id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0911.0183
Erdal Panayirci
Erdal Panayirci, Hakan Dogan, H. Vincent Poor
A Gibbs Sampling Based MAP Detection Algorithm for OFDM Over Rapidly Varying Mobile Radio Channels
6 pages, 4 figures
null
null
null
cs.IT math.AC math.IT
http://creativecommons.org/licenses/publicdomain/
In orthogonal frequency-division multiplexing (OFDM) systems operating over rapidly time-varying channels, the orthogonality between subcarriers is destroyed leading to inter-carrier interference (ICI) and resulting in an irreducible error floor. In this paper, a new and low-complexity maximum {\em a posteriori} probability (MAP) detection algorithm is proposed for OFDM systems operating over rapidly time-varying multipath channels. The detection algorithm exploits the banded structure of the frequency-domain channel matrix whose bandwidth is a parameter to be adjusted according to the speed of the mobile terminal. Based on this assumption, the received signal vector is decomposed into reduced dimensional sub-observations in such a way that all components of the observation vector contributing to the symbol to be detected are included in the decomposed observation model. The data symbols are then detected by the MAP algorithm by means of a Markov chain Monte Carlo (MCMC) technique in an optimal and computationally efficient way. Computational complexity investigation as well as simulation results indicate that this algorithm has significant performance and complexity advantages over existing suboptimal detection and equalization algorithms proposed earlier in the literature.
[ { "version": "v1", "created": "Sun, 1 Nov 2009 18:25:31 GMT" } ]
2009-11-03T00:00:00
[ [ "Panayirci", "Erdal", "" ], [ "Dogan", "Hakan", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0201
Julia Kempe
Julia Kempe and Oded Regev
No Strong Parallel Repetition with Entangled and Non-signaling Provers
15 pages, 2 figures
null
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider one-round games between a classical verifier and two provers. One of the main questions in this area is the \emph{parallel repetition question}: If the game is played $\ell$ times in parallel, does the maximum winning probability decay exponentially in $\ell$? In the classical setting, this question was answered in the affirmative by Raz. More recently the question arose whether the decay is of the form $(1-\Theta(\eps))^\ell$ where $1-\eps$ is the value of the game and $\ell$ is the number of repetitions. This question is known as the \emph{strong parallel repetition question} and was motivated by its connections to the unique games conjecture. It was resolved by Raz who showed that strong parallel repetition does \emph{not} hold, even in the very special case of games known as XOR games. This opens the question whether strong parallel repetition holds in the case when the provers share entanglement. Evidence for this is provided by the behavior of XOR games, which have strong (in fact \emph{perfect}) parallel repetition, and by the recently proved strong parallel repetition of linear unique games. A similar question was open for games with so-called non-signaling provers. Here the best known parallel repetition theorem is due to Holenstein, and is of the form $(1-\Theta(\eps^2))^\ell$. We show that strong parallel repetition holds neither with entangled provers nor with non-signaling provers. In particular we obtain that Holenstein's bound is tight. Along the way we also provide a tight characterization of the asymptotic behavior of the entangled value under parallel repetition of unique games in terms of a semidefinite program.
[ { "version": "v1", "created": "Sun, 1 Nov 2009 20:28:21 GMT" } ]
2009-11-03T00:00:00
[ [ "Kempe", "Julia", "" ], [ "Regev", "Oded", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.0225
Rdv Ijcsis
Dasika Ratna Deepthi, K. Eswaran
A Mirroring Theorem and its Application to a New Method of Unsupervised Hierarchical Pattern Classification
10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 016-025, October 2009, USA
null
ISSN 1947 5500
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we prove a crucial theorem called Mirroring Theorem which affirms that given a collection of samples with enough information in it such that it can be classified into classes and subclasses then (i) There exists a mapping which classifies and subclassifies these samples (ii) There exists a hierarchical classifier which can be constructed by using Mirroring Neural Networks (MNNs) in combination with a clustering algorithm that can approximate this mapping. Thus, the proof of the Mirroring theorem provides a theoretical basis for the existence and a practical feasibility of constructing hierarchical classifiers, given the maps. Our proposed Mirroring Theorem can also be considered as an extension to Kolmogrovs theorem in providing a realistic solution for unsupervised classification. The techniques we develop, are general in nature and have led to the construction of learning machines which are (i) tree like in structure, (ii) modular (iii) with each module running on a common algorithm (tandem algorithm) and (iv) selfsupervised. We have actually built the architecture, developed the tandem algorithm of such a hierarchical classifier and demonstrated it on an example problem.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 19:53:01 GMT" } ]
2009-11-03T00:00:00
[ [ "Deepthi", "Dasika Ratna", "" ], [ "Eswaran", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0911.0231
Mohammad Karimadini
Mohammad Karimadini and Hai Lin
Synchronized Task Decomposition for Cooperative Multi-agent Systems
Submitted for publication, 2010
null
null
NUS-ACT-10-Ver.3-001
cs.MA cs.DC cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is an amazing fact that remarkably complex behaviors could emerge from a large collection of very rudimentary dynamical agents through very simple local interactions. However, it still remains elusive on how to design these local interactions among agents so as to achieve certain desired collective behaviors. This paper aims to tackle this challenge and proposes a divide-and-conquer approach to guarantee specified global behaviors through local coordination and control design for multi-agent systems. The basic idea is to decompose the requested global specification into subtasks for each individual agent. It should be noted that the decomposition is not arbitrary. The global specification should be decomposed in such a way that the fulfilment of these subtasks by each individual agent will imply the satisfaction of the global specification as a team. First, it is shown by a counterexample that not all specifications can be decomposed in this sense. Then, a natural follow-up question is what the necessary and sufficient condition should be for the proposed decomposability of a global specification. The main part of the paper is set to answer this question. The case of two cooperative agents is investigated first, and a necessary and sufficient condition is presented and proven. Later on, the result is generalized to the case of arbitrary finite number of agents, and a hierarchical algorithm is proposed, which is shown to be a sufficient condition. Finally, a cooperative control scenario for a team of three robots is developed to illustrate the task decomposition procedure.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 04:23:25 GMT" }, { "version": "v2", "created": "Wed, 28 Apr 2010 13:14:44 GMT" }, { "version": "v3", "created": "Wed, 12 Jan 2011 02:58:06 GMT" } ]
2011-01-13T00:00:00
[ [ "Karimadini", "Mohammad", "" ], [ "Lin", "Hai", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" } ]
0911.0232
Bahman Gharesifard
Bahman Gharesifard and Jorge Cortes
Distributed strategies for generating weight-balanced and doubly stochastic digraphs
null
null
null
null
math.OC cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Weight-balanced and doubly stochastic digraphs are two classes of digraphs that play an essential role in a variety of cooperative control problems, including formation control, distributed averaging, and optimization. We refer to a digraph as doubly stochasticable (weight-balanceable) if it admits a doubly stochastic (weight-balanced) adjacency matrix. This paper studies the characterization of both classes of digraphs, and introduces distributed algorithms to compute the appropriate set of weights in each case.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 04:24:59 GMT" }, { "version": "v2", "created": "Fri, 13 Nov 2009 19:41:50 GMT" }, { "version": "v3", "created": "Fri, 16 Apr 2010 05:07:29 GMT" }, { "version": "v4", "created": "Thu, 10 Mar 2011 04:04:11 GMT" }, { "version": "v5", "created": "Fri, 15 Jul 2011 01:45:39 GMT" }, { "version": "v6", "created": "Mon, 17 Oct 2011 21:33:34 GMT" } ]
2011-10-19T00:00:00
[ [ "Gharesifard", "Bahman", "" ], [ "Cortes", "Jorge", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" } ]
0911.0257
Alonso Silva Allende
Alonso Silva, Hamidou Tembine, Eitan Altman, Merouane Debbah
Spatial games and global optimization for mobile association problems
Part of this work has been presented at the 49th IEEE Conference on Decision and Control 2010. This work has been submitted to IEEE Transactions on Automatic Control
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The basic optimal transportation problem consists in finding the most effective way of moving masses from one location to another, while minimizing the transportation cost. Such concept has been found to be useful to understand various mathematical, economical, and control theory phenomena, such as Witsenhausen's counterexam-ple in stochastic control theory, principal-agent problem in microeco- nomic theory, location and planning problems, etc. In this work, we focus on mobile association problems: the determina-tion of the cells corresponding to each base station, i.e., the locations at which intelligent mobile terminals prefer to connect to a given base station rather than to others. This work combines game theory and optimal transport theory to characterize the solution based on fluid approximations. We characterize the optimal solution from both the global network and the mobile user points of view.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 08:54:56 GMT" }, { "version": "v2", "created": "Thu, 9 Jun 2011 11:33:23 GMT" } ]
2011-06-10T00:00:00
[ [ "Silva", "Alonso", "" ], [ "Tembine", "Hamidou", "" ], [ "Altman", "Eitan", "" ], [ "Debbah", "Merouane", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0911.0285
Christine Michel
Christine Michel (LIESP, Ictt), Patrick Prevot (LIESP, Ictt)
Knowledge Management Concepts For Training By Project An observation of the case of project management education
6p
International conference on Knowledge Management and information sharing (KMIS 2009), Madeira : Portugal (2009)
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Project management education programmes are often proposed in higher education to give students competences in project planning (Gantt's chart), project organizing, human and technical resource management, quality control and also social competences (collaboration, communication), emotional ones (empathy, consideration of the other, humour, ethics), and organizational ones (leadership, political vision, and so on). This training is often given according a training-by-project type of learning with case studies. This article presents one course characterized by a pedagogical organization based upon Knowledge Management (KM) concepts: knowledge transfer and construction throughout a learning circle and social interactions. The course is supported by a rich and complex tutor organization. We have observed this course by using another KM method inspired from KADS with various return of experience formalized into cards and charts. Our intention is, according to the model of Argyris and Sch\"on (Smith, 2001), to gain feedback information about local and global processes and about actors' experience in order to improve the course. This paper describes precisely the course (pedagogical method and tutor activity) and the KM observation method permitting to identify problem to solve. In our case, we observe problem of pedacogical coordination and skills acquisition. We propose to design a metacognitive tool for tutors and students, usable for improving knowledge construction and learning process organisation
[ { "version": "v1", "created": "Mon, 2 Nov 2009 10:52:28 GMT" } ]
2009-11-03T00:00:00
[ [ "Michel", "Christine", "", "LIESP, Ictt" ], [ "Prevot", "Patrick", "", "LIESP, Ictt" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0911.0310
Christine Michel
Christine Michel (LIESP), Elise Garrot-Lavou\'e (LIESP, SICOMOR)
Meshat: Monitoring and Experience Sharing Tool for Project-Based Learning
8p
IADIS International Conference Cognition and Exploratory Learning in Digital Age (CELDA 2009), Rome : Italy (2009)
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Our work aims at studying tools offered to learners and tutors involved in face-to-face or blended project-based learning activities. To understand better the needs and expectations of each actor, we are especially interested in the specific case of project management training. The results of a course observation show that the lack of monitoring and expertise transfer tools involves important dysfunctions in the course organisation and therefore dissatisfaction for tutors and students (in particular about the acquisition of knowledge and expertise). So as to solve this problem, we propose a personalised platform (according to the actor: project group, student or tutor) which gives information to monitor activities and supports the acquisition and transfer of expertise. This platform is meant for the complex educational context of project-based learning. Indeed, as for the majority of project-based learning activities, the articulation conceptualisation-experiment is an important part of the process. The originality of our approach relies on also supporting the articulation between action (experiment or conceptualisation) and reflection. This approach so improves the acquisition of complex skills (e.g. management, communication and collaboration), which requires a behavioural evolution. We aim at making the students become able ?to learn to learn' and evolve according to contexts. We facilitate their ability to have a critical analysis of their actions according to the situations they encounter.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 13:31:40 GMT" } ]
2009-11-03T00:00:00
[ [ "Michel", "Christine", "", "LIESP" ], [ "Garrot-Lavoué", "Elise", "", "LIESP, SICOMOR" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0911.0344
Stefano Allesina
Stefano Allesina
Accelerating the pace of discovery by changing the peer review algorithm
9 pages 2 figures
null
null
null
cs.DL physics.soc-ph q-bio.OT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The number of scientific publications is constantly rising, increasing the strain on the review process. The number of submissions is actually higher, as each manuscript is often reviewed several times before publication. To face the deluge of submissions, top journals reject a considerable fraction of manuscripts without review, potentially declining manuscripts with merit. The situation is frustrating for authors, reviewers and editors alike. Recently, several editors wrote about the ``tragedy of the reviewer commons', advocating for urgent corrections to the system. Almost every scientist has ideas on how to improve the system, but it is very difficult, if not impossible, to perform experiments to test which measures would be most effective. Surprisingly, relatively few attempts have been made to model peer review. Here I implement a simulation framework in which ideas on peer review can be quantitatively tested. I incorporate authors, reviewers, manuscripts and journals into an agent-based model and a peer review system emerges from their interactions. As a proof-of-concept, I contrast an implementation of the current system, in which authors decide the journal for their submissions, with a system in which journals bid on manuscripts for publication. I show that, all other things being equal, this latter system solves most of the problems currently associated with the peer review process. Manuscripts' evaluation is faster, authors publish more and in better journals, and reviewers' effort is optimally utilized. However, more work is required from editors. This modeling framework can be used to test other solutions for peer review, leading the way for an improvement of how science is disseminated.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 18:49:04 GMT" } ]
2009-11-03T00:00:00
[ [ "Allesina", "Stefano", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Quantitative Biology", "code": "q-bio.OT", "description": "Work in quantitative biology that does not fit into the other q-bio classifications", "span": "(Other Quantitative Biology)" } ]
0911.0351
Philippe Loubaton
Cedric Artigue, Philippe Loubaton
On the precoder design of flat fading MIMO systems equipped with MMSE receivers: a large system approach
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2145710
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is devoted to the design of precoders maximizing the ergodic mutual information (EMI) of bi-correlated flat fading MIMO systems equiped with MMSE receivers. The channel state information and the second order statistics of the channel are assumed available at the receiver side and at the transmitter side respectively. As the direct maximization of the EMI needs the use of non attractive algorithms, it is proposed to optimize an approximation of the EMI, introduced recently, obtained when the number of transmit and receive antennas $t$ and $r$ converge to $\infty$ at the same rate. It is established that the relative error between the actual EMI and its approximation is a $O(\frac{1}{t^{2}})$ term. It is shown that the left singular eigenvectors of the optimum precoder coincide with the eigenvectors of the transmit covariance matrix, and its singular values are solution of a certain maximization problem. Numerical experiments show that the mutual information provided by this precoder is close from what is obtained by maximizing the true EMI, but that the algorithm maximizing the approximation is much less computationally intensive.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 16:32:25 GMT" } ]
2016-11-17T00:00:00
[ [ "Artigue", "Cedric", "" ], [ "Loubaton", "Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0397
Rdv Ijcsis
Keehang Kwon, Hong Pyo Ha
Algorithm as Defining Dynamic Systems
3 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 026-028, October 2009, USA
null
ISSN 1947 5500
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a new view to algorithms, Algorithms as defining dynamic systems. This view extends the traditional, deterministic view that an algorithm is a step by step procedure with nondeterminism. As a dynamic system can be designed by a set of its defining laws, it is also desirable to design an algorithm by a (possibly nondeterministic) set of defining laws. This observation requires some changes to algorithm development. We propose a two step approach, the first step is to design an algorithm via a set of defining laws of dynamic system. The second step is to translate these laws (written in a natural language) into a formal language such as linear logic.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 20:01:19 GMT" } ]
2009-11-03T00:00:00
[ [ "Kwon", "Keehang", "" ], [ "Ha", "Hong Pyo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.0399
Rdv Ijcsis
A.Essaouabi and F. Regragui, E.Ibnelhaj
A Wavelet-Based Digital Watermarking for Video
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 029-033, October 2009, USA
null
ISSN 1947 5500
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel video watermarking system operating in the three dimensional wavelet transform is here presented. Specifically the video sequence is partitioned into spatio temporal units and the single shots are projected onto the 3D wavelet domain. First a grayscale watermark image is decomposed into a series of bitplanes that are preprocessed with a random location matrix. After that the preprocessed bitplanes are adaptively spread spectrum and added in 3D wavelet coefficients of the video shot. Our video watermarking algorithm is robust against the attacks of frame dropping, averaging and swapping. Furthermore, it allows blind retrieval of embedded watermark which does not need the original video and the watermark is perceptually invisible. The algorithm design, evaluation, and experimentation of the proposed scheme are described in this paper.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 20:07:52 GMT" } ]
2009-11-03T00:00:00
[ [ "Essaouabi", "A.", "" ], [ "Regragui", "F.", "" ], [ "Ibnelhaj", "E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0911.0402
Rdv Ijcsis
Sudip Dogra, Ritwik Ray, Saustav Ghosh, Debharshi Bhattacharya, Subir Kr. Sarkar
A Cost Effective RFID Based Customized DVD-ROM to Thwart Software Piracy
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 034-039, October 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software piracy has been a very perilous adversary of the software based industry, from the very beginning of the development of the latter into a significant business. There has been no developed foolproof system that has been developed to appropriately tackle this vile issue. We have in our scheme tried to develop a way to embark upon this problem using a very recently developed technology of RFID.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 20:15:14 GMT" } ]
2009-11-03T00:00:00
[ [ "Dogra", "Sudip", "" ], [ "Ray", "Ritwik", "" ], [ "Ghosh", "Saustav", "" ], [ "Bhattacharya", "Debharshi", "" ], [ "Sarkar", "Subir Kr.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.0405
Rdv Ijcsis
Sohail Safdar, Mohd. Fadzil B. Hassan, Muhammad Aasim Qureshi, Rehan Akbar
Biologically Inspired Execution Framework for Vulnerable Workflow Systems
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 047-051, October 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main objective of the research is to introduce a biologically inspired execution framework for workflow systems under threat due to some intrusion attack. Usually vulnerable systems need to be stop and put into wait state, hence to insure the data security and privacy while being recovered. This research ensures the availability of services and data to the end user by keeping the data security, privacy and integrity intact. To achieve the specified goals, the behavior of chameleons and concept of hibernation has been considered in combination. Hence the workflow systems become more robust using biologically inspired methods and remain available to the business consumers safely even in a vulnerable state.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 20:31:50 GMT" } ]
2009-11-03T00:00:00
[ [ "Safdar", "Sohail", "" ], [ "Hassan", "Mohd. Fadzil B.", "" ], [ "Qureshi", "Muhammad Aasim", "" ], [ "Akbar", "Rehan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.0428
Rebecca Deneckere
Rebecca Deneckere (CRI), Adrian Iacovelli (CRI), Elena Kornyshova (CRI), Carine Souveyet (CRI)
From Method Fragments to Method Services
null
Exploring Modeling Methods for Systems Analysis and Design (EMMSAD'08), Montpellier : France (2008)
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Method Engineering (ME) science, the key issue is the consideration of information system development methods as fragments. Numerous ME approaches have produced several definitions of method parts. Different in nature, these fragments have nevertheless some common disadvantages: lack of implementation tools, insufficient standardization effort, and so on. On the whole, the observed drawbacks are related to the shortage of usage orientation. We have proceeded to an in-depth analysis of existing method fragments within a comparison framework in order to identify their drawbacks. We suggest overcoming them by an improvement of the ?method service? concept. In this paper, the method service is defined through the service paradigm applied to a specific method fragment ? chunk. A discussion on the possibility to develop a unique representation of method fragment completes our contribution.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 21:08:05 GMT" } ]
2009-11-04T00:00:00
[ [ "Deneckere", "Rebecca", "", "CRI" ], [ "Iacovelli", "Adrian", "", "CRI" ], [ "Kornyshova", "Elena", "", "CRI" ], [ "Souveyet", "Carine", "", "CRI" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0911.0430
Rebecca Deneckere
Rebecca Deneckere (CRI), Elena Kornyshova (CRI), Colette Rolland (CRI)
Enhancing the Guidance of the Intentional Model "MAP": Graph Theory Application
9 pages
Research challenges in Information Systems, Fes : Morocco (2009)
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The MAP model was introduced in information system engineering in order to model processes on a flexible way. The intentional level of this model helps an engineer to execute a process with a strong relationship to the situation of the project at hand. In the literature, attempts for having a practical use of maps are not numerous. Our aim is to enhance the guidance mechanisms of the process execution by reusing graph algorithms. After clarifying the existing relationship between graphs and maps, we improve the MAP model by adding qualitative criteria. We then offer a way to express maps with graphs and propose to use Graph theory algorithms to offer an automatic guidance of the map. We illustrate our proposal by an example and discuss its limitations.
[ { "version": "v1", "created": "Mon, 2 Nov 2009 21:08:33 GMT" } ]
2009-11-04T00:00:00
[ [ "Deneckere", "Rebecca", "", "CRI" ], [ "Kornyshova", "Elena", "", "CRI" ], [ "Rolland", "Colette", "", "CRI" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0911.0460
Lester Mackey
Joseph Sill, Gabor Takacs, Lester Mackey, David Lin
Feature-Weighted Linear Stacking
17 pages, 1 figure, 2 tables
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ensemble methods, such as stacking, are designed to boost predictive accuracy by blending the predictions of multiple machine learning models. Recent work has shown that the use of meta-features, additional inputs describing each example in a dataset, can boost the performance of ensemble methods, but the greatest reported gains have come from nonlinear procedures requiring significant tuning and training time. Here, we present a linear technique, Feature-Weighted Linear Stacking (FWLS), that incorporates meta-features for improved accuracy while retaining the well-known virtues of linear regression regarding speed, stability, and interpretability. FWLS combines model predictions linearly using coefficients that are themselves linear functions of meta-features. This technique was a key facet of the solution of the second place team in the recently concluded Netflix Prize competition. Significant increases in accuracy over standard linear stacking are demonstrated on the Netflix Prize collaborative filtering dataset.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 08:17:05 GMT" }, { "version": "v2", "created": "Wed, 4 Nov 2009 08:55:28 GMT" } ]
2009-11-04T00:00:00
[ [ "Sill", "Joseph", "" ], [ "Takacs", "Gabor", "" ], [ "Mackey", "Lester", "" ], [ "Lin", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0911.0462
Marvin Weinstein
Marvin Weinstein
Strange Bedfellows: Quantum Mechanics and Data Mining
11 pages, 7 figures, Invited Talk at Light Cone 2009
null
10.1016/j.nuclphysbps.2010.02.009
SLAC-PUB-13832
cs.LG physics.data-an quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Last year, in 2008, I gave a talk titled {\it Quantum Calisthenics}. This year I am going to tell you about how the work I described then has spun off into a most unlikely direction. What I am going to talk about is how one maps the problem of finding clusters in a given data set into a problem in quantum mechanics. I will then use the tricks I described to let quantum evolution lets the clusters come together on their own.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 00:27:36 GMT" } ]
2015-05-14T00:00:00
[ [ "Weinstein", "Marvin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0911.0465
Konstantinos Pelechrinis
Theodoros Lappas, Konstantinos Pelechrinis, Michalis Faloutsos
A Simple Conceptual Generator for the Internet Graph
9 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The evolution of the Internet during the last years, has lead to a dramatic increase of the size of its graph at the Autonomous System (AS) level. Soon - if not already - its size will make the latter impractical for use from the research community, e.g. for protocol testing. Reproducing a smaller size, snapshot of the AS graph is thus important. However, the first step towards this direction is to obtain the ability to faithfully reproduce the full AS topology. The objective of our work, is to create a generator able to accurately emulate and reproduce the distinctive properties of the Internet graph. Our approach is based on (a) the identification of the jellyfish-like structure [1] of the Internet and (b) the consideration of the peer-to-peer and customer-provider relations between ASs. We are the first to exploit the distinctive structure of the Internet graph together with utilizing the information provided by the AS relationships in order to create a tool with the aforementioned capabilities. Comparing our generator with the existing ones in the literature, the main difference is found on the fact that our tool does not try to satisfy specific metrics, but tries to remain faithful to the conceptual model of the Internet structure. In addition, our approach can lead to (i) the identification of important attributes and patterns in the Internet AS topology, as well as, (ii) the extraction of valuable information on the various relationships between ASs and their effect on the formulation of the Internet structure. We implement our graph generator and we evaluate it using the largest and most recent available dataset for the AS topology. Our evaluations, clearly show the ability of our tool to capture the structural properties of the Internet topology at the AS level with high accuracy.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 00:38:01 GMT" } ]
2009-11-04T00:00:00
[ [ "Lappas", "Theodoros", "" ], [ "Pelechrinis", "Konstantinos", "" ], [ "Faloutsos", "Michalis", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.0467
Tracey Ho
Tao Cui, Tracey Ho, Joerg Kliewer
On Secure Network Coding with Nonuniform or Restricted Wiretap Sets
24 pages, revision submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2012.2216936
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The secrecy capacity of a network, for a given collection of permissible wiretap sets, is the maximum rate of communication such that observing links in any permissible wiretap set reveals no information about the message. This paper considers secure network coding with nonuniform or restricted wiretap sets, for example, networks with unequal link capacities where a wiretapper can wiretap any subset of $k$ links, or networks where only a subset of links can be wiretapped. Existing results show that for the case of uniform wiretap sets (networks with equal capacity links/packets where any $k$ can be wiretapped), the secrecy capacity is given by the cut-set bound, and can be achieved by injecting $k$ random keys at the source which are decoded at the sink along with the message. This is the case whether or not the communicating users have information about the choice of wiretap set. In contrast, we show that for the nonuniform case, the cut-set bound is not achievable in general when the wiretap set is unknown, whereas it is achievable when the wiretap set is made known. We give achievable strategies where random keys are canceled at intermediate non-sink nodes, or injected at intermediate non-source nodes. Finally, we show that determining the secrecy capacity is a NP-hard problem.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 01:21:39 GMT" }, { "version": "v2", "created": "Wed, 26 Oct 2011 18:39:15 GMT" } ]
2016-11-17T00:00:00
[ [ "Cui", "Tao", "" ], [ "Ho", "Tracey", "" ], [ "Kliewer", "Joerg", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0480
Rdv Ijcsis
Boseung Kim, Huibin Lim, Yongtae Shin
Routing Technique Based on Clustering for Data Duplication Prevention in Wireless Sensor Network
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 061-065, October 2009, USA
null
ISSN 1947 5500
cs.NI cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless Sensor Networks is important to nodes energy consumption for long activity of sensor nodes because nodes that compose sensor network are small size, and battery capacity is limited. For energy consumption decrease of sensor nodes, sensor networks routing technique is divided by flat routing and hierarchical routing technique. Specially, hierarchical routing technique is energy efficient routing protocol to pare down energy consumption of whole sensor nodes and to scatter energy consumption of sensor nodes by forming cluster and communicating with cluster head. but though hierarchical routing technique based on clustering is advantage more than flat routing technique, this is not used for reason that is not realistic. The reason that is not realistic is because hierarchical routing technique does not consider data transmission radius of sensor node in actually. so this paper propose realistic routing technique base on clustering.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 03:29:51 GMT" }, { "version": "v2", "created": "Thu, 26 Nov 2009 18:08:56 GMT" } ]
2009-11-26T00:00:00
[ [ "Kim", "Boseung", "" ], [ "Lim", "Huibin", "" ], [ "Shin", "Yongtae", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0911.0481
Rdv Ijcsis
M.Krishnaveni, Suresh Kumar Thakur, P.Subashini
An Optimal Method For Wake Detection In SAR Images Using Radon Transformation Combined With Wavelet Filters
4 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 066-069, October 2009, USA
null
ISSN 1947 5500
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new fangled method for ship wake detection in synthetic aperture radar (SAR) images is explored here. Most of the detection procedure applies the Radon transform as its properties outfit more than any other transformation for the detection purpose. But still it holds problems when the transform is applied to an image with a high level of noise. Here this paper articulates the combination between the radon transformation and the shrinkage methods which increase the mode of wake detection process. The latter shrinkage method with RT maximize the signal to noise ratio hence it leads to most optimal detection of lines in the SAR images. The originality mainly works on the denoising segment of the proposed algorithm. Experimental work outs are carried over both in simulated and real SAR images. The detection process is more adequate with the proposed method and improves better than the conventional methods.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 03:37:03 GMT" } ]
2009-11-04T00:00:00
[ [ "Krishnaveni", "M.", "" ], [ "Thakur", "Suresh Kumar", "" ], [ "Subashini", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0911.0482
Rdv Ijcsis
Hyubgun Lee, Kyounghwa Lee, Yongtae Shin
AES Implementation and Performance Evaluation on 8-bit Microcontrollers
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 070-074, October 2009, USA
null
ISSN 1947 5500
cs.CR cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The sensor network is a network technique for the implementation of Ubiquitous computing environment. It is wireless network environment that consists of the many sensors of lightweight and low power. Though sensor network provides various capabilities, it is unable to ensure the secure authentication between nodes. Eventually it causes the losing reliability of the entire network and many secure problems. Therefore, encryption algorithm for the implementation of reliable sensor network environments is required to the applicable sensor network. In this paper, we proposed the solution of reliable sensor network to analyze the communication efficiency through measuring performance of AES encryption algorithm by plaintext size, and cost of operation per hop according to the network scale.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 03:41:32 GMT" }, { "version": "v2", "created": "Thu, 26 Nov 2009 18:11:06 GMT" } ]
2009-11-26T00:00:00
[ [ "Lee", "Hyubgun", "" ], [ "Lee", "Kyounghwa", "" ], [ "Shin", "Yongtae", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0911.0484
Rdv Ijcsis
Francisco J. Rodriguez Perez, Jose Luis Gonzalez Sanchez, Alfonso Gazo Cervero
GoS Proposal to Improve Trust and Delay of MPLS Flows for MCN Services
8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 075-082, October 2009, USA
null
ISSN 1947 5500
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, Guarantee of Service (GoS) is defined as a proposal to improve the integration of Mission Critical Networking (MCN) services in the Internet, analyzing the congestion impact on those privileged flows with high requirements of trust and delay. Multiprotocol Label Switching (MPLS) is a technology that offers flow differentiation and QoS in the Internet. Therefore, in order to improve network performance in case of congested domains, GoS is proposed as a technique that allows the local recovering of lost packets of MPLS privileged flows. To fulfill the GoS requirements for integration of MCN in MPLS, a minimum set of extensions to RSVPTE has been proposed to provide GoS capable routes. Moreover, we have carried out an analytical study of GoS scalability and a performance improvement analysis by means of simulations.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 03:55:01 GMT" } ]
2009-11-04T00:00:00
[ [ "Perez", "Francisco J. Rodriguez", "" ], [ "Sanchez", "Jose Luis Gonzalez", "" ], [ "Cervero", "Alfonso Gazo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0911.0485
Rdv Ijcsis
Tich Phuoc Tran, Longbing Cao, Dat Tran, Cuong Duc Nguyen
Novel Intrusion Detection using Probabilistic Neural Network and Adaptive Boosting
9 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 083-091, October 2009, USA
null
ISSN 1947 5500
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article applies Machine Learning techniques to solve Intrusion Detection problems within computer networks. Due to complex and dynamic nature of computer networks and hacking techniques, detecting malicious activities remains a challenging task for security experts, that is, currently available defense systems suffer from low detection capability and high number of false alarms. To overcome such performance limitations, we propose a novel Machine Learning algorithm, namely Boosted Subspace Probabilistic Neural Network (BSPNN), which integrates an adaptive boosting technique and a semi parametric neural network to obtain good tradeoff between accuracy and generality. As the result, learning bias and generalization variance can be significantly minimized. Substantial experiments on KDD 99 intrusion benchmark indicate that our model outperforms other state of the art learning algorithms, with significantly improved detection accuracy, minimal false alarms and relatively small computational complexity.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 04:07:19 GMT" } ]
2009-11-04T00:00:00
[ [ "Tran", "Tich Phuoc", "" ], [ "Cao", "Longbing", "" ], [ "Tran", "Dat", "" ], [ "Nguyen", "Cuong Duc", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0911.0486
Rdv Ijcsis
Dang Tuan Nguyen, Ha Quy-Tinh Luong, Tuyen Thi-Thanh Do
Building a Vietnamese Language Query Processing Framework for ELibrary Searching Systems
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 092-096, October 2009, USA
null
ISSN 1947 5500
cs.DL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the objective of building intelligent searching systems for Elibraries or online bookstores, we have proposed a searching system model based on a Vietnamese language query processing component. Such document searching systems based on this model can allow users to use Vietnamese queries that represent content information as input, instead of entering keywords for searching in specific fields in database. To simplify the realization process of system based on this searching system model, we set a target of building a framework to support the rapid development of Vietnamese language query processing components. Such framework let the implementation of Vietnamese language query processing component in similar systems in this domain to be done more easily.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 04:13:32 GMT" } ]
2009-11-04T00:00:00
[ [ "Nguyen", "Dang Tuan", "" ], [ "Luong", "Ha Quy-Tinh", "" ], [ "Do", "Tuyen Thi-Thanh", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0911.0487
Rdv Ijcsis
Ahmed M. Manasrah, Awsan Hasan, Omar Amer Abouabdalla, Sureswaran Ramadass
Detecting Botnet Activities Based on Abnormal DNS traffic
8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 097-104, October 2009, USA
null
ISSN 1947 5500
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
IThe botnet is considered as a critical issue of the Internet due to its fast growing mechanism and affect. Recently, Botnets have utilized the DNS and query DNS server just like any legitimate hosts. In this case, it is difficult to distinguish between the legitimate DNS traffic and illegitimate DNS traffic. It is important to build a suitable solution for botnet detection in the DNS traffic and consequently protect the network from the malicious Botnets activities. In this paper, a simple mechanism is proposed to monitors the DNS traffic and detects the abnormal DNS traffic issued by the botnet based on the fact that botnets appear as a group of hosts periodically. The proposed mechanism is also able to classify the DNS traffic requested by group of hosts (group behavior) and single hosts (individual behavior), consequently detect the abnormal domain name issued by the malicious Botnets. Finally, the experimental results proved that the proposed mechanism is robust and able to classify DNS traffic, and efficiently detects the botnet activity with average detection rate of 89 percent.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 04:19:15 GMT" } ]
2009-11-04T00:00:00
[ [ "Manasrah", "Ahmed M.", "" ], [ "Hasan", "Awsan", "" ], [ "Abouabdalla", "Omar Amer", "" ], [ "Ramadass", "Sureswaran", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.0488
Rdv Ijcsis
Behrouz Minaei, Parinaz Saadat
SOAP Serialization Performance Enhancement, Design And Implementation Of A Middleware
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 105-110, October 2009, USA
null
ISSN 1947 5500
cs.SE cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The most straightforward way to improve performance of any system is to define the bottlenecks and think of ways to remove them. Web services are the inseparable part of any web application, as a result enhancing performance of web services will have a great effect on the overall performance of the system. The most widely used communication protocol in the web services model, SOAP, is a simple protocol for the exchange of messages. The serialization of large SOAP responses is a major performance bottleneck in a SOAP message exchange. Clearly, some web servers can expect to receive many similar messages for a particular web service as they share the same signature. The idea behind this paper is to avoid the redundant serialization stage of SOAP responses for request which have the same call parameters. The technique exploits the similarities between call parameters to improve web service Response Time by avoiding redundant serialization of the same response with the help of a middleware running on top of web server. The middleware will maintain a trie of incoming parameters for every set of current requests. This way request processing and serialization of the response of same requests will be done only once. In a nutshell, to serialize only the different responses is the simplest way to avoid extra work done by a serializer. It might worth noting that although our approach is to utilize the exact repeating portion parameters, the middleware can be configured to apply changes made to the result set of response to the serialized response being maintained in a trie to generate valid results.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 04:28:27 GMT" } ]
2009-11-04T00:00:00
[ [ "Minaei", "Behrouz", "" ], [ "Saadat", "Parinaz", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0911.0490
Rdv Ijcsis
Y. Ireaneus Anna Rejani, S.Thamarai Selvi
Breast Cancer Detection Using Multilevel Thresholding
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 111-115, October 2009, USA
null
ISSN 1947 5500
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an algorithm which aims to assist the radiologist in identifying breast cancer at its earlier stages. It combines several image processing techniques like image negative, thresholding and segmentation techniques for detection of tumor in mammograms. The algorithm is verified by using mammograms from Mammographic Image Analysis Society. The results obtained by applying these techniques are described.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 04:33:55 GMT" } ]
2009-11-04T00:00:00
[ [ "Rejani", "Y. Ireaneus Anna", "" ], [ "Selvi", "S. Thamarai", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0911.0492
Lek-Heng Lim
Ming Gu, Lek-Heng Lim, Cinna Julie Wu
PARNES: A rapidly convergent algorithm for accurate recovery of sparse and approximately sparse signals
22 pages, 1 figure
null
null
null
math.OC cs.SY math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we propose an algorithm, NESTA-LASSO, for the LASSO problem, i.e., an underdetermined linear least-squares problem with a 1-norm constraint on the solution. We prove under the assumption of the restricted isometry property (RIP) and a sparsity condition on the solution, that NESTA-LASSO is guaranteed to be almost always locally linearly convergent. As in the case of the algorithm NESTA proposed by Becker, Bobin, and Candes, we rely on Nesterov's accelerated proximal gradient method, which takes O(e^{-1/2}) iterations to come within e > 0 of the optimal value. We introduce a modification to Nesterov's method that regularly updates the prox-center in a provably optimal manner, and the aforementioned linear convergence is in part due to this modification. In the second part of this article, we attempt to solve the basis pursuit denoising BPDN problem (i.e., approximating the minimum 1-norm solution to an underdetermined least squares problem) by using NESTA-LASSO in conjunction with the Pareto root-finding method employed by van den Berg and Friedlander in their SPGL1 solver. The resulting algorithm is called PARNES. We provide numerical evidence to show that it is comparable to currently available solvers.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 04:44:00 GMT" }, { "version": "v2", "created": "Thu, 5 Nov 2009 07:40:00 GMT" }, { "version": "v3", "created": "Sat, 2 Jul 2011 09:19:39 GMT" }, { "version": "v4", "created": "Sat, 31 Mar 2012 00:44:32 GMT" } ]
2012-04-03T00:00:00
[ [ "Gu", "Ming", "" ], [ "Lim", "Lek-Heng", "" ], [ "Wu", "Cinna Julie", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
0911.0493
Rdv Ijcsis
Rajeswari Mukesh, A. Damodaram, V. Subbiah Bharathi
Energy Efficient Security Architecture for Wireless BioMedical Sensor Networks
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 116-122, October 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Latest developments in VLSI, wireless communications, and biomedical sensing devices allow very small, lightweight, low power, intelligent sensing devices called biosensors. A set of these devices can be integrated into a Wireless Biomedical Sensor Network (WBSN), a new breakthrough technology used in telemedicine for monitoring the physiological condition of an individual. The biosensor nodes in WBSN has got resource limitations in terms of battery lifetime, CPU processing capability, and memory capacity. Replacement or recharging of batteries on thousands of biosensor nodes is quiet difficult or too costly. So, a key challenge in wireless biomedical sensor networks is the reduction of energy and memory consumption. Considering, the sensitivity of information in WBSN, we must provide security and patient privacy, as it is an important issue in the design of such systems. Hence this paper proposes an energy efficient security protocol for WBSN where security is provided to the physiological data, which is being transmitted from the sensor node to the sink device. This is achieved by authenticating the data using patients biometric, encrypting the data using Quasi Group cryptography after compressing the image data using an energy efficient number theory based technique.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 04:45:54 GMT" } ]
2009-11-04T00:00:00
[ [ "Mukesh", "Rajeswari", "" ], [ "Damodaram", "A.", "" ], [ "Bharathi", "V. Subbiah", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.0494
Rdv Ijcsis
C. Banerjee, S. K. Pandey
Software Security Rules, SDLC Perspective
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 123-128, October 2009, USA
null
ISSN 1947 5500
cs.SE cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email and Egreetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of peoples trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, right from the beginning. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are eliminated in the software and a more secure software can be built.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 04:49:37 GMT" } ]
2009-11-04T00:00:00
[ [ "Banerjee", "C.", "" ], [ "Pandey", "S. K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.0497
Rdv Ijcsis
Negin Razavi, Amir Masoud Rahmani, Mehran Mohsenzadeh
A Context-based Trust Management Model for Pervasive Computing Systems
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 137-142, October 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Trust plays an important role in making collaborative decisions about service evaluation and service selection in pervasive computing. Context is a fundamental concept in pervasive systems, which is based on the interpretation of environment and systems. The dynamic nature of context can strongly affect trust management and service selection. In this paper, we present a context-based trust management model for pervasive computing systems. The concept of context is considered in basic components of the model such as trust computation module, recommender assessment module, transaction management module, and request responder. In order to measure a predicted trustworthiness according to the fuzzy nature of trust in pervasive environments, fuzzy concepts are integrated in the proposed model.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 05:03:39 GMT" } ]
2009-11-04T00:00:00
[ [ "Razavi", "Negin", "" ], [ "Rahmani", "Amir Masoud", "" ], [ "Mohsenzadeh", "Mehran", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.0498
Rdv Ijcsis
Safieh Siadat, Amir Masoud Rahmani, Mehran Mohsenzadeh
Proposed platform for improving grid security by trust management system
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 143-148, October 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With increasing the applications of grid system, the risk in security field is enhancing too. Recently Trust management system has been recognized as a noticeable approach in enhancing of security in grid systems. In this article due to improve the grid security a new trust management system with two levels is proposed. The benefits of this platform are adding new domain in grid system, selecting one service provider which has closest adaption with user requests and using from domains security attribute as an important factor in computing the trust value.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 05:07:10 GMT" } ]
2009-11-04T00:00:00
[ [ "Siadat", "Safieh", "" ], [ "Rahmani", "Amir Masoud", "" ], [ "Mohsenzadeh", "Mehran", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.0499
Rdv Ijcsis
Vani Perumal, Jagannathan Ramaswamy
An Innovative Scheme For Effectual Fingerprint Data Compression Using Bezier Curve Representations
9 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 149-157, October 2009, USA
null
ISSN 1947 5500
cs.CV cs.CR cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Naturally, with the mounting application of biometric systems, there arises a difficulty in storing and handling those acquired biometric data. Fingerprint recognition has been recognized as one of the most mature and established technique among all the biometrics systems. In recent times, with fingerprint recognition receiving increasingly more attention the amount of fingerprints collected has been constantly creating enormous problems in storage and transmission. Henceforth, the compression of fingerprints has emerged as an indispensable step in automated fingerprint recognition systems. Several researchers have presented approaches for fingerprint image compression. In this paper, we propose a novel and efficient scheme for fingerprint image compression. The presented scheme utilizes the Bezier curve representations for effective compression of fingerprint images. Initially, the ridges present in the fingerprint image are extracted along with their coordinate values using the approach presented. Subsequently, the control points are determined for all the ridges by visualizing each ridge as a Bezier curve. The control points of all the ridges determined are stored and are used to represent the fingerprint image. When needed, the fingerprint image is reconstructed from the stored control points using Bezier curves. The quality of the reconstructed fingerprint is determined by a formal evaluation. The proposed scheme achieves considerable memory reduction in storing the fingerprint.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 05:11:40 GMT" } ]
2009-11-04T00:00:00
[ [ "Perumal", "Vani", "" ], [ "Ramaswamy", "Jagannathan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0911.0501
Rdv Ijcsis
Al-Sammarraie Hosam, Adli Mustafa, Shakeel Ahmad, Merza Abbas
Exception Agent Detection System for IP Spoofing Over Online Environments
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 158-164, October 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the recent years, IP and email spoofing gained much importance for security concerns due to the current changes in manipulating the system performance in different online environments. Intrusion Detection System (IDS) has been used to secure these environments for sharing their data over network and host based IDS approaches. However, the rapid growth of intrusion events over Internet and local area network become responsible for the distribution of different threats and vulnerabilities in the computing systems. The current signature detection approach used by IDS, detects unclear actions based on analyzing and describing the action patterns such as time, text, password etc and has been faced difficulties in updating information, detect unknown novel attacks, maintenance of an IDS which is necessarily connected with analyzing and patching of security holes, and the lack of information on user privileges and attack signature structure. Thus, this paper proposes an EADS (Exception agent detection system) for securing the header information carried by IP over online environments. The study mainly concerns with the deployment of new technique for detecting and eliminating the unknown threats attacks during the data sharing over online environments.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 05:17:30 GMT" } ]
2009-11-04T00:00:00
[ [ "Hosam", "Al-Sammarraie", "" ], [ "Mustafa", "Adli", "" ], [ "Ahmad", "Shakeel", "" ], [ "Abbas", "Merza", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.0503
Rdv Ijcsis
A. Rajaram, Dr. S. Palaniswami
A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks
8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 165-172, October 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we develop a trust based security protocol based on a cross layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding by maintaining a trust counter for each node. A node is punished or rewarded by decreasing or increasing the trust counter. If the trust counter value falls below a trust threshold, the corresponding intermediate node is marked as malicious. In the next phase of the protocol, we provide link layer security using the CBCX mode of authentication and encryption. By simulation results, we show that the proposed cross layer security protocol achieves high packet delivery ratio while attaining low delay and overhead.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 05:21:47 GMT" } ]
2009-11-04T00:00:00
[ [ "Rajaram", "A.", "" ], [ "Palaniswami", "Dr. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.0505
Kirk D. Borne
Kirk Borne (1) ((1) George Mason University)
Scientific Data Mining in Astronomy
26 pages
Borne, K., in Next Generation of Data Mining (Taylor & Francis: CRC Press), pp. 91-114 (2009)
null
null
astro-ph.IM cs.DB cs.IR physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the application of data mining algorithms to research problems in astronomy. We posit that data mining has always been fundamental to astronomical research, since data mining is the basis of evidence-based discovery, including classification, clustering, and novelty discovery. These algorithms represent a major set of computational tools for discovery in large databases, which will be increasingly essential in the era of data-intensive astronomy. Historical examples of data mining in astronomy are reviewed, followed by a discussion of one of the largest data-producing projects anticipated for the coming decade: the Large Synoptic Survey Telescope (LSST). To facilitate data-driven discoveries in astronomy, we envision a new data-oriented research paradigm for astronomy and astrophysics -- astroinformatics. Astroinformatics is described as both a research approach and an educational imperative for modern data-intensive astronomy. An important application area for large time-domain sky surveys (such as LSST) is the rapid identification, characterization, and classification of real-time sky events (including moving objects, photometrically variable objects, and the appearance of transients). We describe one possible implementation of a classification broker for such events, which incorporates several astroinformatics techniques: user annotation, semantic tagging, metadata markup, heterogeneous data integration, and distributed data mining. Examples of these types of collaborative classification and discovery approaches within other science disciplines are presented.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 05:34:54 GMT" } ]
2009-11-04T00:00:00
[ [ "Borne", "Kirk", "", "George Mason University" ] ]
[ { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0911.0508
Ravindra Guravannavar
Ravindra Guravannavar
Optimization and Evaluation of Nested Queries and Procedures
Ph.D. thesis, 167 pages
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many database applications perform complex data retrieval and update tasks. Nested queries, and queries that invoke user-defined functions, which are written using a mix of procedural and SQL constructs, are often used in such applications. A straight-forward evaluation of such queries involves repeated execution of parameterized sub-queries or blocks containing queries and procedural code. An important problem that arises while optimizing nested queries as well as queries with joins, aggregates and set operations is the problem of finding an optimal sort order from a factorial number of possible sort orders. We show that even a special case of this problem is NP-Hard, and present practical heuristics that are effective and easy to incorporate in existing query optimizers. We also consider iterative execution of queries and updates inside complex procedural blocks such as user-defined functions and stored procedures. Parameter batching is an important means of improving performance as it enables set-orientated processing. The key challenge to parameter batching lies in rewriting a given procedure/function to process a batch of parameter values. We propose a solution, based on program analysis and rewrite rules, to automate the generation of batched forms of procedures and replace iterative database calls within imperative loops with a single call to the batched form. We present experimental results for the proposed techniques, and the results show significant gains in performance.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 06:25:23 GMT" } ]
2009-11-04T00:00:00
[ [ "Guravannavar", "Ravindra", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0911.0519
Moshe Mishali
Moshe Mishali, Yonina C. Eldar and Asaf Elron
Xampling: Signal Acquisition and Processing in Union of Subspaces
16 pages, 9 figures, submitted to IEEE for possible publication
null
10.1109/TSP.2011.2161472
CCIT Report #747 Oct-09, EE Pub No. 1704, EE Dept., Technion - Israel Institute of Technology (refers to v1)
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce Xampling, a unified framework for signal acquisition and processing of signals in a union of subspaces. The main functions of this framework are two. Analog compression that narrows down the input bandwidth prior to sampling with commercial devices. A nonlinear algorithm then detects the input subspace prior to conventional signal processing. A representative union model of spectrally-sparse signals serves as a test-case to study these Xampling functions. We adopt three metrics for the choice of analog compression: robustness to model mismatch, required hardware accuracy and software complexities. We conduct a comprehensive comparison between two sub-Nyquist acquisition strategies for spectrally-sparse signals, the random demodulator and the modulated wideband converter (MWC), in terms of these metrics and draw operative conclusions regarding the choice of analog compression. We then address lowrate signal processing and develop an algorithm for that purpose that enables convenient signal processing at sub-Nyquist rates from samples obtained by the MWC. We conclude by showing that a variety of other sampling approaches for different union classes fit nicely into our framework.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 09:06:03 GMT" }, { "version": "v2", "created": "Sat, 25 Sep 2010 18:52:59 GMT" }, { "version": "v3", "created": "Tue, 8 Mar 2011 08:21:36 GMT" } ]
2016-11-17T00:00:00
[ [ "Mishali", "Moshe", "" ], [ "Eldar", "Yonina C.", "" ], [ "Elron", "Asaf", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0542
Manar Mohaisen
Manar Mohaisen, HeeSeok Yoon, KyungHi Chang
Radio Transmission Performance of EPCglobal Gen-2 RFID System
6 6ages, 13 figures, 3 tables, International Conference on Advanced Communication Technology 2008
ICACT, Korea, Phoenix Park, Feb. 2008, pp. 1423-1428
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we analyze the performance of the encoding and the modulation processes in the downlink and uplink of the EPCglobal Gen2 system through the analysis and simulation. Furthermore, the synchronization issues on time and frequency domain and the preamble architecture are evaluated. Through the simulation in the uplink, we find that the detection probability of FM0 and Miller coding approaches 1 at 13dB Eb/N0.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 10:42:14 GMT" } ]
2009-11-04T00:00:00
[ [ "Mohaisen", "Manar", "" ], [ "Yoon", "HeeSeok", "" ], [ "Chang", "KyungHi", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0911.0547
Haim Avron
Haim Avron, Gil Shklarski, Sivan Toledo
On Element SDD Approximability
6 pages
null
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This short communication shows that in some cases scalar elliptic finite element matrices cannot be approximated well by an SDD matrix. We also give a theoretical analysis of a simple heuristic method for approximating an element by an SDD matrix.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 10:55:16 GMT" } ]
2009-11-04T00:00:00
[ [ "Avron", "Haim", "" ], [ "Shklarski", "Gil", "" ], [ "Toledo", "Sivan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0911.0577
Philip Bille
Philip Bille and Inge Li Goertz
Fast Arc-Annotated Subsequence Matching in Linear Space
To appear in Algoritmica
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An arc-annotated string is a string of characters, called bases, augmented with a set of pairs, called arcs, each connecting two bases. Given arc-annotated strings $P$ and $Q$ the arc-preserving subsequence problem is to determine if $P$ can be obtained from $Q$ by deleting bases from $Q$. Whenever a base is deleted any arc with an endpoint in that base is also deleted. Arc-annotated strings where the arcs are ``nested'' are a natural model of RNA molecules that captures both the primary and secondary structure of these. The arc-preserving subsequence problem for nested arc-annotated strings is basic primitive for investigating the function of RNA molecules. Gramm et al. [ACM Trans. Algorithms 2006] gave an algorithm for this problem using $O(nm)$ time and space, where $m$ and $n$ are the lengths of $P$ and $Q$, respectively. In this paper we present a new algorithm using $O(nm)$ time and $O(n + m)$ space, thereby matching the previous time bound while significantly reducing the space from a quadratic term to linear. This is essential to process large RNA molecules where the space is likely to be a bottleneck. To obtain our result we introduce several novel ideas which may be of independent interest for related problems on arc-annotated strings.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 13:35:41 GMT" }, { "version": "v2", "created": "Wed, 8 Sep 2010 19:16:42 GMT" } ]
2010-09-09T00:00:00
[ [ "Bille", "Philip", "" ], [ "Goertz", "Inge Li", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.0626
Yifan Hu
Yifan Hu
Visualizing Graphs with Node and Edge Labels
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When drawing graphs whose edges and nodes contain text or graphics, such informa tion needs to be displayed without overlaps, either as part of the initial layout or as a post-processing step. The core problem in removing overlaps lies in retaining the structural information inherent in a layout, minimizing the additional area required, and keeping edges as straight as possible. This paper presents a unified node and edge overlap removal algorithm that does well at solving this problem.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 17:44:59 GMT" }, { "version": "v2", "created": "Tue, 3 Nov 2009 21:20:38 GMT" } ]
2016-09-08T00:00:00
[ [ "Hu", "Yifan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.0630
Emmanuel Beffara
Emmanuel Beffara (IML)
Order algebras: a quantitative model of interaction
null
null
null
null
cs.LO cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A quantitative model of concurrent interaction is introduced. The basic objects are linear combinations of partial order relations, acted upon by a group of permutations that represents potential non-determinism in synchronisation. This algebraic structure is shown to provide faithful interpretations of finitary process algebras, for an extension of the standard notion of testing semantics, leading to a model that is both denotational (in the sense that the internal workings of processes are ignored) and non-interleaving. Constructions on algebras and their subspaces enjoy a good structure that make them (nearly) a model of differential linear logic, showing that the underlying approach to the representation of non-determinism as linear combinations is the same.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 17:48:28 GMT" }, { "version": "v2", "created": "Mon, 31 May 2010 09:07:08 GMT" }, { "version": "v3", "created": "Thu, 7 Jul 2011 14:46:42 GMT" } ]
2011-07-08T00:00:00
[ [ "Beffara", "Emmanuel", "", "IML" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0911.0645
Ruriko Yoshida
Peter Huggins, Wenbin Li, David Haws, Thomas Friedrich, Jinze Liu, Ruriko Yoshida
Bayes estimators for phylogenetic reconstruction
31 pages, 4 figures, and 3 tables
null
null
null
q-bio.PE cs.LG q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tree reconstruction methods are often judged by their accuracy, measured by how close they get to the true tree. Yet most reconstruction methods like ML do not explicitly maximize this accuracy. To address this problem, we propose a Bayesian solution. Given tree samples, we propose finding the tree estimate which is closest on average to the samples. This ``median'' tree is known as the Bayes estimator (BE). The BE literally maximizes posterior expected accuracy, measured in terms of closeness (distance) to the true tree. We discuss a unified framework of BE trees, focusing especially on tree distances which are expressible as squared euclidean distances. Notable examples include Robinson--Foulds distance, quartet distance, and squared path difference. Using simulated data, we show Bayes estimators can be efficiently computed in practice by hill climbing. We also show that Bayes estimators achieve higher accuracy, compared to maximum likelihood and neighbor joining.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 18:43:43 GMT" }, { "version": "v2", "created": "Sun, 22 Nov 2009 00:09:42 GMT" } ]
2009-11-22T00:00:00
[ [ "Huggins", "Peter", "" ], [ "Li", "Wenbin", "" ], [ "Haws", "David", "" ], [ "Friedrich", "Thomas", "" ], [ "Liu", "Jinze", "" ], [ "Yoshida", "Ruriko", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0911.0660
Ramy Gohary
Ramy H. Gohary and Timothy N. Davidson
The capacity region of a product of two unmatched Gaussian broadcast channels with three particular messages and a common message
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers a Gaussian broadcast channel with two unmatched degraded components, three particular messages, and a common message that is intended for all three receivers. It is shown that for this channel superposition coding and Gaussian signalling is sufficient to achieve every point in the capacity region.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 19:39:07 GMT" } ]
2009-11-04T00:00:00
[ [ "Gohary", "Ramy H.", "" ], [ "Davidson", "Timothy N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0664
Aaron Potechin
Aaron Potechin
Bounds on monotone switching networks for directed connectivity
49 pages, 12 figures
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We separate monotone analogues of L and NL by proving that any monotone switching network solving directed connectivity on $n$ vertices must have size at least $n^(\Omega(\lg(n)))$.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 20:10:05 GMT" }, { "version": "v2", "created": "Thu, 17 Dec 2009 22:40:59 GMT" }, { "version": "v3", "created": "Sat, 14 Aug 2010 06:07:27 GMT" }, { "version": "v4", "created": "Sun, 27 Nov 2011 19:34:27 GMT" }, { "version": "v5", "created": "Fri, 30 Nov 2012 15:01:57 GMT" }, { "version": "v6", "created": "Sat, 30 Nov 2013 19:28:33 GMT" }, { "version": "v7", "created": "Tue, 29 Nov 2016 21:05:30 GMT" } ]
2016-12-01T00:00:00
[ [ "Potechin", "Aaron", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.0696
Leonid Gurvits
Leonid Gurvits
A proof of the log-concavity conjecture related to the computation of the ergodic capacity of MIMO channels
6 pages, a proof of a conjecture posed in arXiv:0903.1952. We used techniques, developed in arXiv:0711.3496
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An upper bound on the ergodic capacity of {\bf MIMO} channels was introduced recently in arXiv:0903.1952. This upper bound amounts to the maximization on the simplex of some multilinear polynomial $p(\lambda_1,...,\lambda_n)$ with non-negative coefficients. Interestingly, the coefficients are subpermanents of some non-negative matrix. In general, such maximizations problems are {\bf NP-HARD}. But if say, the functional $\log(p)$ is concave on the simplex and can be efficiently evaluated, then the maximization can also be done efficiently. Such log-concavity was conjectured in arXiv:0903.1952. We give in this paper self-contained proof of the conjecture, based on the theory of {\bf H-Stable} polynomials.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 22:03:46 GMT" } ]
2009-11-05T00:00:00
[ [ "Gurvits", "Leonid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0709
Hong Ju Park
Hong Ju Park, Boyu Li, and Ender Ayanoglu
Constellation Precoded Multiple Beamforming
submitted to journal
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Beamforming techniques that employ Singular Value Decomposition (SVD) are commonly used in Multi-Input Multi-Output (MIMO) wireless communication systems. In the absence of channel coding, when a single symbol is transmitted, these systems achieve the full diversity order provided by the channel; whereas when multiple symbols are simultaneously transmitted, this property is lost. When channel coding is employed, full diversity order can be achieved. For example, when Bit-Interleaved Coded Modulation (BICM) is combined with this technique, full diversity order of NM in an MxN MIMO channel transmitting S parallel streams is possible, provided a condition on S and the BICM convolutional code rate is satisfied. In this paper, we present constellation precoded multiple beamforming which can achieve the full diversity order both with BICM-coded and uncoded SVD systems. We provide an analytical proof of this property. To reduce the computational complexity of Maximum Likelihood (ML) decoding in this system, we employ Sphere Decoding (SD). We report an SD technique that reduces the computational complexity beyond commonly used approaches to SD. This technique achieves several orders of magnitude reduction in computational complexity not only with respect to conventional ML decoding but also, with respect to conventional SD.
[ { "version": "v1", "created": "Tue, 3 Nov 2009 23:23:53 GMT" } ]
2009-11-05T00:00:00
[ [ "Park", "Hong Ju", "" ], [ "Li", "Boyu", "" ], [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0727
Manik Lal Das
Animesh Agarwal, Vaibhav Shrimali, Manik Lal Das
GSM Security Using Identity-based Cryptography
10 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require more security than the present GSM supports. Consequently, a careful design of GSM security using both symmetric and asymmetric key cryptography would make GSM security more adaptable in security intensive applications. This paper presents a secure and efficient protocol for GSM security using identity based cryptography. The salient features of the proposed protocol are (i) authenticated key exchange; (ii) mutual authentication amongst communicating entities; and (iii) user anonymity. The security analysis of the protocol shows its strength against some known threats observed in conventional GSM security.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 04:18:44 GMT" } ]
2009-11-05T00:00:00
[ [ "Agarwal", "Animesh", "" ], [ "Shrimali", "Vaibhav", "" ], [ "Das", "Manik Lal", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.0736
Mark Davenport
Mark A. Davenport, Jason N. Laska, Petros T. Boufounos, and Richard G. Baraniuk
A simple proof that random matrices are democratic
null
null
null
Rice University Department of Electrical and Computer Engineering Technical Report TREE0906
math.NA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recently introduced theory of compressive sensing (CS) enables the reconstruction of sparse or compressible signals from a small set of nonadaptive, linear measurements. If properly chosen, the number of measurements can be significantly smaller than the ambient dimension of the signal and yet preserve the significant signal information. Interestingly, it can be shown that random measurement schemes provide a near-optimal encoding in terms of the required number of measurements. In this report, we explore another relatively unexplored, though often alluded to, advantage of using random matrices to acquire CS measurements. Specifically, we show that random matrices are democractic, meaning that each measurement carries roughly the same amount of signal information. We demonstrate that by slightly increasing the number of measurements, the system is robust to the loss of a small number of arbitrary measurements. In addition, we draw connections to oversampling and demonstrate stability from the loss of significantly more measurements.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 06:09:36 GMT" } ]
2009-11-05T00:00:00
[ [ "Davenport", "Mark A.", "" ], [ "Laska", "Jason N.", "" ], [ "Boufounos", "Petros T.", "" ], [ "Baraniuk", "Richard G.", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0737
Shirin Jalali
Shirin Jalali and Tsachy Weissman
Multiple Description Coding of Discrete Ergodic Sources
6 pages, 3 figures, presented at 2009 Allerton Conference on Communication, Control and Computing
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the problem of Multiple Description (MD) coding of discrete ergodic processes. We introduce the notion of MD stationary coding, and characterize its relationship to the conventional block MD coding. In stationary coding, in addition to the two rate constraints normally considered in the MD problem, we consider another rate constraint which reflects the conditional entropy of the process generated by the third decoder given the reconstructions of the two other decoders. The relationship that we establish between stationary and block MD coding enables us to devise a universal algorithm for MD coding of discrete ergodic sources, based on simulated annealing ideas that were recently proven useful for the standard rate distortion problem.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 06:04:58 GMT" } ]
2009-11-05T00:00:00
[ [ "Jalali", "Shirin", "" ], [ "Weissman", "Tsachy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0753
Pasquale De Meo
P. De Meo, G. Quattrone, G. Terracina, D. Ursino
An XML-based Multi-Agent System for Supporting Online Recruitment Services
16 pages, 5 figures
IEEE Transactions on Systems, Man, and Cybernetics, Part A 37(4): 464-480 (2007)
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose an XML-based multi-agent recommender system for supporting online recruitment services. Our system is characterized by the following features: {\em (i)} it handles user profiles for personalizing the job search over the Internet; {\em (ii)} it is based on the Intelligent Agent Technology; {\em (iii)} it uses XML for guaranteeing a light, versatile and standard mechanism for information representation, storing and exchange. The paper discusses the basic features of the proposed system, presents the results of an experimental study we have carried out for evaluating its performance, and makes a comparison between the proposed system and other e-recruitment systems already presented in the past.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 09:19:37 GMT" } ]
2009-11-05T00:00:00
[ [ "De Meo", "P.", "" ], [ "Quattrone", "G.", "" ], [ "Terracina", "G.", "" ], [ "Ursino", "D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0911.0781
Rdv Ijcsis
Kanak Saxena, D.S Rajpoot
A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 186-191, October 2009, USA
null
ISSN 1947 5500
cs.DB cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This has much in common with traditional work in statistics and machine learning. However, there are important new issues which arise because of the sheer size of the data. One of the important problem in data mining is the Classification-rule learning which involves finding rules that partition given data into predefined classes. In the data mining domain where millions of records and a large number of attributes are involved, the execution time of existing algorithms can become prohibitive, particularly in interactive applications.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 11:19:55 GMT" } ]
2009-11-05T00:00:00
[ [ "Saxena", "Kanak", "" ], [ "Rajpoot", "D. S", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0911.0785
Rdv Ijcsis
M. Irfan, M.M. Tahir N. Baig, Furqan H. Khan, Raheel M. Hashmi, Khurram Shehzad, Assad Ali
Management of Location Based Advertisement Services using Spatial Triggers in Cellular Networks
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 181-185, October 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses the advent of new technologies which have emerged under the area of Location Based Services (LBS). An innovative implementation and approach has been presented for design of applications which are inventive and attractive towards the user. Spatial Trigger is one of the most promising additions to the LBS technologies. This paper describes ways in which mobile advertisement services can be introduced effectively in the cellular market by bringing innovation in them through effective usage of Spatial Triggers. Hence, opening new horizons to make the consumer cellular networks, commercially, more effective and informative.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 11:25:06 GMT" } ]
2009-11-05T00:00:00
[ [ "Irfan", "M.", "" ], [ "Baig", "M. M. Tahir N.", "" ], [ "Khan", "Furqan H.", "" ], [ "Hashmi", "Raheel M.", "" ], [ "Shehzad", "Khurram", "" ], [ "Ali", "Assad", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.0787
Rdv Ijcsis
Shailendra Singh, Sanjay Silakari
Generalized Discriminant Analysis algorithm for feature reduction in Cyber Attack Detection System
8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 173-180, October 2009, USA
null
ISSN 1947 5500
cs.CR cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This Generalized Discriminant Analysis (GDA) has provided an extremely powerful approach to extracting non linear features. The network traffic data provided for the design of intrusion detection system always are large with ineffective information, thus we need to remove the worthless information from the original high dimensional database. To improve the generalization ability, we usually generate a small set of features from the original input variables by feature extraction. The conventional Linear Discriminant Analysis (LDA) feature reduction technique has its limitations. It is not suitable for non linear dataset. Thus we propose an efficient algorithm based on the Generalized Discriminant Analysis (GDA) feature reduction technique which is novel approach used in the area of cyber attack detection. This not only reduces the number of the input features but also increases the classification accuracy and reduces the training and testing time of the classifiers by selecting most discriminating features. We use Artificial Neural Network (ANN) and C4.5 classifiers to compare the performance of the proposed technique. The result indicates the superiority of algorithm.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 11:29:57 GMT" } ]
2009-11-05T00:00:00
[ [ "Singh", "Shailendra", "" ], [ "Silakari", "Sanjay", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0911.0790
Nizami Gasilov
Nizami Gasilov, Afet Golayo\u{g}lu Fatullayev and \c{S}ahin Emrah Amrahov
Solution of Non-Square Fuzzy Linear Systems
15 pages, 3 figure
null
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a linear system of equations with crisp coefficients and fuzzy right-hand sides is investigated. All possible cases pertaining to the number of variables, n, and the number of equations, m, are dealt with. A solution is sought not as a fuzzy vector, as usual, but as a fuzzy set of vectors. Each vector in the solution set solves the given fuzzy linear system with a certain possibility. Assuming that the coefficient matrix is a full rank matrix, three cases are considered: For m = n (square system), the solution set is shown to be a parallelepiped in coordinate space and is expressed by an explicit formula. For m > n (overdetermined system), the solution set is proved to be a convex polyhedron and a novel geometric method is proposed to compute it. For m < n (underdetermined system), by determining the contribution of free variables, general solution is computed. From the results of three cases mentioned above, a method is proposed to handle the general case, in which the coefficient matrix is not necessarily a full rank matrix. Comprehensive examples are provided and investigated in depth to illustrate each case and suggested method.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 11:44:39 GMT" }, { "version": "v2", "created": "Mon, 11 Jul 2011 10:04:45 GMT" } ]
2011-07-12T00:00:00
[ [ "Gasilov", "Nizami", "" ], [ "Fatullayev", "Afet Golayoğlu", "" ], [ "Amrahov", "Şahin Emrah", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0911.0801
D\'aniel Marx
D\'aniel Marx
Tractable hypergraph properties for constraint satisfaction and conjunctive queries
Extended abstract appeared in STOC 2010
null
null
null
cs.DS cs.CC cs.DB cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important question in the study of constraint satisfaction problems (CSP) is understanding how the graph or hypergraph describing the incidence structure of the constraints influences the complexity of the problem. For binary CSP instances (i.e., where each constraint involves only two variables), the situation is well understood: the complexity of the problem essentially depends on the treewidth of the graph of the constraints. However, this is not the correct answer if constraints with unbounded number of variables are allowed, and in particular, for CSP instances arising from query evaluation problems in database theory. Formally, if H is a class of hypergraphs, then let CSP(H) be CSP restricted to instances whose hypergraph is in H. Our goal is to characterize those classes of hypergraphs for which CSP(H) is polynomial-time solvable or fixed-parameter tractable, parameterized by the number of variables. Note that in the applications related to database query evaluation, we usually assume that the number of variables is much smaller than the size of the instance, thus parameterization by the number of variables is a meaningful question. The most general known property of H that makes CSP(H) polynomial-time solvable is bounded fractional hypertree width. Here we introduce a new hypergraph measure called submodular width, and show that bounded submodular width of H implies that CSP(H) is fixed-parameter tractable. In a matching hardness result, we show that if H has unbounded submodular width, then CSP(H) is not fixed-parameter tractable, unless the Exponential Time Hypothesis fails.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 14:07:38 GMT" }, { "version": "v2", "created": "Mon, 14 Jun 2010 09:35:29 GMT" }, { "version": "v3", "created": "Tue, 6 Dec 2011 15:12:49 GMT" } ]
2015-03-13T00:00:00
[ [ "Marx", "Dániel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.0820
Marw Ali Ms
Ahmed Ahmedin, Marwa Ali, Ahmed Sultan and Mohammed Nafie
Power and Transmission Duration Control for Un-Slotted Cognitive Radio Networks
submitted to DySPAN 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider an unslotted primary channel with alternating on/off activity and provide a solution to the problem of finding the optimal secondary transmission power and duration given some sensing outcome. The goal is to maximize a weighted sum of the primary and secondary throughput where the weight is determined by the minimum rate required by the primary terminals. The primary transmitter sends at a fixed power and a fixed rate. Its on/off durations follow an exponential distribution. Two sensing schemes are considered: perfect sensing in which the actual state of the primary channel is revealed, and soft sensing in which the secondary transmission power and time are determined based on the sensing metric directly. We use an upperbound for the secondary throughput assuming that the secondary receiver tracks the instantaneous secondary channel state information. The objective function is non-convex and, hence, the optimal solution is obtained via exhaustive search. Our results show that an increase in the overall weighted throughput can be obtained by allowing the secondary to transmit even when the channel is found to be busy. For the examined system parameter values, the throughput gain from soft sensing is marginal. Further investigation is needed for assessing the potential of soft sensing.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 13:23:40 GMT" }, { "version": "v2", "created": "Wed, 11 Nov 2009 08:46:18 GMT" } ]
2009-11-11T00:00:00
[ [ "Ahmedin", "Ahmed", "" ], [ "Ali", "Marwa", "" ], [ "Sultan", "Ahmed", "" ], [ "Nafie", "Mohammed", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0838
Stephane Martin
St\'ephane Martin (LIF), Denis Lugiez (LIF)
Research report : Collaborative Peer 2 Peer Edition: Avoiding Conflicts is Better than Solving Conflicts
12 pages
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Collaborative edition is achieved by distinct sites that work independently on (a copy of) a shared document. Conflicts may arise during this process and must be solved by the collaborative editor. In pure Peer to Peer collaborative editing, no centralization nor locks nor time-stamps are used which make conflict resolution difficult. We propose an algorithm which relies on the notion or semantics dependence and avoids the need of any integration transformation to solve conflicts. Furthermore, it doesn't use any history file recording operations performed since starting the edition process. We show how to define editing operations for semi-structured documents i.e. XML-like trees, that are enriched with informations derived for free from the editing process. Then we define the semantics dependence relation required by the algorithm and we present preliminary results obtained by a prototype implementation.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 19:45:55 GMT" }, { "version": "v2", "created": "Mon, 4 Jan 2010 14:32:53 GMT" } ]
2010-01-04T00:00:00
[ [ "Martin", "Stéphane", "", "LIF" ], [ "Lugiez", "Denis", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0911.0844
Qiyu Sun
M. Zuhair Nashed and Qiyu Sun
Sampling and Reconstruction of Signals in a Reproducing Kernel Subspace of $L^p({\Bbb R}^d)$
null
Journal of Functional Analysis Volume 258, Issue 7, 1 April 2010, Pages 2422-2452
10.1016/j.jfa.2009.12.012
null
cs.IT math.FA math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider sampling and reconstruction of signals in a reproducing kernel subspace of $L^p(\Rd), 1\le p\le \infty$, associated with an idempotent integral operator whose kernel has certain off-diagonal decay and regularity. The space of $p$-integrable non-uniform splines and the shift-invariant spaces generated by finitely many localized functions are our model examples of such reproducing kernel subspaces of $L^p(\Rd)$. We show that a signal in such reproducing kernel subspaces can be reconstructed in a stable way from its samples taken on a relatively-separated set with sufficiently small gap. We also study the exponential convergence, consistency, and the asymptotic pointwise error estimate of the iterative approximation-projection algorithm and the iterative frame algorithm for reconstructing a signal in those reproducing kernel spaces from its samples with sufficiently small gap.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 14:59:35 GMT" } ]
2010-08-26T00:00:00
[ [ "Nashed", "M. Zuhair", "" ], [ "Sun", "Qiyu", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0874
Paul Cuff
Paul Cuff (Princeton University)
State Information in Bayesian Games
Presented at Allerton 2009, 6 pages, 5 eps figures, uses IEEEtran.cls
null
null
null
cs.IT cs.CR cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two-player zero-sum repeated games are well understood. Computing the value of such a game is straightforward. Additionally, if the payoffs are dependent on a random state of the game known to one, both, or neither of the players, the resulting value of the game has been analyzed under the framework of Bayesian games. This investigation considers the optimal performance in a game when a helper is transmitting state information to one of the players. Encoding information for an adversarial setting (game) requires a different result than rate-distortion theory provides. Game theory has accentuated the importance of randomization (mixed strategy), which does not find a significant role in most communication modems and source coding codecs. Higher rates of communication, used in the right way, allow the message to include the necessary random component useful in games.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 16:46:13 GMT" } ]
2009-11-05T00:00:00
[ [ "Cuff", "Paul", "", "Princeton University" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0878
Pablo Fierens
S. A. Ib\'a\~nez, P. I. Fierens, G. A. Patterson, R. P. J. Perazzo and D. F. Grosz
One-bit stochastic resonance storage device
12 pages, 7 figures
null
null
null
nlin.AO cond-mat.other cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing capacity of modern computers, driven by Moore's Law, is accompanied by smaller noise margins and higher error rates. In this paper we propose a memory device, consisting of a ring of two identical overdamped bistable forward-coupled oscillators, which may serve as a building block in a larger scale solution to this problem. We show that such a system is capable of storing one bit and its performance improves with the addition of noise. The proposed device can be regarded as asynchronous, in the sense that stored information can be retrieved at any time and, after a certain synchronization time, the probability of erroneous retrieval does not depend on the interrogated oscillator. We characterize memory persistence time and show it to be maximized for the same noise range that both minimizes the probability of error and ensures synchronization. We also present experimental results for a hard-wired version of the proposed memory, consisting of a loop of two Schmitt triggers. We show that this device is capable of storing one bit and does so more efficiently in the presence of noise.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 16:59:11 GMT" } ]
2009-11-05T00:00:00
[ [ "Ibáñez", "S. A.", "" ], [ "Fierens", "P. I.", "" ], [ "Patterson", "G. A.", "" ], [ "Perazzo", "R. P. J.", "" ], [ "Grosz", "D. F.", "" ] ]
[ { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "cond-mat.other", "description": "Work in condensed matter that does not fit into the other cond-mat classifications", "span": "(Other Condensed Matter)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0911.0894
Vishal Goyal
N. Rama and Meenakshi Lakshmanan
A New Computational Schema for Euphonic Conjunctions in Sanskrit Processing
International Journal of Computer Science Issues, IJCSI Volume 5, pp43-51, October 2009
Rama N. and M. Lakshmanan, "A New Computational Schema for Euphonic Conjunctions in Sanskrit Processing", International Journal of Computer Science Issues, IJCSI, Volume 5, pp43-51, October 2009
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automated language processing is central to the drive to enable facilitated referencing of increasingly available Sanskrit E texts. The first step towards processing Sanskrit text involves the handling of Sanskrit compound words that are an integral part of Sanskrit texts. This firstly necessitates the processing of euphonic conjunctions or sandhis, which are points in words or between words, at which adjacent letters coalesce and transform. The ancient Sanskrit grammarian Panini's codification of the Sanskrit grammar is the accepted authority in the subject. His famed sutras or aphorisms, numbering approximately four thousand, tersely, precisely and comprehensively codify the rules of the grammar, including all the rules pertaining to sandhis. This work presents a fresh new approach to processing sandhis in terms of a computational schema. This new computational model is based on Panini's complex codification of the rules of grammar. The model has simple beginnings and is yet powerful, comprehensive and computationally lean.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 19:33:21 GMT" } ]
2009-11-05T00:00:00
[ [ "Rama", "N.", "" ], [ "Lakshmanan", "Meenakshi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0911.0900
Heidi Gebauer
Heidi Gebauer
Construction of a Non-2-colorable k-uniform Hypergraph with Few Edges
3 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show how to construct a non-2-colorable k-uniform hypergraph with (2^(1 + o(1)))^k edges. By the duality of hypergraphs and monotone k-CNF-formulas this gives an unsatisfiable monotone k-CNF with (2^(1 + o(1)))^k clauses
[ { "version": "v1", "created": "Wed, 4 Nov 2009 18:02:15 GMT" }, { "version": "v2", "created": "Thu, 5 Nov 2009 15:46:50 GMT" } ]
2009-11-05T00:00:00
[ [ "Gebauer", "Heidi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.0902
Vishal Goyal
A.Essaouabi, E.Ibnelhaj, F.Fegragui
Digital Image Watermarking for Arbitrarily Shaped Objects Based On SA-DWT
International Journal of Computer Science Issues, Volume 5, pp1-8, October 2009
A.Essaouabi, E.Ibnelhaj and F.regragui, "Digital Image Watermarking for Arbitrarily Shaped Objects Based On SA-DWT", International Journal of Computer Science Issues, Volume 5, pp1-8, October 2009
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many image watermarking schemes have been proposed in recent years, but they usually involve embedding a watermark to the entire image without considering only a particular object in the image, which the image owner may be interested in. This paper proposes a watermarking scheme that can embed a watermark to an arbitrarily shaped object in an image. Before embedding, the image owner specifies an object of arbitrary shape that is of a concern to him. Then the object is transformed into the wavelet domain using in place lifting shape adaptive DWT(SADWT) and a watermark is embedded by modifying the wavelet coefficients. In order to make the watermark robust and transparent, the watermark is embedded in the average of wavelet blocks using the visual model based on the human visual system. Wavelet coefficients n least significant bits (LSBs) are adjusted in concert with the average. Simulation results shows that the proposed watermarking scheme is perceptually invisible and robust against many attacks such as lossy compression (e.g.JPEG, JPEG2000), scaling, adding noise, filtering, etc.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 18:11:30 GMT" } ]
2009-11-05T00:00:00
[ [ "Essaouabi", "A.", "" ], [ "Ibnelhaj", "E.", "" ], [ "Fegragui", "F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0911.0905
Umer Salim
Umer Salim, David Gesbert and Dirk Slock
Combining Training and Quantized Feedback in Multi-Antenna Reciprocal Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The communication between a multiple-antenna transmitter and multiple receivers (users) with either a single or multiple-antenna each can be significantly enhanced by providing the channel state information at the transmitter (CSIT) of the users, as this allows for scheduling, beamforming and multiuser multiplexing gains. The traditional view on how to enable CSIT has been as follows so far: In time-division duplexed (TDD) systems, uplink (UL) and downlink (DL) channel reciprocity allows the use of a training sequence in the UL direction, which is exploited to obtain an UL channel estimate. This estimate is in turn recycled in the next downlink slot. In frequency-division duplexed (FDD) systems, which lack the UL and DL reciprocity, the CSIT is provided via the use of a dedicated feedback link of limited capacity between the receivers and the transmitter. In this paper, we focus on TDD systems and put this classical approach in question. In particular, we show that the traditional TDD setup above fails to fully exploit the channel reciprocity in its true sense. In fact, we show that the system can benefit from a combined CSIT acquisition strategy mixing the use of limited feedback and that of a training sequence. This combining gives rise to a very interesting joint estimation and detection problem for which we propose two iterative algorithms. An outage rate based framework is also developed which gives the optimal resource split between training and feedback. We demonstrate the potential of this hybrid combining in terms of the improved CSIT quality under a global training and feedback resource constraint.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 18:51:18 GMT" } ]
2009-11-05T00:00:00
[ [ "Salim", "Umer", "" ], [ "Gesbert", "David", "" ], [ "Slock", "Dirk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0907
Vishal Goyal
Kaustubh Bhattacharyya and Kandarpa Kumar Sarma
ANN-based Innovative Segmentation Method for Handwritten text in Assamese
International Journal of Computer Science Issues, Volume 5, pp9-16, October 2009
K. Bhattacharyya and K. K. Sarma, "ANN-based Innovative Segmentation Method for Handwritten text in Assamese", International Journal of Computer Science Issues, Volume 5, pp9-16, October 2009
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Artificial Neural Network (ANN) s has widely been used for recognition of optically scanned character, which partially emulates human thinking in the domain of the Artificial Intelligence. But prior to recognition, it is necessary to segment the character from the text to sentences, words etc. Segmentation of words into individual letters has been one of the major problems in handwriting recognition. Despite several successful works all over the work, development of such tools in specific languages is still an ongoing process especially in the Indian context. This work explores the application of ANN as an aid to segmentation of handwritten characters in Assamese- an important language in the North Eastern part of India. The work explores the performance difference obtained in applying an ANN-based dynamic segmentation algorithm compared to projection- based static segmentation. The algorithm involves, first training of an ANN with individual handwritten characters recorded from different individuals. Handwritten sentences are separated out from text using a static segmentation method. From the segmented line, individual characters are separated out by first over segmenting the entire line. Each of the segments thus obtained, next, is fed to the trained ANN. The point of segmentation at which the ANN recognizes a segment or a combination of several segments to be similar to a handwritten character, a segmentation boundary for the character is assumed to exist and segmentation performed. The segmented character is next compared to the best available match and the segmentation boundary confirmed.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 18:32:08 GMT" } ]
2009-11-05T00:00:00
[ [ "Bhattacharyya", "Kaustubh", "" ], [ "Sarma", "Kandarpa Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0911.0909
Vishal Goyal
Rafael Ponce-Medellin, Gabriel Gonzalez-Serna, Rocio Vargas and Lirio Ruiz
Technology Integration around the Geographic Information: A State of the Art
International Journal of Computer Science Issues, Volume 5, pp17-26, October 2009
R. Ponce-Medellin, G. Gonzalez-Serna, R. Vargas and L. Ruiz, "Technology Integration around the Geographic Information: A State of the Art", IJCSI, Volume 5, pp17-26, October 2009
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the elements that have popularized and facilitated the use of geographical information on a variety of computational applications has been the use of Web maps; this has opened new research challenges on different subjects, from locating places and people, the study of social behavior or the analyzing of the hidden structures of the terms used in a natural language query used for locating a place. However, the use of geographic information under technological features is not new, instead it has been part of a development and technological integration process. This paper presents a state of the art review about the application of geographic information under different approaches: its use on location based services, the collaborative user participation on it, its contextual-awareness, its use in the Semantic Web and the challenges of its use in natural languge queries. Finally, a prototype that integrates most of these areas is presented.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 18:47:54 GMT" } ]
2009-11-05T00:00:00
[ [ "Ponce-Medellin", "Rafael", "" ], [ "Gonzalez-Serna", "Gabriel", "" ], [ "Vargas", "Rocio", "" ], [ "Ruiz", "Lirio", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0911.0910
Vishal Goyal
Mandhapati P. Raju and Siddhartha Khaitan
Domain Decomposition Based High Performance Parallel Computing
International Journal of Computer Science Issues, IJCSI, Volume 5, pp27-32, October 2009
M. P. Raju and S. Khaitan, "Domain Decomposition Based High Performance Parallel Computing", International Journal of Computer Science Issues,IJCSI, Volume 5, pp27-32, October 2009
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The study deals with the parallelization of finite element based Navier-Stokes codes using domain decomposition and state-ofart sparse direct solvers. There has been significant improvement in the performance of sparse direct solvers. Parallel sparse direct solvers are not found to exhibit good scalability. Hence, the parallelization of sparse direct solvers is done using domain decomposition techniques. A highly efficient sparse direct solver PARDISO is used in this study. The scalability of both Newton and modified Newton algorithms are tested.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 18:56:03 GMT" } ]
2009-11-05T00:00:00
[ [ "Raju", "Mandhapati P.", "" ], [ "Khaitan", "Siddhartha", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0911.0912
Vishal Goyal
Ritu Sindhu, Abdul Wahid and G.N.Purohit
Multi-Agent System Interaction in Integrated SCM
International Journal of Computer Science Issues, IJCSI Volume 5, pp33-37, October 2009
R. Sindhu, A. W. and G.N.Purohit, "Multi-Agent System Interaction in Integrated SCM", International Journal of Computer Science Issues, IJCSI, Volume 5, pp33-37, October 2009
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coordination between organizations on strategic, tactical and operation levels leads to more effective and efficient supply chains. Supply chain management is increasing day by day in modern enterprises. The environment is becoming competitive and many enterprises will find it difficult to survive if they do not make their sourcing, production and distribution more efficient. Multi-agent supply chain management has recognized as an effective methodology for supply chain management. Multi-agent systems (MAS) offer new methods compared to conventional, centrally organized architectures in the scope of supply chain management (SCM). Since necessary data are not available within the whole supply chain, an integrated approach for production planning and control taking into account all the partners involved is not feasible. In this study we show how MAS architecture interacts in the integrated SCM architecture with the help of various intelligent agents to highlight the above problem.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 19:11:06 GMT" } ]
2009-11-05T00:00:00
[ [ "Sindhu", "Ritu", "" ], [ "Wahid", "Abdul", "" ], [ "Purohit", "G. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0911.0914
Vishal Goyal
Sumalatha Ramachandran, Sujaya Paulraj, Sharon Joseph and Vetriselvi Ramaraj
Enhanced Trustworthy and High-Quality Information Retrieval System for Web Search Engines
International Journal of Computer Science Issues, IJCSI Volume 5, pp38-42, October 2009
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The WWW is the most important source of information. But, there is no guarantee for information correctness and lots of conflicting information is retrieved by the search engines and the quality of provided information also varies from low quality to high quality. We provide enhanced trustworthiness in both specific (entity) and broad (content) queries in web searching. The filtering of trustworthiness is based on 5 factors: Provenance, Authority, Age, Popularity, and Related Links. The trustworthiness is calculated based on these 5 factors and it is stored thereby increasing the performance in retrieving trustworthy websites. The calculated trustworthiness is stored only for static websites. Quality is provided based on policies selected by the user. Quality based ranking of retrieved trusted information is provided using WIQA (Web Information Quality Assessment) Framework.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 19:22:44 GMT" }, { "version": "v2", "created": "Wed, 18 Nov 2009 02:42:47 GMT" } ]
2009-11-18T00:00:00
[ [ "Ramachandran", "Sumalatha", "" ], [ "Paulraj", "Sujaya", "" ], [ "Joseph", "Sharon", "" ], [ "Ramaraj", "Vetriselvi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0911.0916
Lahatra Rakotondrainibe
Lahatra Rakotondrainibe (IETR), Yvan Kokar (IETR), Gheorghe Zaharia (IETR), Gha\"is El Zein (IETR)
Toward a Gigabit Wireless Communications System
null
International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1,, No. 2, (2009) 7 pages
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the design and the realization of a hybrid wireless Gigabit Ethernet indoor communications system operating at 60 GHz. As the 60 GHz radio link operates only in a single-room configuration, an additional Radio over Fiber (RoF) link is used to ensure the communications within all the rooms of a residential environment. The system uses low complexity baseband processing modules. A byte synchronization technique is designed to provide a high value of the preamble detection probability and a very small value of the false detection probability. Conventional RS (255, 239) encoder and decoder are used for channel forward error correction (FEC). The FEC parameters are determined by the tradeoff between higher coding gain and hardware complexity. The results of bit error rate measurements at 875 Mbps are presented for various antennas configurations.
[ { "version": "v1", "created": "Wed, 4 Nov 2009 19:44:46 GMT" } ]
2009-11-05T00:00:00
[ [ "Rakotondrainibe", "Lahatra", "", "IETR" ], [ "Kokar", "Yvan", "", "IETR" ], [ "Zaharia", "Gheorghe", "", "IETR" ], [ "Zein", "Ghaïs El", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.0971
Hans J{\o}rgen Bang
H. J. Bang, D. Gesbert
Multicell Zero-Forcing and User Scheduling on the Downlink of a Linear Cell Array
15 pages, 3 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coordinated base station (BS) transmission has attracted much interest for its potential to increase the capacity of wireless networks. Yet at the same time, the achievable sum-rate with single-cell processing (SCP) scales optimally with the number of users under Rayleigh fading conditions. One may therefore ask if the value of BS coordination is limited in the many-user regime from a sum-rate perspective. With this in mind we consider multicell zero-forcing beamforming (ZFBF) on the downlink of a linear cell-array. We first identify the beamforming weights and the optimal scheduling policy under a per-base power constraint. We then compare the number of users m and n required per-cell to achieve the same mean SINR, after optimal scheduling, with SCP and ZFBF respectively. Specifically, we show that the ratio m/n grows logarithmically with n. Finally, we demonstrate that the gain in sum-rate between ZFBF and SCP is significant for all practical values of number of users.
[ { "version": "v1", "created": "Thu, 5 Nov 2009 20:29:23 GMT" }, { "version": "v2", "created": "Fri, 6 Nov 2009 09:38:39 GMT" } ]
2009-11-06T00:00:00
[ [ "Bang", "H. J.", "" ], [ "Gesbert", "D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.0978
Lahatra Rakotondrainibe
Lahatra Rakotondrainibe (IETR), Yvan Kokar (IETR), Gheorghe Zaharia (IETR), Gha\"is El Zein (IETR), Eric Tnaguy (IREENA), Li Hongwu (IREENA), Benoit Charbonier
Hybrid, Optical and Wireless Near-Gigabit Communications System
null
The Sixth International Symposium on Wireless Communication Systems 2009 (ISWCS'09), Italy Sienna : France (2009)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the study and the realization of a hybrid 60 GHz wireless communications system. As the 60 GHz radio link operates only in a single-room configuration, an additional Radio over Fibre (RoF) link is used to ensure the communications in all the rooms of a residential environment. A single carrier architecture is adopted. The system uses low complexity baseband processing modules. A byte/frame synchronization technique is designed to provide a high value of the preamble detection probability and a very small value of the false alarm probability. Conventional RS (255, 239) encoder and decoder are used to correct errors in the transmission channel. Results of Bit Error Rate (BER) measurements are presented for various antennas configurations.
[ { "version": "v1", "created": "Thu, 5 Nov 2009 05:44:25 GMT" } ]
2009-11-06T00:00:00
[ [ "Rakotondrainibe", "Lahatra", "", "IETR" ], [ "Kokar", "Yvan", "", "IETR" ], [ "Zaharia", "Gheorghe", "", "IETR" ], [ "Zein", "Ghaïs El", "", "IETR" ], [ "Tnaguy", "Eric", "", "IREENA" ], [ "Hongwu", "Li", "", "IREENA" ], [ "Charbonier", "Benoit", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.0996
Scott Aaronson
Scott Aaronson and Andris Ambainis
The Need for Structure in Quantum Speedups
31 pages; journal version; fixed several significant errors (which were indeed fixable); improved main result from a 9th-power to a 7th-power relation. Conference version in Proceedings of ICS (Innovations in Computer Science) 2011
null
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Is there a general theorem that tells us when we can hope for exponential speedups from quantum algorithms, and when we cannot? In this paper, we make two advances toward such a theorem, in the black-box model where most quantum algorithms operate. First, we show that for any problem that is invariant under permuting inputs and outputs (like the collision or the element distinctness problems), the quantum query complexity is at least the 7th root of the classical randomized query complexity. (An earlier version of this paper gave the 9th root.) This resolves a conjecture of Watrous from 2002. Second, inspired by recent work of O'Donnell et al. (2005) and Dinur et al. (2006), we conjecture that every bounded low-degree polynomial has a "highly influential" variable. Assuming this conjecture, we show that every T-query quantum algorithm can be simulated on most inputs by a poly(T)-query classical algorithm, and that one essentially cannot hope to prove P!=BQP relative to a random oracle.
[ { "version": "v1", "created": "Thu, 5 Nov 2009 09:10:42 GMT" }, { "version": "v2", "created": "Mon, 22 Oct 2012 22:07:31 GMT" }, { "version": "v3", "created": "Thu, 6 Feb 2014 20:13:48 GMT" } ]
2014-02-07T00:00:00
[ [ "Aaronson", "Scott", "" ], [ "Ambainis", "Andris", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.1004
Dimitri Hendriks
Joerg Endrullis, Dimitri Hendriks, and Jan Willem Klop
Let's Make a Difference!
null
null
null
null
cs.DM cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the behaviour of iterations of the difference operator delta on streams over {0,1}. In particular, we show that a stream sigma is eventually periodic if and only if the sequence of differences sigma, delta(sigma), delta(delta(sigma)), ..., the `delta-orbit' of sigma as we call it, is eventually periodic. Moreover, we generalise this result to operations delta_d that sum modulo 2 the elements of each consecutive block of length d+1 in a given 01-stream. Some experimentation with delta-orbits of well-known streams reveals a surprising connexion between the Sierpinski stream and the Mephisto Waltz.
[ { "version": "v1", "created": "Thu, 5 Nov 2009 10:32:34 GMT" } ]
2009-11-06T00:00:00
[ [ "Endrullis", "Joerg", "" ], [ "Hendriks", "Dimitri", "" ], [ "Klop", "Jan Willem", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.1009
Dimitri Hendriks
Joerg Endrullis, Clemens Grabmayer, Dimitri Hendriks and Jan Willem Klop
Unique Normal Forms in Infinitary Weakly Orthogonal Term Rewriting
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The theory of finite and infinitary term rewriting is extensively developed for orthogonal rewrite systems, but to a lesser degree for weakly orthogonal rewrite systems. In this note we present some contributions to the latter case of weak orthogonality, where critial pairs are admitted provided they are trivial. We start with a refinement of the by now classical Compression Lemma, as a tool for establishing infinitary confluence, and hence the property of unique infinitary normal forms, for the case of weakly orthogonal TRSs that do not contain collapsing rewrite rules. That this restriction of collapse-freeness is crucial, is shown in a elaboration of a simple TRS which is weakly orthogonal, but has two collapsing rules. It turns out that all the usual theory breaks down dramatically. We conclude with establishing a positive fact: the diamond property for infinitary developments for weakly orthogonal TRSs, by means of a detailed analysis initiated by van Oostrom for the finite case.
[ { "version": "v1", "created": "Thu, 5 Nov 2009 10:59:16 GMT" } ]
2009-11-06T00:00:00
[ [ "Endrullis", "Joerg", "" ], [ "Grabmayer", "Clemens", "" ], [ "Hendriks", "Dimitri", "" ], [ "Klop", "Jan Willem", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.1021
Dimitris Kalles
Dimitris Kalles, Ilias Fykouras
Examples as Interaction: On Humans Teaching a Computer to Play a Game
15 pages, 1 figure, 13 tables, submitted to a journal
null
null
null
cs.AI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper reviews an experiment in human-computer interaction, where interaction takes place when humans attempt to teach a computer to play a strategy board game. We show that while individually learned models can be shown to improve the playing performance of the computer, their straightforward composition results in diluting what was earlier learned. This observation suggests that interaction cannot be easily distributed when one hopes to harness multiple human experts to develop a quality computer player. This is related to similar approaches in robot task learning and to classic approaches to human learning and reinforces the need to develop tools that facilitate the mix of human-based tuition and computer self-learning.
[ { "version": "v1", "created": "Thu, 5 Nov 2009 12:58:46 GMT" } ]
2009-11-06T00:00:00
[ [ "Kalles", "Dimitris", "" ], [ "Fykouras", "Ilias", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0911.1036
Lahatra Rakotondrainibe
Lahatra Rakotondrainibe (IETR), Yvan Kokar (IETR), Gheorghe Zaharia (IETR), Gha\"is El Zein (IETR)
Syst\`eme de Communications Sans Fil Tr\`es Haut D\'ebit \`a 60 GHz
null
XXIIe Colloque Traitement du Signal et des Images (GRETSI '09), Dijon : France (2009)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the study and the realization at IETR of a high data rate 60 GHz wireless communications system. The system uses a simple single carrier architecture. The receiver architecture is based on a differential demodulation which minimizes the intersymbol interference (ISI) effect and a signal processing unit composed of a joint frame and byte synchronization block and a conventional RS (255, 239) decoder. The byte synchronization technique provides a high preamble detection probability and a very small value of the false detection probability. First measurement results show a good communication link quality in line of sight environments with directional antennas.
[ { "version": "v1", "created": "Thu, 5 Nov 2009 14:11:57 GMT" } ]
2009-11-06T00:00:00
[ [ "Rakotondrainibe", "Lahatra", "", "IETR" ], [ "Kokar", "Yvan", "", "IETR" ], [ "Zaharia", "Gheorghe", "", "IETR" ], [ "Zein", "Ghaïs El", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.1054
Adeel Razi
Adeel Razi, Daniel J. Ryan, Iain B. Collings, Jinhong Yuan
Sum Rates, Rate Allocation, and User Scheduling for Multi-User MIMO Vector Perturbation Precoding
27 pages with 6 figures and 2 tables. Accepted for publication in IEEE Trans. Wireless Commu
null
10.1109/TWC.2010.01.090649
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the multiuser multiple-input multiple-output (MIMO) broadcast channel. We consider the case where the multiple transmit antennas are used to deliver independent data streams to multiple users via vector perturbation. We derive expressions for the sum rate in terms of the average energy of the precoded vector, and use this to derive a high signal-to-noise ratio (SNR) closed-form upper bound, which we show to be tight via simulation. We also propose a modification to vector perturbation where different rates can be allocated to different users. We conclude that for vector perturbation precoding most of the sum rate gains can be achieved by reducing the rate allocation problem to the user selection problem. We then propose a low-complexity user selection algorithm that attempts to maximize the high-SNR sum rate upper bound. Simulations show that the algorithm outperforms other user selection algorithms of similar complexity.
[ { "version": "v1", "created": "Thu, 5 Nov 2009 15:20:32 GMT" } ]
2016-11-18T00:00:00
[ [ "Razi", "Adeel", "" ], [ "Ryan", "Daniel J.", "" ], [ "Collings", "Iain B.", "" ], [ "Yuan", "Jinhong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1072
Nicolas Bitouz\'e
Nicolas Bitouze, Alexandre Graell i Amat, Eirik Rosnes
Error Correcting Coding for a Non-symmetric Ternary Channel
Submitted to IEEE Transactions on Information Theory. Part of this work was presented at the Information Theory and Applications Workshop 2009
IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5715-5729, Nov. 2010
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ternary channels can be used to model the behavior of some memory devices, where information is stored in three different levels. In this paper, error correcting coding for a ternary channel where some of the error transitions are not allowed, is considered. The resulting channel is non-symmetric, therefore classical linear codes are not optimal for this channel. We define the maximum-likelihood (ML) decoding rule for ternary codes over this channel and show that it is complex to compute, since it depends on the channel error probability. A simpler alternative decoding rule which depends only on code properties, called $\da$-decoding, is then proposed. It is shown that $\da$-decoding and ML decoding are equivalent, i.e., $\da$-decoding is optimal, under certain conditions. Assuming $\da$-decoding, we characterize the error correcting capabilities of ternary codes over the non-symmetric ternary channel. We also derive an upper bound and a constructive lower bound on the size of codes, given the code length and the minimum distance. The results arising from the constructive lower bound are then compared, for short sizes, to optimal codes (in terms of code size) found by a clique-based search. It is shown that the proposed construction method gives good codes, and that in some cases the codes are optimal.
[ { "version": "v1", "created": "Thu, 5 Nov 2009 16:15:29 GMT" } ]
2011-05-31T00:00:00
[ [ "Bitouze", "Nicolas", "" ], [ "Amat", "Alexandre Graell i", "" ], [ "Rosnes", "Eirik", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1082
Yan Zhu
Yan Zhu and Dongning Guo
Ergodic Fading One-sided Interference Channels without State Information at Transmitters
Submitted to IEEE Transaction on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work studies the capacity region of a two-user ergodic interference channel with fading, where only one of the users is subject to interference from the other user, and the channel state information (CSI) is only available at the receivers. A layered erasure model with one-sided interference and with arbitrary fading statistics is studied first, whose capacity region is completely determined as a polygon. Each dominant rate pair can be regarded as the outcome of a trade-off between the rate gain of the interference-free user and the rate loss of the other user due to interference. Using insights from the layered erasure model, inner and outer bounds of the capacity region are provided for the one-sided fading Gaussian interference channels. In particular, the inner bound is achieved by artificially creating layers in the signaling of the interference-free user. The outer bound is developed by characterizing a similar trade-off as in the erasure model by taking a "layered" view using the incremental channel approach. Furthermore, the gap between the inner and outer bounds is no more than 12.772 bits per channel use per user, regardless of the signal-to-noise ratios and fading statistics.
[ { "version": "v1", "created": "Thu, 5 Nov 2009 17:26:32 GMT" } ]
2009-11-06T00:00:00
[ [ "Zhu", "Yan", "" ], [ "Guo", "Dongning", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1090
Georg B\"ocherer
Georg B\"ocherer and Valdemar Cardoso da Rocha Junior and Cecilio Pimentel
On the Capacity of Constrained Systems
6 pages, to be presented at SCC 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the first chapter of Shannon's "A Mathematical Theory of Communication," it is shown that the maximum entropy rate of an input process of a constrained system is limited by the combinatorial capacity of the system. Shannon considers systems where the constraints define regular languages and uses results from matrix theory in his derivations. In this work, the regularity constraint is dropped. Using generating functions, it is shown that the maximum entropy rate of an input process is upper-bounded by the combinatorial capacity in general. The presented results also allow for a new approach to systems with regular constraints. As an example, the results are applied to binary sequences that fulfill the (j,k) run-length constraint and by using the proposed framework, a simple formula for the combinatorial capacity is given and a maxentropic input process is defined.
[ { "version": "v1", "created": "Thu, 5 Nov 2009 18:13:26 GMT" }, { "version": "v2", "created": "Fri, 20 Nov 2009 13:28:45 GMT" } ]
2009-11-20T00:00:00
[ [ "Böcherer", "Georg", "" ], [ "Junior", "Valdemar Cardoso da Rocha", "" ], [ "Pimentel", "Cecilio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1112
Michael Nelson
Herbert Van de Sompel, Michael L. Nelson, Robert Sanderson, Lyudmila L. Balakireva, Scott Ainsworth, Harihar Shankar
Memento: Time Travel for the Web
14 pages, 5 figures
null
null
null
cs.IR cs.DL
http://creativecommons.org/licenses/by/3.0/
The Web is ephemeral. Many resources have representations that change over time, and many of those representations are lost forever. A lucky few manage to reappear as archived resources that carry their own URIs. For example, some content management systems maintain version pages that reflect a frozen prior state of their changing resources. Archives recurrently crawl the web to obtain the actual representation of resources, and subsequently make those available via special-purpose archived resources. In both cases, the archival copies have URIs that are protocol-wise disconnected from the URI of the resource of which they represent a prior state. Indeed, the lack of temporal capabilities in the most common Web protocol, HTTP, prevents getting to an archived resource on the basis of the URI of its original. This turns accessing archived resources into a significant discovery challenge for both human and software agents, which typically involves following a multitude of links from the original to the archival resource, or of searching archives for the original URI. This paper proposes the protocol-based Memento solution to address this problem, and describes a proof-of-concept experiment that includes major servers of archival content, including Wikipedia and the Internet Archive. The Memento solution is based on existing HTTP capabilities applied in a novel way to add the temporal dimension. The result is a framework in which archived resources can seamlessly be reached via the URI of their original: protocol-based time travel for the Web.
[ { "version": "v1", "created": "Thu, 5 Nov 2009 20:52:22 GMT" }, { "version": "v2", "created": "Fri, 6 Nov 2009 21:35:50 GMT" } ]
2009-11-06T00:00:00
[ [ "Van de Sompel", "Herbert", "" ], [ "Nelson", "Michael L.", "" ], [ "Sanderson", "Robert", "" ], [ "Balakireva", "Lyudmila L.", "" ], [ "Ainsworth", "Scott", "" ], [ "Shankar", "Harihar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0911.1166
Fei Wei
Fei Wei, Huazhong Yang
Waveform Transmission Method, a New Waveform-relaxation Based Algorithm to Solve Ordinary Differential Equations in Parallel
More info, see my web page http://weifei00.googlepages.com
null
null
null
math.NA cs.DC math.CA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Waveform Relaxation method (WR) is a beautiful algorithm to solve Ordinary Differential Equations (ODEs). However, because of its poor convergence capability, it was rarely used. In this paper, we propose a new distributed algorithm, named Waveform Transmission Method (WTM), by virtually inserting waveform transmission lines into the dynamical system to achieve distributed computing of extremely large ODEs. WTM has better convergence capability than the traditional WR algorithms.
[ { "version": "v1", "created": "Fri, 6 Nov 2009 02:55:33 GMT" }, { "version": "v2", "created": "Wed, 25 Nov 2009 09:34:03 GMT" }, { "version": "v3", "created": "Tue, 7 Sep 2010 23:46:41 GMT" } ]
2010-09-09T00:00:00
[ [ "Wei", "Fei", "" ], [ "Yang", "Huazhong", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" } ]
0911.1174
Aleksandrs Slivkins
Robert Kleinberg and Aleksandrs Slivkins
Sharp Dichotomies for Regret Minimization in Metric Spaces
Full version of a paper in ACM-SIAM SODA 2010
null
null
null
cs.DS cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Lipschitz multi-armed bandit (MAB) problem generalizes the classical multi-armed bandit problem by assuming one is given side information consisting of a priori upper bounds on the difference in expected payoff between certain pairs of strategies. Classical results of (Lai and Robbins 1985) and (Auer et al. 2002) imply a logarithmic regret bound for the Lipschitz MAB problem on finite metric spaces. Recent results on continuum-armed bandit problems and their generalizations imply lower bounds of $\sqrt{t}$, or stronger, for many infinite metric spaces such as the unit interval. Is this dichotomy universal? We prove that the answer is yes: for every metric space, the optimal regret of a Lipschitz MAB algorithm is either bounded above by any $f\in \omega(\log t)$, or bounded below by any $g\in o(\sqrt{t})$. Perhaps surprisingly, this dichotomy does not coincide with the distinction between finite and infinite metric spaces; instead it depends on whether the completion of the metric space is compact and countable. Our proof connects upper and lower bound techniques in online learning with classical topological notions such as perfect sets and the Cantor-Bendixson theorem. Among many other results, we show a similar dichotomy for the "full-feedback" (a.k.a., "best-expert") version.
[ { "version": "v1", "created": "Fri, 6 Nov 2009 03:52:56 GMT" } ]
2009-11-09T00:00:00
[ [ "Kleinberg", "Robert", "" ], [ "Slivkins", "Aleksandrs", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0911.1226
Gwendal Simon
Yaning Liu and Gwendal Simon
Large-Scale Time-Shifted Streaming Delivery
null
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An attractive new feature of connected TV systems consists in allowing users to access past portions of the TV channel. This feature, called time-shifted streaming, is now used by millions of TV viewers. We address in this paper the design of a large-scale delivery system for time-shifted streaming. We highlight the characteristics of time-shifted streaming that prevent known video delivery systems to be used. Then, we present two proposals that meet the demand for two radically different types of TV operator. First, the Peer-Assisted Catch-Up Streaming system, namely PACUS, aims at reducing the load on the server of a large TV broadcasters without losing the control of the TV delivery. Second, the turntable structure, is an overlay of nodes that allow an independent content delivery network or a small independent TV broadcaster to ensure that all past TV programs are stored and as available as possible. We show through extensive simulations that our objectives are reached, with a reduction of up to three quarters of the traffic for PACUS and a 100\% guaranteed availability for the turntable structure. We also compare our proposals to the main previous works in the area.
[ { "version": "v1", "created": "Fri, 6 Nov 2009 11:10:43 GMT" }, { "version": "v2", "created": "Wed, 9 Nov 2011 19:01:04 GMT" } ]
2011-11-10T00:00:00
[ [ "Liu", "Yaning", "" ], [ "Simon", "Gwendal", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0911.1240
Avishai Wool
Avishai Wool
Firewall Configuration Errors Revisited
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The first quantitative evaluation of the quality of corporate firewall configurations appeared in 2004, based on Check Point FireWall-1 rule-sets. In general that survey indicated that corporate firewalls were often enforcing poorly written rule-sets, containing many mistakes. The goal of this work is to revisit the first survey. The current study is much larger. Moreover, for the first time, the study includes configurations from two major vendors. The study also introduce a novel "Firewall Complexity" (FC) measure, that applies to both types of firewalls. The findings of the current study indeed validate the 2004 study's main observations: firewalls are (still) poorly configured, and a rule-set's complexity is (still) positively correlated with the number of detected risk items. Thus we can conclude that, for well-configured firewalls, ``small is (still) beautiful''. However, unlike the 2004 study, we see no significant indication that later software versions have fewer errors (for both vendors).
[ { "version": "v1", "created": "Fri, 6 Nov 2009 12:43:55 GMT" } ]
2009-11-09T00:00:00
[ [ "Wool", "Avishai", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.1275
Yuri Suhov
Mark Kelbert and Yuri Suhov
Continuity of mutual entropy in the large signal-to-noise ratio limit
This paper has been withdrawn since it has been already published, in: {\it Stochastic Analysis 2010.} Springer-Verlag: Berlin, 2010, pp. 281--299; arXiv:0911
null
null
null
cs.IT cs.IR math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article addresses the issue of the proof of the entropy power inequality (EPI), an important tool in the analysis of Gaussian channels of information transmission, proposed by Shannon. We analyse continuity properties of the mutual entropy of the input and output signals in an additive memoryless channel and discuss assumptions under which the entropy-power inequality holds true.
[ { "version": "v1", "created": "Fri, 6 Nov 2009 15:20:54 GMT" }, { "version": "v2", "created": "Mon, 21 Jun 2010 11:43:41 GMT" }, { "version": "v3", "created": "Tue, 2 Apr 2013 20:32:51 GMT" } ]
2013-04-04T00:00:00
[ [ "Kelbert", "Mark", "" ], [ "Suhov", "Yuri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0911.1288
Hugues Genevois
Caroline Cance, Hugues Genevois, Dani\`ele Dubois
What is instrumentality in new digital msuical devices ? A contribution from cognitive linguistics and psychology
11 pages
What is instrumentality in new digital musical devices ? A contribution from cognitive linguistics and psychology, Paris : France (2009)
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As far as music is concerned, instruments have always been part of a cultural ?landscape? (on technical, expressive and symbolic levels). The present contribution explores the changes brought about by the shift that occurred during the 20th century, from mechanical to digital instruments (also named ?virtual instruments?). First and foremost, a short recall of some historical steps of the technological developments that have renewed our relationship to sound, music, and instruments will be presented. Second, an analysis of different discourses and terminologies presently used in the domains of musicology and computer music will account for the evolution of the notion of instrumentality.
[ { "version": "v1", "created": "Fri, 6 Nov 2009 16:06:40 GMT" } ]
2009-11-09T00:00:00
[ [ "Cance", "Caroline", "" ], [ "Genevois", "Hugues", "" ], [ "Dubois", "Danièle", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0911.1298
Sudhir R. Ghorpade
Peter Beelen, Sudhir R. Ghorpade, and Tom Hoeholdt
Affine Grassmann Codes
Slightly Revised Version; 18 pages
IEEE Trans. Inform. Theory 56 (2010), no. 7, 3166-3176
10.1109/TIT.2010.2048470
null
cs.IT math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a new class of linear codes, called affine Grassmann codes. These can be viewed as a variant of generalized Reed-Muller codes and are closely related to Grassmann codes. We determine the length, dimension, and the minimum distance of any affine Grassmann code. Moreover, we show that affine Grassmann codes have a large automorphism group and determine the number of minimum weight codewords.
[ { "version": "v1", "created": "Fri, 6 Nov 2009 16:58:09 GMT" }, { "version": "v2", "created": "Fri, 11 Jun 2010 13:25:32 GMT" } ]
2010-06-22T00:00:00
[ [ "Beelen", "Peter", "" ], [ "Ghorpade", "Sudhir R.", "" ], [ "Hoeholdt", "Tom", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1305
Loet Leydesdorff
Ricardo Arencibia-Jorge, Loet Leydesdorff, Zaida Chinchilla-Rodriguez, Ronald Rousseau, Soren W. Paris
Retrieval of very large numbers of items in the Web of Science: an exercise to develop accurate search strategies
null
El Profesional de la Informacion 18(5) (2009) 555-559
null
null
cs.DL cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The current communication presents a simple exercise with the aim of solving a singular problem: the retrieval of extremely large amounts of items in the Web of Science interface. As it is known, Web of Science interface allows a user to obtain at most 100,000 items from a single query. But what about queries that achieve a result of more than 100,000 items? The exercise developed one possible way to achieve this objective. The case study is the retrieval of the entire scientific production from the United States in a specific year. Different sections of items were retrieved using the field Source of the database. Then, a simple Boolean statement was created with the aim of eliminating overlapping and to improve the accuracy of the search strategy. The importance of team work in the development of advanced search strategies was noted.
[ { "version": "v1", "created": "Fri, 6 Nov 2009 17:20:54 GMT" } ]
2009-11-09T00:00:00
[ [ "Arencibia-Jorge", "Ricardo", "" ], [ "Leydesdorff", "Loet", "" ], [ "Chinchilla-Rodriguez", "Zaida", "" ], [ "Rousseau", "Ronald", "" ], [ "Paris", "Soren W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.1308
Loet Leydesdorff
Diana Lucio-Arias, Loet Leydesdorff
The Dynamics of Exchanges and References among Scientific Texts, and the Autopoiesis of Discursive Knowledge
null
Journal of Informetrics 3(3) (2009) 261-271
null
null
cs.CY cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discursive knowledge emerges as codification in flows of communication. The flows of communication are constrained and enabled by networks of communications as their historical manifestations at each moment of time. New publications modify the existing networks by changing the distributions of attributes and relations in document sets, while the networks are self-referentially updated along trajectories. Codification operates reflexively: the network structures are reconstructed from the perspective of hindsight. Codification along different axes differentiates discursive knowledge into specialties. These intellectual control structures are constructed bottom-up, but feed top-down back upon the production of new knowledge. However, the forward dynamics of diffusion in the development of the communication networks along trajectories differs from the feedback mechanisms of control. Analysis of the development of scientific communication in terms of evolving scientific literatures provides us with a model which makes these evolutionary processes amenable to measurement.
[ { "version": "v1", "created": "Fri, 6 Nov 2009 17:34:48 GMT" } ]
2009-11-09T00:00:00
[ [ "Lucio-Arias", "Diana", "" ], [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.1318
Loet Leydesdorff
Leo Egghe, Loet Leydesdorff
The relation between Pearson's correlation coefficient r and Salton's cosine measure
null
Journal of the American Society for Information Science and Technology 60(5) (2009) 1027-1036
10.1016/j.eswa.2012.07.016
null
cs.IR stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The relation between Pearson's correlation coefficient and Salton's cosine measure is revealed based on the different possible values of the division of the L1-norm and the L2-norm of a vector. These different values yield a sheaf of increasingly straight lines which form together a cloud of points, being the investigated relation. The theoretical results are tested against the author co-citation relations among 24 informetricians for whom two matrices can be constructed, based on co-citations: the asymmetric occurrence matrix and the symmetric co-citation matrix. Both examples completely confirm the theoretical results. The results enable us to specify an algorithm which provides a threshold value for the cosine above which none of the corresponding Pearson correlations would be negative. Using this threshold value can be expected to optimize the visualization of the vector space.
[ { "version": "v1", "created": "Fri, 6 Nov 2009 18:09:07 GMT" } ]
2012-07-25T00:00:00
[ [ "Egghe", "Leo", "" ], [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" } ]
0911.1320
Loet Leydesdorff
Han Park, Loet Leydesdorff
Knowledge linkage structures in communication studies using citation analysis among communication journals
null
Scientometrics 81(1) (2009) 157-175
null
null
cs.DL cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This research analyzes a "who cites whom" matrix in terms of aggregated, journal-journal citations to determine the location of communication studies on the academic spectrum. Using the Journal of Communication as the seed journal, the 2006 data in the Journal Citation Reports are used to map communication studies. The results show that social and experimental psychology journals are the most frequently used sources of information in this field. In addition, several journals devoted to the use and effects of media and advertising are weakly integrated into the larger communication research community, whereas communication studies are dominated by American journals.
[ { "version": "v1", "created": "Fri, 6 Nov 2009 18:13:23 GMT" } ]
2009-11-09T00:00:00
[ [ "Park", "Han", "" ], [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.1340
Saugata Basu
Saugata Basu, Marie-Francoise Roy
Bounding the radii of balls meeting every connected component of semi-algebraic sets
11 pages
J. Symbolic Comput. 45 (12):1270-1279, 2010
null
null
cs.SC cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove explicit bounds on the radius of a ball centered at the origin which is guaranteed to contain all bounded connected components of a semi-algebraic set $S \subset \mathbbm{R}^k$ defined by a quantifier-free formula involving $s$ polynomials in $\mathbbm{Z}[X_1, ..., X_k]$ having degrees at most $d$, and whose coefficients have bitsizes at most $\tau$. Our bound is an explicit function of $s, d, k$ and $\tau$, and does not contain any undetermined constants. We also prove a similar bound on the radius of a ball guaranteed to intersect every connected component of $S$ (including the unbounded components). While asymptotic bounds of the form $2^{\tau d^{O (k)}}$ on these quantities were known before, some applications require bounds which are explicit and which hold for all values of $s, d, k$ and $\tau$. The bounds proved in this paper are of this nature.
[ { "version": "v1", "created": "Fri, 6 Nov 2009 19:53:54 GMT" } ]
2011-02-02T00:00:00
[ [ "Basu", "Saugata", "" ], [ "Roy", "Marie-Francoise", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0911.1346
Pushkar Tripathi
Gagan Goel, Pushkar Tripathi, Lei Wang
Optimal Approximation Algorithms for Multi-agent Combinatorial Problems with Discounted Price Functions
null
null
null
null
cs.MA cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Submodular functions are an important class of functions in combinatorial optimization which satisfy the natural properties of decreasing marginal costs. The study of these functions has led to strong structural properties with applications in many areas. Recently, there has been significant interest in extending the theory of algorithms for optimizing combinatorial problems (such as network design problem of spanning tree) over submodular functions. Unfortunately, the lower bounds under the general class of submodular functions are known to be very high for many of the classical problems. In this paper, we introduce and study an important subclass of submodular functions, which we call discounted price functions. These functions are succinctly representable and generalize linear cost functions. In this paper we study the following fundamental combinatorial optimization problems: Edge Cover, Spanning Tree, Perfect Matching and Shortest Path, and obtain tight upper and lower bounds for these problems. The main technical contribution of this paper is designing novel adaptive greedy algorithms for the above problems. These algorithms greedily build the solution whist rectifying mistakes made in the previous steps.
[ { "version": "v1", "created": "Fri, 6 Nov 2009 20:29:10 GMT" } ]
2009-11-13T00:00:00
[ [ "Goel", "Gagan", "" ], [ "Tripathi", "Pushkar", "" ], [ "Wang", "Lei", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.1368
Sina Jafarpour
Sina Jafarpour, Rebecca Willett, Maxim Raginsky, Robert Calderbank
Performance Bounds for Expander-based Compressed Sensing in the presence of Poisson Noise
Received the best student paper award in Asilomar 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides performance bounds for compressed sensing in the presence of Poisson noise using expander graphs. The Poisson noise model is appropriate for a variety of applications, including low-light imaging and digital streaming, where the signal-independent and/or bounded noise models used in the compressed sensing literature are no longer applicable. In this paper, we develop a novel sensing paradigm based on expander graphs and propose a MAP algorithm for recovering sparse or compressible signals from Poisson observations. The geometry of the expander graphs and the positivity of the corresponding sensing matrices play a crucial role in establishing the bounds on the signal reconstruction error of the proposed algorithm. The geometry of the expander graphs makes them provably superior to random dense sensing matrices, such as Gaussian or partial Fourier ensembles, for the Poisson noise model. We support our results with experimental demonstrations.
[ { "version": "v1", "created": "Fri, 6 Nov 2009 22:23:30 GMT" }, { "version": "v2", "created": "Tue, 10 Nov 2009 19:20:28 GMT" }, { "version": "v3", "created": "Wed, 25 Nov 2009 08:02:02 GMT" } ]
2009-11-25T00:00:00
[ [ "Jafarpour", "Sina", "" ], [ "Willett", "Rebecca", "" ], [ "Raginsky", "Maxim", "" ], [ "Calderbank", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]