id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0911.0183
|
Erdal Panayirci
|
Erdal Panayirci, Hakan Dogan, H. Vincent Poor
|
A Gibbs Sampling Based MAP Detection Algorithm for OFDM Over Rapidly
Varying Mobile Radio Channels
|
6 pages, 4 figures
| null | null | null |
cs.IT math.AC math.IT
|
http://creativecommons.org/licenses/publicdomain/
|
In orthogonal frequency-division multiplexing (OFDM) systems operating over
rapidly time-varying channels, the orthogonality between subcarriers is
destroyed leading to inter-carrier interference (ICI) and resulting in an
irreducible error floor. In this paper, a new and low-complexity maximum {\em a
posteriori} probability (MAP) detection algorithm is proposed for OFDM systems
operating over rapidly time-varying multipath channels. The detection algorithm
exploits the banded structure of the frequency-domain channel matrix whose
bandwidth is a parameter to be adjusted according to the speed of the mobile
terminal. Based on this assumption, the received signal vector is decomposed
into reduced dimensional sub-observations in such a way that all components of
the observation vector contributing to the symbol to be detected are included
in the decomposed observation model. The data symbols are then detected by the
MAP algorithm by means of a Markov chain Monte Carlo (MCMC) technique in an
optimal and computationally efficient way. Computational complexity
investigation as well as simulation results indicate that this algorithm has
significant performance and complexity advantages over existing suboptimal
detection and equalization algorithms proposed earlier in the literature.
|
[
{
"version": "v1",
"created": "Sun, 1 Nov 2009 18:25:31 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Panayirci",
"Erdal",
""
],
[
"Dogan",
"Hakan",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0201
|
Julia Kempe
|
Julia Kempe and Oded Regev
|
No Strong Parallel Repetition with Entangled and Non-signaling Provers
|
15 pages, 2 figures
| null | null | null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider one-round games between a classical verifier and two provers. One
of the main questions in this area is the \emph{parallel repetition question}:
If the game is played $\ell$ times in parallel, does the maximum winning
probability decay exponentially in $\ell$? In the classical setting, this
question was answered in the affirmative by Raz. More recently the question
arose whether the decay is of the form $(1-\Theta(\eps))^\ell$ where $1-\eps$
is the value of the game and $\ell$ is the number of repetitions. This question
is known as the \emph{strong parallel repetition question} and was motivated by
its connections to the unique games conjecture. It was resolved by Raz who
showed that strong parallel repetition does \emph{not} hold, even in the very
special case of games known as XOR games.
This opens the question whether strong parallel repetition holds in the case
when the provers share entanglement. Evidence for this is provided by the
behavior of XOR games, which have strong (in fact \emph{perfect}) parallel
repetition, and by the recently proved strong parallel repetition of linear
unique games. A similar question was open for games with so-called
non-signaling provers. Here the best known parallel repetition theorem is due
to Holenstein, and is of the form $(1-\Theta(\eps^2))^\ell$.
We show that strong parallel repetition holds neither with entangled provers
nor with non-signaling provers. In particular we obtain that Holenstein's bound
is tight. Along the way we also provide a tight characterization of the
asymptotic behavior of the entangled value under parallel repetition of unique
games in terms of a semidefinite program.
|
[
{
"version": "v1",
"created": "Sun, 1 Nov 2009 20:28:21 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Kempe",
"Julia",
""
],
[
"Regev",
"Oded",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.0225
|
Rdv Ijcsis
|
Dasika Ratna Deepthi, K. Eswaran
|
A Mirroring Theorem and its Application to a New Method of Unsupervised
Hierarchical Pattern Classification
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 016-025, October 2009, USA
| null |
ISSN 1947 5500
|
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we prove a crucial theorem called Mirroring Theorem which
affirms that given a collection of samples with enough information in it such
that it can be classified into classes and subclasses then (i) There exists a
mapping which classifies and subclassifies these samples (ii) There exists a
hierarchical classifier which can be constructed by using Mirroring Neural
Networks (MNNs) in combination with a clustering algorithm that can approximate
this mapping. Thus, the proof of the Mirroring theorem provides a theoretical
basis for the existence and a practical feasibility of constructing
hierarchical classifiers, given the maps. Our proposed Mirroring Theorem can
also be considered as an extension to Kolmogrovs theorem in providing a
realistic solution for unsupervised classification. The techniques we develop,
are general in nature and have led to the construction of learning machines
which are (i) tree like in structure, (ii) modular (iii) with each module
running on a common algorithm (tandem algorithm) and (iv) selfsupervised. We
have actually built the architecture, developed the tandem algorithm of such a
hierarchical classifier and demonstrated it on an example problem.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 19:53:01 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Deepthi",
"Dasika Ratna",
""
],
[
"Eswaran",
"K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0911.0231
|
Mohammad Karimadini
|
Mohammad Karimadini and Hai Lin
|
Synchronized Task Decomposition for Cooperative Multi-agent Systems
|
Submitted for publication, 2010
| null | null |
NUS-ACT-10-Ver.3-001
|
cs.MA cs.DC cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is an amazing fact that remarkably complex behaviors could emerge from a
large collection of very rudimentary dynamical agents through very simple local
interactions. However, it still remains elusive on how to design these local
interactions among agents so as to achieve certain desired collective
behaviors. This paper aims to tackle this challenge and proposes a
divide-and-conquer approach to guarantee specified global behaviors through
local coordination and control design for multi-agent systems. The basic idea
is to decompose the requested global specification into subtasks for each
individual agent. It should be noted that the decomposition is not arbitrary.
The global specification should be decomposed in such a way that the fulfilment
of these subtasks by each individual agent will imply the satisfaction of the
global specification as a team. First, it is shown by a counterexample that not
all specifications can be decomposed in this sense. Then, a natural follow-up
question is what the necessary and sufficient condition should be for the
proposed decomposability of a global specification. The main part of the paper
is set to answer this question. The case of two cooperative agents is
investigated first, and a necessary and sufficient condition is presented and
proven. Later on, the result is generalized to the case of arbitrary finite
number of agents, and a hierarchical algorithm is proposed, which is shown to
be a sufficient condition. Finally, a cooperative control scenario for a team
of three robots is developed to illustrate the task decomposition procedure.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 04:23:25 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Apr 2010 13:14:44 GMT"
},
{
"version": "v3",
"created": "Wed, 12 Jan 2011 02:58:06 GMT"
}
] | 2011-01-13T00:00:00 |
[
[
"Karimadini",
"Mohammad",
""
],
[
"Lin",
"Hai",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
}
] |
0911.0232
|
Bahman Gharesifard
|
Bahman Gharesifard and Jorge Cortes
|
Distributed strategies for generating weight-balanced and doubly
stochastic digraphs
| null | null | null | null |
math.OC cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Weight-balanced and doubly stochastic digraphs are two classes of digraphs
that play an essential role in a variety of cooperative control problems,
including formation control, distributed averaging, and optimization. We refer
to a digraph as doubly stochasticable (weight-balanceable) if it admits a
doubly stochastic (weight-balanced) adjacency matrix. This paper studies the
characterization of both classes of digraphs, and introduces distributed
algorithms to compute the appropriate set of weights in each case.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 04:24:59 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Nov 2009 19:41:50 GMT"
},
{
"version": "v3",
"created": "Fri, 16 Apr 2010 05:07:29 GMT"
},
{
"version": "v4",
"created": "Thu, 10 Mar 2011 04:04:11 GMT"
},
{
"version": "v5",
"created": "Fri, 15 Jul 2011 01:45:39 GMT"
},
{
"version": "v6",
"created": "Mon, 17 Oct 2011 21:33:34 GMT"
}
] | 2011-10-19T00:00:00 |
[
[
"Gharesifard",
"Bahman",
""
],
[
"Cortes",
"Jorge",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
}
] |
0911.0257
|
Alonso Silva Allende
|
Alonso Silva, Hamidou Tembine, Eitan Altman, Merouane Debbah
|
Spatial games and global optimization for mobile association problems
|
Part of this work has been presented at the 49th IEEE Conference on
Decision and Control 2010. This work has been submitted to IEEE Transactions
on Automatic Control
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The basic optimal transportation problem consists in finding the most
effective way of moving masses from one location to another, while minimizing
the transportation cost. Such concept has been found to be useful to understand
various mathematical, economical, and control theory phenomena, such as
Witsenhausen's counterexam-ple in stochastic control theory, principal-agent
problem in microeco- nomic theory, location and planning problems, etc. In this
work, we focus on mobile association problems: the determina-tion of the cells
corresponding to each base station, i.e., the locations at which intelligent
mobile terminals prefer to connect to a given base station rather than to
others. This work combines game theory and optimal transport theory to
characterize the solution based on fluid approximations. We characterize the
optimal solution from both the global network and the mobile user points of
view.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 08:54:56 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Jun 2011 11:33:23 GMT"
}
] | 2011-06-10T00:00:00 |
[
[
"Silva",
"Alonso",
""
],
[
"Tembine",
"Hamidou",
""
],
[
"Altman",
"Eitan",
""
],
[
"Debbah",
"Merouane",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0911.0285
|
Christine Michel
|
Christine Michel (LIESP, Ictt), Patrick Prevot (LIESP, Ictt)
|
Knowledge Management Concepts For Training By Project An observation of
the case of project management education
|
6p
|
International conference on Knowledge Management and information
sharing (KMIS 2009), Madeira : Portugal (2009)
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Project management education programmes are often proposed in higher
education to give students competences in project planning (Gantt's chart),
project organizing, human and technical resource management, quality control
and also social competences (collaboration, communication), emotional ones
(empathy, consideration of the other, humour, ethics), and organizational ones
(leadership, political vision, and so on). This training is often given
according a training-by-project type of learning with case studies. This
article presents one course characterized by a pedagogical organization based
upon Knowledge Management (KM) concepts: knowledge transfer and construction
throughout a learning circle and social interactions. The course is supported
by a rich and complex tutor organization. We have observed this course by using
another KM method inspired from KADS with various return of experience
formalized into cards and charts. Our intention is, according to the model of
Argyris and Sch\"on (Smith, 2001), to gain feedback information about local and
global processes and about actors' experience in order to improve the course.
This paper describes precisely the course (pedagogical method and tutor
activity) and the KM observation method permitting to identify problem to
solve. In our case, we observe problem of pedacogical coordination and skills
acquisition. We propose to design a metacognitive tool for tutors and students,
usable for improving knowledge construction and learning process organisation
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 10:52:28 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Michel",
"Christine",
"",
"LIESP, Ictt"
],
[
"Prevot",
"Patrick",
"",
"LIESP, Ictt"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0911.0310
|
Christine Michel
|
Christine Michel (LIESP), Elise Garrot-Lavou\'e (LIESP, SICOMOR)
|
Meshat: Monitoring and Experience Sharing Tool for Project-Based
Learning
|
8p
|
IADIS International Conference Cognition and Exploratory Learning
in Digital Age (CELDA 2009), Rome : Italy (2009)
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Our work aims at studying tools offered to learners and tutors involved in
face-to-face or blended project-based learning activities. To understand better
the needs and expectations of each actor, we are especially interested in the
specific case of project management training. The results of a course
observation show that the lack of monitoring and expertise transfer tools
involves important dysfunctions in the course organisation and therefore
dissatisfaction for tutors and students (in particular about the acquisition of
knowledge and expertise). So as to solve this problem, we propose a
personalised platform (according to the actor: project group, student or tutor)
which gives information to monitor activities and supports the acquisition and
transfer of expertise. This platform is meant for the complex educational
context of project-based learning. Indeed, as for the majority of project-based
learning activities, the articulation conceptualisation-experiment is an
important part of the process. The originality of our approach relies on also
supporting the articulation between action (experiment or conceptualisation)
and reflection. This approach so improves the acquisition of complex skills
(e.g. management, communication and collaboration), which requires a
behavioural evolution. We aim at making the students become able ?to learn to
learn' and evolve according to contexts. We facilitate their ability to have a
critical analysis of their actions according to the situations they encounter.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 13:31:40 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Michel",
"Christine",
"",
"LIESP"
],
[
"Garrot-Lavoué",
"Elise",
"",
"LIESP, SICOMOR"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0911.0344
|
Stefano Allesina
|
Stefano Allesina
|
Accelerating the pace of discovery by changing the peer review algorithm
|
9 pages 2 figures
| null | null | null |
cs.DL physics.soc-ph q-bio.OT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The number of scientific publications is constantly rising, increasing the
strain on the review process. The number of submissions is actually higher, as
each manuscript is often reviewed several times before publication. To face the
deluge of submissions, top journals reject a considerable fraction of
manuscripts without review, potentially declining manuscripts with merit. The
situation is frustrating for authors, reviewers and editors alike. Recently,
several editors wrote about the ``tragedy of the reviewer commons', advocating
for urgent corrections to the system. Almost every scientist has ideas on how
to improve the system, but it is very difficult, if not impossible, to perform
experiments to test which measures would be most effective. Surprisingly,
relatively few attempts have been made to model peer review. Here I implement a
simulation framework in which ideas on peer review can be quantitatively
tested. I incorporate authors, reviewers, manuscripts and journals into an
agent-based model and a peer review system emerges from their interactions. As
a proof-of-concept, I contrast an implementation of the current system, in
which authors decide the journal for their submissions, with a system in which
journals bid on manuscripts for publication. I show that, all other things
being equal, this latter system solves most of the problems currently
associated with the peer review process. Manuscripts' evaluation is faster,
authors publish more and in better journals, and reviewers' effort is optimally
utilized. However, more work is required from editors. This modeling framework
can be used to test other solutions for peer review, leading the way for an
improvement of how science is disseminated.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 18:49:04 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Allesina",
"Stefano",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.OT",
"description": "Work in quantitative biology that does not fit into the other q-bio classifications",
"span": "(Other Quantitative Biology)"
}
] |
0911.0351
|
Philippe Loubaton
|
Cedric Artigue, Philippe Loubaton
|
On the precoder design of flat fading MIMO systems equipped with MMSE
receivers: a large system approach
|
Submitted to IEEE Transactions on Information Theory
| null |
10.1109/TIT.2011.2145710
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is devoted to the design of precoders maximizing the ergodic
mutual information (EMI) of bi-correlated flat fading MIMO systems equiped with
MMSE receivers. The channel state information and the second order statistics
of the channel are assumed available at the receiver side and at the
transmitter side respectively. As the direct maximization of the EMI needs the
use of non attractive algorithms, it is proposed to optimize an approximation
of the EMI, introduced recently, obtained when the number of transmit and
receive antennas $t$ and $r$ converge to $\infty$ at the same rate. It is
established that the relative error between the actual EMI and its
approximation is a $O(\frac{1}{t^{2}})$ term. It is shown that the left
singular eigenvectors of the optimum precoder coincide with the eigenvectors of
the transmit covariance matrix, and its singular values are solution of a
certain maximization problem. Numerical experiments show that the mutual
information provided by this precoder is close from what is obtained by
maximizing the true EMI, but that the algorithm maximizing the approximation is
much less computationally intensive.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 16:32:25 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Artigue",
"Cedric",
""
],
[
"Loubaton",
"Philippe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0397
|
Rdv Ijcsis
|
Keehang Kwon, Hong Pyo Ha
|
Algorithm as Defining Dynamic Systems
|
3 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 026-028, October 2009, USA
| null |
ISSN 1947 5500
|
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a new view to algorithms, Algorithms as defining dynamic
systems. This view extends the traditional, deterministic view that an
algorithm is a step by step procedure with nondeterminism. As a dynamic system
can be designed by a set of its defining laws, it is also desirable to design
an algorithm by a (possibly nondeterministic) set of defining laws. This
observation requires some changes to algorithm development. We propose a two
step approach, the first step is to design an algorithm via a set of defining
laws of dynamic system. The second step is to translate these laws (written in
a natural language) into a formal language such as linear logic.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 20:01:19 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Kwon",
"Keehang",
""
],
[
"Ha",
"Hong Pyo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.0399
|
Rdv Ijcsis
|
A.Essaouabi and F. Regragui, E.Ibnelhaj
|
A Wavelet-Based Digital Watermarking for Video
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 029-033, October 2009, USA
| null |
ISSN 1947 5500
|
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel video watermarking system operating in the three dimensional wavelet
transform is here presented. Specifically the video sequence is partitioned
into spatio temporal units and the single shots are projected onto the 3D
wavelet domain. First a grayscale watermark image is decomposed into a series
of bitplanes that are preprocessed with a random location matrix. After that
the preprocessed bitplanes are adaptively spread spectrum and added in 3D
wavelet coefficients of the video shot. Our video watermarking algorithm is
robust against the attacks of frame dropping, averaging and swapping.
Furthermore, it allows blind retrieval of embedded watermark which does not
need the original video and the watermark is perceptually invisible. The
algorithm design, evaluation, and experimentation of the proposed scheme are
described in this paper.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 20:07:52 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Essaouabi",
"A.",
""
],
[
"Regragui",
"F.",
""
],
[
"Ibnelhaj",
"E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0911.0402
|
Rdv Ijcsis
|
Sudip Dogra, Ritwik Ray, Saustav Ghosh, Debharshi Bhattacharya, Subir
Kr. Sarkar
|
A Cost Effective RFID Based Customized DVD-ROM to Thwart Software Piracy
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 034-039, October 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Software piracy has been a very perilous adversary of the software based
industry, from the very beginning of the development of the latter into a
significant business. There has been no developed foolproof system that has
been developed to appropriately tackle this vile issue. We have in our scheme
tried to develop a way to embark upon this problem using a very recently
developed technology of RFID.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 20:15:14 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Dogra",
"Sudip",
""
],
[
"Ray",
"Ritwik",
""
],
[
"Ghosh",
"Saustav",
""
],
[
"Bhattacharya",
"Debharshi",
""
],
[
"Sarkar",
"Subir Kr.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.0405
|
Rdv Ijcsis
|
Sohail Safdar, Mohd. Fadzil B. Hassan, Muhammad Aasim Qureshi, Rehan
Akbar
|
Biologically Inspired Execution Framework for Vulnerable Workflow
Systems
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 047-051, October 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The main objective of the research is to introduce a biologically inspired
execution framework for workflow systems under threat due to some intrusion
attack. Usually vulnerable systems need to be stop and put into wait state,
hence to insure the data security and privacy while being recovered. This
research ensures the availability of services and data to the end user by
keeping the data security, privacy and integrity intact. To achieve the
specified goals, the behavior of chameleons and concept of hibernation has been
considered in combination. Hence the workflow systems become more robust using
biologically inspired methods and remain available to the business consumers
safely even in a vulnerable state.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 20:31:50 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Safdar",
"Sohail",
""
],
[
"Hassan",
"Mohd. Fadzil B.",
""
],
[
"Qureshi",
"Muhammad Aasim",
""
],
[
"Akbar",
"Rehan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.0428
|
Rebecca Deneckere
|
Rebecca Deneckere (CRI), Adrian Iacovelli (CRI), Elena Kornyshova
(CRI), Carine Souveyet (CRI)
|
From Method Fragments to Method Services
| null |
Exploring Modeling Methods for Systems Analysis and Design
(EMMSAD'08), Montpellier : France (2008)
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In Method Engineering (ME) science, the key issue is the consideration of
information system development methods as fragments. Numerous ME approaches
have produced several definitions of method parts. Different in nature, these
fragments have nevertheless some common disadvantages: lack of implementation
tools, insufficient standardization effort, and so on. On the whole, the
observed drawbacks are related to the shortage of usage orientation. We have
proceeded to an in-depth analysis of existing method fragments within a
comparison framework in order to identify their drawbacks. We suggest
overcoming them by an improvement of the ?method service? concept. In this
paper, the method service is defined through the service paradigm applied to a
specific method fragment ? chunk. A discussion on the possibility to develop a
unique representation of method fragment completes our contribution.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 21:08:05 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Deneckere",
"Rebecca",
"",
"CRI"
],
[
"Iacovelli",
"Adrian",
"",
"CRI"
],
[
"Kornyshova",
"Elena",
"",
"CRI"
],
[
"Souveyet",
"Carine",
"",
"CRI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0911.0430
|
Rebecca Deneckere
|
Rebecca Deneckere (CRI), Elena Kornyshova (CRI), Colette Rolland (CRI)
|
Enhancing the Guidance of the Intentional Model "MAP": Graph Theory
Application
|
9 pages
|
Research challenges in Information Systems, Fes : Morocco (2009)
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The MAP model was introduced in information system engineering in order to
model processes on a flexible way. The intentional level of this model helps an
engineer to execute a process with a strong relationship to the situation of
the project at hand. In the literature, attempts for having a practical use of
maps are not numerous. Our aim is to enhance the guidance mechanisms of the
process execution by reusing graph algorithms. After clarifying the existing
relationship between graphs and maps, we improve the MAP model by adding
qualitative criteria. We then offer a way to express maps with graphs and
propose to use Graph theory algorithms to offer an automatic guidance of the
map. We illustrate our proposal by an example and discuss its limitations.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 21:08:33 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Deneckere",
"Rebecca",
"",
"CRI"
],
[
"Kornyshova",
"Elena",
"",
"CRI"
],
[
"Rolland",
"Colette",
"",
"CRI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0911.0460
|
Lester Mackey
|
Joseph Sill, Gabor Takacs, Lester Mackey, David Lin
|
Feature-Weighted Linear Stacking
|
17 pages, 1 figure, 2 tables
| null | null | null |
cs.LG cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ensemble methods, such as stacking, are designed to boost predictive accuracy
by blending the predictions of multiple machine learning models. Recent work
has shown that the use of meta-features, additional inputs describing each
example in a dataset, can boost the performance of ensemble methods, but the
greatest reported gains have come from nonlinear procedures requiring
significant tuning and training time. Here, we present a linear technique,
Feature-Weighted Linear Stacking (FWLS), that incorporates meta-features for
improved accuracy while retaining the well-known virtues of linear regression
regarding speed, stability, and interpretability. FWLS combines model
predictions linearly using coefficients that are themselves linear functions of
meta-features. This technique was a key facet of the solution of the second
place team in the recently concluded Netflix Prize competition. Significant
increases in accuracy over standard linear stacking are demonstrated on the
Netflix Prize collaborative filtering dataset.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 08:17:05 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Nov 2009 08:55:28 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Sill",
"Joseph",
""
],
[
"Takacs",
"Gabor",
""
],
[
"Mackey",
"Lester",
""
],
[
"Lin",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0911.0462
|
Marvin Weinstein
|
Marvin Weinstein
|
Strange Bedfellows: Quantum Mechanics and Data Mining
|
11 pages, 7 figures, Invited Talk at Light Cone 2009
| null |
10.1016/j.nuclphysbps.2010.02.009
|
SLAC-PUB-13832
|
cs.LG physics.data-an quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Last year, in 2008, I gave a talk titled {\it Quantum Calisthenics}. This
year I am going to tell you about how the work I described then has spun off
into a most unlikely direction. What I am going to talk about is how one maps
the problem of finding clusters in a given data set into a problem in quantum
mechanics. I will then use the tricks I described to let quantum evolution lets
the clusters come together on their own.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 00:27:36 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Weinstein",
"Marvin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0911.0465
|
Konstantinos Pelechrinis
|
Theodoros Lappas, Konstantinos Pelechrinis, Michalis Faloutsos
|
A Simple Conceptual Generator for the Internet Graph
|
9 pages
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The evolution of the Internet during the last years, has lead to a dramatic
increase of the size of its graph at the Autonomous System (AS) level. Soon -
if not already - its size will make the latter impractical for use from the
research community, e.g. for protocol testing. Reproducing a smaller size,
snapshot of the AS graph is thus important. However, the first step towards
this direction is to obtain the ability to faithfully reproduce the full AS
topology. The objective of our work, is to create a generator able to
accurately emulate and reproduce the distinctive properties of the Internet
graph. Our approach is based on (a) the identification of the jellyfish-like
structure [1] of the Internet and (b) the consideration of the peer-to-peer and
customer-provider relations between ASs. We are the first to exploit the
distinctive structure of the Internet graph together with utilizing the
information provided by the AS relationships in order to create a tool with the
aforementioned capabilities. Comparing our generator with the existing ones in
the literature, the main difference is found on the fact that our tool does not
try to satisfy specific metrics, but tries to remain faithful to the conceptual
model of the Internet structure. In addition, our approach can lead to (i) the
identification of important attributes and patterns in the Internet AS
topology, as well as, (ii) the extraction of valuable information on the
various relationships between ASs and their effect on the formulation of the
Internet structure. We implement our graph generator and we evaluate it using
the largest and most recent available dataset for the AS topology. Our
evaluations, clearly show the ability of our tool to capture the structural
properties of the Internet topology at the AS level with high accuracy.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 00:38:01 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Lappas",
"Theodoros",
""
],
[
"Pelechrinis",
"Konstantinos",
""
],
[
"Faloutsos",
"Michalis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.0467
|
Tracey Ho
|
Tao Cui, Tracey Ho, Joerg Kliewer
|
On Secure Network Coding with Nonuniform or Restricted Wiretap Sets
|
24 pages, revision submitted to IEEE Transactions on Information
Theory
| null |
10.1109/TIT.2012.2216936
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The secrecy capacity of a network, for a given collection of permissible
wiretap sets, is the maximum rate of communication such that observing links in
any permissible wiretap set reveals no information about the message. This
paper considers secure network coding with nonuniform or restricted wiretap
sets, for example, networks with unequal link capacities where a wiretapper can
wiretap any subset of $k$ links, or networks where only a subset of links can
be wiretapped. Existing results show that for the case of uniform wiretap sets
(networks with equal capacity links/packets where any $k$ can be wiretapped),
the secrecy capacity is given by the cut-set bound, and can be achieved by
injecting $k$ random keys at the source which are decoded at the sink along
with the message. This is the case whether or not the communicating users have
information about the choice of wiretap set. In contrast, we show that for the
nonuniform case, the cut-set bound is not achievable in general when the
wiretap set is unknown, whereas it is achievable when the wiretap set is made
known. We give achievable strategies where random keys are canceled at
intermediate non-sink nodes, or injected at intermediate non-source nodes.
Finally, we show that determining the secrecy capacity is a NP-hard problem.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 01:21:39 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Oct 2011 18:39:15 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Cui",
"Tao",
""
],
[
"Ho",
"Tracey",
""
],
[
"Kliewer",
"Joerg",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0480
|
Rdv Ijcsis
|
Boseung Kim, Huibin Lim, Yongtae Shin
|
Routing Technique Based on Clustering for Data Duplication Prevention in
Wireless Sensor Network
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 061-065, October 2009, USA
| null |
ISSN 1947 5500
|
cs.NI cs.DC cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless Sensor Networks is important to nodes energy consumption for long
activity of sensor nodes because nodes that compose sensor network are small
size, and battery capacity is limited. For energy consumption decrease of
sensor nodes, sensor networks routing technique is divided by flat routing and
hierarchical routing technique. Specially, hierarchical routing technique is
energy efficient routing protocol to pare down energy consumption of whole
sensor nodes and to scatter energy consumption of sensor nodes by forming
cluster and communicating with cluster head. but though hierarchical routing
technique based on clustering is advantage more than flat routing technique,
this is not used for reason that is not realistic. The reason that is not
realistic is because hierarchical routing technique does not consider data
transmission radius of sensor node in actually. so this paper propose realistic
routing technique base on clustering.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 03:29:51 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Nov 2009 18:08:56 GMT"
}
] | 2009-11-26T00:00:00 |
[
[
"Kim",
"Boseung",
""
],
[
"Lim",
"Huibin",
""
],
[
"Shin",
"Yongtae",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0911.0481
|
Rdv Ijcsis
|
M.Krishnaveni, Suresh Kumar Thakur, P.Subashini
|
An Optimal Method For Wake Detection In SAR Images Using Radon
Transformation Combined With Wavelet Filters
|
4 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 066-069, October 2009, USA
| null |
ISSN 1947 5500
|
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new fangled method for ship wake detection in synthetic aperture radar
(SAR) images is explored here. Most of the detection procedure applies the
Radon transform as its properties outfit more than any other transformation for
the detection purpose. But still it holds problems when the transform is
applied to an image with a high level of noise. Here this paper articulates the
combination between the radon transformation and the shrinkage methods which
increase the mode of wake detection process. The latter shrinkage method with
RT maximize the signal to noise ratio hence it leads to most optimal detection
of lines in the SAR images. The originality mainly works on the denoising
segment of the proposed algorithm. Experimental work outs are carried over both
in simulated and real SAR images. The detection process is more adequate with
the proposed method and improves better than the conventional methods.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 03:37:03 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Krishnaveni",
"M.",
""
],
[
"Thakur",
"Suresh Kumar",
""
],
[
"Subashini",
"P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0911.0482
|
Rdv Ijcsis
|
Hyubgun Lee, Kyounghwa Lee, Yongtae Shin
|
AES Implementation and Performance Evaluation on 8-bit Microcontrollers
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 070-074, October 2009, USA
| null |
ISSN 1947 5500
|
cs.CR cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The sensor network is a network technique for the implementation of
Ubiquitous computing environment. It is wireless network environment that
consists of the many sensors of lightweight and low power. Though sensor
network provides various capabilities, it is unable to ensure the secure
authentication between nodes. Eventually it causes the losing reliability of
the entire network and many secure problems. Therefore, encryption algorithm
for the implementation of reliable sensor network environments is required to
the applicable sensor network. In this paper, we proposed the solution of
reliable sensor network to analyze the communication efficiency through
measuring performance of AES encryption algorithm by plaintext size, and cost
of operation per hop according to the network scale.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 03:41:32 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Nov 2009 18:11:06 GMT"
}
] | 2009-11-26T00:00:00 |
[
[
"Lee",
"Hyubgun",
""
],
[
"Lee",
"Kyounghwa",
""
],
[
"Shin",
"Yongtae",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0911.0484
|
Rdv Ijcsis
|
Francisco J. Rodriguez Perez, Jose Luis Gonzalez Sanchez, Alfonso Gazo
Cervero
|
GoS Proposal to Improve Trust and Delay of MPLS Flows for MCN Services
|
8 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 075-082, October 2009, USA
| null |
ISSN 1947 5500
|
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this article, Guarantee of Service (GoS) is defined as a proposal to
improve the integration of Mission Critical Networking (MCN) services in the
Internet, analyzing the congestion impact on those privileged flows with high
requirements of trust and delay. Multiprotocol Label Switching (MPLS) is a
technology that offers flow differentiation and QoS in the Internet. Therefore,
in order to improve network performance in case of congested domains, GoS is
proposed as a technique that allows the local recovering of lost packets of
MPLS privileged flows. To fulfill the GoS requirements for integration of MCN
in MPLS, a minimum set of extensions to RSVPTE has been proposed to provide GoS
capable routes. Moreover, we have carried out an analytical study of GoS
scalability and a performance improvement analysis by means of simulations.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 03:55:01 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Perez",
"Francisco J. Rodriguez",
""
],
[
"Sanchez",
"Jose Luis Gonzalez",
""
],
[
"Cervero",
"Alfonso Gazo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0911.0485
|
Rdv Ijcsis
|
Tich Phuoc Tran, Longbing Cao, Dat Tran, Cuong Duc Nguyen
|
Novel Intrusion Detection using Probabilistic Neural Network and
Adaptive Boosting
|
9 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 083-091, October 2009, USA
| null |
ISSN 1947 5500
|
cs.NE cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article applies Machine Learning techniques to solve Intrusion Detection
problems within computer networks. Due to complex and dynamic nature of
computer networks and hacking techniques, detecting malicious activities
remains a challenging task for security experts, that is, currently available
defense systems suffer from low detection capability and high number of false
alarms. To overcome such performance limitations, we propose a novel Machine
Learning algorithm, namely Boosted Subspace Probabilistic Neural Network
(BSPNN), which integrates an adaptive boosting technique and a semi parametric
neural network to obtain good tradeoff between accuracy and generality. As the
result, learning bias and generalization variance can be significantly
minimized. Substantial experiments on KDD 99 intrusion benchmark indicate that
our model outperforms other state of the art learning algorithms, with
significantly improved detection accuracy, minimal false alarms and relatively
small computational complexity.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 04:07:19 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Tran",
"Tich Phuoc",
""
],
[
"Cao",
"Longbing",
""
],
[
"Tran",
"Dat",
""
],
[
"Nguyen",
"Cuong Duc",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0911.0486
|
Rdv Ijcsis
|
Dang Tuan Nguyen, Ha Quy-Tinh Luong, Tuyen Thi-Thanh Do
|
Building a Vietnamese Language Query Processing Framework for ELibrary
Searching Systems
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 092-096, October 2009, USA
| null |
ISSN 1947 5500
|
cs.DL cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the objective of building intelligent searching systems for Elibraries or
online bookstores, we have proposed a searching system model based on a
Vietnamese language query processing component. Such document searching systems
based on this model can allow users to use Vietnamese queries that represent
content information as input, instead of entering keywords for searching in
specific fields in database. To simplify the realization process of system
based on this searching system model, we set a target of building a framework
to support the rapid development of Vietnamese language query processing
components. Such framework let the implementation of Vietnamese language query
processing component in similar systems in this domain to be done more easily.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 04:13:32 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Nguyen",
"Dang Tuan",
""
],
[
"Luong",
"Ha Quy-Tinh",
""
],
[
"Do",
"Tuyen Thi-Thanh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0911.0487
|
Rdv Ijcsis
|
Ahmed M. Manasrah, Awsan Hasan, Omar Amer Abouabdalla, Sureswaran
Ramadass
|
Detecting Botnet Activities Based on Abnormal DNS traffic
|
8 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 097-104, October 2009, USA
| null |
ISSN 1947 5500
|
cs.NI cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
IThe botnet is considered as a critical issue of the Internet due to its fast
growing mechanism and affect. Recently, Botnets have utilized the DNS and query
DNS server just like any legitimate hosts. In this case, it is difficult to
distinguish between the legitimate DNS traffic and illegitimate DNS traffic. It
is important to build a suitable solution for botnet detection in the DNS
traffic and consequently protect the network from the malicious Botnets
activities. In this paper, a simple mechanism is proposed to monitors the DNS
traffic and detects the abnormal DNS traffic issued by the botnet based on the
fact that botnets appear as a group of hosts periodically. The proposed
mechanism is also able to classify the DNS traffic requested by group of hosts
(group behavior) and single hosts (individual behavior), consequently detect
the abnormal domain name issued by the malicious Botnets. Finally, the
experimental results proved that the proposed mechanism is robust and able to
classify DNS traffic, and efficiently detects the botnet activity with average
detection rate of 89 percent.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 04:19:15 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Manasrah",
"Ahmed M.",
""
],
[
"Hasan",
"Awsan",
""
],
[
"Abouabdalla",
"Omar Amer",
""
],
[
"Ramadass",
"Sureswaran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.0488
|
Rdv Ijcsis
|
Behrouz Minaei, Parinaz Saadat
|
SOAP Serialization Performance Enhancement, Design And Implementation Of
A Middleware
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 105-110, October 2009, USA
| null |
ISSN 1947 5500
|
cs.SE cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The most straightforward way to improve performance of any system is to
define the bottlenecks and think of ways to remove them. Web services are the
inseparable part of any web application, as a result enhancing performance of
web services will have a great effect on the overall performance of the system.
The most widely used communication protocol in the web services model, SOAP, is
a simple protocol for the exchange of messages. The serialization of large SOAP
responses is a major performance bottleneck in a SOAP message exchange.
Clearly, some web servers can expect to receive many similar messages for a
particular web service as they share the same signature. The idea behind this
paper is to avoid the redundant serialization stage of SOAP responses for
request which have the same call parameters. The technique exploits the
similarities between call parameters to improve web service Response Time by
avoiding redundant serialization of the same response with the help of a
middleware running on top of web server. The middleware will maintain a trie of
incoming parameters for every set of current requests. This way request
processing and serialization of the response of same requests will be done only
once. In a nutshell, to serialize only the different responses is the simplest
way to avoid extra work done by a serializer. It might worth noting that
although our approach is to utilize the exact repeating portion parameters, the
middleware can be configured to apply changes made to the result set of
response to the serialized response being maintained in a trie to generate
valid results.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 04:28:27 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Minaei",
"Behrouz",
""
],
[
"Saadat",
"Parinaz",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0911.0490
|
Rdv Ijcsis
|
Y. Ireaneus Anna Rejani, S.Thamarai Selvi
|
Breast Cancer Detection Using Multilevel Thresholding
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 111-115, October 2009, USA
| null |
ISSN 1947 5500
|
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents an algorithm which aims to assist the radiologist in
identifying breast cancer at its earlier stages. It combines several image
processing techniques like image negative, thresholding and segmentation
techniques for detection of tumor in mammograms. The algorithm is verified by
using mammograms from Mammographic Image Analysis Society. The results obtained
by applying these techniques are described.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 04:33:55 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Rejani",
"Y. Ireaneus Anna",
""
],
[
"Selvi",
"S. Thamarai",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0911.0492
|
Lek-Heng Lim
|
Ming Gu, Lek-Heng Lim, Cinna Julie Wu
|
PARNES: A rapidly convergent algorithm for accurate recovery of sparse
and approximately sparse signals
|
22 pages, 1 figure
| null | null | null |
math.OC cs.SY math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this article, we propose an algorithm, NESTA-LASSO, for the LASSO problem,
i.e., an underdetermined linear least-squares problem with a 1-norm constraint
on the solution. We prove under the assumption of the restricted isometry
property (RIP) and a sparsity condition on the solution, that NESTA-LASSO is
guaranteed to be almost always locally linearly convergent. As in the case of
the algorithm NESTA proposed by Becker, Bobin, and Candes, we rely on
Nesterov's accelerated proximal gradient method, which takes O(e^{-1/2})
iterations to come within e > 0 of the optimal value. We introduce a
modification to Nesterov's method that regularly updates the prox-center in a
provably optimal manner, and the aforementioned linear convergence is in part
due to this modification.
In the second part of this article, we attempt to solve the basis pursuit
denoising BPDN problem (i.e., approximating the minimum 1-norm solution to an
underdetermined least squares problem) by using NESTA-LASSO in conjunction with
the Pareto root-finding method employed by van den Berg and Friedlander in
their SPGL1 solver. The resulting algorithm is called PARNES. We provide
numerical evidence to show that it is comparable to currently available
solvers.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 04:44:00 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Nov 2009 07:40:00 GMT"
},
{
"version": "v3",
"created": "Sat, 2 Jul 2011 09:19:39 GMT"
},
{
"version": "v4",
"created": "Sat, 31 Mar 2012 00:44:32 GMT"
}
] | 2012-04-03T00:00:00 |
[
[
"Gu",
"Ming",
""
],
[
"Lim",
"Lek-Heng",
""
],
[
"Wu",
"Cinna Julie",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
0911.0493
|
Rdv Ijcsis
|
Rajeswari Mukesh, A. Damodaram, V. Subbiah Bharathi
|
Energy Efficient Security Architecture for Wireless BioMedical Sensor
Networks
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 116-122, October 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Latest developments in VLSI, wireless communications, and biomedical sensing
devices allow very small, lightweight, low power, intelligent sensing devices
called biosensors. A set of these devices can be integrated into a Wireless
Biomedical Sensor Network (WBSN), a new breakthrough technology used in
telemedicine for monitoring the physiological condition of an individual. The
biosensor nodes in WBSN has got resource limitations in terms of battery
lifetime, CPU processing capability, and memory capacity. Replacement or
recharging of batteries on thousands of biosensor nodes is quiet difficult or
too costly. So, a key challenge in wireless biomedical sensor networks is the
reduction of energy and memory consumption. Considering, the sensitivity of
information in WBSN, we must provide security and patient privacy, as it is an
important issue in the design of such systems. Hence this paper proposes an
energy efficient security protocol for WBSN where security is provided to the
physiological data, which is being transmitted from the sensor node to the sink
device. This is achieved by authenticating the data using patients biometric,
encrypting the data using Quasi Group cryptography after compressing the image
data using an energy efficient number theory based technique.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 04:45:54 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Mukesh",
"Rajeswari",
""
],
[
"Damodaram",
"A.",
""
],
[
"Bharathi",
"V. Subbiah",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.0494
|
Rdv Ijcsis
|
C. Banerjee, S. K. Pandey
|
Software Security Rules, SDLC Perspective
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 123-128, October 2009, USA
| null |
ISSN 1947 5500
|
cs.SE cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Software has become an integral part of everyday life. Everyday, millions of
people perform transaction through internet, ATM, mobile phone, they send email
and Egreetings, and use word processing and spreadsheet for various purpose.
People use software bearing in mind that it is reliable and can be trust upon
and the operation they perform is secured. Now, if these software have
exploitable security hole then how can they be safe for use. Security brings
value to software in terms of peoples trust. The value provided by secure
software is of vital importance because many critical functions are entirely
dependent on the software. That is why security is a serious topic which should
be given proper attention during the entire SDLC, right from the beginning. For
the proper implementation of security in the software, twenty one security
rules are proposed in this paper along with validation results. It is found
that by applying these rules as per given implementation mechanism, most of the
vulnerabilities are eliminated in the software and a more secure software can
be built.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 04:49:37 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Banerjee",
"C.",
""
],
[
"Pandey",
"S. K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.0497
|
Rdv Ijcsis
|
Negin Razavi, Amir Masoud Rahmani, Mehran Mohsenzadeh
|
A Context-based Trust Management Model for Pervasive Computing Systems
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 137-142, October 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Trust plays an important role in making collaborative decisions about service
evaluation and service selection in pervasive computing. Context is a
fundamental concept in pervasive systems, which is based on the interpretation
of environment and systems. The dynamic nature of context can strongly affect
trust management and service selection. In this paper, we present a
context-based trust management model for pervasive computing systems. The
concept of context is considered in basic components of the model such as trust
computation module, recommender assessment module, transaction management
module, and request responder. In order to measure a predicted trustworthiness
according to the fuzzy nature of trust in pervasive environments, fuzzy
concepts are integrated in the proposed model.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 05:03:39 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Razavi",
"Negin",
""
],
[
"Rahmani",
"Amir Masoud",
""
],
[
"Mohsenzadeh",
"Mehran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.0498
|
Rdv Ijcsis
|
Safieh Siadat, Amir Masoud Rahmani, Mehran Mohsenzadeh
|
Proposed platform for improving grid security by trust management system
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 143-148, October 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With increasing the applications of grid system, the risk in security field
is enhancing too. Recently Trust management system has been recognized as a
noticeable approach in enhancing of security in grid systems. In this article
due to improve the grid security a new trust management system with two levels
is proposed. The benefits of this platform are adding new domain in grid
system, selecting one service provider which has closest adaption with user
requests and using from domains security attribute as an important factor in
computing the trust value.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 05:07:10 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Siadat",
"Safieh",
""
],
[
"Rahmani",
"Amir Masoud",
""
],
[
"Mohsenzadeh",
"Mehran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.0499
|
Rdv Ijcsis
|
Vani Perumal, Jagannathan Ramaswamy
|
An Innovative Scheme For Effectual Fingerprint Data Compression Using
Bezier Curve Representations
|
9 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 149-157, October 2009, USA
| null |
ISSN 1947 5500
|
cs.CV cs.CR cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Naturally, with the mounting application of biometric systems, there arises a
difficulty in storing and handling those acquired biometric data. Fingerprint
recognition has been recognized as one of the most mature and established
technique among all the biometrics systems. In recent times, with fingerprint
recognition receiving increasingly more attention the amount of fingerprints
collected has been constantly creating enormous problems in storage and
transmission. Henceforth, the compression of fingerprints has emerged as an
indispensable step in automated fingerprint recognition systems. Several
researchers have presented approaches for fingerprint image compression. In
this paper, we propose a novel and efficient scheme for fingerprint image
compression. The presented scheme utilizes the Bezier curve representations for
effective compression of fingerprint images. Initially, the ridges present in
the fingerprint image are extracted along with their coordinate values using
the approach presented. Subsequently, the control points are determined for all
the ridges by visualizing each ridge as a Bezier curve. The control points of
all the ridges determined are stored and are used to represent the fingerprint
image. When needed, the fingerprint image is reconstructed from the stored
control points using Bezier curves. The quality of the reconstructed
fingerprint is determined by a formal evaluation. The proposed scheme achieves
considerable memory reduction in storing the fingerprint.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 05:11:40 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Perumal",
"Vani",
""
],
[
"Ramaswamy",
"Jagannathan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0911.0501
|
Rdv Ijcsis
|
Al-Sammarraie Hosam, Adli Mustafa, Shakeel Ahmad, Merza Abbas
|
Exception Agent Detection System for IP Spoofing Over Online
Environments
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 158-164, October 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Over the recent years, IP and email spoofing gained much importance for
security concerns due to the current changes in manipulating the system
performance in different online environments. Intrusion Detection System (IDS)
has been used to secure these environments for sharing their data over network
and host based IDS approaches. However, the rapid growth of intrusion events
over Internet and local area network become responsible for the distribution of
different threats and vulnerabilities in the computing systems. The current
signature detection approach used by IDS, detects unclear actions based on
analyzing and describing the action patterns such as time, text, password etc
and has been faced difficulties in updating information, detect unknown novel
attacks, maintenance of an IDS which is necessarily connected with analyzing
and patching of security holes, and the lack of information on user privileges
and attack signature structure. Thus, this paper proposes an EADS (Exception
agent detection system) for securing the header information carried by IP over
online environments. The study mainly concerns with the deployment of new
technique for detecting and eliminating the unknown threats attacks during the
data sharing over online environments.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 05:17:30 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Hosam",
"Al-Sammarraie",
""
],
[
"Mustafa",
"Adli",
""
],
[
"Ahmad",
"Shakeel",
""
],
[
"Abbas",
"Merza",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.0503
|
Rdv Ijcsis
|
A. Rajaram, Dr. S. Palaniswami
|
A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks
|
8 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 165-172, October 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we develop a trust based security protocol based on a cross
layer approach which attains confidentiality and authentication of packets in
both routing and link layers of MANETs. In the first phase of the protocol, we
design a trust based packet forwarding scheme for detecting and isolating the
malicious nodes using the routing layer information. It uses trust values to
favor packet forwarding by maintaining a trust counter for each node. A node is
punished or rewarded by decreasing or increasing the trust counter. If the
trust counter value falls below a trust threshold, the corresponding
intermediate node is marked as malicious. In the next phase of the protocol, we
provide link layer security using the CBCX mode of authentication and
encryption. By simulation results, we show that the proposed cross layer
security protocol achieves high packet delivery ratio while attaining low delay
and overhead.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 05:21:47 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Rajaram",
"A.",
""
],
[
"Palaniswami",
"Dr. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.0505
|
Kirk D. Borne
|
Kirk Borne (1) ((1) George Mason University)
|
Scientific Data Mining in Astronomy
|
26 pages
|
Borne, K., in Next Generation of Data Mining (Taylor & Francis:
CRC Press), pp. 91-114 (2009)
| null | null |
astro-ph.IM cs.DB cs.IR physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe the application of data mining algorithms to research problems in
astronomy. We posit that data mining has always been fundamental to
astronomical research, since data mining is the basis of evidence-based
discovery, including classification, clustering, and novelty discovery. These
algorithms represent a major set of computational tools for discovery in large
databases, which will be increasingly essential in the era of data-intensive
astronomy. Historical examples of data mining in astronomy are reviewed,
followed by a discussion of one of the largest data-producing projects
anticipated for the coming decade: the Large Synoptic Survey Telescope (LSST).
To facilitate data-driven discoveries in astronomy, we envision a new
data-oriented research paradigm for astronomy and astrophysics --
astroinformatics. Astroinformatics is described as both a research approach and
an educational imperative for modern data-intensive astronomy. An important
application area for large time-domain sky surveys (such as LSST) is the rapid
identification, characterization, and classification of real-time sky events
(including moving objects, photometrically variable objects, and the appearance
of transients). We describe one possible implementation of a classification
broker for such events, which incorporates several astroinformatics techniques:
user annotation, semantic tagging, metadata markup, heterogeneous data
integration, and distributed data mining. Examples of these types of
collaborative classification and discovery approaches within other science
disciplines are presented.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 05:34:54 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Borne",
"Kirk",
"",
"George Mason University"
]
] |
[
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0911.0508
|
Ravindra Guravannavar
|
Ravindra Guravannavar
|
Optimization and Evaluation of Nested Queries and Procedures
|
Ph.D. thesis, 167 pages
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many database applications perform complex data retrieval and update tasks.
Nested queries, and queries that invoke user-defined functions, which are
written using a mix of procedural and SQL constructs, are often used in such
applications. A straight-forward evaluation of such queries involves repeated
execution of parameterized sub-queries or blocks containing queries and
procedural code.
An important problem that arises while optimizing nested queries as well as
queries with joins, aggregates and set operations is the problem of finding an
optimal sort order from a factorial number of possible sort orders. We show
that even a special case of this problem is NP-Hard, and present practical
heuristics that are effective and easy to incorporate in existing query
optimizers.
We also consider iterative execution of queries and updates inside complex
procedural blocks such as user-defined functions and stored procedures.
Parameter batching is an important means of improving performance as it enables
set-orientated processing. The key challenge to parameter batching lies in
rewriting a given procedure/function to process a batch of parameter values. We
propose a solution, based on program analysis and rewrite rules, to automate
the generation of batched forms of procedures and replace iterative database
calls within imperative loops with a single call to the batched form.
We present experimental results for the proposed techniques, and the results
show significant gains in performance.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 06:25:23 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Guravannavar",
"Ravindra",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0911.0519
|
Moshe Mishali
|
Moshe Mishali, Yonina C. Eldar and Asaf Elron
|
Xampling: Signal Acquisition and Processing in Union of Subspaces
|
16 pages, 9 figures, submitted to IEEE for possible publication
| null |
10.1109/TSP.2011.2161472
|
CCIT Report #747 Oct-09, EE Pub No. 1704, EE Dept., Technion -
Israel Institute of Technology (refers to v1)
|
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce Xampling, a unified framework for signal acquisition and
processing of signals in a union of subspaces. The main functions of this
framework are two. Analog compression that narrows down the input bandwidth
prior to sampling with commercial devices. A nonlinear algorithm then detects
the input subspace prior to conventional signal processing. A representative
union model of spectrally-sparse signals serves as a test-case to study these
Xampling functions. We adopt three metrics for the choice of analog
compression: robustness to model mismatch, required hardware accuracy and
software complexities. We conduct a comprehensive comparison between two
sub-Nyquist acquisition strategies for spectrally-sparse signals, the random
demodulator and the modulated wideband converter (MWC), in terms of these
metrics and draw operative conclusions regarding the choice of analog
compression. We then address lowrate signal processing and develop an algorithm
for that purpose that enables convenient signal processing at sub-Nyquist rates
from samples obtained by the MWC. We conclude by showing that a variety of
other sampling approaches for different union classes fit nicely into our
framework.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 09:06:03 GMT"
},
{
"version": "v2",
"created": "Sat, 25 Sep 2010 18:52:59 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Mar 2011 08:21:36 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Mishali",
"Moshe",
""
],
[
"Eldar",
"Yonina C.",
""
],
[
"Elron",
"Asaf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0542
|
Manar Mohaisen
|
Manar Mohaisen, HeeSeok Yoon, KyungHi Chang
|
Radio Transmission Performance of EPCglobal Gen-2 RFID System
|
6 6ages, 13 figures, 3 tables, International Conference on Advanced
Communication Technology 2008
|
ICACT, Korea, Phoenix Park, Feb. 2008, pp. 1423-1428
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we analyze the performance of the encoding and the modulation
processes in the downlink and uplink of the EPCglobal Gen2 system through the
analysis and simulation. Furthermore, the synchronization issues on time and
frequency domain and the preamble architecture are evaluated. Through the
simulation in the uplink, we find that the detection probability of FM0 and
Miller coding approaches 1 at 13dB Eb/N0.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 10:42:14 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Mohaisen",
"Manar",
""
],
[
"Yoon",
"HeeSeok",
""
],
[
"Chang",
"KyungHi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0911.0547
|
Haim Avron
|
Haim Avron, Gil Shklarski, Sivan Toledo
|
On Element SDD Approximability
|
6 pages
| null | null | null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This short communication shows that in some cases scalar elliptic finite
element matrices cannot be approximated well by an SDD matrix. We also give a
theoretical analysis of a simple heuristic method for approximating an element
by an SDD matrix.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 10:55:16 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Avron",
"Haim",
""
],
[
"Shklarski",
"Gil",
""
],
[
"Toledo",
"Sivan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0911.0577
|
Philip Bille
|
Philip Bille and Inge Li Goertz
|
Fast Arc-Annotated Subsequence Matching in Linear Space
|
To appear in Algoritmica
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An arc-annotated string is a string of characters, called bases, augmented
with a set of pairs, called arcs, each connecting two bases. Given
arc-annotated strings $P$ and $Q$ the arc-preserving subsequence problem is to
determine if $P$ can be obtained from $Q$ by deleting bases from $Q$. Whenever
a base is deleted any arc with an endpoint in that base is also deleted.
Arc-annotated strings where the arcs are ``nested'' are a natural model of RNA
molecules that captures both the primary and secondary structure of these. The
arc-preserving subsequence problem for nested arc-annotated strings is basic
primitive for investigating the function of RNA molecules. Gramm et al. [ACM
Trans. Algorithms 2006] gave an algorithm for this problem using $O(nm)$ time
and space, where $m$ and $n$ are the lengths of $P$ and $Q$, respectively. In
this paper we present a new algorithm using $O(nm)$ time and $O(n + m)$ space,
thereby matching the previous time bound while significantly reducing the space
from a quadratic term to linear. This is essential to process large RNA
molecules where the space is likely to be a bottleneck. To obtain our result we
introduce several novel ideas which may be of independent interest for related
problems on arc-annotated strings.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 13:35:41 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Sep 2010 19:16:42 GMT"
}
] | 2010-09-09T00:00:00 |
[
[
"Bille",
"Philip",
""
],
[
"Goertz",
"Inge Li",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.0626
|
Yifan Hu
|
Yifan Hu
|
Visualizing Graphs with Node and Edge Labels
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When drawing graphs whose edges and nodes contain text or graphics, such
informa tion needs to be displayed without overlaps, either as part of the
initial layout or as a post-processing step. The core problem in removing
overlaps lies in retaining the structural information inherent in a layout,
minimizing the additional area required, and keeping edges as straight as
possible. This paper presents a unified node and edge overlap removal algorithm
that does well at solving this problem.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 17:44:59 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Nov 2009 21:20:38 GMT"
}
] | 2016-09-08T00:00:00 |
[
[
"Hu",
"Yifan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.0630
|
Emmanuel Beffara
|
Emmanuel Beffara (IML)
|
Order algebras: a quantitative model of interaction
| null | null | null | null |
cs.LO cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A quantitative model of concurrent interaction is introduced. The basic
objects are linear combinations of partial order relations, acted upon by a
group of permutations that represents potential non-determinism in
synchronisation. This algebraic structure is shown to provide faithful
interpretations of finitary process algebras, for an extension of the standard
notion of testing semantics, leading to a model that is both denotational (in
the sense that the internal workings of processes are ignored) and
non-interleaving. Constructions on algebras and their subspaces enjoy a good
structure that make them (nearly) a model of differential linear logic, showing
that the underlying approach to the representation of non-determinism as linear
combinations is the same.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 17:48:28 GMT"
},
{
"version": "v2",
"created": "Mon, 31 May 2010 09:07:08 GMT"
},
{
"version": "v3",
"created": "Thu, 7 Jul 2011 14:46:42 GMT"
}
] | 2011-07-08T00:00:00 |
[
[
"Beffara",
"Emmanuel",
"",
"IML"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0911.0645
|
Ruriko Yoshida
|
Peter Huggins, Wenbin Li, David Haws, Thomas Friedrich, Jinze Liu,
Ruriko Yoshida
|
Bayes estimators for phylogenetic reconstruction
|
31 pages, 4 figures, and 3 tables
| null | null | null |
q-bio.PE cs.LG q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Tree reconstruction methods are often judged by their accuracy, measured by
how close they get to the true tree. Yet most reconstruction methods like ML do
not explicitly maximize this accuracy. To address this problem, we propose a
Bayesian solution. Given tree samples, we propose finding the tree estimate
which is closest on average to the samples. This ``median'' tree is known as
the Bayes estimator (BE). The BE literally maximizes posterior expected
accuracy, measured in terms of closeness (distance) to the true tree. We
discuss a unified framework of BE trees, focusing especially on tree distances
which are expressible as squared euclidean distances. Notable examples include
Robinson--Foulds distance, quartet distance, and squared path difference. Using
simulated data, we show Bayes estimators can be efficiently computed in
practice by hill climbing. We also show that Bayes estimators achieve higher
accuracy, compared to maximum likelihood and neighbor joining.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 18:43:43 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Nov 2009 00:09:42 GMT"
}
] | 2009-11-22T00:00:00 |
[
[
"Huggins",
"Peter",
""
],
[
"Li",
"Wenbin",
""
],
[
"Haws",
"David",
""
],
[
"Friedrich",
"Thomas",
""
],
[
"Liu",
"Jinze",
""
],
[
"Yoshida",
"Ruriko",
""
]
] |
[
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0911.0660
|
Ramy Gohary
|
Ramy H. Gohary and Timothy N. Davidson
|
The capacity region of a product of two unmatched Gaussian broadcast
channels with three particular messages and a common message
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers a Gaussian broadcast channel with two unmatched degraded
components, three particular messages, and a common message that is intended
for all three receivers. It is shown that for this channel superposition coding
and Gaussian signalling is sufficient to achieve every point in the capacity
region.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 19:39:07 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Gohary",
"Ramy H.",
""
],
[
"Davidson",
"Timothy N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0664
|
Aaron Potechin
|
Aaron Potechin
|
Bounds on monotone switching networks for directed connectivity
|
49 pages, 12 figures
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We separate monotone analogues of L and NL by proving that any monotone
switching network solving directed connectivity on $n$ vertices must have size
at least $n^(\Omega(\lg(n)))$.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 20:10:05 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Dec 2009 22:40:59 GMT"
},
{
"version": "v3",
"created": "Sat, 14 Aug 2010 06:07:27 GMT"
},
{
"version": "v4",
"created": "Sun, 27 Nov 2011 19:34:27 GMT"
},
{
"version": "v5",
"created": "Fri, 30 Nov 2012 15:01:57 GMT"
},
{
"version": "v6",
"created": "Sat, 30 Nov 2013 19:28:33 GMT"
},
{
"version": "v7",
"created": "Tue, 29 Nov 2016 21:05:30 GMT"
}
] | 2016-12-01T00:00:00 |
[
[
"Potechin",
"Aaron",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.0696
|
Leonid Gurvits
|
Leonid Gurvits
|
A proof of the log-concavity conjecture related to the computation of
the ergodic capacity of MIMO channels
|
6 pages, a proof of a conjecture posed in arXiv:0903.1952. We used
techniques, developed in arXiv:0711.3496
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An upper bound on the ergodic capacity of {\bf MIMO} channels was introduced
recently in arXiv:0903.1952. This upper bound amounts to the maximization on
the simplex of some multilinear polynomial $p(\lambda_1,...,\lambda_n)$ with
non-negative coefficients. Interestingly, the coefficients are subpermanents of
some non-negative matrix. In general, such maximizations problems are {\bf
NP-HARD}. But if say, the functional $\log(p)$ is concave on the simplex and
can be efficiently evaluated, then the maximization can also be done
efficiently. Such log-concavity was conjectured in arXiv:0903.1952. We give in
this paper self-contained proof of the conjecture, based on the theory of {\bf
H-Stable} polynomials.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 22:03:46 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Gurvits",
"Leonid",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0709
|
Hong Ju Park
|
Hong Ju Park, Boyu Li, and Ender Ayanoglu
|
Constellation Precoded Multiple Beamforming
|
submitted to journal
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Beamforming techniques that employ Singular Value Decomposition (SVD) are
commonly used in Multi-Input Multi-Output (MIMO) wireless communication
systems. In the absence of channel coding, when a single symbol is transmitted,
these systems achieve the full diversity order provided by the channel; whereas
when multiple symbols are simultaneously transmitted, this property is lost.
When channel coding is employed, full diversity order can be achieved. For
example, when Bit-Interleaved Coded Modulation (BICM) is combined with this
technique, full diversity order of NM in an MxN MIMO channel transmitting S
parallel streams is possible, provided a condition on S and the BICM
convolutional code rate is satisfied. In this paper, we present constellation
precoded multiple beamforming which can achieve the full diversity order both
with BICM-coded and uncoded SVD systems. We provide an analytical proof of this
property. To reduce the computational complexity of Maximum Likelihood (ML)
decoding in this system, we employ Sphere Decoding (SD). We report an SD
technique that reduces the computational complexity beyond commonly used
approaches to SD. This technique achieves several orders of magnitude reduction
in computational complexity not only with respect to conventional ML decoding
but also, with respect to conventional SD.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 23:23:53 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Park",
"Hong Ju",
""
],
[
"Li",
"Boyu",
""
],
[
"Ayanoglu",
"Ender",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0727
|
Manik Lal Das
|
Animesh Agarwal, Vaibhav Shrimali, Manik Lal Das
|
GSM Security Using Identity-based Cryptography
|
10 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Current security model in Global System for Mobile Communications (GSM)
predominantly use symmetric key cryptography. The rapid advancement of Internet
technology facilitates online trading, banking, downloading, emailing using
resource-constrained handheld devices such as personal digital assistants and
cell phones. However, these applications require more security than the present
GSM supports. Consequently, a careful design of GSM security using both
symmetric and asymmetric key cryptography would make GSM security more
adaptable in security intensive applications. This paper presents a secure and
efficient protocol for GSM security using identity based cryptography. The
salient features of the proposed protocol are (i) authenticated key exchange;
(ii) mutual authentication amongst communicating entities; and (iii) user
anonymity. The security analysis of the protocol shows its strength against
some known threats observed in conventional GSM security.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 04:18:44 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Agarwal",
"Animesh",
""
],
[
"Shrimali",
"Vaibhav",
""
],
[
"Das",
"Manik Lal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.0736
|
Mark Davenport
|
Mark A. Davenport, Jason N. Laska, Petros T. Boufounos, and Richard G.
Baraniuk
|
A simple proof that random matrices are democratic
| null | null | null |
Rice University Department of Electrical and Computer Engineering
Technical Report TREE0906
|
math.NA cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The recently introduced theory of compressive sensing (CS) enables the
reconstruction of sparse or compressible signals from a small set of
nonadaptive, linear measurements. If properly chosen, the number of
measurements can be significantly smaller than the ambient dimension of the
signal and yet preserve the significant signal information. Interestingly, it
can be shown that random measurement schemes provide a near-optimal encoding in
terms of the required number of measurements. In this report, we explore
another relatively unexplored, though often alluded to, advantage of using
random matrices to acquire CS measurements. Specifically, we show that random
matrices are democractic, meaning that each measurement carries roughly the
same amount of signal information. We demonstrate that by slightly increasing
the number of measurements, the system is robust to the loss of a small number
of arbitrary measurements. In addition, we draw connections to oversampling and
demonstrate stability from the loss of significantly more measurements.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 06:09:36 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Davenport",
"Mark A.",
""
],
[
"Laska",
"Jason N.",
""
],
[
"Boufounos",
"Petros T.",
""
],
[
"Baraniuk",
"Richard G.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0737
|
Shirin Jalali
|
Shirin Jalali and Tsachy Weissman
|
Multiple Description Coding of Discrete Ergodic Sources
|
6 pages, 3 figures, presented at 2009 Allerton Conference on
Communication, Control and Computing
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the problem of Multiple Description (MD) coding of discrete
ergodic processes. We introduce the notion of MD stationary coding, and
characterize its relationship to the conventional block MD coding. In
stationary coding, in addition to the two rate constraints normally considered
in the MD problem, we consider another rate constraint which reflects the
conditional entropy of the process generated by the third decoder given the
reconstructions of the two other decoders. The relationship that we establish
between stationary and block MD coding enables us to devise a universal
algorithm for MD coding of discrete ergodic sources, based on simulated
annealing ideas that were recently proven useful for the standard rate
distortion problem.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 06:04:58 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Jalali",
"Shirin",
""
],
[
"Weissman",
"Tsachy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0753
|
Pasquale De Meo
|
P. De Meo, G. Quattrone, G. Terracina, D. Ursino
|
An XML-based Multi-Agent System for Supporting Online Recruitment
Services
|
16 pages, 5 figures
|
IEEE Transactions on Systems, Man, and Cybernetics, Part A 37(4):
464-480 (2007)
| null | null |
cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we propose an XML-based multi-agent recommender system for
supporting online recruitment services. Our system is characterized by the
following features: {\em (i)} it handles user profiles for personalizing the
job search over the Internet; {\em (ii)} it is based on the Intelligent Agent
Technology; {\em (iii)} it uses XML for guaranteeing a light, versatile and
standard mechanism for information representation, storing and exchange. The
paper discusses the basic features of the proposed system, presents the results
of an experimental study we have carried out for evaluating its performance,
and makes a comparison between the proposed system and other e-recruitment
systems already presented in the past.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 09:19:37 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"De Meo",
"P.",
""
],
[
"Quattrone",
"G.",
""
],
[
"Terracina",
"G.",
""
],
[
"Ursino",
"D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0911.0781
|
Rdv Ijcsis
|
Kanak Saxena, D.S Rajpoot
|
A Way to Understand Various Patterns of Data Mining Techniques for
Selected Domains
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 186-191, October 2009, USA
| null |
ISSN 1947 5500
|
cs.DB cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This has much in common with traditional work in statistics and machine
learning. However, there are important new issues which arise because of the
sheer size of the data. One of the important problem in data mining is the
Classification-rule learning which involves finding rules that partition given
data into predefined classes. In the data mining domain where millions of
records and a large number of attributes are involved, the execution time of
existing algorithms can become prohibitive, particularly in interactive
applications.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 11:19:55 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Saxena",
"Kanak",
""
],
[
"Rajpoot",
"D. S",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0911.0785
|
Rdv Ijcsis
|
M. Irfan, M.M. Tahir N. Baig, Furqan H. Khan, Raheel M. Hashmi,
Khurram Shehzad, Assad Ali
|
Management of Location Based Advertisement Services using Spatial
Triggers in Cellular Networks
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 181-185, October 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper discusses the advent of new technologies which have emerged under
the area of Location Based Services (LBS). An innovative implementation and
approach has been presented for design of applications which are inventive and
attractive towards the user. Spatial Trigger is one of the most promising
additions to the LBS technologies. This paper describes ways in which mobile
advertisement services can be introduced effectively in the cellular market by
bringing innovation in them through effective usage of Spatial Triggers. Hence,
opening new horizons to make the consumer cellular networks, commercially, more
effective and informative.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 11:25:06 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Irfan",
"M.",
""
],
[
"Baig",
"M. M. Tahir N.",
""
],
[
"Khan",
"Furqan H.",
""
],
[
"Hashmi",
"Raheel M.",
""
],
[
"Shehzad",
"Khurram",
""
],
[
"Ali",
"Assad",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.0787
|
Rdv Ijcsis
|
Shailendra Singh, Sanjay Silakari
|
Generalized Discriminant Analysis algorithm for feature reduction in
Cyber Attack Detection System
|
8 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 173-180, October 2009, USA
| null |
ISSN 1947 5500
|
cs.CR cs.CV cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This Generalized Discriminant Analysis (GDA) has provided an extremely
powerful approach to extracting non linear features. The network traffic data
provided for the design of intrusion detection system always are large with
ineffective information, thus we need to remove the worthless information from
the original high dimensional database. To improve the generalization ability,
we usually generate a small set of features from the original input variables
by feature extraction. The conventional Linear Discriminant Analysis (LDA)
feature reduction technique has its limitations. It is not suitable for non
linear dataset. Thus we propose an efficient algorithm based on the Generalized
Discriminant Analysis (GDA) feature reduction technique which is novel approach
used in the area of cyber attack detection. This not only reduces the number of
the input features but also increases the classification accuracy and reduces
the training and testing time of the classifiers by selecting most
discriminating features. We use Artificial Neural Network (ANN) and C4.5
classifiers to compare the performance of the proposed technique. The result
indicates the superiority of algorithm.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 11:29:57 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Singh",
"Shailendra",
""
],
[
"Silakari",
"Sanjay",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0911.0790
|
Nizami Gasilov
|
Nizami Gasilov, Afet Golayo\u{g}lu Fatullayev and \c{S}ahin Emrah
Amrahov
|
Solution of Non-Square Fuzzy Linear Systems
|
15 pages, 3 figure
| null | null | null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a linear system of equations with crisp coefficients and fuzzy
right-hand sides is investigated. All possible cases pertaining to the number
of variables, n, and the number of equations, m, are dealt with. A solution is
sought not as a fuzzy vector, as usual, but as a fuzzy set of vectors. Each
vector in the solution set solves the given fuzzy linear system with a certain
possibility. Assuming that the coefficient matrix is a full rank matrix, three
cases are considered: For m = n (square system), the solution set is shown to
be a parallelepiped in coordinate space and is expressed by an explicit
formula. For m > n (overdetermined system), the solution set is proved to be a
convex polyhedron and a novel geometric method is proposed to compute it. For m
< n (underdetermined system), by determining the contribution of free
variables, general solution is computed. From the results of three cases
mentioned above, a method is proposed to handle the general case, in which the
coefficient matrix is not necessarily a full rank matrix. Comprehensive
examples are provided and investigated in depth to illustrate each case and
suggested method.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 11:44:39 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jul 2011 10:04:45 GMT"
}
] | 2011-07-12T00:00:00 |
[
[
"Gasilov",
"Nizami",
""
],
[
"Fatullayev",
"Afet Golayoğlu",
""
],
[
"Amrahov",
"Şahin Emrah",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0911.0801
|
D\'aniel Marx
|
D\'aniel Marx
|
Tractable hypergraph properties for constraint satisfaction and
conjunctive queries
|
Extended abstract appeared in STOC 2010
| null | null | null |
cs.DS cs.CC cs.DB cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An important question in the study of constraint satisfaction problems (CSP)
is understanding how the graph or hypergraph describing the incidence structure
of the constraints influences the complexity of the problem. For binary CSP
instances (i.e., where each constraint involves only two variables), the
situation is well understood: the complexity of the problem essentially depends
on the treewidth of the graph of the constraints. However, this is not the
correct answer if constraints with unbounded number of variables are allowed,
and in particular, for CSP instances arising from query evaluation problems in
database theory. Formally, if H is a class of hypergraphs, then let CSP(H) be
CSP restricted to instances whose hypergraph is in H. Our goal is to
characterize those classes of hypergraphs for which CSP(H) is polynomial-time
solvable or fixed-parameter tractable, parameterized by the number of
variables. Note that in the applications related to database query evaluation,
we usually assume that the number of variables is much smaller than the size of
the instance, thus parameterization by the number of variables is a meaningful
question. The most general known property of H that makes CSP(H)
polynomial-time solvable is bounded fractional hypertree width. Here we
introduce a new hypergraph measure called submodular width, and show that
bounded submodular width of H implies that CSP(H) is fixed-parameter tractable.
In a matching hardness result, we show that if H has unbounded submodular
width, then CSP(H) is not fixed-parameter tractable, unless the Exponential
Time Hypothesis fails.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 14:07:38 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jun 2010 09:35:29 GMT"
},
{
"version": "v3",
"created": "Tue, 6 Dec 2011 15:12:49 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Marx",
"Dániel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.0820
|
Marw Ali Ms
|
Ahmed Ahmedin, Marwa Ali, Ahmed Sultan and Mohammed Nafie
|
Power and Transmission Duration Control for Un-Slotted Cognitive Radio
Networks
|
submitted to DySPAN 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider an unslotted primary channel with alternating on/off activity and
provide a solution to the problem of finding the optimal secondary transmission
power and duration given some sensing outcome. The goal is to maximize a
weighted sum of the primary and secondary throughput where the weight is
determined by the minimum rate required by the primary terminals. The primary
transmitter sends at a fixed power and a fixed rate. Its on/off durations
follow an exponential distribution. Two sensing schemes are considered: perfect
sensing in which the actual state of the primary channel is revealed, and soft
sensing in which the secondary transmission power and time are determined based
on the sensing metric directly. We use an upperbound for the secondary
throughput assuming that the secondary receiver tracks the instantaneous
secondary channel state information. The objective function is non-convex and,
hence, the optimal solution is obtained via exhaustive search. Our results show
that an increase in the overall weighted throughput can be obtained by allowing
the secondary to transmit even when the channel is found to be busy. For the
examined system parameter values, the throughput gain from soft sensing is
marginal. Further investigation is needed for assessing the potential of soft
sensing.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 13:23:40 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Nov 2009 08:46:18 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Ahmedin",
"Ahmed",
""
],
[
"Ali",
"Marwa",
""
],
[
"Sultan",
"Ahmed",
""
],
[
"Nafie",
"Mohammed",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0838
|
Stephane Martin
|
St\'ephane Martin (LIF), Denis Lugiez (LIF)
|
Research report : Collaborative Peer 2 Peer Edition: Avoiding Conflicts
is Better than Solving Conflicts
|
12 pages
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Collaborative edition is achieved by distinct sites that work independently
on (a copy of) a shared document. Conflicts may arise during this process and
must be solved by the collaborative editor. In pure Peer to Peer collaborative
editing, no centralization nor locks nor time-stamps are used which make
conflict resolution difficult. We propose an algorithm which relies on the
notion or semantics dependence and avoids the need of any integration
transformation to solve conflicts. Furthermore, it doesn't use any history file
recording operations performed since starting the edition process. We show how
to define editing operations for semi-structured documents i.e. XML-like trees,
that are enriched with informations derived for free from the editing process.
Then we define the semantics dependence relation required by the algorithm and
we present preliminary results obtained by a prototype implementation.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 19:45:55 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Jan 2010 14:32:53 GMT"
}
] | 2010-01-04T00:00:00 |
[
[
"Martin",
"Stéphane",
"",
"LIF"
],
[
"Lugiez",
"Denis",
"",
"LIF"
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0911.0844
|
Qiyu Sun
|
M. Zuhair Nashed and Qiyu Sun
|
Sampling and Reconstruction of Signals in a Reproducing Kernel Subspace
of $L^p({\Bbb R}^d)$
| null |
Journal of Functional Analysis Volume 258, Issue 7, 1 April 2010,
Pages 2422-2452
|
10.1016/j.jfa.2009.12.012
| null |
cs.IT math.FA math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider sampling and reconstruction of signals in a
reproducing kernel subspace of $L^p(\Rd), 1\le p\le \infty$, associated with an
idempotent integral operator whose kernel has certain off-diagonal decay and
regularity. The space of $p$-integrable non-uniform splines and the
shift-invariant spaces generated by finitely many localized functions are our
model examples of such reproducing kernel subspaces of $L^p(\Rd)$. We show that
a signal in such reproducing kernel subspaces can be reconstructed in a stable
way from its samples taken on a relatively-separated set with sufficiently
small gap. We also study the exponential convergence, consistency, and the
asymptotic pointwise error estimate of the iterative approximation-projection
algorithm and the iterative frame algorithm for reconstructing a signal in
those reproducing kernel spaces from its samples with sufficiently small gap.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 14:59:35 GMT"
}
] | 2010-08-26T00:00:00 |
[
[
"Nashed",
"M. Zuhair",
""
],
[
"Sun",
"Qiyu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0874
|
Paul Cuff
|
Paul Cuff (Princeton University)
|
State Information in Bayesian Games
|
Presented at Allerton 2009, 6 pages, 5 eps figures, uses IEEEtran.cls
| null | null | null |
cs.IT cs.CR cs.GT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Two-player zero-sum repeated games are well understood. Computing the value
of such a game is straightforward. Additionally, if the payoffs are dependent
on a random state of the game known to one, both, or neither of the players,
the resulting value of the game has been analyzed under the framework of
Bayesian games. This investigation considers the optimal performance in a game
when a helper is transmitting state information to one of the players.
Encoding information for an adversarial setting (game) requires a different
result than rate-distortion theory provides. Game theory has accentuated the
importance of randomization (mixed strategy), which does not find a significant
role in most communication modems and source coding codecs. Higher rates of
communication, used in the right way, allow the message to include the
necessary random component useful in games.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 16:46:13 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Cuff",
"Paul",
"",
"Princeton University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0878
|
Pablo Fierens
|
S. A. Ib\'a\~nez, P. I. Fierens, G. A. Patterson, R. P. J. Perazzo and
D. F. Grosz
|
One-bit stochastic resonance storage device
|
12 pages, 7 figures
| null | null | null |
nlin.AO cond-mat.other cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The increasing capacity of modern computers, driven by Moore's Law, is
accompanied by smaller noise margins and higher error rates. In this paper we
propose a memory device, consisting of a ring of two identical overdamped
bistable forward-coupled oscillators, which may serve as a building block in a
larger scale solution to this problem. We show that such a system is capable of
storing one bit and its performance improves with the addition of noise. The
proposed device can be regarded as asynchronous, in the sense that stored
information can be retrieved at any time and, after a certain synchronization
time, the probability of erroneous retrieval does not depend on the
interrogated oscillator. We characterize memory persistence time and show it to
be maximized for the same noise range that both minimizes the probability of
error and ensures synchronization. We also present experimental results for a
hard-wired version of the proposed memory, consisting of a loop of two Schmitt
triggers. We show that this device is capable of storing one bit and does so
more efficiently in the presence of noise.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 16:59:11 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Ibáñez",
"S. A.",
""
],
[
"Fierens",
"P. I.",
""
],
[
"Patterson",
"G. A.",
""
],
[
"Perazzo",
"R. P. J.",
""
],
[
"Grosz",
"D. F.",
""
]
] |
[
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "cond-mat.other",
"description": "Work in condensed matter that does not fit into the other cond-mat classifications",
"span": "(Other Condensed Matter)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0911.0894
|
Vishal Goyal
|
N. Rama and Meenakshi Lakshmanan
|
A New Computational Schema for Euphonic Conjunctions in Sanskrit
Processing
|
International Journal of Computer Science Issues, IJCSI Volume 5,
pp43-51, October 2009
|
Rama N. and M. Lakshmanan, "A New Computational Schema for
Euphonic Conjunctions in Sanskrit Processing", International Journal of
Computer Science Issues, IJCSI, Volume 5, pp43-51, October 2009
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Automated language processing is central to the drive to enable facilitated
referencing of increasingly available Sanskrit E texts. The first step towards
processing Sanskrit text involves the handling of Sanskrit compound words that
are an integral part of Sanskrit texts. This firstly necessitates the
processing of euphonic conjunctions or sandhis, which are points in words or
between words, at which adjacent letters coalesce and transform. The ancient
Sanskrit grammarian Panini's codification of the Sanskrit grammar is the
accepted authority in the subject. His famed sutras or aphorisms, numbering
approximately four thousand, tersely, precisely and comprehensively codify the
rules of the grammar, including all the rules pertaining to sandhis. This work
presents a fresh new approach to processing sandhis in terms of a computational
schema. This new computational model is based on Panini's complex codification
of the rules of grammar. The model has simple beginnings and is yet powerful,
comprehensive and computationally lean.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 19:33:21 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Rama",
"N.",
""
],
[
"Lakshmanan",
"Meenakshi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0911.0900
|
Heidi Gebauer
|
Heidi Gebauer
|
Construction of a Non-2-colorable k-uniform Hypergraph with Few Edges
|
3 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show how to construct a non-2-colorable k-uniform hypergraph with (2^(1 +
o(1)))^k edges. By the duality of hypergraphs and monotone k-CNF-formulas this
gives an unsatisfiable monotone k-CNF with (2^(1 + o(1)))^k clauses
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 18:02:15 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Nov 2009 15:46:50 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Gebauer",
"Heidi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.0902
|
Vishal Goyal
|
A.Essaouabi, E.Ibnelhaj, F.Fegragui
|
Digital Image Watermarking for Arbitrarily Shaped Objects Based On
SA-DWT
|
International Journal of Computer Science Issues, Volume 5, pp1-8,
October 2009
|
A.Essaouabi, E.Ibnelhaj and F.regragui, "Digital Image
Watermarking for Arbitrarily Shaped Objects Based On SA-DWT", International
Journal of Computer Science Issues, Volume 5, pp1-8, October 2009
| null | null |
cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many image watermarking schemes have been proposed in recent years, but they
usually involve embedding a watermark to the entire image without considering
only a particular object in the image, which the image owner may be interested
in. This paper proposes a watermarking scheme that can embed a watermark to an
arbitrarily shaped object in an image. Before embedding, the image owner
specifies an object of arbitrary shape that is of a concern to him. Then the
object is transformed into the wavelet domain using in place lifting shape
adaptive DWT(SADWT) and a watermark is embedded by modifying the wavelet
coefficients. In order to make the watermark robust and transparent, the
watermark is embedded in the average of wavelet blocks using the visual model
based on the human visual system. Wavelet coefficients n least significant bits
(LSBs) are adjusted in concert with the average. Simulation results shows that
the proposed watermarking scheme is perceptually invisible and robust against
many attacks such as lossy compression (e.g.JPEG, JPEG2000), scaling, adding
noise, filtering, etc.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 18:11:30 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Essaouabi",
"A.",
""
],
[
"Ibnelhaj",
"E.",
""
],
[
"Fegragui",
"F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0911.0905
|
Umer Salim
|
Umer Salim, David Gesbert and Dirk Slock
|
Combining Training and Quantized Feedback in Multi-Antenna Reciprocal
Channels
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The communication between a multiple-antenna transmitter and multiple
receivers (users) with either a single or multiple-antenna each can be
significantly enhanced by providing the channel state information at the
transmitter (CSIT) of the users, as this allows for scheduling, beamforming and
multiuser multiplexing gains. The traditional view on how to enable CSIT has
been as follows so far: In time-division duplexed (TDD) systems, uplink (UL)
and downlink (DL) channel reciprocity allows the use of a training sequence in
the UL direction, which is exploited to obtain an UL channel estimate. This
estimate is in turn recycled in the next downlink slot. In frequency-division
duplexed (FDD) systems, which lack the UL and DL reciprocity, the CSIT is
provided via the use of a dedicated feedback link of limited capacity between
the receivers and the transmitter. In this paper, we focus on TDD systems and
put this classical approach in question. In particular, we show that the
traditional TDD setup above fails to fully exploit the channel reciprocity in
its true sense. In fact, we show that the system can benefit from a combined
CSIT acquisition strategy mixing the use of limited feedback and that of a
training sequence. This combining gives rise to a very interesting joint
estimation and detection problem for which we propose two iterative algorithms.
An outage rate based framework is also developed which gives the optimal
resource split between training and feedback. We demonstrate the potential of
this hybrid combining in terms of the improved CSIT quality under a global
training and feedback resource constraint.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 18:51:18 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Salim",
"Umer",
""
],
[
"Gesbert",
"David",
""
],
[
"Slock",
"Dirk",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0907
|
Vishal Goyal
|
Kaustubh Bhattacharyya and Kandarpa Kumar Sarma
|
ANN-based Innovative Segmentation Method for Handwritten text in
Assamese
|
International Journal of Computer Science Issues, Volume 5, pp9-16,
October 2009
|
K. Bhattacharyya and K. K. Sarma, "ANN-based Innovative
Segmentation Method for Handwritten text in Assamese", International Journal
of Computer Science Issues, Volume 5, pp9-16, October 2009
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Artificial Neural Network (ANN) s has widely been used for recognition of
optically scanned character, which partially emulates human thinking in the
domain of the Artificial Intelligence. But prior to recognition, it is
necessary to segment the character from the text to sentences, words etc.
Segmentation of words into individual letters has been one of the major
problems in handwriting recognition. Despite several successful works all over
the work, development of such tools in specific languages is still an ongoing
process especially in the Indian context. This work explores the application of
ANN as an aid to segmentation of handwritten characters in Assamese- an
important language in the North Eastern part of India. The work explores the
performance difference obtained in applying an ANN-based dynamic segmentation
algorithm compared to projection- based static segmentation. The algorithm
involves, first training of an ANN with individual handwritten characters
recorded from different individuals. Handwritten sentences are separated out
from text using a static segmentation method. From the segmented line,
individual characters are separated out by first over segmenting the entire
line. Each of the segments thus obtained, next, is fed to the trained ANN. The
point of segmentation at which the ANN recognizes a segment or a combination of
several segments to be similar to a handwritten character, a segmentation
boundary for the character is assumed to exist and segmentation performed. The
segmented character is next compared to the best available match and the
segmentation boundary confirmed.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 18:32:08 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Bhattacharyya",
"Kaustubh",
""
],
[
"Sarma",
"Kandarpa Kumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0911.0909
|
Vishal Goyal
|
Rafael Ponce-Medellin, Gabriel Gonzalez-Serna, Rocio Vargas and Lirio
Ruiz
|
Technology Integration around the Geographic Information: A State of the
Art
|
International Journal of Computer Science Issues, Volume 5, pp17-26,
October 2009
|
R. Ponce-Medellin, G. Gonzalez-Serna, R. Vargas and L. Ruiz,
"Technology Integration around the Geographic Information: A State of the
Art", IJCSI, Volume 5, pp17-26, October 2009
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the elements that have popularized and facilitated the use of
geographical information on a variety of computational applications has been
the use of Web maps; this has opened new research challenges on different
subjects, from locating places and people, the study of social behavior or the
analyzing of the hidden structures of the terms used in a natural language
query used for locating a place. However, the use of geographic information
under technological features is not new, instead it has been part of a
development and technological integration process. This paper presents a state
of the art review about the application of geographic information under
different approaches: its use on location based services, the collaborative
user participation on it, its contextual-awareness, its use in the Semantic Web
and the challenges of its use in natural languge queries. Finally, a prototype
that integrates most of these areas is presented.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 18:47:54 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Ponce-Medellin",
"Rafael",
""
],
[
"Gonzalez-Serna",
"Gabriel",
""
],
[
"Vargas",
"Rocio",
""
],
[
"Ruiz",
"Lirio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0911.0910
|
Vishal Goyal
|
Mandhapati P. Raju and Siddhartha Khaitan
|
Domain Decomposition Based High Performance Parallel Computing
|
International Journal of Computer Science Issues, IJCSI, Volume 5,
pp27-32, October 2009
|
M. P. Raju and S. Khaitan, "Domain Decomposition Based High
Performance Parallel Computing", International Journal of Computer Science
Issues,IJCSI, Volume 5, pp27-32, October 2009
| null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The study deals with the parallelization of finite element based
Navier-Stokes codes using domain decomposition and state-ofart sparse direct
solvers. There has been significant improvement in the performance of sparse
direct solvers. Parallel sparse direct solvers are not found to exhibit good
scalability. Hence, the parallelization of sparse direct solvers is done using
domain decomposition techniques. A highly efficient sparse direct solver
PARDISO is used in this study. The scalability of both Newton and modified
Newton algorithms are tested.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 18:56:03 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Raju",
"Mandhapati P.",
""
],
[
"Khaitan",
"Siddhartha",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0911.0912
|
Vishal Goyal
|
Ritu Sindhu, Abdul Wahid and G.N.Purohit
|
Multi-Agent System Interaction in Integrated SCM
|
International Journal of Computer Science Issues, IJCSI Volume 5,
pp33-37, October 2009
|
R. Sindhu, A. W. and G.N.Purohit, "Multi-Agent System Interaction
in Integrated SCM", International Journal of Computer Science Issues, IJCSI,
Volume 5, pp33-37, October 2009
| null | null |
cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Coordination between organizations on strategic, tactical and operation
levels leads to more effective and efficient supply chains. Supply chain
management is increasing day by day in modern enterprises. The environment is
becoming competitive and many enterprises will find it difficult to survive if
they do not make their sourcing, production and distribution more efficient.
Multi-agent supply chain management has recognized as an effective methodology
for supply chain management. Multi-agent systems (MAS) offer new methods
compared to conventional, centrally organized architectures in the scope of
supply chain management (SCM). Since necessary data are not available within
the whole supply chain, an integrated approach for production planning and
control taking into account all the partners involved is not feasible. In this
study we show how MAS architecture interacts in the integrated SCM architecture
with the help of various intelligent agents to highlight the above problem.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 19:11:06 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Sindhu",
"Ritu",
""
],
[
"Wahid",
"Abdul",
""
],
[
"Purohit",
"G. N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0911.0914
|
Vishal Goyal
|
Sumalatha Ramachandran, Sujaya Paulraj, Sharon Joseph and Vetriselvi
Ramaraj
|
Enhanced Trustworthy and High-Quality Information Retrieval System for
Web Search Engines
|
International Journal of Computer Science Issues, IJCSI Volume 5,
pp38-42, October 2009
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The WWW is the most important source of information. But, there is no
guarantee for information correctness and lots of conflicting information is
retrieved by the search engines and the quality of provided information also
varies from low quality to high quality. We provide enhanced trustworthiness in
both specific (entity) and broad (content) queries in web searching. The
filtering of trustworthiness is based on 5 factors: Provenance, Authority, Age,
Popularity, and Related Links. The trustworthiness is calculated based on these
5 factors and it is stored thereby increasing the performance in retrieving
trustworthy websites. The calculated trustworthiness is stored only for static
websites. Quality is provided based on policies selected by the user. Quality
based ranking of retrieved trusted information is provided using WIQA (Web
Information Quality Assessment) Framework.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 19:22:44 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Nov 2009 02:42:47 GMT"
}
] | 2009-11-18T00:00:00 |
[
[
"Ramachandran",
"Sumalatha",
""
],
[
"Paulraj",
"Sujaya",
""
],
[
"Joseph",
"Sharon",
""
],
[
"Ramaraj",
"Vetriselvi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0911.0916
|
Lahatra Rakotondrainibe
|
Lahatra Rakotondrainibe (IETR), Yvan Kokar (IETR), Gheorghe Zaharia
(IETR), Gha\"is El Zein (IETR)
|
Toward a Gigabit Wireless Communications System
| null |
International Journal of Communication Networks and Information
Security (IJCNIS) Vol. 1,, No. 2, (2009) 7 pages
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the design and the realization of a hybrid wireless
Gigabit Ethernet indoor communications system operating at 60 GHz. As the 60
GHz radio link operates only in a single-room configuration, an additional
Radio over Fiber (RoF) link is used to ensure the communications within all the
rooms of a residential environment. The system uses low complexity baseband
processing modules. A byte synchronization technique is designed to provide a
high value of the preamble detection probability and a very small value of the
false detection probability. Conventional RS (255, 239) encoder and decoder are
used for channel forward error correction (FEC). The FEC parameters are
determined by the tradeoff between higher coding gain and hardware complexity.
The results of bit error rate measurements at 875 Mbps are presented for
various antennas configurations.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 19:44:46 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Rakotondrainibe",
"Lahatra",
"",
"IETR"
],
[
"Kokar",
"Yvan",
"",
"IETR"
],
[
"Zaharia",
"Gheorghe",
"",
"IETR"
],
[
"Zein",
"Ghaïs El",
"",
"IETR"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.0971
|
Hans J{\o}rgen Bang
|
H. J. Bang, D. Gesbert
|
Multicell Zero-Forcing and User Scheduling on the Downlink of a Linear
Cell Array
|
15 pages, 3 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Coordinated base station (BS) transmission has attracted much interest for
its potential to increase the capacity of wireless networks. Yet at the same
time, the achievable sum-rate with single-cell processing (SCP) scales
optimally with the number of users under Rayleigh fading conditions. One may
therefore ask if the value of BS coordination is limited in the many-user
regime from a sum-rate perspective. With this in mind we consider multicell
zero-forcing beamforming (ZFBF) on the downlink of a linear cell-array. We
first identify the beamforming weights and the optimal scheduling policy under
a per-base power constraint. We then compare the number of users m and n
required per-cell to achieve the same mean SINR, after optimal scheduling, with
SCP and ZFBF respectively. Specifically, we show that the ratio m/n grows
logarithmically with n. Finally, we demonstrate that the gain in sum-rate
between ZFBF and SCP is significant for all practical values of number of
users.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 20:29:23 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Nov 2009 09:38:39 GMT"
}
] | 2009-11-06T00:00:00 |
[
[
"Bang",
"H. J.",
""
],
[
"Gesbert",
"D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.0978
|
Lahatra Rakotondrainibe
|
Lahatra Rakotondrainibe (IETR), Yvan Kokar (IETR), Gheorghe Zaharia
(IETR), Gha\"is El Zein (IETR), Eric Tnaguy (IREENA), Li Hongwu (IREENA),
Benoit Charbonier
|
Hybrid, Optical and Wireless Near-Gigabit Communications System
| null |
The Sixth International Symposium on Wireless Communication
Systems 2009 (ISWCS'09), Italy Sienna : France (2009)
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the study and the realization of a hybrid 60 GHz wireless
communications system. As the 60 GHz radio link operates only in a single-room
configuration, an additional Radio over Fibre (RoF) link is used to ensure the
communications in all the rooms of a residential environment. A single carrier
architecture is adopted. The system uses low complexity baseband processing
modules. A byte/frame synchronization technique is designed to provide a high
value of the preamble detection probability and a very small value of the false
alarm probability. Conventional RS (255, 239) encoder and decoder are used to
correct errors in the transmission channel. Results of Bit Error Rate (BER)
measurements are presented for various antennas configurations.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 05:44:25 GMT"
}
] | 2009-11-06T00:00:00 |
[
[
"Rakotondrainibe",
"Lahatra",
"",
"IETR"
],
[
"Kokar",
"Yvan",
"",
"IETR"
],
[
"Zaharia",
"Gheorghe",
"",
"IETR"
],
[
"Zein",
"Ghaïs El",
"",
"IETR"
],
[
"Tnaguy",
"Eric",
"",
"IREENA"
],
[
"Hongwu",
"Li",
"",
"IREENA"
],
[
"Charbonier",
"Benoit",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.0996
|
Scott Aaronson
|
Scott Aaronson and Andris Ambainis
|
The Need for Structure in Quantum Speedups
|
31 pages; journal version; fixed several significant errors (which
were indeed fixable); improved main result from a 9th-power to a 7th-power
relation. Conference version in Proceedings of ICS (Innovations in Computer
Science) 2011
| null | null | null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Is there a general theorem that tells us when we can hope for exponential
speedups from quantum algorithms, and when we cannot? In this paper, we make
two advances toward such a theorem, in the black-box model where most quantum
algorithms operate.
First, we show that for any problem that is invariant under permuting inputs
and outputs (like the collision or the element distinctness problems), the
quantum query complexity is at least the 7th root of the classical randomized
query complexity. (An earlier version of this paper gave the 9th root.) This
resolves a conjecture of Watrous from 2002.
Second, inspired by recent work of O'Donnell et al. (2005) and Dinur et al.
(2006), we conjecture that every bounded low-degree polynomial has a "highly
influential" variable. Assuming this conjecture, we show that every T-query
quantum algorithm can be simulated on most inputs by a poly(T)-query classical
algorithm, and that one essentially cannot hope to prove P!=BQP relative to a
random oracle.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 09:10:42 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Oct 2012 22:07:31 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Feb 2014 20:13:48 GMT"
}
] | 2014-02-07T00:00:00 |
[
[
"Aaronson",
"Scott",
""
],
[
"Ambainis",
"Andris",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.1004
|
Dimitri Hendriks
|
Joerg Endrullis, Dimitri Hendriks, and Jan Willem Klop
|
Let's Make a Difference!
| null | null | null | null |
cs.DM cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the behaviour of iterations of the difference operator delta on
streams over {0,1}. In particular, we show that a stream sigma is eventually
periodic if and only if the sequence of differences sigma, delta(sigma),
delta(delta(sigma)), ..., the `delta-orbit' of sigma as we call it, is
eventually periodic. Moreover, we generalise this result to operations delta_d
that sum modulo 2 the elements of each consecutive block of length d+1 in a
given 01-stream. Some experimentation with delta-orbits of well-known streams
reveals a surprising connexion between the Sierpinski stream and the Mephisto
Waltz.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 10:32:34 GMT"
}
] | 2009-11-06T00:00:00 |
[
[
"Endrullis",
"Joerg",
""
],
[
"Hendriks",
"Dimitri",
""
],
[
"Klop",
"Jan Willem",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.1009
|
Dimitri Hendriks
|
Joerg Endrullis, Clemens Grabmayer, Dimitri Hendriks and Jan Willem
Klop
|
Unique Normal Forms in Infinitary Weakly Orthogonal Term Rewriting
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The theory of finite and infinitary term rewriting is extensively developed
for orthogonal rewrite systems, but to a lesser degree for weakly orthogonal
rewrite systems. In this note we present some contributions to the latter case
of weak orthogonality, where critial pairs are admitted provided they are
trivial.
We start with a refinement of the by now classical Compression Lemma, as a
tool for establishing infinitary confluence, and hence the property of unique
infinitary normal forms, for the case of weakly orthogonal TRSs that do not
contain collapsing rewrite rules.
That this restriction of collapse-freeness is crucial, is shown in a
elaboration of a simple TRS which is weakly orthogonal, but has two collapsing
rules. It turns out that all the usual theory breaks down dramatically.
We conclude with establishing a positive fact: the diamond property for
infinitary developments for weakly orthogonal TRSs, by means of a detailed
analysis initiated by van Oostrom for the finite case.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 10:59:16 GMT"
}
] | 2009-11-06T00:00:00 |
[
[
"Endrullis",
"Joerg",
""
],
[
"Grabmayer",
"Clemens",
""
],
[
"Hendriks",
"Dimitri",
""
],
[
"Klop",
"Jan Willem",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.1021
|
Dimitris Kalles
|
Dimitris Kalles, Ilias Fykouras
|
Examples as Interaction: On Humans Teaching a Computer to Play a Game
|
15 pages, 1 figure, 13 tables, submitted to a journal
| null | null | null |
cs.AI cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper reviews an experiment in human-computer interaction, where
interaction takes place when humans attempt to teach a computer to play a
strategy board game. We show that while individually learned models can be
shown to improve the playing performance of the computer, their straightforward
composition results in diluting what was earlier learned. This observation
suggests that interaction cannot be easily distributed when one hopes to
harness multiple human experts to develop a quality computer player. This is
related to similar approaches in robot task learning and to classic approaches
to human learning and reinforces the need to develop tools that facilitate the
mix of human-based tuition and computer self-learning.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 12:58:46 GMT"
}
] | 2009-11-06T00:00:00 |
[
[
"Kalles",
"Dimitris",
""
],
[
"Fykouras",
"Ilias",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0911.1036
|
Lahatra Rakotondrainibe
|
Lahatra Rakotondrainibe (IETR), Yvan Kokar (IETR), Gheorghe Zaharia
(IETR), Gha\"is El Zein (IETR)
|
Syst\`eme de Communications Sans Fil Tr\`es Haut D\'ebit \`a 60 GHz
| null |
XXIIe Colloque Traitement du Signal et des Images (GRETSI '09),
Dijon : France (2009)
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the study and the realization at IETR of a high data rate
60 GHz wireless communications system. The system uses a simple single carrier
architecture. The receiver architecture is based on a differential demodulation
which minimizes the intersymbol interference (ISI) effect and a signal
processing unit composed of a joint frame and byte synchronization block and a
conventional RS (255, 239) decoder. The byte synchronization technique provides
a high preamble detection probability and a very small value of the false
detection probability. First measurement results show a good communication link
quality in line of sight environments with directional antennas.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 14:11:57 GMT"
}
] | 2009-11-06T00:00:00 |
[
[
"Rakotondrainibe",
"Lahatra",
"",
"IETR"
],
[
"Kokar",
"Yvan",
"",
"IETR"
],
[
"Zaharia",
"Gheorghe",
"",
"IETR"
],
[
"Zein",
"Ghaïs El",
"",
"IETR"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.1054
|
Adeel Razi
|
Adeel Razi, Daniel J. Ryan, Iain B. Collings, Jinhong Yuan
|
Sum Rates, Rate Allocation, and User Scheduling for Multi-User MIMO
Vector Perturbation Precoding
|
27 pages with 6 figures and 2 tables. Accepted for publication in
IEEE Trans. Wireless Commu
| null |
10.1109/TWC.2010.01.090649
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers the multiuser multiple-input multiple-output (MIMO)
broadcast channel. We consider the case where the multiple transmit antennas
are used to deliver independent data streams to multiple users via vector
perturbation. We derive expressions for the sum rate in terms of the average
energy of the precoded vector, and use this to derive a high signal-to-noise
ratio (SNR) closed-form upper bound, which we show to be tight via simulation.
We also propose a modification to vector perturbation where different rates can
be allocated to different users. We conclude that for vector perturbation
precoding most of the sum rate gains can be achieved by reducing the rate
allocation problem to the user selection problem. We then propose a
low-complexity user selection algorithm that attempts to maximize the high-SNR
sum rate upper bound. Simulations show that the algorithm outperforms other
user selection algorithms of similar complexity.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 15:20:32 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Razi",
"Adeel",
""
],
[
"Ryan",
"Daniel J.",
""
],
[
"Collings",
"Iain B.",
""
],
[
"Yuan",
"Jinhong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1072
|
Nicolas Bitouz\'e
|
Nicolas Bitouze, Alexandre Graell i Amat, Eirik Rosnes
|
Error Correcting Coding for a Non-symmetric Ternary Channel
|
Submitted to IEEE Transactions on Information Theory. Part of this
work was presented at the Information Theory and Applications Workshop 2009
|
IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5715-5729, Nov. 2010
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ternary channels can be used to model the behavior of some memory devices,
where information is stored in three different levels. In this paper, error
correcting coding for a ternary channel where some of the error transitions are
not allowed, is considered. The resulting channel is non-symmetric, therefore
classical linear codes are not optimal for this channel. We define the
maximum-likelihood (ML) decoding rule for ternary codes over this channel and
show that it is complex to compute, since it depends on the channel error
probability. A simpler alternative decoding rule which depends only on code
properties, called $\da$-decoding, is then proposed. It is shown that
$\da$-decoding and ML decoding are equivalent, i.e., $\da$-decoding is optimal,
under certain conditions. Assuming $\da$-decoding, we characterize the error
correcting capabilities of ternary codes over the non-symmetric ternary
channel. We also derive an upper bound and a constructive lower bound on the
size of codes, given the code length and the minimum distance. The results
arising from the constructive lower bound are then compared, for short sizes,
to optimal codes (in terms of code size) found by a clique-based search. It is
shown that the proposed construction method gives good codes, and that in some
cases the codes are optimal.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 16:15:29 GMT"
}
] | 2011-05-31T00:00:00 |
[
[
"Bitouze",
"Nicolas",
""
],
[
"Amat",
"Alexandre Graell i",
""
],
[
"Rosnes",
"Eirik",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1082
|
Yan Zhu
|
Yan Zhu and Dongning Guo
|
Ergodic Fading One-sided Interference Channels without State Information
at Transmitters
|
Submitted to IEEE Transaction on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work studies the capacity region of a two-user ergodic interference
channel with fading, where only one of the users is subject to interference
from the other user, and the channel state information (CSI) is only available
at the receivers. A layered erasure model with one-sided interference and with
arbitrary fading statistics is studied first, whose capacity region is
completely determined as a polygon. Each dominant rate pair can be regarded as
the outcome of a trade-off between the rate gain of the interference-free user
and the rate loss of the other user due to interference. Using insights from
the layered erasure model, inner and outer bounds of the capacity region are
provided for the one-sided fading Gaussian interference channels. In
particular, the inner bound is achieved by artificially creating layers in the
signaling of the interference-free user. The outer bound is developed by
characterizing a similar trade-off as in the erasure model by taking a
"layered" view using the incremental channel approach. Furthermore, the gap
between the inner and outer bounds is no more than 12.772 bits per channel use
per user, regardless of the signal-to-noise ratios and fading statistics.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 17:26:32 GMT"
}
] | 2009-11-06T00:00:00 |
[
[
"Zhu",
"Yan",
""
],
[
"Guo",
"Dongning",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1090
|
Georg B\"ocherer
|
Georg B\"ocherer and Valdemar Cardoso da Rocha Junior and Cecilio
Pimentel
|
On the Capacity of Constrained Systems
|
6 pages, to be presented at SCC 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the first chapter of Shannon's "A Mathematical Theory of Communication,"
it is shown that the maximum entropy rate of an input process of a constrained
system is limited by the combinatorial capacity of the system. Shannon
considers systems where the constraints define regular languages and uses
results from matrix theory in his derivations. In this work, the regularity
constraint is dropped. Using generating functions, it is shown that the maximum
entropy rate of an input process is upper-bounded by the combinatorial capacity
in general. The presented results also allow for a new approach to systems with
regular constraints. As an example, the results are applied to binary sequences
that fulfill the (j,k) run-length constraint and by using the proposed
framework, a simple formula for the combinatorial capacity is given and a
maxentropic input process is defined.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 18:13:26 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Nov 2009 13:28:45 GMT"
}
] | 2009-11-20T00:00:00 |
[
[
"Böcherer",
"Georg",
""
],
[
"Junior",
"Valdemar Cardoso da Rocha",
""
],
[
"Pimentel",
"Cecilio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1112
|
Michael Nelson
|
Herbert Van de Sompel, Michael L. Nelson, Robert Sanderson, Lyudmila
L. Balakireva, Scott Ainsworth, Harihar Shankar
|
Memento: Time Travel for the Web
|
14 pages, 5 figures
| null | null | null |
cs.IR cs.DL
|
http://creativecommons.org/licenses/by/3.0/
|
The Web is ephemeral. Many resources have representations that change over
time, and many of those representations are lost forever. A lucky few manage to
reappear as archived resources that carry their own URIs. For example, some
content management systems maintain version pages that reflect a frozen prior
state of their changing resources. Archives recurrently crawl the web to obtain
the actual representation of resources, and subsequently make those available
via special-purpose archived resources. In both cases, the archival copies have
URIs that are protocol-wise disconnected from the URI of the resource of which
they represent a prior state. Indeed, the lack of temporal capabilities in the
most common Web protocol, HTTP, prevents getting to an archived resource on the
basis of the URI of its original. This turns accessing archived resources into
a significant discovery challenge for both human and software agents, which
typically involves following a multitude of links from the original to the
archival resource, or of searching archives for the original URI. This paper
proposes the protocol-based Memento solution to address this problem, and
describes a proof-of-concept experiment that includes major servers of archival
content, including Wikipedia and the Internet Archive. The Memento solution is
based on existing HTTP capabilities applied in a novel way to add the temporal
dimension. The result is a framework in which archived resources can seamlessly
be reached via the URI of their original: protocol-based time travel for the
Web.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 20:52:22 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Nov 2009 21:35:50 GMT"
}
] | 2009-11-06T00:00:00 |
[
[
"Van de Sompel",
"Herbert",
""
],
[
"Nelson",
"Michael L.",
""
],
[
"Sanderson",
"Robert",
""
],
[
"Balakireva",
"Lyudmila L.",
""
],
[
"Ainsworth",
"Scott",
""
],
[
"Shankar",
"Harihar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0911.1166
|
Fei Wei
|
Fei Wei, Huazhong Yang
|
Waveform Transmission Method, a New Waveform-relaxation Based Algorithm
to Solve Ordinary Differential Equations in Parallel
|
More info, see my web page http://weifei00.googlepages.com
| null | null | null |
math.NA cs.DC math.CA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Waveform Relaxation method (WR) is a beautiful algorithm to solve Ordinary
Differential Equations (ODEs). However, because of its poor convergence
capability, it was rarely used. In this paper, we propose a new distributed
algorithm, named Waveform Transmission Method (WTM), by virtually inserting
waveform transmission lines into the dynamical system to achieve distributed
computing of extremely large ODEs. WTM has better convergence capability than
the traditional WR algorithms.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 02:55:33 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Nov 2009 09:34:03 GMT"
},
{
"version": "v3",
"created": "Tue, 7 Sep 2010 23:46:41 GMT"
}
] | 2010-09-09T00:00:00 |
[
[
"Wei",
"Fei",
""
],
[
"Yang",
"Huazhong",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
}
] |
0911.1174
|
Aleksandrs Slivkins
|
Robert Kleinberg and Aleksandrs Slivkins
|
Sharp Dichotomies for Regret Minimization in Metric Spaces
|
Full version of a paper in ACM-SIAM SODA 2010
| null | null | null |
cs.DS cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Lipschitz multi-armed bandit (MAB) problem generalizes the classical
multi-armed bandit problem by assuming one is given side information consisting
of a priori upper bounds on the difference in expected payoff between certain
pairs of strategies. Classical results of (Lai and Robbins 1985) and (Auer et
al. 2002) imply a logarithmic regret bound for the Lipschitz MAB problem on
finite metric spaces. Recent results on continuum-armed bandit problems and
their generalizations imply lower bounds of $\sqrt{t}$, or stronger, for many
infinite metric spaces such as the unit interval. Is this dichotomy universal?
We prove that the answer is yes: for every metric space, the optimal regret of
a Lipschitz MAB algorithm is either bounded above by any $f\in \omega(\log t)$,
or bounded below by any $g\in o(\sqrt{t})$. Perhaps surprisingly, this
dichotomy does not coincide with the distinction between finite and infinite
metric spaces; instead it depends on whether the completion of the metric space
is compact and countable. Our proof connects upper and lower bound techniques
in online learning with classical topological notions such as perfect sets and
the Cantor-Bendixson theorem. Among many other results, we show a similar
dichotomy for the "full-feedback" (a.k.a., "best-expert") version.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 03:52:56 GMT"
}
] | 2009-11-09T00:00:00 |
[
[
"Kleinberg",
"Robert",
""
],
[
"Slivkins",
"Aleksandrs",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0911.1226
|
Gwendal Simon
|
Yaning Liu and Gwendal Simon
|
Large-Scale Time-Shifted Streaming Delivery
| null | null | null | null |
cs.NI cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An attractive new feature of connected TV systems consists in allowing users
to access past portions of the TV channel. This feature, called time-shifted
streaming, is now used by millions of TV viewers. We address in this paper the
design of a large-scale delivery system for time-shifted streaming. We
highlight the characteristics of time-shifted streaming that prevent known
video delivery systems to be used. Then, we present two proposals that meet the
demand for two radically different types of TV operator. First, the
Peer-Assisted Catch-Up Streaming system, namely PACUS, aims at reducing the
load on the server of a large TV broadcasters without losing the control of the
TV delivery. Second, the turntable structure, is an overlay of nodes that allow
an independent content delivery network or a small independent TV broadcaster
to ensure that all past TV programs are stored and as available as possible. We
show through extensive simulations that our objectives are reached, with a
reduction of up to three quarters of the traffic for PACUS and a 100\%
guaranteed availability for the turntable structure. We also compare our
proposals to the main previous works in the area.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 11:10:43 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Nov 2011 19:01:04 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"Liu",
"Yaning",
""
],
[
"Simon",
"Gwendal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0911.1240
|
Avishai Wool
|
Avishai Wool
|
Firewall Configuration Errors Revisited
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The first quantitative evaluation of the quality of corporate firewall
configurations appeared in 2004, based on Check Point FireWall-1 rule-sets. In
general that survey indicated that corporate firewalls were often enforcing
poorly written rule-sets, containing many mistakes.
The goal of this work is to revisit the first survey. The current study is
much larger. Moreover, for the first time, the study includes configurations
from two major vendors. The study also introduce a novel "Firewall Complexity"
(FC) measure, that applies to both types of firewalls.
The findings of the current study indeed validate the 2004 study's main
observations: firewalls are (still) poorly configured, and a rule-set's
complexity is (still) positively correlated with the number of detected risk
items. Thus we can conclude that, for well-configured firewalls, ``small is
(still) beautiful''. However, unlike the 2004 study, we see no significant
indication that later software versions have fewer errors (for both vendors).
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 12:43:55 GMT"
}
] | 2009-11-09T00:00:00 |
[
[
"Wool",
"Avishai",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.1275
|
Yuri Suhov
|
Mark Kelbert and Yuri Suhov
|
Continuity of mutual entropy in the large signal-to-noise ratio limit
|
This paper has been withdrawn since it has been already published,
in: {\it Stochastic Analysis 2010.} Springer-Verlag: Berlin, 2010, pp.
281--299; arXiv:0911
| null | null | null |
cs.IT cs.IR math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article addresses the issue of the proof of the entropy power inequality
(EPI), an important tool in the analysis of Gaussian channels of information
transmission, proposed by Shannon.
We analyse continuity properties of the mutual entropy of the input and
output signals in an additive memoryless channel and discuss assumptions under
which the entropy-power inequality holds true.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 15:20:54 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Jun 2010 11:43:41 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Apr 2013 20:32:51 GMT"
}
] | 2013-04-04T00:00:00 |
[
[
"Kelbert",
"Mark",
""
],
[
"Suhov",
"Yuri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0911.1288
|
Hugues Genevois
|
Caroline Cance, Hugues Genevois, Dani\`ele Dubois
|
What is instrumentality in new digital msuical devices ? A contribution
from cognitive linguistics and psychology
|
11 pages
|
What is instrumentality in new digital musical devices ? A
contribution from cognitive linguistics and psychology, Paris : France (2009)
| null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As far as music is concerned, instruments have always been part of a cultural
?landscape? (on technical, expressive and symbolic levels). The present
contribution explores the changes brought about by the shift that occurred
during the 20th century, from mechanical to digital instruments (also named
?virtual instruments?). First and foremost, a short recall of some historical
steps of the technological developments that have renewed our relationship to
sound, music, and instruments will be presented. Second, an analysis of
different discourses and terminologies presently used in the domains of
musicology and computer music will account for the evolution of the notion of
instrumentality.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 16:06:40 GMT"
}
] | 2009-11-09T00:00:00 |
[
[
"Cance",
"Caroline",
""
],
[
"Genevois",
"Hugues",
""
],
[
"Dubois",
"Danièle",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0911.1298
|
Sudhir R. Ghorpade
|
Peter Beelen, Sudhir R. Ghorpade, and Tom Hoeholdt
|
Affine Grassmann Codes
|
Slightly Revised Version; 18 pages
|
IEEE Trans. Inform. Theory 56 (2010), no. 7, 3166-3176
|
10.1109/TIT.2010.2048470
| null |
cs.IT math.AG math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a new class of linear codes, called affine Grassmann codes. These
can be viewed as a variant of generalized Reed-Muller codes and are closely
related to Grassmann codes. We determine the length, dimension, and the minimum
distance of any affine Grassmann code. Moreover, we show that affine Grassmann
codes have a large automorphism group and determine the number of minimum
weight codewords.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 16:58:09 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Jun 2010 13:25:32 GMT"
}
] | 2010-06-22T00:00:00 |
[
[
"Beelen",
"Peter",
""
],
[
"Ghorpade",
"Sudhir R.",
""
],
[
"Hoeholdt",
"Tom",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1305
|
Loet Leydesdorff
|
Ricardo Arencibia-Jorge, Loet Leydesdorff, Zaida Chinchilla-Rodriguez,
Ronald Rousseau, Soren W. Paris
|
Retrieval of very large numbers of items in the Web of Science: an
exercise to develop accurate search strategies
| null |
El Profesional de la Informacion 18(5) (2009) 555-559
| null | null |
cs.DL cs.IR physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The current communication presents a simple exercise with the aim of solving
a singular problem: the retrieval of extremely large amounts of items in the
Web of Science interface. As it is known, Web of Science interface allows a
user to obtain at most 100,000 items from a single query. But what about
queries that achieve a result of more than 100,000 items? The exercise
developed one possible way to achieve this objective. The case study is the
retrieval of the entire scientific production from the United States in a
specific year. Different sections of items were retrieved using the field
Source of the database. Then, a simple Boolean statement was created with the
aim of eliminating overlapping and to improve the accuracy of the search
strategy. The importance of team work in the development of advanced search
strategies was noted.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 17:20:54 GMT"
}
] | 2009-11-09T00:00:00 |
[
[
"Arencibia-Jorge",
"Ricardo",
""
],
[
"Leydesdorff",
"Loet",
""
],
[
"Chinchilla-Rodriguez",
"Zaida",
""
],
[
"Rousseau",
"Ronald",
""
],
[
"Paris",
"Soren W.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.1308
|
Loet Leydesdorff
|
Diana Lucio-Arias, Loet Leydesdorff
|
The Dynamics of Exchanges and References among Scientific Texts, and the
Autopoiesis of Discursive Knowledge
| null |
Journal of Informetrics 3(3) (2009) 261-271
| null | null |
cs.CY cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Discursive knowledge emerges as codification in flows of communication. The
flows of communication are constrained and enabled by networks of
communications as their historical manifestations at each moment of time. New
publications modify the existing networks by changing the distributions of
attributes and relations in document sets, while the networks are
self-referentially updated along trajectories. Codification operates
reflexively: the network structures are reconstructed from the perspective of
hindsight. Codification along different axes differentiates discursive
knowledge into specialties. These intellectual control structures are
constructed bottom-up, but feed top-down back upon the production of new
knowledge. However, the forward dynamics of diffusion in the development of the
communication networks along trajectories differs from the feedback mechanisms
of control. Analysis of the development of scientific communication in terms of
evolving scientific literatures provides us with a model which makes these
evolutionary processes amenable to measurement.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 17:34:48 GMT"
}
] | 2009-11-09T00:00:00 |
[
[
"Lucio-Arias",
"Diana",
""
],
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.1318
|
Loet Leydesdorff
|
Leo Egghe, Loet Leydesdorff
|
The relation between Pearson's correlation coefficient r and Salton's
cosine measure
| null |
Journal of the American Society for Information Science and
Technology 60(5) (2009) 1027-1036
|
10.1016/j.eswa.2012.07.016
| null |
cs.IR stat.ME
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The relation between Pearson's correlation coefficient and Salton's cosine
measure is revealed based on the different possible values of the division of
the L1-norm and the L2-norm of a vector. These different values yield a sheaf
of increasingly straight lines which form together a cloud of points, being the
investigated relation. The theoretical results are tested against the author
co-citation relations among 24 informetricians for whom two matrices can be
constructed, based on co-citations: the asymmetric occurrence matrix and the
symmetric co-citation matrix. Both examples completely confirm the theoretical
results. The results enable us to specify an algorithm which provides a
threshold value for the cosine above which none of the corresponding Pearson
correlations would be negative. Using this threshold value can be expected to
optimize the visualization of the vector space.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 18:09:07 GMT"
}
] | 2012-07-25T00:00:00 |
[
[
"Egghe",
"Leo",
""
],
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
}
] |
0911.1320
|
Loet Leydesdorff
|
Han Park, Loet Leydesdorff
|
Knowledge linkage structures in communication studies using citation
analysis among communication journals
| null |
Scientometrics 81(1) (2009) 157-175
| null | null |
cs.DL cs.IR physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This research analyzes a "who cites whom" matrix in terms of aggregated,
journal-journal citations to determine the location of communication studies on
the academic spectrum. Using the Journal of Communication as the seed journal,
the 2006 data in the Journal Citation Reports are used to map communication
studies. The results show that social and experimental psychology journals are
the most frequently used sources of information in this field. In addition,
several journals devoted to the use and effects of media and advertising are
weakly integrated into the larger communication research community, whereas
communication studies are dominated by American journals.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 18:13:23 GMT"
}
] | 2009-11-09T00:00:00 |
[
[
"Park",
"Han",
""
],
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.1340
|
Saugata Basu
|
Saugata Basu, Marie-Francoise Roy
|
Bounding the radii of balls meeting every connected component of
semi-algebraic sets
|
11 pages
|
J. Symbolic Comput. 45 (12):1270-1279, 2010
| null | null |
cs.SC cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove explicit bounds on the radius of a ball centered at the origin which
is guaranteed to contain all bounded connected components of a semi-algebraic
set $S \subset \mathbbm{R}^k$ defined by a quantifier-free formula involving
$s$ polynomials in $\mathbbm{Z}[X_1, ..., X_k]$ having degrees at most $d$, and
whose coefficients have bitsizes at most $\tau$. Our bound is an explicit
function of $s, d, k$ and $\tau$, and does not contain any undetermined
constants. We also prove a similar bound on the radius of a ball guaranteed to
intersect every connected component of $S$ (including the unbounded
components). While asymptotic bounds of the form $2^{\tau d^{O (k)}}$ on these
quantities were known before, some applications require bounds which are
explicit and which hold for all values of $s, d, k$ and $\tau$. The bounds
proved in this paper are of this nature.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 19:53:54 GMT"
}
] | 2011-02-02T00:00:00 |
[
[
"Basu",
"Saugata",
""
],
[
"Roy",
"Marie-Francoise",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0911.1346
|
Pushkar Tripathi
|
Gagan Goel, Pushkar Tripathi, Lei Wang
|
Optimal Approximation Algorithms for Multi-agent Combinatorial Problems
with Discounted Price Functions
| null | null | null | null |
cs.MA cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Submodular functions are an important class of functions in combinatorial
optimization which satisfy the natural properties of decreasing marginal costs.
The study of these functions has led to strong structural properties with
applications in many areas. Recently, there has been significant interest in
extending the theory of algorithms for optimizing combinatorial problems (such
as network design problem of spanning tree) over submodular functions.
Unfortunately, the lower bounds under the general class of submodular functions
are known to be very high for many of the classical problems.
In this paper, we introduce and study an important subclass of submodular
functions, which we call discounted price functions. These functions are
succinctly representable and generalize linear cost functions. In this paper we
study the following fundamental combinatorial optimization problems: Edge
Cover, Spanning Tree, Perfect Matching and Shortest Path, and obtain tight
upper and lower bounds for these problems.
The main technical contribution of this paper is designing novel adaptive
greedy algorithms for the above problems. These algorithms greedily build the
solution whist rectifying mistakes made in the previous steps.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 20:29:10 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Goel",
"Gagan",
""
],
[
"Tripathi",
"Pushkar",
""
],
[
"Wang",
"Lei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.1368
|
Sina Jafarpour
|
Sina Jafarpour, Rebecca Willett, Maxim Raginsky, Robert Calderbank
|
Performance Bounds for Expander-based Compressed Sensing in the presence
of Poisson Noise
|
Received the best student paper award in Asilomar 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper provides performance bounds for compressed sensing in the presence
of Poisson noise using expander graphs. The Poisson noise model is appropriate
for a variety of applications, including low-light imaging and digital
streaming, where the signal-independent and/or bounded noise models used in the
compressed sensing literature are no longer applicable. In this paper, we
develop a novel sensing paradigm based on expander graphs and propose a MAP
algorithm for recovering sparse or compressible signals from Poisson
observations. The geometry of the expander graphs and the positivity of the
corresponding sensing matrices play a crucial role in establishing the bounds
on the signal reconstruction error of the proposed algorithm. The geometry of
the expander graphs makes them provably superior to random dense sensing
matrices, such as Gaussian or partial Fourier ensembles, for the Poisson noise
model. We support our results with experimental demonstrations.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 22:23:30 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Nov 2009 19:20:28 GMT"
},
{
"version": "v3",
"created": "Wed, 25 Nov 2009 08:02:02 GMT"
}
] | 2009-11-25T00:00:00 |
[
[
"Jafarpour",
"Sina",
""
],
[
"Willett",
"Rebecca",
""
],
[
"Raginsky",
"Maxim",
""
],
[
"Calderbank",
"Robert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.