id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0911.1370
|
Jakub Radoszewski
|
Marcin Kubica, Jakub Radoszewski, Wojciech Rytter, Tomasz Walen
|
On the maximal number of cubic subwords in a string
|
14 pages
| null |
10.1007/978-3-642-10217-2_34
| null |
cs.FL cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the problem of the maximum number of cubic subwords (of the
form $www$) in a given word. We also consider square subwords (of the form
$ww$). The problem of the maximum number of squares in a word is not well
understood. Several new results related to this problem are produced in the
paper. We consider two simple problems related to the maximum number of
subwords which are squares or which are highly repetitive; then we provide a
nontrivial estimation for the number of cubes. We show that the maximum number
of squares $xx$ such that $x$ is not a primitive word (nonprimitive squares) in
a word of length $n$ is exactly $\lfloor \frac{n}{2}\rfloor - 1$, and the
maximum number of subwords of the form $x^k$, for $k\ge 3$, is exactly $n-2$.
In particular, the maximum number of cubes in a word is not greater than $n-2$
either. Using very technical properties of occurrences of cubes, we improve
this bound significantly. We show that the maximum number of cubes in a word of
length $n$ is between $(1/2)n$ and $(4/5)n$. (In particular, we improve the
lower bound from the conference version of the paper.)
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 23:05:30 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Kubica",
"Marcin",
""
],
[
"Radoszewski",
"Jakub",
""
],
[
"Rytter",
"Wojciech",
""
],
[
"Walen",
"Tomasz",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.1379
|
Harish Sethu
|
Xiaoyu Chu and Harish Sethu
|
On Improving the Representation of a Region Achieved by a Sensor Network
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This report considers the class of applications of sensor networks in which
each sensor node makes measurements, such as temperature or humidity, at the
precise location of the node. Such spot-sensing applications approximate the
physical condition of the entire region of interest by the measurements made at
only the points where the sensor nodes are located. Given a certain density of
nodes in a region, a more spatially uniform distribution of the nodes leads to
a better approximation of the physical condition of the region. This report
considers the error in this approximation and seeks to improve the quality of
representation of the physical condition of the points in the region in the
data collected by the sensor network. We develop two essential metrics which
together allow a rigorous quantitative assessment of the quality of
representation achieved: the average representation error and the unevenness of
representation error, the latter based on a well-accepted measure of inequality
used in economics. We present the rationale behind the use of these metrics and
derive relevant theoretical bounds on them in the common scenario of a planar
region of arbitrary shape covered by a sensor network deployment. A simple new
heuristic algorithm is presented for each node to determine if and when it
should sense or sleep to conserve energy while also preserving the quality of
representation. Simulation results show that it achieves a significant
improvement in the quality of representation compared to other related
distributed algorithms. Interestingly, our results also show that improved
spatial uniformity has the welcome side-effect of a significant increase in the
network lifetime.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 23:59:32 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Mar 2010 20:14:11 GMT"
}
] | 2010-03-26T00:00:00 |
[
[
"Chu",
"Xiaoyu",
""
],
[
"Sethu",
"Harish",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.1383
|
Marc Harper
|
Marc Harper
|
Information Geometry and Evolutionary Game Theory
|
Added references
| null | null | null |
cs.IT cs.GT math.DS math.IT nlin.AO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Shahshahani geometry of evolutionary game theory is realized as the
information geometry of the simplex, deriving from the Fisher information
metric of the manifold of categorical probability distributions. Some essential
concepts in evolutionary game theory are realized information-theoretically.
Results are extended to the Lotka-Volterra equation and to multiple population
systems.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 19:16:22 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Harper",
"Marc",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
0911.1386
|
Emanuel Diamant
|
Emanuel Diamant
|
Machine Learning: When and Where the Horses Went Astray?
|
The paper is accepted to be published in the Machine Learning serie
of the InTech
| null | null | null |
cs.AI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Machine Learning is usually defined as a subfield of AI, which is busy with
information extraction from raw data sets. Despite of its common acceptance and
widespread recognition, this definition is wrong and groundless. Meaningful
information does not belong to the data that bear it. It belongs to the
observers of the data and it is a shared agreement and a convention among them.
Therefore, this private information cannot be extracted from the data by any
means. Therefore, all further attempts of Machine Learning apologists to
justify their funny business are inappropriate.
|
[
{
"version": "v1",
"created": "Sat, 7 Nov 2009 02:52:53 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Diamant",
"Emanuel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0911.1388
|
Victor Miller
|
Don Coppersmith, Victor S. Miller
|
Binary Non-tiles
| null | null | null | null |
cs.DM cs.IT math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A subset V of GF(2)^n is a tile if GF(2)^n can be covered by disjoint
translates of V. In other words, V is a tile if and only if there is a subset A
of GF(2)^n such that V+A = GF(2)^n uniquely (i.e., v + a = v' + a' implies that
v=v' and a=a' where v,v' in V and a,a' in A). In some problems in coding theory
and hashing we are given a putative tile V, and wish to know whether or not it
is a tile. In this paper we give two computational criteria for certifying that
V is not a tile. The first involves impossibility of a bin-packing problem, and
the second involves infeasibility of a linear program. We apply both criteria
to a list of putative tiles given by Gordon, Miller, and Ostapenko in that none
of them are, in fact, tiles.
|
[
{
"version": "v1",
"created": "Sat, 7 Nov 2009 03:25:40 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Aug 2011 02:53:14 GMT"
}
] | 2011-08-02T00:00:00 |
[
[
"Coppersmith",
"Don",
""
],
[
"Miller",
"Victor S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1393
|
Lek-Heng Lim
|
Christopher Hillar and Lek-Heng Lim
|
Most tensor problems are NP-hard
|
38 pages; to appear in Journal of the ACM
| null | null | null |
cs.CC cs.NA math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that multilinear (tensor) analogues of many efficiently computable
problems in numerical linear algebra are NP-hard. Our list here includes:
determining the feasibility of a system of bilinear equations, deciding whether
a 3-tensor possesses a given eigenvalue, singular value, or spectral norm;
approximating an eigenvalue, eigenvector, singular vector, or the spectral
norm; and determining the rank or best rank-1 approximation of a 3-tensor.
Furthermore, we show that restricting these problems to symmetric tensors does
not alleviate their NP-hardness. We also explain how deciding nonnegative
definiteness of a symmetric 4-tensor is NP-hard and how computing the
combinatorial hyperdeterminant of a 4-tensor is NP-, #P-, and VNP-hard. We
shall argue that our results provide another view of the boundary separating
the computational tractability of linear/convex problems from the
intractability of nonlinear/nonconvex ones.
|
[
{
"version": "v1",
"created": "Sat, 7 Nov 2009 05:21:11 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Apr 2010 10:36:24 GMT"
},
{
"version": "v3",
"created": "Mon, 9 Apr 2012 18:02:09 GMT"
},
{
"version": "v4",
"created": "Tue, 12 Feb 2013 00:33:53 GMT"
},
{
"version": "v5",
"created": "Mon, 1 Jul 2013 01:10:12 GMT"
}
] | 2013-07-02T00:00:00 |
[
[
"Hillar",
"Christopher",
""
],
[
"Lim",
"Lek-Heng",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
0911.1412
|
Clemens Grabmayer
|
Clemens Grabmayer
|
From Abstract Rewriting Systems to Abstract Proof Systems
|
15 pages, 3 figures
| null | null | null |
cs.LO cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Some personal recollections on the introduction of `abstract proof systems'
as a framework for formulating syntax-independent, general results about rule
derivability and admissibility. With a particular eye on the inspiration I owe
to Roel de Vrijer: the analogy with abstract rewriting systems.
|
[
{
"version": "v1",
"created": "Sat, 7 Nov 2009 12:48:23 GMT"
},
{
"version": "v2",
"created": "Sat, 23 Feb 2013 16:38:28 GMT"
}
] | 2013-02-26T00:00:00 |
[
[
"Grabmayer",
"Clemens",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0911.1419
|
Yusuke Watanabe
|
Yusuke Watanabe and Michael Chertkov
|
Belief Propagation and Loop Calculus for the Permanent of a Non-Negative
Matrix
|
11 pages; submitted to Journal of Physics A: Mathematical Theoretical
| null |
10.1088/1751-8113/43/24/242002
| null |
cs.DS cond-mat.stat-mech cs.DM cs.LG cs.NA math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider computation of permanent of a positive $(N\times N)$ non-negative
matrix, $P=(P_i^j|i,j=1,\cdots,N)$, or equivalently the problem of weighted
counting of the perfect matchings over the complete bipartite graph $K_{N,N}$.
The problem is known to be of likely exponential complexity. Stated as the
partition function $Z$ of a graphical model, the problem allows exact Loop
Calculus representation [Chertkov, Chernyak '06] in terms of an interior
minimum of the Bethe Free Energy functional over non-integer doubly stochastic
matrix of marginal beliefs, $\beta=(\beta_i^j|i,j=1,\cdots,N)$, also
correspondent to a fixed point of the iterative message-passing algorithm of
the Belief Propagation (BP) type. Our main result is an explicit expression of
the exact partition function (permanent) in terms of the matrix of BP
marginals, $\beta$, as $Z=\mbox{Perm}(P)=Z_{BP}
\mbox{Perm}(\beta_i^j(1-\beta_i^j))/\prod_{i,j}(1-\beta_i^j)$, where $Z_{BP}$
is the BP expression for the permanent stated explicitly in terms if $\beta$.
We give two derivations of the formula, a direct one based on the Bethe Free
Energy and an alternative one combining the Ihara graph-$\zeta$ function and
the Loop Calculus approaches. Assuming that the matrix $\beta$ of the Belief
Propagation marginals is calculated, we provide two lower bounds and one
upper-bound to estimate the multiplicative term. Two complementary lower bounds
are based on the Gurvits-van der Waerden theorem and on a relation between the
modified permanent and determinant respectively.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 04:15:01 GMT"
},
{
"version": "v2",
"created": "Sun, 2 May 2010 15:58:46 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Watanabe",
"Yusuke",
""
],
[
"Chertkov",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0911.1426
|
Hossein Bagheri
|
Hossein Bagheri, Abolfazl S. Motahari, and Amir K. Khandani
|
On the Capacity of the Half-Duplex Diamond Channel
|
25 pages, 2 figures, submitted to IEEE Transactions on Information
Theory
| null |
10.1109/ISIT.2010.5513566
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a dual-hop communication system composed of a source S and a
destination D connected through two non-interfering half-duplex relays, R1 and
R2, is considered. In the literature of Information Theory, this configuration
is known as the diamond channel. In this setup, four transmission modes are
present, namely: 1) S transmits, and R1 and R2 listen (broadcast mode), 2) S
transmits, R1 listens, and simultaneously, R2 transmits and D listens. 3) S
transmits, R2 listens, and simultaneously, R1 transmits and D listens. 4) R1,
R2 transmit, and D listens (multiple-access mode). Assuming a constant power
constraint for all transmitters, a parameter $\Delta$ is defined, which
captures some important features of the channel. It is proven that for
$\Delta$=0 the capacity of the channel can be attained by successive relaying,
i.e, using modes 2 and 3 defined above in a successive manner. This strategy
may have an infinite gap from the capacity of the channel when $\Delta\neq$0.
To achieve rates as close as 0.71 bits to the capacity, it is shown that the
cases of $\Delta$>0 and $\Delta$<0 should be treated differently. Using new
upper bounds based on the dual problem of the linear program associated with
the cut-set bounds, it is proven that the successive relaying strategy needs to
be enhanced by an additional broadcast mode (mode 1), or multiple access mode
(mode 4), for the cases of $\Delta$<0 and $\Delta$>0, respectively.
Furthermore, it is established that under average power constraints the
aforementioned strategies achieve rates as close as 3.6 bits to the capacity of
the channel.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 20:58:23 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Bagheri",
"Hossein",
""
],
[
"Motahari",
"Abolfazl S.",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1440
|
Loet Leydesdorff
|
Loet Leydesdorff
|
Caveats for the Use of Citation Indicators in Research and Journal
Evaluations
| null |
Loet Leydesdorff, Caveats for the Use of Citation Indicators in
Research and Journal Evaluations, Journal of the American Society for
Information Science and Technology 59(2), 278-287, 2008
| null | null |
physics.soc-ph cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ageing of publications, percentage of self-citations, and impact vary from
journal to journal within fields of science. The assumption that citation and
publication practices are homogenous within specialties and fields of science
is invalid. Furthermore, the delineation of fields and among specialties is
fuzzy. Institutional units of analysis and persons may move between fields or
span different specialties. The match between the citation index and
institutional profiles varies among institutional units and nations. The
respective matches may heavily affect the representation of the units. Non-ISI
journals are increasingly cornered into "transdisciplinary" Mode-2 functions
with the exception of specialist journals publishing in languages other than
English. An "externally cited impact factor" can be calculated for these
journals. The citation impact of non-ISI journals will be demonstrated using
Science and Public Policy as the example.
|
[
{
"version": "v1",
"created": "Sat, 7 Nov 2009 18:43:47 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0911.1445
|
Loet Leydesdorff
|
Loet Leydesdorff
|
The delineation of nanoscience and nanotechnology in terms of journals
and patents: a most recent update
| null |
Loet Leydesdorff, The delineation of nanoscience and
nanotechnology in terms of journals and patents: a most recent update.
Scientometrics 76(1), 159-167, 2008
| null | null |
physics.soc-ph cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The journal set which provides a representation of nanoscience and
nanotechnology at the interfaces among applied physics, chemistry, and the life
sciences is developing rapidly because of the introduction of new journals. The
relevant contributions of nations can be expected to change according to the
representations of the relevant interfaces among journal sets. In the 2005 set
the position of the USA decreased more than in the 2004-set, while the EU-27
gained in terms of its percentage of world share of citations. The tag "Y01N"
which was newly added to the EU classification system for patents, allows for
the visualization of national profiles of nanotechnology in terms of relevant
patents and patent classes.
|
[
{
"version": "v1",
"created": "Sat, 7 Nov 2009 18:47:52 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0911.1447
|
Loet Leydesdorff
|
Loet Leydesdorff
|
On the Normalization and Visualization of Author Co-Citation Data
Salton's Cosine versus the Jaccard Index
| null |
Loet Leydesdorff, On the Normalization and Visualization of Author
Co-citation Data: Salton's cosine versus the Jaccard Index, Journal of the
American Society for Information Science and Technology, 59(1), 77-85, 2008
| null | null |
physics.soc-ph cs.DL cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The debate about which similarity measure one should use for the
normalization in the case of Author Co-citation Analysis (ACA) is further
complicated when one distinguishes between the symmetrical co-citation--or,
more generally, co-occurrence--matrix and the underlying asymmetrical
citation--occurrence--matrix. In the Web environment, the approach of
retrieving original citation data is often not feasible. In that case, one
should use the Jaccard index, but preferentially after adding the number of
total citations (occurrences) on the main diagonal. Unlike Salton's cosine and
the Pearson correlation, the Jaccard index abstracts from the shape of the
distributions and focuses only on the intersection and the sum of the two sets.
Since the correlations in the co-occurrence matrix may partially be spurious,
this property of the Jaccard index can be considered as an advantage in this
case.
|
[
{
"version": "v1",
"created": "Sat, 7 Nov 2009 18:53:09 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0911.1451
|
Loet Leydesdorff
|
Loet Leydesdorff, Ping Zhou
|
Co-word Analysis using the Chinese Character Set
| null |
Co-Word Analysis using the Chinese Character Set, Journal of the
American Society for Information Science and Technology 59(9), 1528-1530,
2008
| null | null |
cs.CL cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Until recently, Chinese texts could not be studied using co-word analysis
because the words are not separated by spaces in Chinese (and Japanese). A word
can be composed of one or more characters. The online availability of programs
that separate Chinese texts makes it possible to analyze them using semantic
maps. Chinese characters contain not only information, but also meaning. This
may enhance the readability of semantic maps. In this study, we analyze 58
words which occur ten or more times in the 1652 journal titles of the China
Scientific and Technical Papers and Citations Database. The word occurrence
matrix is visualized and factor-analyzed.
|
[
{
"version": "v1",
"created": "Sat, 7 Nov 2009 19:15:33 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
],
[
"Zhou",
"Ping",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0911.1454
|
Loet Leydesdorff
|
Diana Lucio-Arias and Loet Leydesdorff
|
Main-path analysis and path-dependent transitions in HistCite(TM)-based
historiograms
| null |
Journal of the American Society for Information Science and
Technology 59(12), 1948-1962, 2008
| null | null |
physics.soc-ph cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the program HistCite(TM) it is possible to generate and visualize the
most relevant papers in a set of documents retrieved from the Science Citation
Index. Historical reconstructions of scientific developments can be represented
chronologically as developments in networks of citation relations extracted
from scientific literature. This study aims to go beyond the historical
reconstruction of scientific knowledge, enriching the output of HistCite(TM)
with algorithms from social network analysis and information theory.
|
[
{
"version": "v1",
"created": "Sat, 7 Nov 2009 19:36:46 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Lucio-Arias",
"Diana",
""
],
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0911.1456
|
Loet Leydesdorff
|
Han Woo Park, Loet Leydesdorff
|
Korean journals in the Science Citation Index: What do they reveal about
the intellectual structure of S&T in Korea?
| null |
Han Woo Park & Loet Leydesdorff, Korean journals in the Science
Citation Index: What do they reveal about the intellectual structure of ST in
Korea Scientometrics 75(3) (2008) 439-462
| null | null |
physics.soc-ph cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
During the last decade, we have witnessed a sustained growth of South Korea's
research output in terms of the world share of publications in the Science
Citation Index database. However, Korea's citation performance is not yet as
competitive as publication performance. In this study, the authors examine the
intellectual structure of Korean S&T field based on social network analysis of
journal-journal citation data using the ten Korean SCI journals as seed
journals. The results reveal that Korean SCI journals function more like
publication places, neither research channels nor information sources among
national scientists. Thus, these journals may provide Korean scholars with
access to international scientific communities by facilitating the respective
entry barriers. However, there are no citation relations based on their Korean
background. Furthermore, we intend to draw some policy implications which may
be helpful to increase Korea's research potential.
|
[
{
"version": "v1",
"created": "Sat, 7 Nov 2009 20:05:08 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Park",
"Han Woo",
""
],
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0911.1494
|
Rebecca Deneckere
|
Yves-Roger Nehan (CRI), Rebecca Deneckere (CRI)
|
Situational Method Engineering: Fundamentals and Experiences
| null |
Situational Method Engineering: Fundamentals and Experiences,
Geneve : Switzerland (2007)
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The work presented in this paper is related to the area of Situational Method
Engineering (SME) which focuses on project-specific method construction. We
propose a faceted framework to understand and classify issues in system
development SME. The framework identifies four different but complementary
viewpoints. Each view allows us to capture a particular aspect of situational
methods. Inter-relationships between these views show how they influence each
other. In order to study, understand and classify a particular view of SME in
its diversity, we associate a set of facets with each view. As a facet allows
an in-depth description of one specific aspect of SME, the views show the
variety and diversity of these aspects.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 08:37:36 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Nehan",
"Yves-Roger",
"",
"CRI"
],
[
"Deneckere",
"Rebecca",
"",
"CRI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0911.1495
|
Rebecca Deneckere
|
Elena Kornyshova (CRI), Rebecca Deneckere (CRI), Camille Salinesi
(CRI)
|
Method Chunks Selection by Multicriteria Techniques: an Extension of the
Assembly-based Approach
| null |
Situational Method Engineering: Fundamentals and Experiences,
Geneve : Suisse (2007)
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The work presented in this paper is related to the area of situational method
engineering (SME). In this domain, approaches are developed accordingly to
specific project specifications. We propose to adapt an existing method
construction process, namely the assembly-based one. One of the particular
features of assembly-based SME approach is the selection of method chunks. Our
proposal is to offer a better guidance in the retrieval of chunks by the
introduction of multicriteria techniques. To use them efficiently, we defined a
typology of projects characteristics, in order to identify all their critical
aspects, which will offer a priorisation to help the method engineer in the
choice between similar chunks.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 08:38:06 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Kornyshova",
"Elena",
"",
"CRI"
],
[
"Deneckere",
"Rebecca",
"",
"CRI"
],
[
"Salinesi",
"Camille",
"",
"CRI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0911.1496
|
Rebecca Deneckere
|
Elena Kornyshova (CRI), Rebecca Deneckere (CRI), Camille Salinesi
(CRI)
|
Improving Software Development Processes with Multicriteria Methods
|
11 pages
|
Atelier: M\'ethodes avanc\'ee de d\'eveloppement des SI,
Fontainebleau : France (2008)
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
All software development processes include steps where several alternatives
induce a choice, a decision-making. Sometimes, methodologies offer a way to
make decisions. However, in a lot of cases, the arguments to carry out the
decision are very poor and the choice is made in an intuitive and hazardous
way. The aim of our work is to offer a scientifically founded way to guide the
engineer through tactical choices with the application of multicriteria methods
in software development processes. This approach is illustrated with three
cases: risks, use cases and tools within Rational Unified Process.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 08:38:34 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Kornyshova",
"Elena",
"",
"CRI"
],
[
"Deneckere",
"Rebecca",
"",
"CRI"
],
[
"Salinesi",
"Camille",
"",
"CRI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0911.1502
|
Gitanjali Bhutani
|
Gitanjali Bhutani
|
A Round-based Pricing Scheme for Maximizing Service Provider's Revenue
in P2PTV Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we analyze a round-based pricing scheme that encourages
favorable behavior from users of real-time P2P applications like P2PTV. In the
design of pricing schemes, we consider price to be a function of usage and
capacity of download/upload streams, and quality of content served. Users are
consumers and servers at the same time in such networks, and often exhibit
behavior that is unfavorable towards maximization of social benefits.
Traditionally, network designers have overcome this difficulty by building-in
traffic latencies. However, using simulations, we show that appropriate pricing
schemes and usage terms can enable designers to limit required traffic
latencies, and be able to earn nearly 30% extra revenue from providing P2PTV
services. The service provider adjusts the prices of individual programs
incrementally within rounds, while making relatively large-scale adjustments at
the end of each round. Through simulations, we show that it is most beneficial
for the service provider to carry out 5 such rounds of price adjustments for
maximizing his average profit and minimizing the associated standard deviation
at the same time.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 10:04:54 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Bhutani",
"Gitanjali",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.1504
|
Sana Ullah
|
Sana Ullah, Yingji Zhong, S.M.Riazul Islam, Ahasanun Nessa, Kyung Sup
Kwak
|
Throughput Limits of IEEE 802.11 and IEEE 802.15.3
|
4 pages, 6 figures, 1 table, 4th International Conference on Wireless
Communications, Networking and Mobile Computing, 2008. WiCOM '08
| null |
10.1109/WiCom.2008.731
| null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
IEEE 802.11 and IEEE 802.15.3 are wireless standards originally designed for
wireless local area network (WLAN) and wireless personal area network (WPAN).
This paper studies MAC throughput analysis of both standards. We present a
comparative analysis of both standards in terms of MAC throughput and bandwidth
efficiency. Numerical results show that the performance of IEEE 802.15.3
transcends IEEE 802.11 in all cases.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 09:59:15 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Ullah",
"Sana",
""
],
[
"Zhong",
"Yingji",
""
],
[
"Islam",
"S. M. Riazul",
""
],
[
"Nessa",
"Ahasanun",
""
],
[
"Kwak",
"Kyung Sup",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0911.1507
|
Sana Ullah
|
Sana Ullah, Pervez Khan, Young-Woo Choi, Hyung-Soo Lee, Kyung Sup Kwak
|
MAC Layer Hurdles in BSNs
|
ICACT 2009
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The last few decades have seen considerable research progress in
microelectronics and integrated circuits, system-on-chip design, wireless
communication, and sensor technology. This progress has enabled the seamless
integration of autonomous wireless sensor nodes around a human body to create a
Body Sensor Network (BSN). The development of a proactive and ambulatory BSN
induces a number of enormous issues and challenges. This paper presents the
technical hurdles during the design and implementation of a low-power Medium
Access Control (MAC) protocol for in-body and on-body sensor networks. We
analyze the performance of IEEE 802.15.4 protocol for the on-body sensor
network. We also provide a comprehensive insight into the heterogeneous
characteristics of the in-body sensor network. A low-power technique called
Pattern-Based Wake-up Table is proposed to handle the normal traffic in a BSN.
The proposed technique provides a reliable solution towards low-power
communication in the in-body sensor network.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 10:25:11 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jul 2010 18:48:11 GMT"
},
{
"version": "v3",
"created": "Thu, 25 Oct 2018 07:51:41 GMT"
}
] | 2018-10-26T00:00:00 |
[
[
"Ullah",
"Sana",
""
],
[
"Khan",
"Pervez",
""
],
[
"Choi",
"Young-Woo",
""
],
[
"Lee",
"Hyung-Soo",
""
],
[
"Kwak",
"Kyung Sup",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.1508
|
Sana Ullah
|
Ahasanun Nessa, Qinghai Yang, Sana Ullah, Humaun Kabir, and Kyung Sup
Kwak
|
Performance Analysis of Two-Hop Cooperative MIMO transmission with Relay
Selection in Rayleigh Fading Channel
|
5 figures, 4th International Conference on Wireless Communications,
Networking and Mobile Computing, 2008. WiCOM '08
| null |
10.1109/WiCom.2008.122
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless relaying is one of the promising solutions to overcome the channel
impairments and provide high data rate coverage that appears for beyond 3G
mobile communications. In this paper we present an end to end BER performance
analysis of dual hop wireless communication systems equipped with multiple
decode and forward relays over the Rayleigh fading channel with relay
selection. We select the best relay based on end to end channel conditions. We
apply orthogonal space time block coding (OSTBC) at source, and also present
how the multiple antennas at the source terminal affects the end to end BER
performance. This intermediate relay technique will cover long distance where
destination is out of reach from source.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 10:30:32 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Nessa",
"Ahasanun",
""
],
[
"Yang",
"Qinghai",
""
],
[
"Ullah",
"Sana",
""
],
[
"Kabir",
"Humaun",
""
],
[
"Kwak",
"Kyung Sup",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.1509
|
Sana Ullah
|
Sana Ullah, Pervez Khan, and Kyung Sup Kwak
|
On the Development of Low Power MAC Protocol for WBANs
|
IMECS 2009
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Current advances in wireless communication, microelectronics, semiconductor
technologies, and intelligent sensors have contributed to the development of
unobtrusive WBANs. These networks provide long term health monitoring of
patients without any constraint in their normal activities. Traditional MAC
protocols do not accommodate the assorted WBAN traffic requirements in a power
efficient manner. In this paper, we present a brief discussion on the
development process of a low power MAC protocol for WBANs. We observe the
behavior of a beacon-enabled IEEE 802.15.4 for on-body sensor networks. We
further propose a low power technique called traffic based wakeup mechanism for
a WBAN that exploits the traffic patterns of the BAN Nodes to ensure power
efficient and reliable communication.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 10:34:02 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Feb 2010 07:37:48 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Jul 2010 18:49:17 GMT"
},
{
"version": "v4",
"created": "Thu, 25 Oct 2018 07:50:04 GMT"
}
] | 2018-10-26T00:00:00 |
[
[
"Ullah",
"Sana",
""
],
[
"Khan",
"Pervez",
""
],
[
"Kwak",
"Kyung Sup",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.1510
|
Gitanjali Bhutani
|
Gitanjali Bhutani
|
A Near-Optimal Scheme for TCP ACK Pacing to Maintain Throughput in
Wireless Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The advent of fourth generation technologies in wireless networks and the
rapid growth of 3G have heralded an era that will require researchers to find
reliable and easily implement-able solutions to the problem of poor TCP
performance in the wireless environment. Since a large part of the Internet is
TCP-based, solving this problem will be instrumental in determining if the move
from wired to wireless will be seamless or not. This paper proposes a scheme
that uses the base station's ability to predict the time at which the link may
be going down and to estimate the period for which the mobile would be
unreachable due to conditions like fading. By using cross-layer and ACK pacing
algorithms, the base station prevents the fixed host from timing out while
waiting for ACKs from the mobile. This in turn prevents TCP on the fixed host
from bringing down the throughput drastically due to temporary network
conditions, caused by mobility or the unreliability of wireless links.
Experimental results indicate a reasonable increase in throughput when the ACK
holding scheme is used.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 10:38:18 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Bhutani",
"Gitanjali",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.1511
|
Sana Ullah
|
Yingji Zhong, Kyung Sup Kwak, and Sana Ullah
|
MIMO Cluster Cooperative Assignment Cross Layer Scheme for Hybrid
Wireless Sensor Networks
|
4 figures, 9th International Symposium on Communication and
Information Technology 2009 (ISCIT 2009), September 28-30, 2009, South Korea
| null |
10.1109/ISCIT.2009.5341234
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The dual-cross scenario of the hybrid wireless sensor networks (WSNs) is
studied and a novel MIMO Cluster Cooperative Assignment Cross Layer Scheduling
Scheme (MCCA-CLSS) is proposed in this paper. The comparison and the
predominance of the proposed scheme are demonstrated, the clusters are
optimized. With the help of the simulations, the relative energy consumption
and the end-to-end blocking probability are all improved. The addressing ratio
of success in the condition of the unchanged parameters and external
information can be increased and the network can tolerate more hops to support
reliable transportation by the proposed scheme.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 10:38:50 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Dec 2009 05:52:24 GMT"
},
{
"version": "v3",
"created": "Fri, 6 Aug 2010 08:14:28 GMT"
}
] | 2010-08-09T00:00:00 |
[
[
"Zhong",
"Yingji",
""
],
[
"Kwak",
"Kyung Sup",
""
],
[
"Ullah",
"Sana",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.1512
|
Sana Ullah
|
Yingji Zhong, Sana Ullah, and Kyung Sup Kwak
|
A Novel Cross Layer Scheme for Multi-Channel Hybrid Cognitive Ad-hoc
Networks
|
3 figures, KICS Summer Conference 08, Jeju Island, South Korea
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A special scenario of the topology in the hybrid Cognitive Ad-hoc networks is
studied and a novel cross layer scheme is proposed in this paper. The proposed
scheme integrated the attributes both of the new performance evaluation machine
check time metric and the topology space in special scenario. The topology and
power consumption of each node can all be optimized due to the minimum link
occupation with the help of this scheme. Simulation results show that the novel
scheme can give schedule guarantee to the multi-channel networks in the
variable node loads and transmission powers, and make the node stable to
support multi-hops at the same time.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 10:40:52 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Zhong",
"Yingji",
""
],
[
"Ullah",
"Sana",
""
],
[
"Kwak",
"Kyung Sup",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.1514
|
Sana Ullah
|
Murad Ali, Sana Ullah, and Pervez Khan
|
Managing Innovation and Technology in Developing Countries
|
The 5th annual International New Exploratory Technologies Conference
2008 (NEXT 2008), Turku, Finland
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Innovation and technology management is an inevitable issue in the high end
technological and innovative organizations. Today, most of the innovations are
limited with developed countries like USA, Japan and Europe while developing
countries are still behind in the field of innovation and management of
technology. But it is also becoming a subject for rapid progress and
development in developing countries. Innovation and technology environment in
developing countries are by nature, problematic, characterized by poor business
models, political instability and governance conditions, low education level
and lack of world-class research universities, an underdeveloped and mediocre
physical infrastructure, and lack of solid technology based on trained human
resources. This paper provides a theoretical and conceptual framework analysis
for managing innovation and technology in developing countries like India and
China. We present the issues and challenges in innovation and technology
management and come up with proposed solutions.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 10:51:47 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Ali",
"Murad",
""
],
[
"Ullah",
"Sana",
""
],
[
"Khan",
"Pervez",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0911.1516
|
Sana Ullah
|
Sana Ullah, M.A. Khan, Kyung Sup Kwak
|
A Discourse-based Approach in Text-based Machine Translation
|
1 figure, 3 tables, ICCIT 07, Vol. 3, pp 1073-1074, Busan, June 2007
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a theoretical research based approach to ellipsis
resolution in machine translation. The formula of discourse is applied in order
to resolve ellipses. The validity of the discourse formula is analyzed by
applying it to the real world text, i.e., newspaper fragments. The source text
is converted into mono-sentential discourses where complex discourses require
further dissection either directly into primitive discourses or first into
compound discourses and later into primitive ones. The procedure of dissection
needs further improvement, i.e., discovering as many primitive discourse forms
as possible. An attempt has been made to investigate new primitive discourses
or patterns from the given text.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 10:57:04 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Jul 2010 08:49:34 GMT"
}
] | 2010-07-29T00:00:00 |
[
[
"Ullah",
"Sana",
""
],
[
"Khan",
"M. A.",
""
],
[
"Kwak",
"Kyung Sup",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0911.1517
|
Sana Ullah
|
Sana Ullah, M.Asdaque Hussain, and Kyung Sup Kwak
|
Resolution of Unidentified Words in Machine Translation
|
4 pages, 2 figures, 2 tables, The 4th annual International New
Exploratory Technologies Conference 2007 (NEXT 2007), Seoul, South Korea
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a mechanism of resolving unidentified lexical units in
Text-based Machine Translation (TBMT). In a Machine Translation (MT) system it
is unlikely to have a complete lexicon and hence there is intense need of a new
mechanism to handle the problem of unidentified words. These unknown words
could be abbreviations, names, acronyms and newly introduced terms. We have
proposed an algorithm for the resolution of the unidentified words. This
algorithm takes discourse unit (primitive discourse) as a unit of analysis and
provides real time updates to the lexicon. We have manually applied the
algorithm to news paper fragments. Along with anaphora and cataphora
resolution, many unknown words especially names and abbreviations were updated
to the lexicon.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 13:52:05 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Jul 2010 10:45:45 GMT"
}
] | 2010-07-29T00:00:00 |
[
[
"Ullah",
"Sana",
""
],
[
"Hussain",
"M. Asdaque",
""
],
[
"Kwak",
"Kyung Sup",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0911.1520
|
Sana Ullah
|
Ahasanun Nessa, M.A. Ameen, Sana Ullah, and Kyung Sup Kwak
|
Applicability of Telemedicine in Bangladesh: Current Status and Future
Prospects
|
ICCIT 08, Vol. 1, pp.948-953, Busan, November 2008
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Telemedicine refers to the use of information and communication technology to
provide and support health care mainly for the purpose of providing
consultation. It is also a way to provide medical procedures or examinations to
remote locations. It has the potential to improve both the quality and the
access to health care services delivery while lowering costs even in the
scarcity of resources. Understanding the potentiality of telemedicine, many
developing countries are implementing telemedicine to provide health care
facility to remote area where health care facilities are deficient. Bangladesh
is not an exception to this either. In this paper we mention the reasons why
Bangladesh has to move for telemedicine. We also present the past and on-going
telemedicine activities and projects in Bangladesh. Analyzing these projects we
have found out some factors which should be assessed carefully for successful
implementation of telemedicine application. Finally we propose a prototype
telemedicine network for Bangladesh that can improve health facilities through
telemedicine by making a connection between rural health facility providers and
special hospitals.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 11:32:38 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Nessa",
"Ahasanun",
""
],
[
"Ameen",
"M. A.",
""
],
[
"Ullah",
"Sana",
""
],
[
"Kwak",
"Kyung Sup",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0911.1544
|
Sana Ullah
|
Sana Ullah, Xizhi An, and Kyung Sup Kwak
|
Towards Power Efficient MAC Protocol for In-Body and On-Body Sensor
Networks
|
11 pages, 5 figures, 3 tables,KES AMSTA 09, LNAI 5559, pp.335-345,
Uppsala, June 2009. arXiv admin note: text overlap with arXiv:0911.1507
| null |
10.1007/978-3-642-01665-3_34
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents an empirical discussion on the design and implementation
of a power-efficient Medium Access Control (MAC) protocol for in-body and
on-body sensor networks. We analyze the performance of a beacon-enabled IEEE
802.15.4, PB-TDMA, and S-MAC protocols for on-body sensor networks. We further
present a Traffic Based Wakeup Mechanism that utilizes the traffic patterns of
the BAN Nodes (BNs) to accommodate the entire BSN traffic. To enable a logical
connection between different BNs working on different frequency bands, a method
called Bridging function is proposed. The Bridging function integrates all BNs
working on different bands into a complete BSN.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 16:40:24 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Feb 2010 08:44:06 GMT"
}
] | 2018-10-26T00:00:00 |
[
[
"Ullah",
"Sana",
""
],
[
"An",
"Xizhi",
""
],
[
"Kwak",
"Kyung Sup",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.1546
|
Sana Ullah
|
Sana Ullah, Henry Higgins, M.Arif Siddiqui, and Kyung Sup Kwak
|
A Study of Implanted and Wearable Body Sensor Networks
|
KES-AMSTA 08, LNAI 4953, pp. 464-473, Incheon, March 2008
| null |
10.1007/978-3-540-78582-8_47
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent advances in intelligent sensors, microelectronics and integrated
circuit, system-on-chip design and low power wireless communication introduced
the development of miniaturised and autonomous sensor nodes. These tiny sensor
nodes can be deployed to develop a proactive Body Sensor Network (BSN). The
rapid advancement in ultra low-power RF (radio frequency) technology enables
invasive and non-invasive devices to communicate with a remote station. This
communication revolutionizes healthcare system by enabling long term health
monitoring of a patient and providing real time feedback to the medical
experts. In this paper, we present In-body and On-body communication networks
with a special focus on the methodologies of wireless communication between
implanted medical devices with external monitoring equipment and recent
technological growth in both areas. We also discuss open issues and challenges
in a BSN.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 16:46:59 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Nov 2009 07:47:38 GMT"
},
{
"version": "v3",
"created": "Tue, 30 Oct 2018 01:22:08 GMT"
}
] | 2018-10-31T00:00:00 |
[
[
"Ullah",
"Sana",
""
],
[
"Higgins",
"Henry",
""
],
[
"Siddiqui",
"M. Arif",
""
],
[
"Kwak",
"Kyung Sup",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.1564
|
Guangwu Xu
|
T. Tony Cai, Lie Wang, Guangwu Xu
|
New Bounds for Restricted Isometry Constants
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we show that if the restricted isometry constant $\delta_k$ of
the compressed sensing matrix satisfies \[ \delta_k < 0.307, \] then $k$-sparse
signals are guaranteed to be recovered exactly via $\ell_1$ minimization when
no noise is present and $k$-sparse signals can be estimated stably in the noisy
case. It is also shown that the bound cannot be substantively improved. An
explicitly example is constructed in which $\delta_{k}=\frac{k-1}{2k-1} < 0.5$,
but it is impossible to recover certain $k$-sparse signals.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 21:58:47 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Cai",
"T. Tony",
""
],
[
"Wang",
"Lie",
""
],
[
"Xu",
"Guangwu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1582
|
Toby Walsh
|
Tyrel Russell and Toby Walsh
|
Manipulating Tournaments in Cup and Round Robin Competitions
|
Proceedings of Algorithmic Decision Theory, First International
Conference, ADT 2009, Venice, Italy, October 20-23, 2009
| null |
10.1007/978-3-642-04428-1_3
| null |
cs.AI cs.GT cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In sports competitions, teams can manipulate the result by, for instance,
throwing games. We show that we can decide how to manipulate round robin and
cup competitions, two of the most popular types of sporting competitions in
polynomial time. In addition, we show that finding the minimal number of games
that need to be thrown to manipulate the result can also be determined in
polynomial time. Finally, we show that there are several different variations
of standard cup competitions where manipulation remains polynomial.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 03:57:45 GMT"
}
] | 2012-04-18T00:00:00 |
[
[
"Russell",
"Tyrel",
""
],
[
"Walsh",
"Toby",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0911.1583
|
Johan Bollen
|
Johan Bollen, Alberto Pepe and Huina Mao
|
Modeling public mood and emotion: Twitter sentiment and socio-economic
phenomena
|
submitted to WWW2010
|
Proceedings of the Fifth International AAAI Conference on Weblogs
and Social Media (ICWSM 2011), 17-21 July 2011, Barcelona, Spain
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Microblogging is a form of online communication by which users broadcast
brief text updates, also known as tweets, to the public or a selected circle of
contacts. A variegated mosaic of microblogging uses has emerged since the
launch of Twitter in 2006: daily chatter, conversation, information sharing,
and news commentary, among others. Regardless of their content and intended
use, tweets often convey pertinent information about their author's mood
status. As such, tweets can be regarded as temporally-authentic microscopic
instantiations of public mood state. In this article, we perform a sentiment
analysis of all public tweets broadcasted by Twitter users between August 1 and
December 20, 2008. For every day in the timeline, we extract six dimensions of
mood (tension, depression, anger, vigor, fatigue, confusion) using an extended
version of the Profile of Mood States (POMS), a well-established psychometric
instrument. We compare our results to fluctuations recorded by stock market and
crude oil price indices and major events in media and popular culture, such as
the U.S. Presidential Election of November 4, 2008 and Thanksgiving Day. We
find that events in the social, political, cultural and economic sphere do have
a significant, immediate and highly specific effect on the various dimensions
of public mood. We speculate that large scale analyses of mood can provide a
solid platform to model collective emotive trends in terms of their predictive
value with regards to existing social as well as economic indicators.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 04:07:03 GMT"
}
] | 2011-03-29T00:00:00 |
[
[
"Bollen",
"Johan",
""
],
[
"Pepe",
"Alberto",
""
],
[
"Mao",
"Huina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0911.1619
|
Paul D\"utting
|
Paul D\"utting, Monika Henzinger and Ingmar Weber
|
On the Pricing of Recommendations and Recommending Strategically
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
If you recommend a product to me and I buy it, how much should you be paid by
the seller? And if your sole interest is to maximize the amount paid to you by
the seller for a sequence of recommendations, how should you recommend
optimally if I become more inclined to ignore you with each irrelevant
recommendation you make? Finding an answer to these questions is a key
challenge in all forms of marketing that rely on and explore social ties;
ranging from personal recommendations to viral marketing.
In the first part of this paper, we show that there can be no pricing
mechanism that is "truthful" with respect to the seller, and we use solution
concepts from coalitional game theory, namely the Core, the Shapley Value, and
the Nash Bargaining Solution, to derive provably "fair" prices for settings
with one or multiple recommenders. We then investigate pricing mechanisms for
the setting where recommenders have different "purchase arguments". Here we
show that it might be beneficial for the recommenders to withhold some of their
arguments, unless anonymity-proof solution concepts, such as the
anonymity-proof Shapley value, are used.
In the second part of this paper, we analyze the setting where the
recommendee loses trust in the recommender for each irrelevant recommendation.
Here we prove that even if the recommendee regains her initial trust on each
successful recommendation, the expected total profit the recommender can make
over an infinite period is bounded. This can only be overcome when the
recommendee also incrementally regains trust during periods without any
recommendation. Here, we see an interesting connection to "banner blindness",
suggesting that showing fewer ads can lead to a higher long-term profit.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 10:21:42 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Dütting",
"Paul",
""
],
[
"Henzinger",
"Monika",
""
],
[
"Weber",
"Ingmar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0911.1626
|
Marek Cygan
|
Marek Cygan, Lukasz Kowalik, Marcin Mucha, Marcin Pilipczuk, Piotr
Sankowski
|
Fast Approximation in Subspaces by Doubling Metric Decomposition
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we propose and study a new complexity model for approximation
algorithms. The main motivation are practical problems over large data sets
that need to be solved many times for different scenarios, e.g., many multicast
trees that need to be constructed for different groups of users. In our model
we allow a preprocessing phase, when some information of the input graph
$G=(V,E)$ is stored in a limited size data structure. Next, the data structure
enables processing queries of the form ``solve problem A for an input
$S\subseteq V$''. We consider problems like {\sc Steiner Forest}, {\sc Facility
Location}, {\sc $k$-Median}, {\sc $k$-Center} and {\sc TSP} in the case when
the graph induces a doubling metric. Our main results are data structures of
near-linear size that are able to answer queries in time close to linear in
$|S|$. This improves over typical worst case reuniting time of approximation
algorithms in the classical setting which is $\Omega(|E|)$ independently of the
query size. In most cases, our approximation guarantees are arbitrarily close
to those in the classical setting. Additionally, we present the first fully
dynamic algorithm for the Steiner tree problem.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 10:29:49 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Jun 2010 08:01:58 GMT"
}
] | 2010-06-18T00:00:00 |
[
[
"Cygan",
"Marek",
""
],
[
"Kowalik",
"Lukasz",
""
],
[
"Mucha",
"Marcin",
""
],
[
"Pilipczuk",
"Marcin",
""
],
[
"Sankowski",
"Piotr",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.1647
|
Ajinkya Kale
|
Ajinkya Kale, Ananth Chakravarthy, Nitin Jadhav
|
An extendible User-Command Framework based on tagging system
| null | null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Memorizing the user commands has been a problem since long. In this study we
try to propose solutions to overcome two problems - the problem of selecting
appropriate commands names during application development and the problem of
memorizing these command names. The proposed solution includes a framework in
which the applications can plug into, to get their application commands and
corresponding tags in to the new command execution application.We also propose
a mechanism where user can generate her own set of tags for a command and share
those with peers.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 11:49:50 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Kale",
"Ajinkya",
""
],
[
"Chakravarthy",
"Ananth",
""
],
[
"Jadhav",
"Nitin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0911.1672
|
Balaji Akula
|
Balaji Akula, James Cusick
|
Biological Computing Fundamentals and Futures
|
Introduction to Biological computing, 7 pages
| null | null | null |
cs.CE q-bio.OT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The fields of computing and biology have begun to cross paths in new ways. In
this paper a review of the current research in biological computing is
presented. Fundamental concepts are introduced and these foundational elements
are explored to discuss the possibilities of a new computing paradigm. We
assume the reader to possess a basic knowledge of Biology and Computer Science
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 13:16:01 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Akula",
"Balaji",
""
],
[
"Cusick",
"James",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.OT",
"description": "Work in quantitative biology that does not fit into the other q-bio classifications",
"span": "(Other Quantitative Biology)"
}
] |
0911.1677
|
Bernd Schuh
|
Bernd R. Schuh
|
Logical Primes, Metavariables and Satisfiability
| null | null | null | null |
math.LO cs.CC cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For formulas F of propositional calculus I introduce a "metavariable" MF and
show how it can be used to define an algorithm for testing satisfiability. MF
is a formula which is true/false under all possible truth assignments iff F is
satisfiable/unsatisfiable. In this sense MF is a metavariable with the
"meaning" 'F is SAT'. For constructing MF a group of transformations of the
basic variables ai is used which corresponds to 'flipping" literals to their
negation. The whole procedure corresponds to branching algorithms where a
formula is split with respect to the truth values of its variables, one by one.
Each branching step corresponds to an approximation to the metatheorem which
doubles the chance to find a satisfying truth assignment but also doubles the
length of the formulas to be tested, in principle. Simplifications arise by
additional length reductions. I also discuss the notion of "logical primes" and
show that each formula can be written as a uniquely defined product of such
prime factors. Satisfying truth assignments can be found by determining the
"missing" primes in the factorization of a formula.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 13:29:53 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Schuh",
"Bernd R.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.1678
|
Joao Marques-Silva
|
Ashish Darbari and Bernd Fischer and Joao Marques-Silva
|
Industrial-Strength Formally Certified SAT Solving
| null | null | null | null |
cs.LO cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Boolean Satisfiability (SAT) solvers are now routinely used in the
verification of large industrial problems. However, their application in
safety-critical domains such as the railways, avionics, and automotive
industries requires some form of assurance for the results, as the solvers can
(and sometimes do) have bugs. Unfortunately, the complexity of modern, highly
optimized SAT solvers renders impractical the development of direct formal
proofs of their correctness. This paper presents an alternative approach where
an untrusted, industrial-strength, SAT solver is plugged into a trusted,
formally certified, SAT proof checker to provide industrial-strength certified
SAT solving. The key novelties and characteristics of our approach are (i) that
the checker is automatically extracted from the formal development, (ii), that
the combined system can be used as a standalone executable program independent
of any supporting theorem prover, and (iii) that the checker certifies any SAT
solver respecting the agreed format for satisfiability and unsatisfiability
claims. The core of the system is a certified checker for unsatisfiability
claims that is formally designed and verified in Coq. We present its formal
design and outline the correctness proofs. The actual standalone checker is
automatically extracted from the the Coq development. An evaluation of the
certified checker on a representative set of industrial benchmarks from the SAT
Race Competition shows that, albeit it is slower than uncertified SAT checkers,
it is significantly faster than certified checkers implemented on top of an
interactive theorem prover.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 13:42:55 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Dec 2009 19:31:03 GMT"
}
] | 2009-12-17T00:00:00 |
[
[
"Darbari",
"Ashish",
""
],
[
"Fischer",
"Bernd",
""
],
[
"Marques-Silva",
"Joao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0911.1681
|
Sana Ullah
|
Sana Ullah, Murad Ali, Asdaque Hussain, Kyung Sup Kwak
|
Applications of UWB Technology
|
Report (informal)
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent advances in wideband impulse technology, low power communication along
with unlicensed band have enabled ultra wide band (UWB) as a leading technology
for future wireless applications. This paper outlines the applications of
emerging UWB technology in a private and commercial sector. We further talk
about UWB technology for a wireless body area network (WBAN).
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 13:54:06 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jul 2010 16:42:49 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Apr 2015 13:32:18 GMT"
}
] | 2015-04-03T00:00:00 |
[
[
"Ullah",
"Sana",
""
],
[
"Ali",
"Murad",
""
],
[
"Hussain",
"Asdaque",
""
],
[
"Kwak",
"Kyung Sup",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.1685
|
Damien Chablat
|
Liang Ma (IRCCyN), Wei Zhang (DIE), Damien Chablat (IRCCyN), Fouad
Bennis (IRCCyN), Fran\c{c}ois Guillaume
|
Multi-Objective Optimisation Method for Posture Prediction and Analysis
with Consideration of Fatigue Effect and its Application Case
| null |
Computers & Industrial Engineering 57, 4 (2009) 1235-1246
|
10.1016/j.cie.2009.06.003
| null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Automation technique has been widely used in manufacturing industry, but
there are still manual handling operations required in assembly and maintenance
work in industry. Inappropriate posture and physical fatigue might result in
musculoskeletal disorders (MSDs) in such physical jobs. In ergonomics and
occupational biomechanics, virtual human modelling techniques have been
employed to design and optimize the manual operations in design stage so as to
avoid or decrease potential MSD risks. In these methods, physical fatigue is
only considered as minimizing the muscle or joint stress, and the fatigue
effect along time for the posture is not considered enough. In this study,
based on the existing methods and multiple objective optimisation method (MOO),
a new posture prediction and analysis method is proposed for predicting the
optimal posture and evaluating the physical fatigue in the manual handling
operation. The posture prediction and analysis problem is mathematically
described and a special application case is demonstrated for analyzing a
drilling assembly operation in European Aeronautic Defence & Space Company
(EADS) in this paper.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 13:57:25 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Ma",
"Liang",
"",
"IRCCyN"
],
[
"Zhang",
"Wei",
"",
"DIE"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Bennis",
"Fouad",
"",
"IRCCyN"
],
[
"Guillaume",
"François",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0911.1691
|
Rasmus Resen Amossen
|
Rasmus Resen Amossen
|
Vertical partitioning of relational OLTP databases using integer
programming
| null | null | null | null |
cs.DB cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A way to optimize performance of relational row store databases is to reduce
the row widths by vertically partitioning tables into table fractions in order
to minimize the number of irrelevant columns/attributes read by each
transaction. This paper considers vertical partitioning algorithms for
relational row-store OLTP databases with an H-store-like architecture, meaning
that we would like to maximize the number of single-sited transactions. We
present a model for the vertical partitioning problem that, given a schema
together with a vertical partitioning and a workload, estimates the costs
(bytes read/written by storage layer access methods and bytes transferred
between sites) of evaluating the workload on the given partitioning. The cost
model allows for arbitrarily prioritizing load balancing of sites vs. total
cost minimization. We show that finding a minimum-cost vertical partitioning in
this model is NP-hard and present two algorithms returning solutions in which
single-sitedness of read queries is preserved while allowing column replication
(which may allow a drastically reduced cost compared to disjoint partitioning).
The first algorithm is a quadratic integer program that finds optimal
minimum-cost solutions with respect to the model, and the second algorithm is a
more scalable heuristic based on simulated annealing. Experiments show that the
algorithms can reduce the cost of the model objective by 37% when applied to
the TPC-C benchmark and the heuristic is shown to obtain solutions with cost
close to the ones found using the quadratic program.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 15:03:31 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jan 2010 20:28:21 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Feb 2010 09:43:50 GMT"
}
] | 2010-02-16T00:00:00 |
[
[
"Amossen",
"Rasmus Resen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0911.1696
|
Julia Kempe
|
Andris Ambainis, Julia Kempe, Or Sattath
|
A Quantum Lovasz Local Lemma
|
19 pages
|
Journal of the ACM, Volume 59 Issue 5, October 2012, Article No.
24
|
10.1145/2371656.2371659
| null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Lovasz Local Lemma (LLL) is a powerful tool in probability theory to show
the existence of combinatorial objects meeting a prescribed collection of
"weakly dependent" criteria. We show that the LLL extends to a much more
general geometric setting, where events are replaced with subspaces and
probability is replaced with relative dimension, which allows to lower bound
the dimension of the intersection of vector spaces under certain independence
conditions. Our result immediately applies to the k-QSAT problem: For instance
we show that any collection of rank 1 projectors with the property that each
qubit appears in at most $2^k/(e \cdot k)$ of them, has a joint satisfiable
state.
We then apply our results to the recently studied model of random k-QSAT.
Recent works have shown that the satisfiable region extends up to a density of
1 in the large k limit, where the density is the ratio of projectors to qubits.
Using a hybrid approach building on work by Laumann et al. we greatly extend
the known satisfiable region for random k-QSAT to a density of
$\Omega(2^k/k^2)$. Since our tool allows us to show the existence of joint
satisfying states without the need to construct them, we are able to penetrate
into regions where the satisfying states are conjectured to be entangled,
avoiding the need to construct them, which has limited previous approaches to
product states.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 15:07:25 GMT"
}
] | 2013-10-10T00:00:00 |
[
[
"Ambainis",
"Andris",
""
],
[
"Kempe",
"Julia",
""
],
[
"Sattath",
"Or",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.1707
|
Michel Nabaa
|
Michel Nabaa (LITIS), Cyrille Bertelle (LITIS), Antoine Dutot (LITIS),
Damien Olivier (LITIS), Pascal Mallet
|
A Dynamic Vulnerability Map to Assess the Risk of Road Network Traffic
Utilization
| null |
International Symposium on Risk Models and Applications, Ki\`ev :
Ukraine (2008)
| null | null |
cs.AI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Le Havre agglomeration (CODAH) includes 16 establishments classified Seveso
with high threshold. In the literature, we construct vulnerability maps to help
decision makers assess the risk. Such approaches remain static and do take into
account the population displacement in the estimation of the vulnerability. We
propose a decision making tool based on a dynamic vulnerability map to evaluate
the difficulty of evacuation in the different sectors of CODAH. We use a
Geographic Information system (GIS) to visualize the map which evolves with the
road traffic state through a detection of communities in large graphs
algorithm.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 15:43:54 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Nabaa",
"Michel",
"",
"LITIS"
],
[
"Bertelle",
"Cyrille",
"",
"LITIS"
],
[
"Dutot",
"Antoine",
"",
"LITIS"
],
[
"Olivier",
"Damien",
"",
"LITIS"
],
[
"Mallet",
"Pascal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.1708
|
Pierrick Tranouez
|
Pierrick Tranouez (LITIS, IDEES), Antoine Dutot (LITIS)
|
Different goals in multiscale simulations and how to reach them
| null |
Complex Systems and Self-organization Modelling, Bertelle,
Cyrille; Duchamp, G\'erard H.E.; Kadri-Dahmani, Hakima (Ed.) (2009) 29-39
|
10.1007/978-3-540-88073-8
| null |
cs.AI nlin.AO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we sum up our works on multiscale programs, mainly simulations.
We first start with describing what multiscaling is about, how it helps
perceiving signal from a background noise in a ?ow of data for example, for a
direct perception by a user or for a further use by another program. We then
give three examples of multiscale techniques we used in the past, maintaining a
summary, using an environmental marker introducing an history in the data and
finally using a knowledge on the behavior of the different scales to really
handle them at the same time.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 15:46:17 GMT"
}
] | 2016-11-25T00:00:00 |
[
[
"Tranouez",
"Pierrick",
"",
"LITIS, IDEES"
],
[
"Dutot",
"Antoine",
"",
"LITIS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
0911.1713
|
Mathieu Bogaerts
|
Mathieu Bogaerts
|
Isometries and Construction of Permutation Arrays
|
6 pages, 2 tables
| null | null | null |
math.CO cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An (n,d)-permutation code is a subset C of Sym(n) such that the Hamming
distance d_H between any two distinct elements of C is at least equal to d. In
this paper, we use the characterisation of the isometry group of the metric
space (Sym(n),d_H) in order to develop generating algorithms with rejection of
isomorphic objects. To classify the (n,d)-permutation codes up to isometry, we
construct invariants and study their efficiency. We give the numbers of
non-isometric (4,3)- and (5,4)- permutation codes. Maximal and balanced
(n,d)-permutation codes are enumerated in a constructive way.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 16:19:15 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Bogaerts",
"Mathieu",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1720
|
Carlos P. Roca
|
Carlos P. Roca, Jos\'e A. Cuesta and Angel S\'anchez
|
Evolutionary game theory: Temporal and spatial effects beyond replicator
dynamics
|
Review, 48 pages, 26 figures
|
Physics of Life Reviews 6, 208-249 (2009)
|
10.1016/j.plrev.2009.08.001
| null |
q-bio.PE cs.GT physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Evolutionary game dynamics is one of the most fruitful frameworks for
studying evolution in different disciplines, from Biology to Economics. Within
this context, the approach of choice for many researchers is the so-called
replicator equation, that describes mathematically the idea that those
individuals performing better have more offspring and thus their frequency in
the population grows. While very many interesting results have been obtained
with this equation in the three decades elapsed since it was first proposed, it
is important to realize the limits of its applicability. One particularly
relevant issue in this respect is that of non-mean-field effects, that may
arise from temporal fluctuations or from spatial correlations, both neglected
in the replicator equation. This review discusses these temporal and spatial
effects focusing on the non-trivial modifications they induce when compared to
the outcome of replicator dynamics. Alongside this question, the hypothesis of
linearity and its relation to the choice of the rule for strategy update is
also analyzed. The discussion is presented in terms of the emergence of
cooperation, as one of the current key problems in Biology and in other
disciplines.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 16:29:47 GMT"
}
] | 2009-11-14T00:00:00 |
[
[
"Roca",
"Carlos P.",
""
],
[
"Cuesta",
"José A.",
""
],
[
"Sánchez",
"Angel",
""
]
] |
[
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0911.1739
|
Shmuel Friedland
|
Shmuel Friedland
|
Graph isomorphism and volumes of convex bodies
|
9 pages
| null | null | null |
cs.CC cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that a nontrivial graph isomorphism problem of two undirected graphs,
and more generally, the permutation similarity of two given $n\times n$
matrices, is equivalent to equalities of volumes of the induced three convex
bounded polytopes intersected with a given sequence of balls, centered at the
origin with radii $t_i\in (0,\sqrt{n-1})$, where $\{t_i\}$ is an increasing
sequence converging to $\sqrt{n-1}$. These polytopes are characterized by $n^2$
inequalities in at most $n^2$ variables. The existence of fpras for computing
volumes of convex bodies gives rise to a semi-frpas of order $O^*(n^{14})$ at
most to find if given two undirected graphs are isomorphic.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 17:48:36 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Friedland",
"Shmuel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.1741
|
Andrew King
|
Andrew D. King
|
Hitting all maximum cliques with a stable set using lopsided independent
transversals
|
7 pages. v4: Correction to statement of Lemma 8 and clarified proof.
| null |
10.1002/jgt.20532
| null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Rabern recently proved that any graph with omega >= (3/4)(Delta+1) contains a
stable set meeting all maximum cliques. We strengthen this result, proving that
such a stable set exists for any graph with omega > (2/3)(Delta+1). This is
tight, i.e. the inequality in the statement must be strict. The proof relies on
finding an independent transversal in a graph partitioned into vertex sets of
unequal size.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 17:55:06 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Dec 2009 19:35:42 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Mar 2010 15:35:15 GMT"
},
{
"version": "v4",
"created": "Wed, 10 Mar 2010 15:16:08 GMT"
}
] | 2011-02-11T00:00:00 |
[
[
"King",
"Andrew D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0911.1743
|
Ryan Hinton
|
Ryan Hinton (University of Virginia and L-3 Communications CSW) and
Stephen G. Wilson (University of Virginia)
|
Analysis of peeling decoder for MET ensembles
|
Preprint of submission to Information Theory Workshop (ITW) 2010. 5
pages, two figures (from seven files). Processed with PDFLaTeX including
IEEEtran style, amsmath, amsfonts, cite, array, graphicx, and amsthm packages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The peeling decoder introduced by Luby, et al. allows analysis of LDPC
decoding for the binary erasure channel (BEC). For irregular ensembles, they
analyze the decoder state as a Markov process and present a solution to the
differential equations describing the process mean. Multi-edge type (MET)
ensembles allow greater precision through specifying graph connectivity. We
generalize the the peeling decoder for MET ensembles and derive analogous
differential equations. We offer a new change of variables and solution to the
node fraction evolutions in the general (MET) case. This result is preparatory
to investigating finite-length ensemble behavior.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 18:38:53 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Hinton",
"Ryan",
"",
"University of Virginia and L-3 Communications CSW"
],
[
"Wilson",
"Stephen G.",
"",
"University of Virginia"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1745
|
Tuvi Etzion
|
Tuvi Etzion
|
Sequence Folding, Lattice Tiling, and Multidimensional Coding
|
21 pages
| null | null | null |
cs.IT math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Folding a sequence $S$ into a multidimensional box is a well-known method
which is used as a multidimensional coding technique. The operation of folding
is generalized in a way that the sequence $S$ can be folded into various shapes
and not just a box. The new definition of folding is based on a lattice tiling
for the given shape $\cS$ and a direction in the $D$-dimensional integer grid.
Necessary and sufficient conditions that a lattice tiling for $\cS$ combined
with a direction define a folding of a sequence into $\cS$ are derived. The
immediate and most impressive application is some new lower bounds on the
number of dots in two-dimensional synchronization patterns. This can be also
generalized for multidimensional synchronization patterns. The technique and
its application for two-dimensional synchronization patterns, raise some
interesting problems in discrete geometry. We will also discuss these problems.
It is also shown how folding can be used to construct multidimensional
error-correcting codes. Finally, by using the new definition of folding,
multidimensional pseudo-random arrays with various shapes are generated.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 18:55:24 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Etzion",
"Tuvi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1763
|
Marc Harper
|
Marc Harper
|
The Replicator Equation as an Inference Dynamic
|
Added a discussion of the discrete dynamic.
| null | null | null |
math.DS cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The replicator equation is interpreted as a continuous inference equation and
a formal similarity between the discrete replicator equation and Bayesian
inference is described. Further connections between inference and the
replicator equation are given including a discussion of information divergences
and exponential families as solutions for the replicator dynamic, using Fisher
information and information geometry.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 20:38:46 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Dec 2009 19:12:38 GMT"
},
{
"version": "v3",
"created": "Mon, 3 May 2010 21:53:31 GMT"
}
] | 2010-05-05T00:00:00 |
[
[
"Harper",
"Marc",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1764
|
Marc Harper
|
Marc Harper
|
Escort Evolutionary Game Theory
|
Minor typo correction
|
Physica D: Nonlinear Phenomena, Volume 240, Issue 18, 1 September
2011, Pages 1411-1415
|
10.1016/j.physd.2011.04.008
| null |
math.DS cs.IT math.DG math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A family of replicator-like dynamics, called the escort replicator equation,
is constructed using information-geometric concepts and generalized information
entropies and diverenges from statistical thermodynamics. Lyapunov functions
and escort generalizations of basic concepts and constructions in evolutionary
game theory are given, such as an escorted Fisher's Fundamental theorem and
generalizations of the Shahshahani geometry.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 20:41:48 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Dec 2009 19:14:40 GMT"
},
{
"version": "v3",
"created": "Fri, 7 May 2010 20:27:20 GMT"
},
{
"version": "v4",
"created": "Tue, 18 May 2010 00:06:49 GMT"
},
{
"version": "v5",
"created": "Fri, 24 Feb 2012 07:53:20 GMT"
}
] | 2012-02-27T00:00:00 |
[
[
"Harper",
"Marc",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1765
|
Ion Mandoiu
|
Justin Kennedy, Ion I. Mandoiu, and Bogdan Pasaniuc
|
GEDI: Scalable Algorithms for Genotype Error Detection and Imputation
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Genome-wide association studies generate very large datasets that require
scalable analysis algorithms. In this report we describe the GEDI software
package, which implements efficient algorithms for performing several common
tasks in the analysis of population genotype data, including genotype error
detection and correction, imputation of both randomly missing and untyped
genotypes, and genotype phasing. Experimental results show that GEDI achieves
high accuracy with a runtime scaling linearly with the number of markers and
samples. The open source C++ code of GEDI, released under the GNU General
Public License, is available for download at
http://dna.engr.uconn.edu/software/GEDI/
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 23:35:41 GMT"
}
] | 2016-09-08T00:00:00 |
[
[
"Kennedy",
"Justin",
""
],
[
"Mandoiu",
"Ion I.",
""
],
[
"Pasaniuc",
"Bogdan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.1767
|
Yashodhan Kanoria
|
Yashodhan Kanoria, Mohsen Bayati, Christian Borgs, Jennifer Chayes and
Andrea Montanari
|
A Natural Dynamics for Bargaining on Exchange Networks
|
28 pages, 1 figure, second part of this work with different analysis
and stronger results available at arXiv:1004.2079v1 [cs.GT]. This paper
unchanged in update.
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Bargaining networks model the behavior of a set of players that need to reach
pairwise agreements for making profits. Nash bargaining solutions are special
outcomes of such games that are both stable and balanced. Kleinberg and Tardos
proved a sharp algorithmic characterization of such outcomes, but left open the
problem of how the actual bargaining process converges to them. A partial
answer was provided by Azar et al. who proposed a distributed algorithm for
constructing Nash bargaining solutions, but without polynomial bounds on its
convergence rate. In this paper, we introduce a simple and natural model for
this process, and study its convergence rate to Nash bargaining solutions. At
each time step, each player proposes a deal to each of her neighbors. The
proposal consists of a share of the potential profit in case of agreement. The
share is chosen to be balanced in Nash's sense as far as this is feasible (with
respect to the current best alternatives for both players). We prove that,
whenever the Nash bargaining solution is unique (and satisfies a positive gap
condition) this dynamics converges to it in polynomial time. Our analysis is
based on an approximate decoupling phenomenon between the dynamics on different
substructures of the network. This approach may be of general interest for the
analysis of local algorithms on networks.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 00:37:35 GMT"
},
{
"version": "v2",
"created": "Fri, 7 May 2010 18:59:43 GMT"
}
] | 2010-05-10T00:00:00 |
[
[
"Kanoria",
"Yashodhan",
""
],
[
"Bayati",
"Mohsen",
""
],
[
"Borgs",
"Christian",
""
],
[
"Chayes",
"Jennifer",
""
],
[
"Montanari",
"Andrea",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0911.1783
|
Anton Leykin
|
Anton Leykin
|
Numerical Algebraic Geometry for Macaulay2
|
7 pages
|
Numerical algebraic geometry. JSAG, 3:5-10, 2011
| null |
Mittag-Leffler-2011spring
|
math.AG cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Numerical Algebraic Geometry uses numerical data to describe algebraic
varieties. It is based on the methods of numerical polynomial homotopy
continuation, an alternative to the classical symbolic approaches of
computational algebraic geometry. We present a package, the driving idea behind
which is to interlink the existing symbolic methods of Macaulay2 and the
powerful engine of numerical approximate computations. The core procedures of
the package exhibit performance competitive with the other homotopy
continuation software.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 21:17:43 GMT"
},
{
"version": "v2",
"created": "Sun, 22 May 2011 09:40:47 GMT"
}
] | 2011-11-23T00:00:00 |
[
[
"Leykin",
"Anton",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0911.1807
|
Jevin West
|
Jevin West and Theodore Bergstrom and Carl Bergstrom
|
Big Macs and Eigenfactor Scores: Don't Let Correlation Coefficients Fool
You
|
Version 2 This is a response to Phil Davis's 2008 paper
(arXiv:0807.2678)
| null | null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Eigenfactor Metrics provide an alternative way of evaluating scholarly
journals based on an iterative ranking procedure analogous to Google's PageRank
algorithm. These metrics have recently been adopted by Thomson-Reuters and are
listed alongside the Impact Factor in the Journal Citation Reports. But do
these metrics differ sufficiently so as to be a useful addition to the
bibliometric toolbox? Davis (2008) has argued otherwise, based on his finding
of a 0.95 correlation coefficient between Eigenfactor score and Total Citations
for a sample of journals in the field of medicine. This conclusion is mistaken;
here we illustrate the basic statistical fallacy to which Davis succumbed. We
provide a complete analysis of the 2006 Journal Citation Reports and
demonstrate that there are statistically and economically significant
differences between the information provided by the Eigenfactor Metrics and
that provided by Impact Factor and Total Citations.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 00:44:12 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Apr 2010 00:24:18 GMT"
}
] | 2010-05-03T00:00:00 |
[
[
"West",
"Jevin",
""
],
[
"Bergstrom",
"Theodore",
""
],
[
"Bergstrom",
"Carl",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0911.1813
|
Aaron Roth
|
Aaron Roth, Tim Roughgarden
|
Interactive Privacy via the Median Mechanism
|
Appeared in STOC 2010
| null | null | null |
cs.CR cs.CC cs.DB cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define a new interactive differentially private mechanism -- the median
mechanism -- for answering arbitrary predicate queries that arrive online.
Relative to fixed accuracy and privacy constraints, this mechanism can answer
exponentially more queries than the previously best known interactive privacy
mechanism (the Laplace mechanism, which independently perturbs each query
result). Our guarantee is almost the best possible, even for non-interactive
privacy mechanisms. Conceptually, the median mechanism is the first privacy
mechanism capable of identifying and exploiting correlations among queries in
an interactive setting.
We also give an efficient implementation of the median mechanism, with
running time polynomial in the number of queries, the database size, and the
domain size. This efficient implementation guarantees privacy for all input
databases, and accurate query results for almost all input databases. The
dependence of the privacy on the number of queries in this mechanism improves
over that of the best previously known efficient mechanism by a
super-polynomial factor, even in the non-interactive setting.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 03:55:44 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Jan 2011 16:09:18 GMT"
}
] | 2011-01-20T00:00:00 |
[
[
"Roth",
"Aaron",
""
],
[
"Roughgarden",
"Tim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.1826
|
William Martin
|
J. H. Koolen (USTC), W. S. Lee (POSTECH), W. J. Martin (WPI), H.
Tanaka (Tohoku)
|
Arithmetic completely regular codes
|
26 pages, 1 figure
|
Discrete Math. Theor. Comput. Sci. 17 (2016) 59-76
|
10.46298/dmtcs.2150
| null |
math.CO cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we explore completely regular codes in the Hamming graphs and
related graphs. Experimental evidence suggests that many completely regular
codes have the property that the eigenvalues of the code are in arithmetic
progression. In order to better understand these "arithmetic completely regular
codes", we focus on cartesian products of completely regular codes and products
of their corresponding coset graphs in the additive case. Employing earlier
results, we are then able to prove a theorem which nearly classifies these
codes in the case where the graph admits a completely regular partition into
such codes (e.g, the cosets of some additive completely regular code).
Connections to the theory of distance-regular graphs are explored and several
open questions are posed.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 04:32:59 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Jan 2014 19:50:32 GMT"
},
{
"version": "v3",
"created": "Thu, 11 Feb 2016 00:35:24 GMT"
}
] | 2021-11-02T00:00:00 |
[
[
"Koolen",
"J. H.",
"",
"USTC"
],
[
"Lee",
"W. S.",
"",
"POSTECH"
],
[
"Martin",
"W. J.",
"",
"WPI"
],
[
"Tanaka",
"H.",
"",
"Tohoku"
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1842
|
Laurent Romary
|
Nancy Ide (INRIA Lorraine - LORIA), Laurent Romary (INRIA Lorraine -
LORIA)
|
Standards for Language Resources
|
Colloque avec actes et comit\'e de lecture. internationale
|
IRCS Workshop on Linguistic Databases, Philadelphia : United
States (2001)
| null |
A01-R-287 || ide01b
|
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The goal of this paper is two-fold: to present an abstract data model for
linguistic annotations and its implementation using XML, RDF and related
standards; and to outline the work of a newly formed committee of the
International Standards Organization (ISO), ISO/TC 37/SC 4 Language Resource
Management, which will use this work as its starting point.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 07:12:03 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Ide",
"Nancy",
"",
"INRIA Lorraine - LORIA"
],
[
"Romary",
"Laurent",
"",
"INRIA Lorraine -\n LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0911.1849
|
Omar El Ayach
|
Omar El Ayach, Steven W. Peters, and Robert W. Heath Jr
|
The Feasibility of Interference Alignment over Measured MIMO-OFDM
Channels
|
13 double column pages, 16 figures, accepted for publication in IEEE
Transactions on Vehicular Technology
|
IEEE Transactions on Vehicular Technology, vol. 59, no. 9, pp.
4309-4321, November 2010
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Interference alignment (IA) has been shown to achieve the maximum achievable
degrees of freedom in the interference channel. This results in sum rate
scaling linearly with the number of users in the high signal-to-noise-ratio
(SNR) regime. Linear scaling is achieved by precoding transmitted signals to
align interference subspaces at the receivers, given channel knowledge of all
transmit-receive pairs, effectively reducing the number of discernible
interferers. The theory of IA was derived under assumptions about the richness
of scattering in the propagation channel; practical channels do not guarantee
such ideal characteristics. This paper presents the first experimental study of
IA in measured multiple-input multiple-output orthogonal frequency-division
multiplexing (MIMO-OFDM) interference channels. Our measurement campaign
includes a variety of indoor and outdoor measurement scenarios at The
University of Texas at Austin. We show that IA achieves the claimed scaling
factors, or degrees of freedom, in several measured channel settings for a 3
user, 2 antennas per node setup. In addition to verifying the claimed
performance, we characterize the effect of Kronecker spatial correlation on sum
rate and present two other correlation measures, which we show are more tightly
related to the achieved sum rate.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 18:36:04 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Feb 2010 06:42:10 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Oct 2010 23:01:48 GMT"
}
] | 2013-04-15T00:00:00 |
[
[
"Ayach",
"Omar El",
""
],
[
"Peters",
"Steven W.",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.1851
|
Kees Middelburg
|
J. A. Bergstra, C. A. Middelburg
|
Functional units for natural numbers
|
17 pages; notational mistakes in tables 5 and 6 corrected; erroneous
definition at bottom of page 9 corrected
| null | null |
PRG0913
|
cs.PL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Interaction with services provided by an execution environment forms part of
the behaviours exhibited by instruction sequences under execution. Mechanisms
related to the kind of interaction in question have been proposed in the
setting of thread algebra. Like thread, service is an abstract behavioural
concept. The concept of a functional unit is similar to the concept of a
service, but more concrete. A state space is inherent in the concept of a
functional unit, whereas it is not inherent in the concept of a service. In
this paper, we establish the existence of a universal computable functional
unit for natural numbers and related results.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 08:09:33 GMT"
},
{
"version": "v2",
"created": "Sat, 8 May 2010 12:36:02 GMT"
},
{
"version": "v3",
"created": "Sun, 17 Oct 2010 20:26:13 GMT"
}
] | 2010-10-19T00:00:00 |
[
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.1862
|
EPTCS
|
Luca Aceto (Reykjavik University), Anna Ingolfsdottir (Reykjavik
University), Joshua Sack (Reykjavik University)
|
Characteristic Formulae for Fixed-Point Semantics: A General Framework
| null |
EPTCS 8, 2009, pp. 1-15
|
10.4204/EPTCS.8.1
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The literature on concurrency theory offers a wealth of examples of
characteristic-formula constructions for various behavioural relations over
finite labelled transition systems and Kripke structures that are defined in
terms of fixed points of suitable functions. Such constructions and their
proofs of correctness have been developed independently, but have a common
underlying structure. This study provides a general view of characteristic
formulae that are expressed in terms of logics with a facility for the
recursive definition of formulae. It is shown how several examples of
characteristic-formula constructions from the literature can be recovered as
instances of the proposed general framework, and how the framework can be used
to yield novel constructions.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 09:14:55 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Aceto",
"Luca",
"",
"Reykjavik University"
],
[
"Ingolfsdottir",
"Anna",
"",
"Reykjavik\n University"
],
[
"Sack",
"Joshua",
"",
"Reykjavik University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.1891
|
Juha Partala
|
Juha Partala
|
A note on conjugacy search and racks
|
6 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that for every effective left conjugacy closed left quasigroup, there
is an induced rack that retains the conjugation structure of the left
translations. This means that cryptographic protocols relying on conjugacy
search can be secure only if conjugacy search of left translations is
infeasible in the induced rack. We note that, in fact, protocols based on
conjugacy search could be simply implemented using a rack. We give an
exposition of the Anshel-Anshel-Goldfeld protocol in such a case.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 11:57:34 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Partala",
"Juha",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.1900
|
Daniel Raible
|
Daniel Raible, Henning Fernau
|
A Faster Exact Algorithm for the Directed Maximum Leaf Spanning Tree
Problem
| null | null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a directed graph $G=(V,A)$, the Directed Maximum Leaf Spanning Tree
problem asks to compute a directed spanning tree (i.e., an out-branching) with
as many leaves as possible. By designing a Branch-and-Reduced algorithm
combined with the Measure & Conquer technique for running time analysis, we
show that the problem can be solved in time $\Oh^*(1.9043^n)$ using polynomial
space. Hitherto, there have been only few examples. Provided exponential space
this run time upper bound can be lowered to $\Oh^*(1.8139^n)$.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 12:50:07 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Nov 2009 14:12:27 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Raible",
"Daniel",
""
],
[
"Fernau",
"Henning",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.1934
|
Gustavo L. Gilardoni
|
Gustavo L. Gilardoni
|
On a Gel'fand-Yaglom-Peres theorem for f-divergences
|
1+4 pages, no figures
| null | null | null |
cs.IT math.IT math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is shown that the $f$-divergence between two probability measures $P$ and
$R$ equals the supremum of the same $f$-divergence computed over all finite
measurable partitions of the original space, thus generalizing results
previously proved by Gel'fand and Yaglom and by Peres for the Information
Divergence and more recently by Dukkipati, Bhatnagar and Murty for the Tsallis'
and Renyi's divergences.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 15:58:57 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Gilardoni",
"Gustavo L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0911.1965
|
Nitin Madnani
|
Nitin Madnani, Hongyan Jing, Nanda Kambhatla and Salim Roukos
|
Active Learning for Mention Detection: A Comparison of Sentence
Selection Strategies
|
12 pages, 9 figures
| null | null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose and compare various sentence selection strategies for active
learning for the task of detecting mentions of entities. The best strategy
employs the sum of confidences of two statistical classifiers trained on
different views of the data. Our experimental results show that, compared to
the random selection strategy, this strategy reduces the amount of required
labeled training data by over 50% while achieving the same performance. The
effect is even more significant when only named mentions are considered: the
system achieves the same performance by using only 42% of the training data
required by the random selection strategy.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 19:52:01 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Madnani",
"Nitin",
""
],
[
"Jing",
"Hongyan",
""
],
[
"Kambhatla",
"Nanda",
""
],
[
"Roukos",
"Salim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0911.1972
|
Neal Patwari
|
Neal Patwari and Joey Wilson
|
People-Sensing Spatial Characteristics of RF Sensor Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An "RF sensor" network can monitor RSS values on links in the network and
perform device-free localization, i.e., locating a person or object moving in
the area in which the network is deployed. This paper provides a statistical
model for the RSS variance as a function of the person's position w.r.t. the
transmitter (TX) and receiver (RX). We show that the ensemble mean of the RSS
variance has an approximately linear relationship with the expected total
affected power (ETAP). We then use analysis to derive approximate expressions
for the ETAP as a function of the person's position, for both scattering and
reflection. Counterintuitively, we show that reflection, not scattering, causes
the RSS variance contours to be shaped like Cassini ovals. Experimental tests
reported here and in past literature are shown to validate the analysis.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 19:31:07 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Patwari",
"Neal",
""
],
[
"Wilson",
"Joey",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.2022
|
Wei Liu
|
Wei Liu and Biao Chen
|
Interference Channels With Arbitrarily Correlated Sources
|
Submitted to IEEE Transaction on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Communicating arbitrarily correlated sources over interference channels is
considered in this paper. A sufficient condition is found for the lossless
transmission of a pair of correlated sources over a discrete memoryless
interference channel. With independent sources, the sufficient condition
reduces to the Han-Kobayashi achievable rate region for the interference
channel. For a special correlation structure (in the sense of Slepian-Wolf,
1973), the proposed region reduces to the known achievable region for
interference channels with common information. A simple example is given to
show that the separation approach, with Slepian-Wolf encoding followed by
optimal channel coding, is strictly suboptimal.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 22:42:13 GMT"
}
] | 2009-11-12T00:00:00 |
[
[
"Liu",
"Wei",
""
],
[
"Chen",
"Biao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.2023
|
Aditya Mahajan
|
Aditya Mahajan and Sekhar Tatikonda
|
Opportunistic capacity and error exponent regions for compound channel
with feedback
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Variable length communication over a compound channel with feedback is
considered. Traditionally, capacity of a compound channel without feedback is
defined as the maximum rate that is determined before the start of
communication such that communication is reliable. This traditional definition
is pessimistic. In the presence of feedback, an opportunistic definition is
given. Capacity is defined as the maximum rate that is determined at the end of
communication such that communication is reliable. Thus, the transmission rate
can adapt to the channel chosen by nature. Under this definition, feedback
communication over a compound channel is conceptually similar to multi-terminal
communication. Transmission rate is a vector rather than a scalar; channel
capacity is a region rather than a scalar; error exponent is a region rather
than a scalar. In this paper, variable length communication over a compound
channel with feedback is formulated, its opportunistic capacity region is
characterized, and lower bounds for its error exponent region are provided..
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 22:52:23 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Apr 2010 20:35:30 GMT"
},
{
"version": "v3",
"created": "Wed, 29 Jun 2011 18:10:44 GMT"
}
] | 2011-06-30T00:00:00 |
[
[
"Mahajan",
"Aditya",
""
],
[
"Tatikonda",
"Sekhar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.2033
|
EPTCS
|
Tom\'a\v{s} Babiak, Vojt\v{e}ch \v{R}eh\'ak, Jan Strej\v{c}ek
|
Almost Linear B\"uchi Automata
| null |
EPTCS 8, 2009, pp. 16-25
|
10.4204/EPTCS.8.2
| null |
cs.FL cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new fragment of Linear temporal logic (LTL) called LIO and a
new class of Buechi automata (BA) called Almost linear Buechi automata (ALBA).
We provide effective translations between LIO and ALBA showing that the two
formalisms are expressively equivalent. While standard translations of LTL into
BA use some intermediate formalisms, the presented translation of LIO into ALBA
is direct. As we expect applications of ALBA in model checking, we compare the
expressiveness of ALBA with other classes of Buechi automata studied in this
context and we indicate possible applications.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 00:48:28 GMT"
}
] | 2009-11-12T00:00:00 |
[
[
"Babiak",
"Tomáš",
""
],
[
"Řehák",
"Vojtěch",
""
],
[
"Strejček",
"Jan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0911.2034
|
EPTCS
|
Edgar G. Daylight (Institute of Logic, Language, and Computation,
University of Amsterdam), Sandeep K. Shukla (Department of Electrical and
Computer Engineering, Virginia Tech), Davide Sergio (Institute of Logic,
Language, and Computation, University of Amsterdam)
|
Expressing the Behavior of Three Very Different Concurrent Systems by
Using Natural Extensions of Separation Logic
| null |
EPTCS 8, 2009, pp. 26-40
|
10.4204/EPTCS.8.3
| null |
cs.LO cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Separation Logic is a non-classical logic used to verify pointer-intensive
code. In this paper, however, we show that Separation Logic, along with its
natural extensions, can also be used as a specification language for
concurrent-system design. To do so, we express the behavior of three very
different concurrent systems: a Subway, a Stopwatch, and a 2x2 Switch. The
Subway is originally implemented in LUSTRE, the Stopwatch in Esterel, and the
2x2 Switch in Bluespec.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 00:53:07 GMT"
}
] | 2009-11-12T00:00:00 |
[
[
"Daylight",
"Edgar G.",
"",
"Institute of Logic, Language, and Computation,\n University of Amsterdam"
],
[
"Shukla",
"Sandeep K.",
"",
"Department of Electrical and\n Computer Engineering, Virginia Tech"
],
[
"Sergio",
"Davide",
"",
"Institute of Logic,\n Language, and Computation, University of Amsterdam"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0911.2035
|
EPTCS
|
Maciej Gazda, Wan Fokkink
|
Modal Logic and the Approximation Induction Principle
| null |
EPTCS 8, 2009, pp. 41-50
|
10.4204/EPTCS.8.4
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove a compactness theorem in the context of Hennessy-Milner logic. It is
used to derive a sufficient condition on modal characterizations for the
Approximation Induction Principle to be sound modulo the corresponding process
equivalence. We show that this condition is necessary when the equivalence in
question is compositional with respect to the projection operators.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 00:57:55 GMT"
}
] | 2009-11-12T00:00:00 |
[
[
"Gazda",
"Maciej",
""
],
[
"Fokkink",
"Wan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.2036
|
EPTCS
|
Joshua Guttman (Worcester Polytechnic Institute)
|
Security Theorems via Model Theory
| null |
EPTCS 8, 2009, pp. 51-65
|
10.4204/EPTCS.8.5
| null |
cs.CR cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A model-theoretic approach can establish security theorems for cryptographic
protocols. Formulas expressing authentication and non-disclosure properties of
protocols have a special form. They are quantified implications for all xs .
(phi implies for some ys . psi). Models (interpretations) for these formulas
are *skeletons*, partially ordered structures consisting of a number of local
protocol behaviors. Realized skeletons contain enough local sessions to explain
all the behavior, when combined with some possible adversary behaviors. We show
two results. (1) If phi is the antecedent of a security goal, then there is a
skeleton A_phi such that, for every skeleton B, phi is satisfied in B iff there
is a homomorphism from A_phi to B. (2) A protocol enforces for all xs . (phi
implies for some ys . psi) iff every realized homomorphic image of A_phi
satisfies psi. Hence, to verify a security goal, one can use the Cryptographic
Protocol Shapes Analyzer CPSA (TACAS, 2007) to identify minimal realized
skeletons, or "shapes," that are homomorphic images of A_phi. If psi holds in
each of these shapes, then the goal holds.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 01:00:15 GMT"
}
] | 2009-11-12T00:00:00 |
[
[
"Guttman",
"Joshua",
"",
"Worcester Polytechnic Institute"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.2053
|
I-Hsiang Wang
|
I-Hsiang Wang and David N. C. Tse
|
Interference Mitigation Through Limited Receiver Cooperation
|
Submitted to IEEE Transactions on Information Theory. 69 pages, 14
figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Interference is a major issue limiting the performance in wireless networks.
Cooperation among receivers can help mitigate interference by forming
distributed MIMO systems. The rate at which receivers cooperate, however, is
limited in most scenarios. How much interference can one bit of receiver
cooperation mitigate? In this paper, we study the two-user Gaussian
interference channel with conferencing decoders to answer this question in a
simple setting. We identify two regions regarding the gain from receiver
cooperation: linear and saturation regions. In the linear region receiver
cooperation is efficient and provides a degrees-of-freedom gain, which is
either one cooperation bit buys one more bit or two cooperation bits buy one
more bit until saturation. In the saturation region receiver cooperation is
inefficient and provides a power gain, which is at most a constant regardless
of the rate at which receivers cooperate. The conclusion is drawn from the
characterization of capacity region to within two bits. The proposed strategy
consists of two parts: (1) the transmission scheme, where superposition
encoding with a simple power split is employed, and (2) the cooperative
protocol, where one receiver quantize-bin-and-forwards its received signal, and
the other after receiving the side information decode-bin-and-forwards its
received signal.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 05:08:39 GMT"
}
] | 2009-11-12T00:00:00 |
[
[
"Wang",
"I-Hsiang",
""
],
[
"Tse",
"David N. C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.2075
|
Guoqiang Zhang
|
Guoqiang Zhang
|
A scientific understanding of network designing
|
8 pages, 6 figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As the Internet becomes severely overburdened with exponentially growing
traffic demand, it becomes a general belief that a new generation data network
is in urgent need today. However, standing at this crossroad, we find that we
are in a situation that lacks a theory of network designing. This issue becomes
even more serious as the recent progress of network measurement and modeling
challenges the foundation of network research in the past decades.
This paper tries to set up a scientific foundation for network designing by
formalizing it as a multi-objective optimization process and quantifying the
way different designing choices independently and collectively influence these
objectives. A cartesian coordinate system is introduced to map the effect of
each designing scheme to a coordinate. We investigated the achievable area of
the network designing space and proved some boundary conditions. It is shown
that different kind of networks display different shapes of achievable areas in
the cartesian coordinate and exhibit different abilities to achieve
cost-effective and scalable designing. In particular, we found that the
philosophy underlying current empirical network designing and engineering fails
to meet the cost-effective and evolvable requirements of network designing. We
demonstrated that the efficient routing combined with effective betweenness
based link bandwidth allocation scheme is a cost-effective and scalable design
for BA-like scale-free networks, whereas if other designing choices cannot be
determined beforehand, ER network is a markedly good candidate for
cost-effective and scalable design.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 08:09:07 GMT"
}
] | 2009-11-12T00:00:00 |
[
[
"Zhang",
"Guoqiang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.2142
|
Amit Patel
|
Herbert Edelsbrunner, Dmitriy Morozov, Amit Patel
|
Quantifying Transversality by Measuring the Robustness of Intersections
| null | null | null | null |
cs.CG math.GM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
By definition, transverse intersections are stable under infinitesimal
perturbations. Using persistent homology, we extend this notion to a measure.
Given a space of perturbations, we assign to each homology class of the
intersection its robustness, the magnitude of a perturbations in this space
necessary to kill it, and prove that robustness is stable. Among the
applications of this result is a stable notion of robustness for fixed points
of continuous mappings and a statement of stability for contours of smooth
mappings.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 14:18:41 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Apr 2010 20:24:31 GMT"
}
] | 2010-04-22T00:00:00 |
[
[
"Edelsbrunner",
"Herbert",
""
],
[
"Morozov",
"Dmitriy",
""
],
[
"Patel",
"Amit",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
}
] |
0911.2174
|
Dirk Pleiter
|
H. Baier, H. Boettiger, M. Drochner, N. Eicker, U. Fischer, Z. Fodor,
A. Frommer, C. Gomez, G. Goldrian, S. Heybrock, D. Hierl, M. H\"usken, T.
Huth, B. Krill, J. Lauritsen, T. Lippert, T. Maurer, B. Mendl, N. Meyer, A.
Nobile, I. Ouda, M. Pivanti, D. Pleiter, M. Ries, A. Sch\"afer, H. Schick, F.
Schifano, H. Simma, S. Solbrig, T. Streuer, K.-H. Sulanke, R. Tripiccione,
J.-S. Vogt, T. Wettig, F. Winter
|
QPACE -- a QCD parallel computer based on Cell processors
|
21 pages. Poster by T. Maurer and plenary talk by D. Pleiter
presented at the "XXVII International Symposium on Lattice Field Theory",
July 26-31 2009, Peking University, Beijing, China. Information on recent
Green500 ranking added and list of authors extended
|
PoS LAT2009:001,2009
| null | null |
hep-lat cs.AR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
QPACE is a novel parallel computer which has been developed to be primarily
used for lattice QCD simulations. The compute power is provided by the IBM
PowerXCell 8i processor, an enhanced version of the Cell processor that is used
in the Playstation 3. The QPACE nodes are interconnected by a custom,
application optimized 3-dimensional torus network implemented on an FPGA. To
achieve the very high packaging density of 26 TFlops per rack a new water
cooling concept has been developed and successfully realized. In this paper we
give an overview of the architecture and highlight some important technical
details of the system. Furthermore, we provide initial performance results and
report on the installation of 8 QPACE racks providing an aggregate peak
performance of 200 TFlops.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 16:47:22 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Nov 2009 23:30:20 GMT"
},
{
"version": "v3",
"created": "Thu, 24 Dec 2009 01:26:43 GMT"
}
] | 2010-11-05T00:00:00 |
[
[
"Baier",
"H.",
""
],
[
"Boettiger",
"H.",
""
],
[
"Drochner",
"M.",
""
],
[
"Eicker",
"N.",
""
],
[
"Fischer",
"U.",
""
],
[
"Fodor",
"Z.",
""
],
[
"Frommer",
"A.",
""
],
[
"Gomez",
"C.",
""
],
[
"Goldrian",
"G.",
""
],
[
"Heybrock",
"S.",
""
],
[
"Hierl",
"D.",
""
],
[
"Hüsken",
"M.",
""
],
[
"Huth",
"T.",
""
],
[
"Krill",
"B.",
""
],
[
"Lauritsen",
"J.",
""
],
[
"Lippert",
"T.",
""
],
[
"Maurer",
"T.",
""
],
[
"Mendl",
"B.",
""
],
[
"Meyer",
"N.",
""
],
[
"Nobile",
"A.",
""
],
[
"Ouda",
"I.",
""
],
[
"Pivanti",
"M.",
""
],
[
"Pleiter",
"D.",
""
],
[
"Ries",
"M.",
""
],
[
"Schäfer",
"A.",
""
],
[
"Schick",
"H.",
""
],
[
"Schifano",
"F.",
""
],
[
"Simma",
"H.",
""
],
[
"Solbrig",
"S.",
""
],
[
"Streuer",
"T.",
""
],
[
"Sulanke",
"K. -H.",
""
],
[
"Tripiccione",
"R.",
""
],
[
"Vogt",
"J. -S.",
""
],
[
"Wettig",
"T.",
""
],
[
"Winter",
"F.",
""
]
] |
[
{
"class": "Physics",
"code": "hep-lat",
"description": "Lattice field theory. Phenomenology from lattice field theory. Algorithms for lattice field theory. Hardware for lattice field theory.",
"span": "(High Energy Physics - Lattice)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0911.2193
|
Erik Wilde
|
Erik Wilde
|
Feeds as Query Result Serializations
| null | null | null |
UCB ISchool Report 2009-030
|
cs.NI
|
http://creativecommons.org/licenses/by/3.0/
|
Many Web-based data sources and services are available as feeds, a model that
provides consumers with a loosely coupled way of interacting with providers.
The current feed model is limited in its capabilities, however. Though it is
simple to implement and scales well, it cannot be transferred to a wider range
of application scenarios. This paper conceptualizes feeds as a way to serialize
query results, describes the current hardcoded query semantics of such a
perspective, and surveys the ways in which extensions of this hardcoded model
have been proposed or implemented. Our generalized view of feeds as query
result serializations has implications for the applicability of feeds as a
generic Web service for any collection that is providing access to individual
information items. As one interesting and compelling class of applications, we
describe a simple way in which a query-based approach to feeds can be used to
support location-based services.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 18:04:30 GMT"
}
] | 2009-11-12T00:00:00 |
[
[
"Wilde",
"Erik",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0911.2197
|
P. G. L. Porta Mana
|
P. G. L. Porta Mana
|
On the relation between plausibility logic and the maximum-entropy
principle: a numerical study
|
24 pages of main text and references, 8 pages of tables, 7 pages of
additional references
| null | null |
Perimeter Institute pi-other-154
|
math.PR cs.IT math.IT physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
What is the relationship between plausibility logic and the principle of
maximum entropy? When does the principle give unreasonable or wrong results?
When is it appropriate to use the rule `expectation = average'? Can
plausibility logic give the same answers as the principle, and better answers
if those of the principle are unreasonable? To try to answer these questions,
this study offers a numerical collection of plausibility distributions given by
the maximum-entropy principle and by plausibility logic for a set of fifteen
simple problems: throwing dice.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 20:38:23 GMT"
}
] | 2016-05-19T00:00:00 |
[
[
"Mana",
"P. G. L. Porta",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0911.2214
|
Warren Schudy
|
Marek Karpinski and Warren Schudy
|
Approximation Schemes for the Betweenness Problem in Tournaments and
Related Ranking Problems
|
15 pages. Minor changes to presentation from version 2
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We design the first polynomial time approximation schemes (PTASs) for the
Minimum Betweenness problem in tournaments and some related higher arity
ranking problems. This settles the approximation status of the Betweenness
problem in tournaments along with other ranking problems which were open for
some time now. The results depend on a new technique of dealing with fragile
ranking constraints and could be of independent interest.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 20:36:49 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Jun 2010 00:25:34 GMT"
},
{
"version": "v3",
"created": "Fri, 9 Jul 2010 00:13:29 GMT"
}
] | 2010-07-12T00:00:00 |
[
[
"Karpinski",
"Marek",
""
],
[
"Schudy",
"Warren",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.2233
|
Zhi Xu
|
Ehsan Chiniforooshan, Lila Kari and Zhi Xu
|
Pseudo-Power Avoidance
| null | null | null | null |
cs.FL cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Repetition avoidance has been studied since Thue's work. In this paper, we
considered another type of repetition, which is called pseudo-power. This
concept is inspired by Watson-Crick complementarity in DNA sequence and is
defined over an antimorphic involution $\phi$. We first classify the alphabet
$\Sigma$ and the antimorphic involution $\phi$, under which there exists
sufficiently long pseudo-$k$th-power-free words. Then we present algorithms to
test whether a finite word $w$ is pseudo-$k$th-power-free.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 21:07:36 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Chiniforooshan",
"Ehsan",
""
],
[
"Kari",
"Lila",
""
],
[
"Xu",
"Zhi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.2258
|
Tomoki Ohsawa
|
Tomoki Ohsawa, Anthony M. Bloch, Melvin Leok
|
Discrete Hamilton-Jacobi Theory
|
26 pages, 2 figures
|
SIAM J. Control Optim. 49 (2011), pp. 1829-1856
|
10.1137/090776822
| null |
math.OC cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop a discrete analogue of Hamilton-Jacobi theory in the framework of
discrete Hamiltonian mechanics. The resulting discrete Hamilton-Jacobi equation
is discrete only in time. We describe a discrete analogue of Jacobi's solution
and also prove a discrete version of the geometric Hamilton-Jacobi theorem. The
theory applied to discrete linear Hamiltonian systems yields the discrete
Riccati equation as a special case of the discrete Hamilton-Jacobi equation. We
also apply the theory to discrete optimal control problems, and recover some
well-known results, such as the Bellman equation (discrete-time HJB equation)
of dynamic programming and its relation to the costate variable in the
Pontryagin maximum principle. This relationship between the discrete
Hamilton-Jacobi equation and Bellman equation is exploited to derive a
generalized form of the Bellman equation that has controls at internal stages.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 22:27:58 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Jun 2011 18:46:31 GMT"
}
] | 2011-08-15T00:00:00 |
[
[
"Ohsawa",
"Tomoki",
""
],
[
"Bloch",
"Anthony M.",
""
],
[
"Leok",
"Melvin",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
}
] |
0911.2270
|
Lianlin Li Dr
|
Lianlin Li, B. Jafarpour
|
An Iteratively Reweighted Algorithm for Sparse Reconstruction of
Subsurface Flow Properties from Nonlinear Dynamic Data
| null | null | null | null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present a practical algorithm based on sparsity
regularization to effectively solve nonlinear dynamic inverse problems that are
encountered in subsurface model calibration. We use an iteratively reweighted
algorithm that is widely used to solve linear inverse problems with sparsity
constraint known as compressed sensing to estimate permeability fields from
nonlinear dynamic flow data.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 23:27:03 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Nov 2009 14:32:28 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Li",
"Lianlin",
""
],
[
"Jafarpour",
"B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0911.2280
|
Bal\'azs Csan\'ad Cs\'aji
|
Bal\'azs Csan\'ad Cs\'aji, Rapha\"el M. Jungers, and Vincent D.
Blondel
|
PageRank Optimization by Edge Selection
|
30 pages, 3 figures
|
Discrete Applied Mathematics, Volume 169, 2014, Pages 73-87
|
10.1016/j.dam.2014.01.007
| null |
cs.DS cs.CC cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The importance of a node in a directed graph can be measured by its PageRank.
The PageRank of a node is used in a number of application contexts - including
ranking websites - and can be interpreted as the average portion of time spent
at the node by an infinite random walk. We consider the problem of maximizing
the PageRank of a node by selecting some of the edges from a set of edges that
are under our control. By applying results from Markov decision theory, we show
that an optimal solution to this problem can be found in polynomial time. Our
core solution results in a linear programming formulation, but we also provide
an alternative greedy algorithm, a variant of policy iteration, which runs in
polynomial time, as well. Finally, we show that, under the slight modification
for which we are given mutually exclusive pairs of edges, the problem of
PageRank optimization becomes NP-hard.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 12:57:09 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Jan 2012 09:09:34 GMT"
}
] | 2014-05-22T00:00:00 |
[
[
"Csáji",
"Balázs Csanád",
""
],
[
"Jungers",
"Raphaël M.",
""
],
[
"Blondel",
"Vincent D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
}
] |
0911.2284
|
Fabio G. Guerrero-Moreno
|
Fabio G. Guerrero
|
A New Look at the Classical Entropy of Written English
|
Submitted to the IEEE Transactions on Information Theory. Reference
on page 5 corrected. Weighted average of HL on page 12 corrected (average
redundancy R has therefore been updated). Abstract slightly changed
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A simple method for finding the entropy and redundancy of a reasonable long
sample of English text by direct computer processing and from first principles
according to Shannon theory is presented. As an example, results on the entropy
of the English language have been obtained based on a total of 20.3 million
characters of written English, considering symbols from one to five hundred
characters in length. Besides a more realistic value of the entropy of English,
a new perspective on some classic entropy-related concepts is presented. This
method can also be extended to other Latin languages. Some implications for
practical applications such as plagiarism-detection software, and the minimum
number of words that should be used in social Internet network messaging, are
discussed.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 01:48:12 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Nov 2009 03:15:30 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Guerrero",
"Fabio G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0911.2293
|
Michael Bloem
|
Michael Bloem, Tansu Alpcan, and Tamer Basar
|
A Robust Control Framework for Malware Filtering
|
8 pages, 10 figures, IEEE format
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study and develop a robust control framework for malware filtering and
network security. We investigate the malware filtering problem by capturing the
tradeoff between increased security on one hand and continued usability of the
network on the other. We analyze the problem using a linear control system
model with a quadratic cost structure and develop algorithms based on H
infinity-optimal control theory. A dynamic feedback filter is derived and shown
via numerical analysis to be an improvement over various heuristic approaches
to malware filtering. The results are verified and demonstrated with packet
level simulations on the Ns-2 network simulator.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 03:13:37 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Bloem",
"Michael",
""
],
[
"Alpcan",
"Tansu",
""
],
[
"Basar",
"Tamer",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0911.2317
|
EPTCS
|
Farid Ablayev, Alexander Vasiliev
|
Algorithms for Quantum Branching Programs Based on Fingerprinting
| null |
EPTCS 9, 2009, pp. 1-11
|
10.4204/EPTCS.9.1
| null |
cs.CC cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the paper we develop a method for constructing quantum algorithms for
computing Boolean functions by quantum ordered read-once branching programs
(quantum OBDDs). Our method is based on fingerprinting technique and
representation of Boolean functions by their characteristic polynomials. We use
circuit notation for branching programs for desired algorithms presentation.
For several known functions our approach provides optimal QOBDDs. Namely we
consider such functions as Equality, Palindrome, and Permutation Matrix Test.
We also propose a generalization of our method and apply it to the Boolean
variant of the Hidden Subgroup Problem.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 08:24:23 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Ablayev",
"Farid",
""
],
[
"Vasiliev",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0911.2319
|
EPTCS
|
Luca Bernardinello, Lucia Pomello, Stefania Rombol\`a
|
Orthomodular Lattices Induced by the Concurrency Relation
| null |
EPTCS 9, 2009, pp. 12-21
|
10.4204/EPTCS.9.2
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We apply to locally finite partially ordered sets a construction which
associates a complete lattice to a given poset; the elements of the lattice are
the closed subsets of a closure operator, defined starting from the concurrency
relation. We show that, if the partially ordered set satisfies a property of
local density, i.e.: N-density, then the associated lattice is also
orthomodular. We then consider occurrence nets, introduced by C.A. Petri as
models of concurrent computations, and define a family of subsets of the
elements of an occurrence net; we call those subsets "causally closed" because
they can be seen as subprocesses of the whole net which are, intuitively,
closed with respect to the forward and backward local state changes. We show
that, when the net is K-dense, the causally closed sets coincide with the
closed sets induced by the closure operator defined starting from the
concurrency relation. K-density is a property of partially ordered sets
introduced by Petri, on the basis of former axiomatizations of special
relativity theory.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 08:36:43 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Bernardinello",
"Luca",
""
],
[
"Pomello",
"Lucia",
""
],
[
"Rombolà",
"Stefania",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0911.2320
|
EPTCS
|
Paola Bonizzoni, Clelia De Felice, Rosalba Zizza
|
Circular Languages Generated by Complete Splicing Systems and Pure
Unitary Languages
| null |
EPTCS 9, 2009, pp. 22-31
|
10.4204/EPTCS.9.3
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Circular splicing systems are a formal model of a generative mechanism of
circular words, inspired by a recombinant behaviour of circular DNA. Some
unanswered questions are related to the computational power of such systems,
and finding a characterization of the class of circular languages generated by
circular splicing systems is still an open problem. In this paper we solve this
problem for complete systems, which are special finite circular splicing
systems. We show that a circular language L is generated by a complete system
if and only if the set Lin(L) of all words corresponding to L is a pure unitary
language generated by a set closed under the conjugacy relation. The class of
pure unitary languages was introduced by A. Ehrenfeucht, D. Haussler, G.
Rozenberg in 1983, as a subclass of the class of context-free languages,
together with a characterization of regular pure unitary languages by means of
a decidable property. As a direct consequence, we characterize (regular)
circular languages generated by complete systems. We can also decide whether
the language generated by a complete system is regular. Finally, we point out
that complete systems have the same computational power as finite simple
systems, an easy type of circular splicing system defined in the literature
from the very beginning, when only one rule is allowed. From our results on
complete systems, it follows that finite simple systems generate a class of
context-free languages containing non-regular languages, showing the
incorrectness of a longstanding result on simple systems.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 08:40:12 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Bonizzoni",
"Paola",
""
],
[
"De Felice",
"Clelia",
""
],
[
"Zizza",
"Rosalba",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0911.2322
|
EPTCS
|
Amin Coja-Oghlan
|
Random Constraint Satisfaction Problems
| null |
EPTCS 9, 2009, pp. 32-37
|
10.4204/EPTCS.9.4
| null |
cs.DM cs.CC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Random instances of constraint satisfaction problems such as k-SAT provide
challenging benchmarks. If there are m constraints over n variables there is
typically a large range of densities r=m/n where solutions are known to exist
with probability close to one due to non-constructive arguments. However, no
algorithms are known to find solutions efficiently with a non-vanishing
probability at even much lower densities. This fact appears to be related to a
phase transition in the set of all solutions. The goal of this extended
abstract is to provide a perspective on this phenomenon, and on the
computational challenge that it poses.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 08:42:42 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Coja-Oghlan",
"Amin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0911.2323
|
EPTCS
|
Mariangiola Dezani-Ciancaglini (Dipartimento di Informatica,
Universit\`a di Torino), Paola Giannini (Dipartimento di Informatica,
Universit\`a del Piemonte Orientale), Angelo Troina (Dipartimento di
Informatica, Universit\`a di Torino)
|
A Type System for Required/Excluded Elements in CLS
| null |
EPTCS 9, 2009, pp. 38-48
|
10.4204/EPTCS.9.5
| null |
cs.LO cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The calculus of looping sequences is a formalism for describing the evolution
of biological systems by means of term rewriting rules. We enrich this calculus
with a type discipline to guarantee the soundness of reduction rules with
respect to some biological properties deriving from the requirement of certain
elements, and the repellency of others. As an example, we model a toy system
where the repellency of a certain element is captured by our type system and
forbids another element to exit a compartment.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 08:44:27 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Dezani-Ciancaglini",
"Mariangiola",
"",
"Dipartimento di Informatica,\n Università di Torino"
],
[
"Giannini",
"Paola",
"",
"Dipartimento di Informatica,\n Università del Piemonte Orientale"
],
[
"Troina",
"Angelo",
"",
"Dipartimento di\n Informatica, Università di Torino"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0911.2324
|
EPTCS
|
Martin F\"urer
|
Deterministic Autopoietic Automata
| null |
EPTCS 9, 2009, pp. 49-53
|
10.4204/EPTCS.9.6
| null |
cs.NE cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies two issues related to the paper on Computing by
Self-reproduction: Autopoietic Automata by Jiri Wiedermann. It is shown that
all results presented there extend to deterministic computations. In
particular, nondeterminism is not needed for a lineage to generate all
autopoietic automata.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 08:48:38 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Fürer",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0911.2325
|
EPTCS
|
Walid Gomaa (Alexandria University)
|
Characterizing Polynomial Time Computability of Rational and Real
Functions
| null |
EPTCS 9, 2009, pp. 54-64
|
10.4204/EPTCS.9.7
| null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recursive analysis was introduced by A. Turing [1936], A. Grzegorczyk [1955],
and D. Lacombe [1955]. It is based on a discrete mechanical framework that can
be used to model computation over the real numbers. In this context the
computational complexity of real functions defined over compact domains has
been extensively studied. However, much less have been done for other kinds of
real functions. This article is divided into two main parts. The first part
investigates polynomial time computability of rational functions and the role
of continuity in such computation. On the one hand this is interesting for its
own sake. On the other hand it provides insights into polynomial time
computability of real functions for the latter, in the sense of recursive
analysis, is modeled as approximations of rational computations. The main
conclusion of this part is that continuity does not play any role in the
efficiency of computing rational functions. The second part defines polynomial
time computability of arbitrary real functions, characterizes it, and compares
it with the corresponding notion over rational functions. Assuming continuity,
the main conclusion is that there is a conceptual difference between polynomial
time computation over the rationals and the reals manifested by the fact that
there are polynomial time computable rational functions whose extensions to the
reals are not polynomial time computable and vice versa.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 08:50:28 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Gomaa",
"Walid",
"",
"Alexandria University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0911.2327
|
EPTCS
|
Ozan Kahramano\u{g}ullari, Luca Cardelli, Emmanuelle Caron
|
An Intuitive Automated Modelling Interface for Systems Biology
| null |
EPTCS 9, 2009, pp. 73-86
|
10.4204/EPTCS.9.9
| null |
cs.PL cs.CE cs.LO q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a natural language interface for building stochastic pi calculus
models of biological systems. In this language, complex constructs describing
biochemical events are built from basic primitives of association, dissociation
and transformation. This language thus allows us to model biochemical systems
modularly by describing their dynamics in a narrative-style language, while
making amendments, refinements and extensions on the models easy. We
demonstrate the language on a model of Fc-gamma receptor phosphorylation during
phagocytosis. We provide a tool implementation of the translation into a
stochastic pi calculus language, Microsoft Research's SPiM.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 08:56:05 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Kahramanoğullari",
"Ozan",
""
],
[
"Cardelli",
"Luca",
""
],
[
"Caron",
"Emmanuelle",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0911.2330
|
EPTCS
|
Zoran Konkoli
|
Diffusion Controlled Reactions, Fluctuation Dominated Kinetics, and
Living Cell Biochemistry
| null |
EPTCS 9, 2009, pp. 98-107
|
10.4204/EPTCS.9.11
| null |
cs.CE cs.OH q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years considerable portion of the computer science community has
focused its attention on understanding living cell biochemistry and efforts to
understand such complication reaction environment have spread over wide front,
ranging from systems biology approaches, through network analysis (motif
identification) towards developing language and simulators for low level
biochemical processes. Apart from simulation work, much of the efforts are
directed to using mean field equations (equivalent to the equations of
classical chemical kinetics) to address various problems (stability,
robustness, sensitivity analysis, etc.). Rarely is the use of mean field
equations questioned. This review will provide a brief overview of the
situations when mean field equations fail and should not be used. These
equations can be derived from the theory of diffusion controlled reactions, and
emerge when assumption of perfect mixing is used.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 09:04:01 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Konkoli",
"Zoran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0911.2346
|
Soheil Mohajer
|
Soheil Mohajer, Chao Tian, Suhas N. Diggavi
|
Asymmetric Multilevel Diversity Coding and Asymmetric Gaussian Multiple
Descriptions
|
42 pages, 9 figures, submitted to IEEE transactions on Information
Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the asymmetric multilevel diversity (A-MLD) coding problem, where
a set of $2^K-1$ information sources, ordered in a decreasing level of
importance, is encoded into $K$ messages (or descriptions). There are $2^K-1$
decoders, each of which has access to a non-empty subset of the encoded
messages. Each decoder is required to reproduce the information sources up to a
certain importance level depending on the combination of descriptions available
to it. We obtain a single letter characterization of the achievable rate region
for the 3-description problem. In contrast to symmetric multilevel diversity
coding, source-separation coding is not sufficient in the asymmetric case, and
ideas akin to network coding need to be used strategically. Based on the
intuitions gained in treating the A-MLD problem, we derive inner and outer
bounds for the rate region of the asymmetric Gaussian multiple description (MD)
problem with three descriptions. Both the inner and outer bounds have a similar
geometric structure to the rate region template of the A-MLD coding problem,
and moreover, we show that the gap between them is small, which results in an
approximate characterization of the asymmetric Gaussian three description rate
region.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 10:15:08 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Mohajer",
"Soheil",
""
],
[
"Tian",
"Chao",
""
],
[
"Diggavi",
"Suhas N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0911.2364
|
Loet Leydesdorff
|
Wilfred Dolfsma, Loet Leydesdorff
|
Journals as constituents of scientific discourse: economic heterodoxy
| null |
Wilfred Dolfsma & Loet Leydesdorff, Journals as Constituents of
Scientific Discourse: Economic Heterodoxy, On the Horizon 16(4), 214-225,
2008
| null | null |
cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Purpose: to provide a view and analysis of the immediate field of journals
which surround a number of key heterodox economics journals.
Design/methodology/approach: Using citation data from the Science and Social
Science Citation Index, the individual and collective networks of a number of
journals in this field are analyzed. Findings: The size and shape of the
citation networks of journals can differ substantially, even if in a broadly
similar category. Heterodox economics cannot (yet) be considered as an
integrated specialty: authors in several journals in heterodox economics cite
more from mainstream economics than from other heterodox journals. There are
also strong links with other disciplinary fields such as geography, development
studies, women studies, etc.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 11:12:11 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Dolfsma",
"Wilfred",
""
],
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.