arXiv:0911.5018 [cs.LO]; introduction and concluding remarks rewritten; remarks and examples added; minor error in proof of theorem 4 corrected
Acta Informatica, 49(3):139--172, 2012
10.1007/s00236-012-0154-2
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Instruction sequence is a key concept in practice, but it has as yet not come prominently into the picture in theoretical circles. This paper concerns instruction sequences, the behaviours produced by them under execution, the interaction between these behaviours and components of the execution environment, and two issues relating to computability theory. Positioning Turing's result regarding the undecidability of the halting problem as a result about programs rather than machines, and taking instruction sequences as programs, we analyse the autosolvability requirement that a program of a certain kind must solve the halting problem for all programs of that kind. We present novel results concerning this autosolvability requirement. The analysis is streamlined by using the notion of a functional unit, which is an abstract state-based model of a machine. In the case where the behaviours exhibited by a component of an execution environment can be viewed as the behaviours of a machine in its different states, the behaviours concerned are completely determined by a functional unit. The above-mentioned analysis involves functional units whose possible states represent the possible contents of the tapes of Turing machines with a particular tape alphabet. We also investigate functional units whose possible states are the natural numbers. This investigation yields a novel computability result, viz. the existence of a universal computable functional unit for natural numbers.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 07:41:27 GMT" }, { "version": "v2", "created": "Tue, 10 Nov 2009 08:01:30 GMT" }, { "version": "v3", "created": "Sun, 17 Oct 2010 20:17:01 GMT" }, { "version": "v4", "created": "Mon, 26 Dec 2011 13:43:37 GMT" }, { "version": "v5", "created": "Wed, 7 Mar 2012 08:40:16 GMT" } ]
2012-05-07T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0910.5577
Ilkka Norros
Ilkka Norros, Hannu Reittu, Timo Eirola
On the stability of two-chunk file-sharing systems
19 pages, 7 figures
Queueing Systems (2011) 67: 183
10.1007/s11134-011-9209-2
null
cs.OS math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider five different peer-to-peer file sharing systems with two chunks, with the aim of finding chunk selection algorithms that have provably stable performance with any input rate and assuming non-altruistic peers who leave the system immediately after downloading the second chunk. We show that many algorithms that first looked promising lead to unstable or oscillating behavior. However, we end up with a system with desirable properties. Most of our rigorous results concern the corresponding deterministic large system limits, but in two simplest cases we provide proofs for the stochastic systems also.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 08:38:32 GMT" } ]
2018-10-24T00:00:00
[ [ "Norros", "Ilkka", "" ], [ "Reittu", "Hannu", "" ], [ "Eirola", "Timo", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0910.5595
Shohreh Sharif Mansouri
Shohreh Sharif Mansouri and Elena Dubrova
An Improved Implementation of Grain
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A common approach to protect confidential information is to use a stream cipher which combines plain text bits with a pseudo-random bit sequence. Among the existing stream ciphers, Non-Linear Feedback Shift Register (NLFSR)-based ones provide the best trade-off between cryptographic security and hardware efficiency. In this paper, we show how to further improve the hardware efficiency of Grain stream cipher. By transforming the NLFSR of Grain from its original Fibonacci configuration to the Galois configuration and by introducing a clock division block, we double the throughput of the 80 and 128-bit key 1bit/cycle architectures of Grain with no area penalty.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 09:44:02 GMT" } ]
2009-10-30T00:00:00
[ [ "Mansouri", "Shohreh Sharif", "" ], [ "Dubrova", "Elena", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0910.5599
Dror Rawitz
Boaz Patt-Shamir, Dror Rawitz
Vector Bin Packing with Multiple-Choice
null
null
10.1007/978-3-642-13731-0_24
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a variant of bin packing called multiple-choice vector bin packing. In this problem we are given a set of items, where each item can be selected in one of several $D$-dimensional incarnations. We are also given $T$ bin types, each with its own cost and $D$-dimensional size. Our goal is to pack the items in a set of bins of minimum overall cost. The problem is motivated by scheduling in networks with guaranteed quality of service (QoS), but due to its general formulation it has many other applications as well. We present an approximation algorithm that is guaranteed to produce a solution whose cost is about $\ln D$ times the optimum. For the running time to be polynomial we require $D=O(1)$ and $T=O(\log n)$. This extends previous results for vector bin packing, in which each item has a single incarnation and there is only one bin type. To obtain our result we also present a PTAS for the multiple-choice version of multidimensional knapsack, where we are given only one bin and the goal is to pack a maximum weight set of (incarnations of) items in that bin.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 10:00:37 GMT" } ]
2015-05-14T00:00:00
[ [ "Patt-Shamir", "Boaz", "" ], [ "Rawitz", "Dror", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.5643
Alonso Silva Allende
Alonso Silva, Eitan Altman, Merouane Debbah, Giuseppa Alfano
Magnetworks: how mobility impacts the design of Mobile Networks
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the optimal placement and optimal number of active relay nodes through the traffic density in mobile sensor ad-hoc networks. We consider a setting in which a set of mobile sensor sources is creating data and a set of mobile sensor destinations receiving that data. We make the assumption that the network is massively dense, i.e., there are so many sources, destinations, and relay nodes, that it is best to describe the network in terms of macroscopic parameters, such as their spatial density, rather than in terms of microscopic parameters, such as their individual placements. We focus on a particular physical layer model that is characterized by the following assumptions: i) the nodes must only transport the data from the sources to the destinations, and do not need to sense the data at the sources, or deliver them at the destinations once the data arrive at their physical locations, and ii) the nodes have limited bandwidth available to them, but they use it optimally to locally achieve the network capacity. In this setting, the optimal distribution of nodes induces a traffic density that resembles the electric displacement that will be created if we substitute the sources and destinations with positive and negative charges respectively. The analogy between the two settings is very tight and have a direct interpretation in wireless sensor networks.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 14:02:45 GMT" } ]
2009-10-30T00:00:00
[ [ "Silva", "Alonso", "" ], [ "Altman", "Eitan", "" ], [ "Debbah", "Merouane", "" ], [ "Alfano", "Giuseppa", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0910.5673
Florian D\"orfler
Florian Dorfler and Francesco Bullo
Synchronization and Transient Stability in Power Networks and Non-Uniform Kuramoto Oscillators
null
null
null
null
math.OC cs.SY math-ph math.DS math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by recent interest for multi-agent systems and smart power grid architectures, we discuss the synchronization problem for the network-reduced model of a power system with non-trivial transfer conductances. Our key insight is to exploit the relationship between the power network model and a first-order model of coupled oscillators. Assuming overdamped generators (possibly due to local excitation controllers), a singular perturbation analysis shows the equivalence between the classic swing equations and a non-uniform Kuramoto model. Here, non-uniform Kuramoto oscillators are characterized by multiple time constants, non-homogeneous coupling, and non-uniform phase shifts. Extending methods from transient stability, synchronization theory, and consensus protocols, we establish sufficient conditions for synchronization of non-uniform Kuramoto oscillators. These conditions reduce to and improve upon previously-available tests for the standard Kuramoto model. Combining our singular perturbation and Kuramoto analyses, we derive concise and purely algebraic conditions that relate synchronization and transient stability of a power network to the underlying system parameters and initial conditions.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 16:32:56 GMT" }, { "version": "v2", "created": "Fri, 29 Jan 2010 23:55:51 GMT" }, { "version": "v3", "created": "Sat, 2 Oct 2010 19:11:11 GMT" }, { "version": "v4", "created": "Mon, 27 Jun 2011 17:44:11 GMT" } ]
2011-06-28T00:00:00
[ [ "Dorfler", "Florian", "" ], [ "Bullo", "Francesco", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
0910.5682
David Fernandez-Amoros
David Fernandez-Amoros
Word Sense Disambiguation Using English-Spanish Aligned Phrases over Comparable Corpora
latex2e, 8 pages, 1 figure, published in the Proceedings of Cross-Language Knowledge Induction Workshop, 2005 Cluj-Napoca, held during the summer school EUROLAN 2005
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe a WSD experiment based on bilingual English-Spanish comparable corpora in which individual noun phrases have been identified and aligned with their respective counterparts in the other language. The evaluation of the experiment has been carried out against SemCor. We show that, with the alignment algorithm employed, potential precision is high (74.3%), however the coverage of the method is low (2.7%), due to alignments being far less frequent than we expected. Contrary to our intuition, precision does not rise consistently with the number of alignments. The coverage is low due to several factors; there are important domain differences, and English and Spanish are too close languages for this approach to be able to discriminate efficiently between senses, rendering it unsuitable for WSD, although the method may prove more productive in machine translation.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 17:19:01 GMT" } ]
2009-10-30T00:00:00
[ [ "Fernandez-Amoros", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0910.5697
Eitan Yaakobi
Eitan Yaakobi and Tuvi Etzion
High Dimensional Error-Correcting Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we construct multidimensional codes with high dimension. The codes can correct high dimensional errors which have the form of either small clusters, or confined to an area with a small radius. We also consider small number of errors in a small area. The clusters which are discussed are mainly spheres such as semi-crosses and crosses. Also considered are clusters with small number of errors such as 2-bursts, two errors in various clusters, and three errors on a line. Our main focus is on the redundancy of the codes when the most dominant parameter is the dimension of the code.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 18:06:41 GMT" }, { "version": "v2", "created": "Mon, 26 Apr 2010 08:35:15 GMT" } ]
2010-04-27T00:00:00
[ [ "Yaakobi", "Eitan", "" ], [ "Etzion", "Tuvi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.5714
Aaron D. Jaggard
Joan Feigenbaum, Aaron D. Jaggard, and Michael Schapira
Approximate Privacy: Foundations and Quantification
33 pages, seven figures, two tables. Changes in version 2 include an expanded discussion of other approaches to approximate privacy and added acknowledgements
null
null
DIMACS TR 2009-14
cs.CR cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data about individuals and organizations. Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and used in electronic commerce. There have been many formulations of privacy and, unfortunately, many negative results about the feasibility of maintaining privacy of sensitive data in realistic networked environments. We formulate communication-complexity-based definitions, both worst-case and average-case, of a problem's privacy-approximation ratio. We use our definitions to investigate the extent to which approximate privacy is achievable in two standard problems: the second-price Vickrey auction and the millionaires problem of Yao. For both the second-price Vickrey auction and the millionaires problem, we show that not only is perfect privacy impossible or infeasibly costly to achieve, but even close approximations of perfect privacy suffer from the same lower bounds. By contrast, we show that, if the values of the parties are drawn uniformly at random from {0,...,2^k-1}, then, for both problems, simple and natural communication protocols have privacy-approximation ratios that are linear in k (i.e., logarithmic in the size of the space of possible inputs). We conjecture that this improved privacy-approximation ratio is achievable for any probability distribution.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 19:48:17 GMT" }, { "version": "v2", "created": "Wed, 9 Jun 2010 19:06:59 GMT" } ]
2010-06-10T00:00:00
[ [ "Feigenbaum", "Joan", "" ], [ "Jaggard", "Aaron D.", "" ], [ "Schapira", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0910.5744
Olivier Spanjaard
Lucie Galand and Olivier Spanjaard
Exact algorithms for OWA-optimization in multiobjective spanning tree problems
17 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the multiobjective version of the optimal spanning tree problem. More precisely, we are interested in determining the optimal spanning tree according to an Ordered Weighted Average (OWA) of its objective values. We first show that the problem is weakly NP-hard. In the case where the weights of the OWA are strictly decreasing, we then propose a mixed integer programming formulation, and provide dedicated optimality conditions yielding an important reduction of the size of the program. Next, we present two bounds that can be used to prune subspaces of solutions either in a shaving phase or in a branch and bound procedure. The validity of these bounds does not depend on specific properties of the weights (apart from non-negativity). All these exact resolution algorithms are compared on the basis of numerical experiments, according to their respective validity scopes.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 23:17:24 GMT" } ]
2009-11-02T00:00:00
[ [ "Galand", "Lucie", "" ], [ "Spanjaard", "Olivier", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.5745
Dusko Pavlovic
Dusko Pavlovic and Catherine Meadows
Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol
31 pages, 2 figures; short version of this paper appeared in the Proceedings of MFPS 2010
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As mobile devices pervade physical space, the familiar authentication patterns are becoming insufficient: besides entity authentication, many applications require, e.g., location authentication. Many interesting protocols have been proposed and implemented to provide such strengthened forms of authentication, but there are very few proofs that such protocols satisfy the required security properties. The logical formalisms, devised for reasoning about security protocols on standard computer networks, turn out to be difficult to adapt for reasoning about hybrid protocols, used in pervasive and heterogenous networks. <p> We refine the Dolev-Yao-style algebraic method for protocol analysis by a probabilistic model of guessing, needed to analyze protocols that mix weak cryptography with physical properties of nonstandard communication channels. Applying this model, we provide a precise security proof for a proximity authentication protocol, due to Hancke and Kuhn, that uses a subtle form of probabilistic reasoning to achieve its goals.
[ { "version": "v1", "created": "Thu, 29 Oct 2009 23:49:37 GMT" }, { "version": "v2", "created": "Sat, 13 Feb 2010 02:40:59 GMT" }, { "version": "v3", "created": "Wed, 14 Jul 2010 21:47:13 GMT" } ]
2010-07-16T00:00:00
[ [ "Pavlovic", "Dusko", "" ], [ "Meadows", "Catherine", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0910.5759
Ravi Tandon
Ravi Tandon, Sennur Ulukus, Kannan Ramchandran
Secure Source Coding with a Helper
IEEE Transactions on Information Theory, to appear
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a secure source coding problem with a rate-limited helper. In particular, Alice observes an independent and identically distributed (i.i.d.) source X and wishes to transmit this source losslessly to Bob over a rate-limited link. A helper (Helen), observes an i.i.d. correlated source Y and can transmit information to Bob over a separate rate-limited link. A passive eavesdropper (Eve) can observe the coded output of Alice, i.e., the link from Alice to Bob is public. The uncertainty about the source X at Eve, is measured by the conditional entropy of the source given the coded output of Alice. We completely characterize the rate-equivocation region for this secure source coding model, where we show that Slepian-Wolf binning of X with respect to the coded side information received at Bob is optimal. We next consider a modification of this model in which Alice also has access to the coded output of Helen. For the two-sided helper model, we characterize the rate-equivocation region. While the availability of side information at Alice does not reduce the rate of transmission from Alice, it significantly enhances the resulting equivocation at Eve. In particular, the resulting equivocation for the two-sided helper case is shown to be min(H(X),R_y), i.e., one bit from the two-sided helper provides one bit of uncertainty at Eve. From this result, we infer that Slepian-Wolf binning of X is suboptimal and one can further decrease the information leakage to the eavesdropper by utilizing the side information at Alice. We finally generalize these results to the case in which there is additional un-coded side information W available at Bob and characterize the rate-equivocation regions under the assumption that Y-X-W forms a Markov chain.
[ { "version": "v1", "created": "Fri, 30 Oct 2009 00:35:15 GMT" }, { "version": "v2", "created": "Mon, 2 Nov 2009 00:07:13 GMT" }, { "version": "v3", "created": "Fri, 7 Dec 2012 01:03:15 GMT" } ]
2012-12-10T00:00:00
[ [ "Tandon", "Ravi", "" ], [ "Ulukus", "Sennur", "" ], [ "Ramchandran", "Kannan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.5761
Jose Bento
Jose Bento, Andrea Montanari
Which graphical models are difficult to learn?
null
null
null
null
stat.ML cond-mat.stat-mech cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of learning the structure of Ising models (pairwise binary Markov random fields) from i.i.d. samples. While several methods have been proposed to accomplish this task, their relative merits and limitations remain somewhat obscure. By analyzing a number of concrete examples, we show that low-complexity algorithms systematically fail when the Markov random field develops long-range correlations. More precisely, this phenomenon appears to be related to the Ising model phase transition (although it does not coincide with it).
[ { "version": "v1", "created": "Fri, 30 Oct 2009 01:10:44 GMT" } ]
2009-11-07T00:00:00
[ [ "Bento", "Jose", "" ], [ "Montanari", "Andrea", "" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0910.5765
Frank Vallentin
Jop Briet, Fernando Mario de Oliveira Filho, Frank Vallentin
The positive semidefinite Grothendieck problem with rank constraint
(v3) to appear in Proceedings of the 37th International Colloquium on Automata, Languages and Programming, 12 pages
ICALP, Part I, LNCS 6198, 2010, pages 31-42
10.1007/978-3-642-14165-2_4
null
math.OC cs.DS math.CO math.FA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a positive integer n and a positive semidefinite matrix A = (A_{ij}) of size m x m, the positive semidefinite Grothendieck problem with rank-n-constraint (SDP_n) is maximize \sum_{i=1}^m \sum_{j=1}^m A_{ij} x_i \cdot x_j, where x_1, ..., x_m \in S^{n-1}. In this paper we design a polynomial time approximation algorithm for SDP_n achieving an approximation ratio of \gamma(n) = \frac{2}{n}(\frac{\Gamma((n+1)/2)}{\Gamma(n/2)})^2 = 1 - \Theta(1/n). We show that under the assumption of the unique games conjecture the achieved approximation ratio is optimal: There is no polynomial time algorithm which approximates SDP_n with a ratio greater than \gamma(n). We improve the approximation ratio of the best known polynomial time algorithm for SDP_1 from 2/\pi to 2/(\pi\gamma(m)) = 2/\pi + \Theta(1/m), and we show a tighter approximation ratio for SDP_n when A is the Laplacian matrix of a graph with nonnegative edge weights.
[ { "version": "v1", "created": "Fri, 30 Oct 2009 04:49:10 GMT" }, { "version": "v2", "created": "Thu, 5 Nov 2009 02:09:03 GMT" }, { "version": "v3", "created": "Mon, 3 May 2010 11:58:34 GMT" } ]
2010-09-17T00:00:00
[ [ "Briet", "Jop", "" ], [ "Filho", "Fernando Mario de Oliveira", "" ], [ "Vallentin", "Frank", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" } ]
0910.5794
Damien Chablat
Anatoly Pashkevich (ROBOTIC Laboratory, Irccyn), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Roman Gomolitsky (ROBOTIC Laboratory)
Calibration of 3-d.o.f. Translational Parallel Manipulators Using Leg Observations
ISBN: 978-3-902613-20-2
Parallel Manipulators, New Developments, Jee-Hwan Ryu (Ed.) (2008) 225-240
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper proposes a novel approach for the geometrical model calibration of quasi-isotropic parallel kinematic mechanisms of the Orthoglide family. It is based on the observations of the manipulator leg parallelism during motions between the specific test postures and employs a low-cost measuring system composed of standard comparator indicators attached to the universal magnetic stands. They are sequentially used for measuring the deviation of the relevant leg location while the manipulator moves the TCP along the Cartesian axes. Using the measured differences, the developed algorithm estimates the joint offsets and the leg lengths that are treated as the most essential parameters. Validity of the proposed calibration technique is confirmed by the experimental results.
[ { "version": "v1", "created": "Fri, 30 Oct 2009 05:43:56 GMT" } ]
2009-11-02T00:00:00
[ [ "Pashkevich", "Anatoly", "", "ROBOTIC Laboratory, Irccyn" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Gomolitsky", "Roman", "", "ROBOTIC Laboratory" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0910.5816
Giuseppe Notarstefano
Giuseppe Notarstefano and Francesco Bullo
Distributed Abstract Optimization via Constraints Consensus: Theory and Applications
null
null
null
null
cs.DC cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed abstract programs are a novel class of distributed optimization problems where (i) the number of variables is much smaller than the number of constraints and (ii) each constraint is associated to a network node. Abstract optimization programs are a generalization of linear programs that captures numerous geometric optimization problems. We propose novel constraints consensus algorithms for distributed abstract programs: as each node iteratively identifies locally active constraints and exchanges them with its neighbors, the network computes the active constraints determining the global optimum. The proposed algorithms are appropriate for networks with weak time-dependent connectivity requirements and tight memory constraints. We show how suitable target localization and formation control problems can be tackled via constraints consensus.
[ { "version": "v1", "created": "Fri, 30 Oct 2009 09:06:19 GMT" }, { "version": "v2", "created": "Mon, 2 Nov 2009 13:39:28 GMT" } ]
2009-11-02T00:00:00
[ [ "Notarstefano", "Giuseppe", "" ], [ "Bullo", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0910.5819
S{\l}awomir Lasota
Slawomir Lasota, Marcin Poturalski
Undecidability of performance equivalence of Petri nets
null
null
null
null
cs.CC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate bisimulation equivalence on Petri nets under durational semantics. Our motivation was to verify the conjecture that in durational setting, the bisimulation equivalence checking problem becomes more tractable than in ordinary setting (which is the case, e.g., over communication-free nets). We disprove this conjecture in three of four proposed variants of durational semantics. The fourth variant remains an intriguing open problem.
[ { "version": "v1", "created": "Fri, 30 Oct 2009 09:25:43 GMT" }, { "version": "v2", "created": "Thu, 25 Jun 2015 20:38:29 GMT" } ]
2015-06-29T00:00:00
[ [ "Lasota", "Slawomir", "" ], [ "Poturalski", "Marcin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0910.5833
Jean-Loup Carr\'e
Jean-Loup Carre and Charles Hymans
From Single-thread to Multithreaded: An Efficient Static Analysis Algorithm
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A great variety of static analyses that compute safety properties of single-thread programs have now been developed. This paper presents a systematic method to extend a class of such static analyses, so that they handle programs with multiple POSIX-style threads. Starting from a pragmatic operational semantics, we build a denotational semantics that expresses reasoning a la assume-guarantee. The final algorithm is then derived by abstract interpretation. It analyses each thread in turn, propagating interferences between threads, in addition to other semantic information. The combinatorial explosion, ensued from the explicit consideration of all interleavings, is thus avoided. The worst case complexity is only increased by a factor n compared to the single-thread case, where n is the number of instructions in the program. We have implemented prototype tools, demonstrating the practicality of the approach.
[ { "version": "v1", "created": "Fri, 30 Oct 2009 10:27:23 GMT" } ]
2009-11-02T00:00:00
[ [ "Carre", "Jean-Loup", "" ], [ "Hymans", "Charles", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0910.5844
Tony Tan
Tony Tan
On Pebble Automata for Data Languages with Decidable Emptiness Problem
An extended abstract of this work has been published in the proceedings of the 34th International Symposium on Mathematical Foundations of Computer Science (MFCS) 2009}, Springer, Lecture Notes in Computer Science 5734, pages 712-723
null
10.1007/978-3-642-03816-7_60
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study a subclass of pebble automata (PA) for data languages for which the emptiness problem is decidable. Namely, we introduce the so-called top view weak PA. Roughly speaking, top view weak PA are weak PA where the equality test is performed only between the data values seen by the two most recently placed pebbles. The emptiness problem for this model is decidable. We also show that it is robust: alternating, nondeterministic and deterministic top view weak PA have the same recognition power. Moreover, this model is strong enough to accept all data languages expressible in Linear Temporal Logic with the future-time operators, augmented with one register freeze quantifier.
[ { "version": "v1", "created": "Fri, 30 Oct 2009 11:14:03 GMT" } ]
2015-05-14T00:00:00
[ [ "Tan", "Tony", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0910.5904
Bernhard G. Bodmann
Bernhard G. Bodmann, Peter G. Casazza and Gitta Kutyniok
A quantitative notion of redundancy for finite frames
19 pages, LateX with AMS macros; corrections addressing complications due to zero vectors and spark
null
null
null
math.FA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The objective of this paper is to improve the customary definition of redundancy by providing quantitative measures in its place, which we coin upper and lower redundancies, that match better with an intuitive understanding of redundancy for finite frames in a Hilbert space. This motivates a carefully chosen list of desired properties for upper and lower redundancies. The means to achieve these properties is to consider the maximum and minimum of a redundancy function, which is interesting in itself. The redundancy function is defined on the sphere of the Hilbert space and measures the concentration of frame vectors around each point. A complete characterization of functions on the sphere which coincide with a redundancy function for some frame is given. The upper and lower redundancies obtained from this function are shown to satisfy all of the intuitively desirable properties. In addition, the range of values they assume is characterized.
[ { "version": "v1", "created": "Fri, 30 Oct 2009 16:10:35 GMT" }, { "version": "v2", "created": "Thu, 19 Nov 2009 02:11:10 GMT" } ]
2009-11-19T00:00:00
[ [ "Bodmann", "Bernhard G.", "" ], [ "Casazza", "Peter G.", "" ], [ "Kutyniok", "Gitta", "" ] ]
[ { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0910.5920
David O'Callaghan
David O'Callaghan, Louise Doran and Brian Coghlan
Evaluating Trust in Grid Certificates
5 pages, 1 figure, accepted for ACM SAC 2010
null
null
null
cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Digital certificates are used to secure international computation and data storage grids used for e-Science projects, like the Worldwide Large Hadron Collider Computing Grid. The International Grid Trust Federation has defined the Grid Certificate Profile: a set of guidelines for digital certificates used for grid authentication. We have designed and implemented a program and related test suites for checking X.509 certificates against the certificate profiles and policies relevant for use on the Grid. The result is a practical tool that assists implementers and users of public key infrastructures to reach appropriate trust decisions.
[ { "version": "v1", "created": "Fri, 30 Oct 2009 17:30:10 GMT" } ]
2009-11-02T00:00:00
[ [ "O'Callaghan", "David", "" ], [ "Doran", "Louise", "" ], [ "Coghlan", "Brian", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0910.5932
Prateek Jain
Prateek Jain, Brian Kulis, Jason V. Davis, Inderjit S. Dhillon
Metric and Kernel Learning using a Linear Transformation
null
null
null
null
cs.LG cs.CV cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Metric and kernel learning are important in several machine learning applications. However, most existing metric learning algorithms are limited to learning metrics over low-dimensional data, while existing kernel learning algorithms are often limited to the transductive setting and do not generalize to new data points. In this paper, we study metric learning as a problem of learning a linear transformation of the input data. We show that for high-dimensional data, a particular framework for learning a linear transformation of the data based on the LogDet divergence can be efficiently kernelized to learn a metric (or equivalently, a kernel function) over an arbitrarily high dimensional space. We further demonstrate that a wide class of convex loss functions for learning linear transformations can similarly be kernelized, thereby considerably expanding the potential applications of metric learning. We demonstrate our learning approach by applying it to large-scale real world problems in computer vision and text mining.
[ { "version": "v1", "created": "Fri, 30 Oct 2009 18:19:03 GMT" } ]
2009-11-02T00:00:00
[ [ "Jain", "Prateek", "" ], [ "Kulis", "Brian", "" ], [ "Davis", "Jason V.", "" ], [ "Dhillon", "Inderjit S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0910.5947
Jennifer Kloke
Jennifer Kloke and Gunnar Carlsson
Topological De-Noising: Strengthening the Topological Signal
13 pages, 37 figures, content added
null
null
null
cs.CG cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Topological methods, including persistent homology, are powerful tools for analysis of high-dimensional data sets but these methods rely almost exclusively on thresholding techniques. In noisy data sets, thresholding does not always allow for the recovery of topological information. We present an easy to implement, computationally efficient pre-processing algorithm to prepare noisy point cloud data sets for topological data analysis. The topological de-noising algorithm allows for the recovery of topological information that is inaccessible by thresholding methods. We apply the algorithm to synthetically-generated noisy data sets and show the recovery of topological information which is impossible to obtain by thresholding. We also apply the algorithm to natural image data in R^8 and show a very clean recovery of topological information previously only available with large amounts of thresholding. Finally, we discuss future directions for improving this algorithm using zig-zag persistence methods.
[ { "version": "v1", "created": "Fri, 30 Oct 2009 19:08:44 GMT" }, { "version": "v2", "created": "Mon, 8 Feb 2010 23:50:41 GMT" } ]
2016-09-08T00:00:00
[ [ "Kloke", "Jennifer", "" ], [ "Carlsson", "Gunnar", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0910.5950
Mahmoud Taherzadeh
Mahmoud Taherzadeh and H. Vincent Poor
Limits on the Robustness of MIMO Joint Source-Channel Codes
presented at Allerton Conference 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the theoretical limits on the robustness of MIMO joint source channel codes is investigated. The case in which a single joint source channel code is used for the entire range of SNRs and for all levels of required fidelity is considered. Limits on the asymptotic performance of such a system are characterized in terms of upper bounds on the diversity-fidelity tradeoff, which can be viewed as an analog version of the diversity-multiplexing tradeoff. In particular, it is shown that there is a considerable gap between the diversity-fidelity tradeoff of robust joint source-channel codes and the optimum tradeoff (without the constraint of robustness).
[ { "version": "v1", "created": "Fri, 30 Oct 2009 19:20:27 GMT" } ]
2009-11-02T00:00:00
[ [ "Taherzadeh", "Mahmoud", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0028
Rdv Ijcsis
A. E. E. Elalfi, M. E. Elalami, Y. M . Asem
Knowledge Extraction for Discriminating Male and Female in Logical Reasoning from Student Model
10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 006-015, October 2009, USA
null
ISSN 1947 5500
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The learning process is a process of communication and interaction between the teacher and his students on one side and between the students and each others on the other side. Interaction of the teacher with his students has a great importance in the process of learning and education. The pattern and style of this interaction is determined by the educational situation, trends and concerns, and educational characteristics. Classroom interaction has an importance and a big role in increasing the efficiency of the learning process and raising the achievement levels of students. Students need to learn skills and habits of study, especially at the university level. The effectiveness of learning is affected by several factors that include the prevailing patterns of interactive behavior in the classroom. These patterns are reflected in the activities of teacher and learners during the learning process. The effectiveness of learning is also influenced by the cognitive and non cognitive characteristics of teacher that help him to succeed, the characteristics of learners, teaching subject, and the teaching methods. This paper presents a machine learning algorithm for extracting knowledge from student model. The proposed algorithm utilizes the inherent characteristic of genetic algorithm and neural network for extracting comprehensible rules from the student database. The knowledge is used for discriminating male and female levels in logical reasoning as a part of an expert system course.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 19:30:52 GMT" } ]
2009-11-03T00:00:00
[ [ "Elalfi", "A. E. E.", "" ], [ "Elalami", "M. E.", "" ], [ "Asem", "Y. M .", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0911.0039
Gene Golovchinsky
Gene Golovchinsky, Scott Carter, Jacob Biehl
Beyond the Drawing Board: Toward More Effective Use of Whiteboard Content
Modified acknowledgments
null
null
FXPAL-TR-09-004
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We developed a system that augments traditional office whiteboards with computation for the purposes of retrieving, reusing, and sharing whiteboard content. Our system automatically captures changes to whiteboard images, detects significant changes, and identifies potential collaborative activities. Users then browse and search the collection of images captured from their camera or shared from other users' cameras based on aspects such as location, time, collaboration, etc. We report on the results of a formative study and on an evaluation of effectiveness of our system, and discuss additional functionality that can be built on our framework.
[ { "version": "v1", "created": "Fri, 30 Oct 2009 23:31:38 GMT" }, { "version": "v2", "created": "Wed, 9 Dec 2009 05:35:43 GMT" } ]
2009-12-09T00:00:00
[ [ "Golovchinsky", "Gene", "" ], [ "Carter", "Scott", "" ], [ "Biehl", "Jacob", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0911.0050
Hyoungshick Kim
Hyoungshick Kim and Ji Won Yoon
How to Compare the Scientific Contributions between Research Groups
null
null
null
0911.0049
cs.IR cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a method to analyse the scientific contributions between research groups. Given multiple research groups, we construct their journal/proceeding graphs and then compute the similarity/gap between them using network analysis. This analysis can be used for measuring similarity/gap of the topics/qualities between research groups' scientific contributions. We demonstrate the practicality of our method by comparing the scientific contributions by Korean researchers with those by the global researchers for information security in 2006 - 2008. The empirical analysis shows that the current security research in South Korea has been isolated from the global research trend.
[ { "version": "v1", "created": "Sat, 31 Oct 2009 01:03:27 GMT" } ]
2009-11-03T00:00:00
[ [ "Kim", "Hyoungshick", "" ], [ "Yoon", "Ji Won", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0911.0054
Ambuj Tewari
Sham M. Kakade, Ohad Shamir, Karthik Sridharan, Ambuj Tewari
Learning Exponential Families in High-Dimensions: Strong Convexity and Sparsity
Errata added. Incorrect claim about cumulants of the Bernoulli distribution fixed
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The versatility of exponential families, along with their attendant convexity properties, make them a popular and effective statistical model. A central issue is learning these models in high-dimensions, such as when there is some sparsity pattern of the optimal parameter. This work characterizes a certain strong convexity property of general exponential families, which allow their generalization ability to be quantified. In particular, we show how this property can be used to analyze generic exponential families under L_1 regularization.
[ { "version": "v1", "created": "Sat, 31 Oct 2009 02:56:18 GMT" }, { "version": "v2", "created": "Sat, 16 May 2015 22:45:35 GMT" } ]
2015-05-19T00:00:00
[ [ "Kakade", "Sham M.", "" ], [ "Shamir", "Ohad", "" ], [ "Sridharan", "Karthik", "" ], [ "Tewari", "Ambuj", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0911.0086
Gwena\"el Joret
Jean Cardinal, Samuel Fiorini, Gwena\"el Joret, Rapha\"el Jungers and J. Ian Munro
Sorting under Partial Information (without the Ellipsoid Algorithm)
v3: Minor changes. A preliminary version appeared in the proceedings of the 42th ACM Symposium on Theory of Computing (STOC 2010)
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We revisit the well-known problem of sorting under partial information: sort a finite set given the outcomes of comparisons between some pairs of elements. The input is a partially ordered set P, and solving the problem amounts to discovering an unknown linear extension of P, using pairwise comparisons. The information-theoretic lower bound on the number of comparisons needed in the worst case is log e(P), the binary logarithm of the number of linear extensions of P. In a breakthrough paper, Jeff Kahn and Jeong Han Kim (J. Comput. System Sci. 51 (3), 390-399, 1995) showed that there exists a polynomial-time algorithm for the problem achieving this bound up to a constant factor. Their algorithm invokes the ellipsoid algorithm at each iteration for determining the next comparison, making it impractical. We develop efficient algorithms for sorting under partial information. Like Kahn and Kim, our approach relies on graph entropy. However, our algorithms differ in essential ways from theirs. Rather than resorting to convex programming for computing the entropy, we approximate the entropy, or make sure it is computed only once, in a restricted class of graphs, permitting the use of a simpler algorithm. Specifically, we present: - an O(n^2) algorithm performing O(log n log e(P)) comparisons; - an O(n^2.5) algorithm performing at most (1+ epsilon) log e(P) + O_epsilon (n) comparisons; - an O(n^2.5) algorithm performing O(log e(P)) comparisons. All our algorithms can be implemented in such a way that their computational bottleneck is confined in a preprocessing phase, while the sorting phase is completed in O(q) + O(n) time, where q denotes the number of comparisons performed.
[ { "version": "v1", "created": "Sat, 31 Oct 2009 14:36:36 GMT" }, { "version": "v2", "created": "Tue, 21 Sep 2010 12:58:11 GMT" }, { "version": "v3", "created": "Mon, 21 Jan 2013 13:56:44 GMT" } ]
2013-01-22T00:00:00
[ [ "Cardinal", "Jean", "" ], [ "Fiorini", "Samuel", "" ], [ "Joret", "Gwenaël", "" ], [ "Jungers", "Raphaël", "" ], [ "Munro", "J. Ian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.0089
Melda Yuksel
Melda Yuksel, Xi Liu, Elza Erkip
A Secure Communication Game with a Relay Helping the Eavesdropper
5 pages, 4 figures, published in proceedings of IEEE Information Theory Workshop, Taormina, Italy, October 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work a four terminal Gaussian network composed of a source, a destination, an eavesdropper and a jammer relay is studied. The jammer relay does not hear the source transmission. It assists the eavesdropper and aims to decrease the achievable secrecy rates. The source, on the other hand, aims to increase the achievable secrecy rates. Assuming Gaussian strategies at the source and the jammer relay, this problem is formulated as a two-player zero-sum continuous game, where the payoff is the achieved secrecy rate. For this game the Nash Equilibrium is generally achieved with mixed strategies. The optimal cumulative distribution functions for the source and the jammer relay that achieve the value of the game, which is the equilibrium secrecy rate, are found.
[ { "version": "v1", "created": "Sat, 31 Oct 2009 15:58:08 GMT" } ]
2009-11-03T00:00:00
[ [ "Yuksel", "Melda", "" ], [ "Liu", "Xi", "" ], [ "Erkip", "Elza", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0090
Tullio Ceccherini-Silberstein
Tullio Ceccherini-Silberstein and Wolfgang Woess
Context-free pairs of groups I: Context-free pairs and graphs
null
European J. Combin. 33 (2012) 1449-1466
10.1016/j.ejc.2012.03.011
null
math.GR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $G$ be a finitely generated group, $A$ a finite set of generators and $K$ a subgroup of $G$. We call the pair $(G,K)$ context-free if the set of all words over $A$ that reduce in $G$ to an element of $K$ is a context-free language. When $K$ is trivial, $G$ itself is called context-free; context-free groups have been classified more than 20 years ago in celebrated work of Muller and Schupp as the virtually free groups. Here, we derive some basic properties of such group pairs. Context-freeness is independent of the choice of the generating set. It is preserved under finite index modifications of $G$ and finite index enlargements of $K$. If $G$ is virtually free and $K$ is finitely generated then $(G,K)$ is context-free. A basic tool is the following: $(G,K)$ is context-free if and only if the Schreier graph of $(G,K)$ with respect to $A$ is a context-free graph.
[ { "version": "v1", "created": "Sat, 31 Oct 2009 16:03:41 GMT" } ]
2012-12-05T00:00:00
[ [ "Ceccherini-Silberstein", "Tullio", "" ], [ "Woess", "Wolfgang", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0105
Ian Pratt-Hartmann
Ian Pratt-Hartmann and Ivo D\"untsch
Functions Definable by Numerical Set-Expressions
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A "numerical set-expression" is a term specifying a cascade of arithmetic and logical operations to be performed on sets of non-negative integers. If these operations are confined to the usual Boolean operations together with the result of lifting addition to the level of sets, we speak of "additive circuits". If they are confined to the usual Boolean operations together with the result of lifting addition and multiplication to the level of sets, we speak of "arithmetic circuits". In this paper, we investigate the definability of sets and functions by means of additive and arithmetic circuits, occasionally augmented with additional operations.
[ { "version": "v1", "created": "Sat, 31 Oct 2009 23:17:49 GMT" } ]
2009-11-03T00:00:00
[ [ "Pratt-Hartmann", "Ian", "" ], [ "Düntsch", "Ivo", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.0121
Rdv Ijcsis
Boseung Kim, Joohyun Lee, Yongtae Shin
(RCFT) ReClustering Formation Technique in Hierarchical Sensor Network
4 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 052-055, October 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
TBecause of limited energy of nodes, an important issue for sensor network is efficient use of the energy. The clustering technique reduces energy consumption as cluster head sends sensed information to a sink node. Because of such character of clustering technique, electing cluster head is an important element for networks. This paper proposes RCFT (ReClustering Formation Technique) that reconstruct clusters in hierarchical sensor networks. RCFT is a protocol that reconstructed clusters considering position of a cluster head and nodes in randomly constructed clusters. And this paper demonstrated that clusters are composed evenly through simulation, accordingly this simulation shows the result reducing energy consumption.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 20:37:14 GMT" }, { "version": "v2", "created": "Thu, 26 Nov 2009 18:03:22 GMT" } ]
2009-11-26T00:00:00
[ [ "Kim", "Boseung", "" ], [ "Lee", "Joohyun", "" ], [ "Shin", "Yongtae", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.0130
Graham Norton
Graham H. Norton
Minimal Polynomial Algorithms for Finite Sequences
Section 2 added, remarks and references expanded. To appear in IEEE Transactions on Information Theory.
null
10.1109/TIT.2010.2054150
null
cs.IT cs.DM cs.SC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that a straightforward rewrite of a known minimal polynomial algorithm yields a simpler version of a recent algorithm of A. Salagean.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 04:06:37 GMT" }, { "version": "v2", "created": "Mon, 9 Nov 2009 01:45:52 GMT" }, { "version": "v3", "created": "Wed, 17 Mar 2010 05:12:49 GMT" } ]
2016-11-17T00:00:00
[ [ "Norton", "Graham H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0136
Yu Huang
Yu Huang, Jianping Yu, Jiannong Cao, Xiaoxing Ma, Xianping Tao, Jian Lu
Checking Behavioral Consistency Constraints for Pervasive Context in Asynchronous Environments
9 pages, 9 figures
null
null
null
cs.SE cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Context consistency checking, the checking of specified constraint on properties of contexts, is essential to context-aware applications. In order to delineate and adapt to dynamic changes in the pervasive computing environment, context-aware applications often need to specify and check behavioral consistency constraints over the contexts. This problem is challenging mainly due to the distributed and asynchronous nature of pervasive computing environments. Specifically, the critical issue in checking behavioral constraints is the temporal ordering of contextual activities. The contextual activities usually involve multiple context collecting devices, which are fully-decentralized and interact in an asynchronous manner. However, existing context consistency checking schemes do not work in asynchronous environments, since they implicitly assume the availability of a global clock or relay on synchronized interactions. To this end, we propose the Ordering Global Activity (OGA) algorithm, which detects the ordering of the global activities based on predicate detection in asynchronous environments. The essence of our approach is the message causality and its on-the-fly coding as logic vector clocks in asynchronous environments. We implement the Middleware Infrastructure for Predicate detection in Asynchronous environments (MIPA), over which the OGA algorithm is implemented and evaluated. The evaluation results show the impact of asynchrony on the checking of behavioral consistency constraints, which justifies the primary motivation of our work. They also show that OGA can achieve accurate checking of behavioral consistency constraints in dynamic pervasive computing environments.
[ { "version": "v1", "created": "Sun, 1 Nov 2009 07:20:55 GMT" } ]
2009-11-03T00:00:00
[ [ "Huang", "Yu", "" ], [ "Yu", "Jianping", "" ], [ "Cao", "Jiannong", "" ], [ "Ma", "Xiaoxing", "" ], [ "Tao", "Xianping", "" ], [ "Lu", "Jian", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.0137
Kalyana Babu Nakshatrala
S. Darbha, K. B. Nakshatrala, and K. R. Rajagopal
On the vibrations of lumped parameter systems governed by differential-algebraic equations
null
null
null
null
cs.NA physics.class-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the vibratory motions of lumped parameter systems wherein the components of the system cannot be described by constitutive expressions for the force in terms of appropriate kinematical quantities. Such physical systems reduce to a system of differential-algebraic equations, which invariably need to be solved numerically. To illustrate the issues with clarity, we consider a simple system in which the dashpot is assumed to contain a "Bingham" fluid for which one cannot describe the force in the dashpot as a function of the velocity. On the other hand, one can express the velocity as a function of the force.
[ { "version": "v1", "created": "Sun, 1 Nov 2009 07:23:03 GMT" }, { "version": "v2", "created": "Fri, 6 Nov 2009 22:31:10 GMT" }, { "version": "v3", "created": "Mon, 9 Nov 2009 22:40:52 GMT" }, { "version": "v4", "created": "Wed, 16 Dec 2009 06:16:55 GMT" }, { "version": "v5", "created": "Tue, 20 Jul 2010 19:28:36 GMT" } ]
2015-03-13T00:00:00
[ [ "Darbha", "S.", "" ], [ "Nakshatrala", "K. B.", "" ], [ "Rajagopal", "K. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
0911.0141
Yoann Pigne
C\'edric Ga\"el Aboue-Nze (LITIS), Fr\'ed\'eric Guinand (LITIS), Yoann Pign\'e (LITIS)
Impact of Obstacles on the Degree of Mobile Ad Hoc Connection Graphs
null
International Conference on Networking and Services, Valence : Spain (2009)
10.1109/ICNS.2009.36
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
What is the impact of obstacles on the graphs of connections between stations in Mobile Ad hoc Networks? In order to answer, at least partially, this question, the first step is to define both an environment with obstacles and a mobility model for the stations in such an environment. The present paper focuses on a new way of considering the mobility within environments with obstacles, while keeping the core ideas of the well-known Random WayPoint mobility model (a.k.a RWP). Based on a mesh-partitioning of the space, we propose a new model called RSP-O-G for which we compute the spatial distribution of stations and analyse how the presence of obstacles impacts this distribution compared to the distribution when no obstacles are present. Coupled with a simple model of radio propagation, and according to the density of stations in the environment, we study the mean degree of the connection graphs corresponding to such mobile ad hoc networks.
[ { "version": "v1", "created": "Sun, 1 Nov 2009 07:49:51 GMT" } ]
2009-11-03T00:00:00
[ [ "Aboue-Nze", "Cédric Gaël", "", "LITIS" ], [ "Guinand", "Frédéric", "", "LITIS" ], [ "Pigné", "Yoann", "", "LITIS" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.0142
Sava Ecaterina
Wilfried Huss, Ecaterina Sava, Wolfgang Woess
Entropy sensitivity of languages defined by infinite automata, via Markov chains with forbidden transitions
to appear in Theoretical Computer Science, 2010
Theoretical Computer Science 411 (2010), 3917-3922
10.1016/j.tcs.2010.07.020
null
cs.FL math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A language L over a finite alphabet is growth-sensitive (or entropy sensitive) if forbidding any set of subwords F yields a sub-language L^F whose exponential growth rate (entropy) is smaller than that of L. Let (X, E, l) be an infinite, oriented, labelled graph. Considering the graph as an (infinite) automaton, we associate with any pair of vertices x,y in X the language consisting of all words that can be read as the labels along some path from x to y. Under suitable, general assumptions we prove that these languages are growth-sensitive. This is based on using Markov chains with forbidden transitions.
[ { "version": "v1", "created": "Sun, 1 Nov 2009 07:58:52 GMT" }, { "version": "v2", "created": "Mon, 26 Jul 2010 09:38:18 GMT" } ]
2010-12-14T00:00:00
[ [ "Huss", "Wilfried", "" ], [ "Sava", "Ecaterina", "" ], [ "Woess", "Wolfgang", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0911.0143
Gagan Garg
Reza Omrani, Gagan Garg, P. Vijay Kumar, Petros Elia, and Pankaj Bhambhani
Large Families of Optimal Two-Dimensional Optical Orthogonal Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nine new 2-D OOCs are presented here, all sharing the common feature of a code size that is much larger in relation to the number of time slots than those of constructions appearing previously in the literature. Each of these constructions is either optimal or asymptotically optimal with respect to either the original Johnson bound or else a non-binary version of the Johnson bound introduced in this paper. The first 5 codes are constructed using polynomials over finite fields - the first construction is optimal while the remaining 4 are asymptotically optimal. The next two codes are constructed using rational functions in place of polynomials and these are asymptotically optimal. The last two codes, also asymptotically optimal, are constructed by composing two of the above codes with a constant weight binary code. Also presented, is a three-dimensional OOC that exploits the polarization dimension. Finally, phase-encoded optical CDMA is considered and construction of two efficient codes are provided.
[ { "version": "v1", "created": "Sun, 1 Nov 2009 09:27:29 GMT" } ]
2009-11-03T00:00:00
[ [ "Omrani", "Reza", "" ], [ "Garg", "Gagan", "" ], [ "Kumar", "P. Vijay", "" ], [ "Elia", "Petros", "" ], [ "Bhambhani", "Pankaj", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0151
Rdv Ijcsis
Rares Vasilescu
An Alternative To Common Content Management Techniques
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 056-060, October 2009, USA
null
ISSN 1947 5500
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Content management systems use various strategies to store and manage information. One of the most usual methods encountered in commercial products is to make use of the file system to store the raw content information, while the associated metadata is kept synchronized in a relational database management system. This strategy has its advantages but we believe it also has significant limitations which should be addressed and eventually solved. In this paper we propose an alternative method of storing and managing content aiming at finding solutions for current limitations both in terms of functional and nonfunctional requirements.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 20:43:18 GMT" } ]
2009-11-03T00:00:00
[ [ "Vasilescu", "Rares", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0911.0174
Rdv Ijcsis
Muhammad Aasim Qureshi, Dr. Fadzil B. Hassan, Sohail Safdar, Rehan Akbar
A O(E) Time Shortest Path Algorithm For Non Negative Weighted Undirected Graphs
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 040-046, October 2009, USA
null
ISSN 1947 5500
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In most of the shortest path problems like vehicle routing problems and network routing problems, we only need an efficient path between two points source and destination, and it is not necessary to calculate the shortest path from source to all other nodes. This paper concentrates on this very idea and presents an algorithm for calculating shortest path for (i) nonnegative weighted undirected graphs (ii) unweighted undirected graphs. The algorithm completes its execution in O(E) for all graphs except few in which longer path (in terms of number of edges) from source to some node makes it best selection for that node. The main advantage of the algorithms is its simplicity and it does not need complex data structures for implementations.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 20:24:05 GMT" } ]
2009-11-03T00:00:00
[ [ "Qureshi", "Muhammad Aasim", "" ], [ "Hassan", "Dr. Fadzil B.", "" ], [ "Safdar", "Sohail", "" ], [ "Akbar", "Rehan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]