id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0911.1370
Jakub Radoszewski
Marcin Kubica, Jakub Radoszewski, Wojciech Rytter, Tomasz Walen
On the maximal number of cubic subwords in a string
14 pages
null
10.1007/978-3-642-10217-2_34
null
cs.FL cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the problem of the maximum number of cubic subwords (of the form $www$) in a given word. We also consider square subwords (of the form $ww$). The problem of the maximum number of squares in a word is not well understood. Several new results related to this problem are produced in the paper. We consider two simple problems related to the maximum number of subwords which are squares or which are highly repetitive; then we provide a nontrivial estimation for the number of cubes. We show that the maximum number of squares $xx$ such that $x$ is not a primitive word (nonprimitive squares) in a word of length $n$ is exactly $\lfloor \frac{n}{2}\rfloor - 1$, and the maximum number of subwords of the form $x^k$, for $k\ge 3$, is exactly $n-2$. In particular, the maximum number of cubes in a word is not greater than $n-2$ either. Using very technical properties of occurrences of cubes, we improve this bound significantly. We show that the maximum number of cubes in a word of length $n$ is between $(1/2)n$ and $(4/5)n$. (In particular, we improve the lower bound from the conference version of the paper.)
[ { "version": "v1", "created": "Fri, 6 Nov 2009 23:05:30 GMT" } ]
2015-05-14T00:00:00
[ [ "Kubica", "Marcin", "" ], [ "Radoszewski", "Jakub", "" ], [ "Rytter", "Wojciech", "" ], [ "Walen", "Tomasz", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.1379
Harish Sethu
Xiaoyu Chu and Harish Sethu
On Improving the Representation of a Region Achieved by a Sensor Network
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report considers the class of applications of sensor networks in which each sensor node makes measurements, such as temperature or humidity, at the precise location of the node. Such spot-sensing applications approximate the physical condition of the entire region of interest by the measurements made at only the points where the sensor nodes are located. Given a certain density of nodes in a region, a more spatially uniform distribution of the nodes leads to a better approximation of the physical condition of the region. This report considers the error in this approximation and seeks to improve the quality of representation of the physical condition of the points in the region in the data collected by the sensor network. We develop two essential metrics which together allow a rigorous quantitative assessment of the quality of representation achieved: the average representation error and the unevenness of representation error, the latter based on a well-accepted measure of inequality used in economics. We present the rationale behind the use of these metrics and derive relevant theoretical bounds on them in the common scenario of a planar region of arbitrary shape covered by a sensor network deployment. A simple new heuristic algorithm is presented for each node to determine if and when it should sense or sleep to conserve energy while also preserving the quality of representation. Simulation results show that it achieves a significant improvement in the quality of representation compared to other related distributed algorithms. Interestingly, our results also show that improved spatial uniformity has the welcome side-effect of a significant increase in the network lifetime.
[ { "version": "v1", "created": "Fri, 6 Nov 2009 23:59:32 GMT" }, { "version": "v2", "created": "Wed, 24 Mar 2010 20:14:11 GMT" } ]
2010-03-26T00:00:00
[ [ "Chu", "Xiaoyu", "" ], [ "Sethu", "Harish", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.1383
Marc Harper
Marc Harper
Information Geometry and Evolutionary Game Theory
Added references
null
null
null
cs.IT cs.GT math.DS math.IT nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Shahshahani geometry of evolutionary game theory is realized as the information geometry of the simplex, deriving from the Fisher information metric of the manifold of categorical probability distributions. Some essential concepts in evolutionary game theory are realized information-theoretically. Results are extended to the Lotka-Volterra equation and to multiple population systems.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 19:16:22 GMT" } ]
2009-11-10T00:00:00
[ [ "Harper", "Marc", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
0911.1386
Emanuel Diamant
Emanuel Diamant
Machine Learning: When and Where the Horses Went Astray?
The paper is accepted to be published in the Machine Learning serie of the InTech
null
null
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Machine Learning is usually defined as a subfield of AI, which is busy with information extraction from raw data sets. Despite of its common acceptance and widespread recognition, this definition is wrong and groundless. Meaningful information does not belong to the data that bear it. It belongs to the observers of the data and it is a shared agreement and a convention among them. Therefore, this private information cannot be extracted from the data by any means. Therefore, all further attempts of Machine Learning apologists to justify their funny business are inappropriate.
[ { "version": "v1", "created": "Sat, 7 Nov 2009 02:52:53 GMT" } ]
2009-11-10T00:00:00
[ [ "Diamant", "Emanuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0911.1388
Victor Miller
Don Coppersmith, Victor S. Miller
Binary Non-tiles
null
null
null
null
cs.DM cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A subset V of GF(2)^n is a tile if GF(2)^n can be covered by disjoint translates of V. In other words, V is a tile if and only if there is a subset A of GF(2)^n such that V+A = GF(2)^n uniquely (i.e., v + a = v' + a' implies that v=v' and a=a' where v,v' in V and a,a' in A). In some problems in coding theory and hashing we are given a putative tile V, and wish to know whether or not it is a tile. In this paper we give two computational criteria for certifying that V is not a tile. The first involves impossibility of a bin-packing problem, and the second involves infeasibility of a linear program. We apply both criteria to a list of putative tiles given by Gordon, Miller, and Ostapenko in that none of them are, in fact, tiles.
[ { "version": "v1", "created": "Sat, 7 Nov 2009 03:25:40 GMT" }, { "version": "v2", "created": "Mon, 1 Aug 2011 02:53:14 GMT" } ]
2011-08-02T00:00:00
[ [ "Coppersmith", "Don", "" ], [ "Miller", "Victor S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1393
Lek-Heng Lim
Christopher Hillar and Lek-Heng Lim
Most tensor problems are NP-hard
38 pages; to appear in Journal of the ACM
null
null
null
cs.CC cs.NA math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that multilinear (tensor) analogues of many efficiently computable problems in numerical linear algebra are NP-hard. Our list here includes: determining the feasibility of a system of bilinear equations, deciding whether a 3-tensor possesses a given eigenvalue, singular value, or spectral norm; approximating an eigenvalue, eigenvector, singular vector, or the spectral norm; and determining the rank or best rank-1 approximation of a 3-tensor. Furthermore, we show that restricting these problems to symmetric tensors does not alleviate their NP-hardness. We also explain how deciding nonnegative definiteness of a symmetric 4-tensor is NP-hard and how computing the combinatorial hyperdeterminant of a 4-tensor is NP-, #P-, and VNP-hard. We shall argue that our results provide another view of the boundary separating the computational tractability of linear/convex problems from the intractability of nonlinear/nonconvex ones.
[ { "version": "v1", "created": "Sat, 7 Nov 2009 05:21:11 GMT" }, { "version": "v2", "created": "Fri, 9 Apr 2010 10:36:24 GMT" }, { "version": "v3", "created": "Mon, 9 Apr 2012 18:02:09 GMT" }, { "version": "v4", "created": "Tue, 12 Feb 2013 00:33:53 GMT" }, { "version": "v5", "created": "Mon, 1 Jul 2013 01:10:12 GMT" } ]
2013-07-02T00:00:00
[ [ "Hillar", "Christopher", "" ], [ "Lim", "Lek-Heng", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
0911.1412
Clemens Grabmayer
Clemens Grabmayer
From Abstract Rewriting Systems to Abstract Proof Systems
15 pages, 3 figures
null
null
null
cs.LO cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Some personal recollections on the introduction of `abstract proof systems' as a framework for formulating syntax-independent, general results about rule derivability and admissibility. With a particular eye on the inspiration I owe to Roel de Vrijer: the analogy with abstract rewriting systems.
[ { "version": "v1", "created": "Sat, 7 Nov 2009 12:48:23 GMT" }, { "version": "v2", "created": "Sat, 23 Feb 2013 16:38:28 GMT" } ]
2013-02-26T00:00:00
[ [ "Grabmayer", "Clemens", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0911.1419
Yusuke Watanabe
Yusuke Watanabe and Michael Chertkov
Belief Propagation and Loop Calculus for the Permanent of a Non-Negative Matrix
11 pages; submitted to Journal of Physics A: Mathematical Theoretical
null
10.1088/1751-8113/43/24/242002
null
cs.DS cond-mat.stat-mech cs.DM cs.LG cs.NA math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider computation of permanent of a positive $(N\times N)$ non-negative matrix, $P=(P_i^j|i,j=1,\cdots,N)$, or equivalently the problem of weighted counting of the perfect matchings over the complete bipartite graph $K_{N,N}$. The problem is known to be of likely exponential complexity. Stated as the partition function $Z$ of a graphical model, the problem allows exact Loop Calculus representation [Chertkov, Chernyak '06] in terms of an interior minimum of the Bethe Free Energy functional over non-integer doubly stochastic matrix of marginal beliefs, $\beta=(\beta_i^j|i,j=1,\cdots,N)$, also correspondent to a fixed point of the iterative message-passing algorithm of the Belief Propagation (BP) type. Our main result is an explicit expression of the exact partition function (permanent) in terms of the matrix of BP marginals, $\beta$, as $Z=\mbox{Perm}(P)=Z_{BP} \mbox{Perm}(\beta_i^j(1-\beta_i^j))/\prod_{i,j}(1-\beta_i^j)$, where $Z_{BP}$ is the BP expression for the permanent stated explicitly in terms if $\beta$. We give two derivations of the formula, a direct one based on the Bethe Free Energy and an alternative one combining the Ihara graph-$\zeta$ function and the Loop Calculus approaches. Assuming that the matrix $\beta$ of the Belief Propagation marginals is calculated, we provide two lower bounds and one upper-bound to estimate the multiplicative term. Two complementary lower bounds are based on the Gurvits-van der Waerden theorem and on a relation between the modified permanent and determinant respectively.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 04:15:01 GMT" }, { "version": "v2", "created": "Sun, 2 May 2010 15:58:46 GMT" } ]
2015-05-14T00:00:00
[ [ "Watanabe", "Yusuke", "" ], [ "Chertkov", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0911.1426
Hossein Bagheri
Hossein Bagheri, Abolfazl S. Motahari, and Amir K. Khandani
On the Capacity of the Half-Duplex Diamond Channel
25 pages, 2 figures, submitted to IEEE Transactions on Information Theory
null
10.1109/ISIT.2010.5513566
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a dual-hop communication system composed of a source S and a destination D connected through two non-interfering half-duplex relays, R1 and R2, is considered. In the literature of Information Theory, this configuration is known as the diamond channel. In this setup, four transmission modes are present, namely: 1) S transmits, and R1 and R2 listen (broadcast mode), 2) S transmits, R1 listens, and simultaneously, R2 transmits and D listens. 3) S transmits, R2 listens, and simultaneously, R1 transmits and D listens. 4) R1, R2 transmit, and D listens (multiple-access mode). Assuming a constant power constraint for all transmitters, a parameter $\Delta$ is defined, which captures some important features of the channel. It is proven that for $\Delta$=0 the capacity of the channel can be attained by successive relaying, i.e, using modes 2 and 3 defined above in a successive manner. This strategy may have an infinite gap from the capacity of the channel when $\Delta\neq$0. To achieve rates as close as 0.71 bits to the capacity, it is shown that the cases of $\Delta$>0 and $\Delta$<0 should be treated differently. Using new upper bounds based on the dual problem of the linear program associated with the cut-set bounds, it is proven that the successive relaying strategy needs to be enhanced by an additional broadcast mode (mode 1), or multiple access mode (mode 4), for the cases of $\Delta$<0 and $\Delta$>0, respectively. Furthermore, it is established that under average power constraints the aforementioned strategies achieve rates as close as 3.6 bits to the capacity of the channel.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 20:58:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Bagheri", "Hossein", "" ], [ "Motahari", "Abolfazl S.", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1440
Loet Leydesdorff
Loet Leydesdorff
Caveats for the Use of Citation Indicators in Research and Journal Evaluations
null
Loet Leydesdorff, Caveats for the Use of Citation Indicators in Research and Journal Evaluations, Journal of the American Society for Information Science and Technology 59(2), 278-287, 2008
null
null
physics.soc-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ageing of publications, percentage of self-citations, and impact vary from journal to journal within fields of science. The assumption that citation and publication practices are homogenous within specialties and fields of science is invalid. Furthermore, the delineation of fields and among specialties is fuzzy. Institutional units of analysis and persons may move between fields or span different specialties. The match between the citation index and institutional profiles varies among institutional units and nations. The respective matches may heavily affect the representation of the units. Non-ISI journals are increasingly cornered into "transdisciplinary" Mode-2 functions with the exception of specialist journals publishing in languages other than English. An "externally cited impact factor" can be calculated for these journals. The citation impact of non-ISI journals will be demonstrated using Science and Public Policy as the example.
[ { "version": "v1", "created": "Sat, 7 Nov 2009 18:43:47 GMT" } ]
2009-11-10T00:00:00
[ [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0911.1445
Loet Leydesdorff
Loet Leydesdorff
The delineation of nanoscience and nanotechnology in terms of journals and patents: a most recent update
null
Loet Leydesdorff, The delineation of nanoscience and nanotechnology in terms of journals and patents: a most recent update. Scientometrics 76(1), 159-167, 2008
null
null
physics.soc-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The journal set which provides a representation of nanoscience and nanotechnology at the interfaces among applied physics, chemistry, and the life sciences is developing rapidly because of the introduction of new journals. The relevant contributions of nations can be expected to change according to the representations of the relevant interfaces among journal sets. In the 2005 set the position of the USA decreased more than in the 2004-set, while the EU-27 gained in terms of its percentage of world share of citations. The tag "Y01N" which was newly added to the EU classification system for patents, allows for the visualization of national profiles of nanotechnology in terms of relevant patents and patent classes.
[ { "version": "v1", "created": "Sat, 7 Nov 2009 18:47:52 GMT" } ]
2009-11-10T00:00:00
[ [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0911.1447
Loet Leydesdorff
Loet Leydesdorff
On the Normalization and Visualization of Author Co-Citation Data Salton's Cosine versus the Jaccard Index
null
Loet Leydesdorff, On the Normalization and Visualization of Author Co-citation Data: Salton's cosine versus the Jaccard Index, Journal of the American Society for Information Science and Technology, 59(1), 77-85, 2008
null
null
physics.soc-ph cs.DL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The debate about which similarity measure one should use for the normalization in the case of Author Co-citation Analysis (ACA) is further complicated when one distinguishes between the symmetrical co-citation--or, more generally, co-occurrence--matrix and the underlying asymmetrical citation--occurrence--matrix. In the Web environment, the approach of retrieving original citation data is often not feasible. In that case, one should use the Jaccard index, but preferentially after adding the number of total citations (occurrences) on the main diagonal. Unlike Salton's cosine and the Pearson correlation, the Jaccard index abstracts from the shape of the distributions and focuses only on the intersection and the sum of the two sets. Since the correlations in the co-occurrence matrix may partially be spurious, this property of the Jaccard index can be considered as an advantage in this case.
[ { "version": "v1", "created": "Sat, 7 Nov 2009 18:53:09 GMT" } ]
2009-11-10T00:00:00
[ [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0911.1451
Loet Leydesdorff
Loet Leydesdorff, Ping Zhou
Co-word Analysis using the Chinese Character Set
null
Co-Word Analysis using the Chinese Character Set, Journal of the American Society for Information Science and Technology 59(9), 1528-1530, 2008
null
null
cs.CL cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Until recently, Chinese texts could not be studied using co-word analysis because the words are not separated by spaces in Chinese (and Japanese). A word can be composed of one or more characters. The online availability of programs that separate Chinese texts makes it possible to analyze them using semantic maps. Chinese characters contain not only information, but also meaning. This may enhance the readability of semantic maps. In this study, we analyze 58 words which occur ten or more times in the 1652 journal titles of the China Scientific and Technical Papers and Citations Database. The word occurrence matrix is visualized and factor-analyzed.
[ { "version": "v1", "created": "Sat, 7 Nov 2009 19:15:33 GMT" } ]
2009-11-10T00:00:00
[ [ "Leydesdorff", "Loet", "" ], [ "Zhou", "Ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0911.1454
Loet Leydesdorff
Diana Lucio-Arias and Loet Leydesdorff
Main-path analysis and path-dependent transitions in HistCite(TM)-based historiograms
null
Journal of the American Society for Information Science and Technology 59(12), 1948-1962, 2008
null
null
physics.soc-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the program HistCite(TM) it is possible to generate and visualize the most relevant papers in a set of documents retrieved from the Science Citation Index. Historical reconstructions of scientific developments can be represented chronologically as developments in networks of citation relations extracted from scientific literature. This study aims to go beyond the historical reconstruction of scientific knowledge, enriching the output of HistCite(TM) with algorithms from social network analysis and information theory.
[ { "version": "v1", "created": "Sat, 7 Nov 2009 19:36:46 GMT" } ]
2009-11-10T00:00:00
[ [ "Lucio-Arias", "Diana", "" ], [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0911.1456
Loet Leydesdorff
Han Woo Park, Loet Leydesdorff
Korean journals in the Science Citation Index: What do they reveal about the intellectual structure of S&T in Korea?
null
Han Woo Park & Loet Leydesdorff, Korean journals in the Science Citation Index: What do they reveal about the intellectual structure of ST in Korea Scientometrics 75(3) (2008) 439-462
null
null
physics.soc-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
During the last decade, we have witnessed a sustained growth of South Korea's research output in terms of the world share of publications in the Science Citation Index database. However, Korea's citation performance is not yet as competitive as publication performance. In this study, the authors examine the intellectual structure of Korean S&T field based on social network analysis of journal-journal citation data using the ten Korean SCI journals as seed journals. The results reveal that Korean SCI journals function more like publication places, neither research channels nor information sources among national scientists. Thus, these journals may provide Korean scholars with access to international scientific communities by facilitating the respective entry barriers. However, there are no citation relations based on their Korean background. Furthermore, we intend to draw some policy implications which may be helpful to increase Korea's research potential.
[ { "version": "v1", "created": "Sat, 7 Nov 2009 20:05:08 GMT" } ]
2009-11-10T00:00:00
[ [ "Park", "Han Woo", "" ], [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0911.1494
Rebecca Deneckere
Yves-Roger Nehan (CRI), Rebecca Deneckere (CRI)
Situational Method Engineering: Fundamentals and Experiences
null
Situational Method Engineering: Fundamentals and Experiences, Geneve : Switzerland (2007)
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The work presented in this paper is related to the area of Situational Method Engineering (SME) which focuses on project-specific method construction. We propose a faceted framework to understand and classify issues in system development SME. The framework identifies four different but complementary viewpoints. Each view allows us to capture a particular aspect of situational methods. Inter-relationships between these views show how they influence each other. In order to study, understand and classify a particular view of SME in its diversity, we associate a set of facets with each view. As a facet allows an in-depth description of one specific aspect of SME, the views show the variety and diversity of these aspects.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 08:37:36 GMT" } ]
2009-11-10T00:00:00
[ [ "Nehan", "Yves-Roger", "", "CRI" ], [ "Deneckere", "Rebecca", "", "CRI" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0911.1495
Rebecca Deneckere
Elena Kornyshova (CRI), Rebecca Deneckere (CRI), Camille Salinesi (CRI)
Method Chunks Selection by Multicriteria Techniques: an Extension of the Assembly-based Approach
null
Situational Method Engineering: Fundamentals and Experiences, Geneve : Suisse (2007)
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The work presented in this paper is related to the area of situational method engineering (SME). In this domain, approaches are developed accordingly to specific project specifications. We propose to adapt an existing method construction process, namely the assembly-based one. One of the particular features of assembly-based SME approach is the selection of method chunks. Our proposal is to offer a better guidance in the retrieval of chunks by the introduction of multicriteria techniques. To use them efficiently, we defined a typology of projects characteristics, in order to identify all their critical aspects, which will offer a priorisation to help the method engineer in the choice between similar chunks.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 08:38:06 GMT" } ]
2009-11-10T00:00:00
[ [ "Kornyshova", "Elena", "", "CRI" ], [ "Deneckere", "Rebecca", "", "CRI" ], [ "Salinesi", "Camille", "", "CRI" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0911.1496
Rebecca Deneckere
Elena Kornyshova (CRI), Rebecca Deneckere (CRI), Camille Salinesi (CRI)
Improving Software Development Processes with Multicriteria Methods
11 pages
Atelier: M\'ethodes avanc\'ee de d\'eveloppement des SI, Fontainebleau : France (2008)
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
All software development processes include steps where several alternatives induce a choice, a decision-making. Sometimes, methodologies offer a way to make decisions. However, in a lot of cases, the arguments to carry out the decision are very poor and the choice is made in an intuitive and hazardous way. The aim of our work is to offer a scientifically founded way to guide the engineer through tactical choices with the application of multicriteria methods in software development processes. This approach is illustrated with three cases: risks, use cases and tools within Rational Unified Process.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 08:38:34 GMT" } ]
2009-11-10T00:00:00
[ [ "Kornyshova", "Elena", "", "CRI" ], [ "Deneckere", "Rebecca", "", "CRI" ], [ "Salinesi", "Camille", "", "CRI" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0911.1502
Gitanjali Bhutani
Gitanjali Bhutani
A Round-based Pricing Scheme for Maximizing Service Provider's Revenue in P2PTV Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we analyze a round-based pricing scheme that encourages favorable behavior from users of real-time P2P applications like P2PTV. In the design of pricing schemes, we consider price to be a function of usage and capacity of download/upload streams, and quality of content served. Users are consumers and servers at the same time in such networks, and often exhibit behavior that is unfavorable towards maximization of social benefits. Traditionally, network designers have overcome this difficulty by building-in traffic latencies. However, using simulations, we show that appropriate pricing schemes and usage terms can enable designers to limit required traffic latencies, and be able to earn nearly 30% extra revenue from providing P2PTV services. The service provider adjusts the prices of individual programs incrementally within rounds, while making relatively large-scale adjustments at the end of each round. Through simulations, we show that it is most beneficial for the service provider to carry out 5 such rounds of price adjustments for maximizing his average profit and minimizing the associated standard deviation at the same time.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 10:04:54 GMT" } ]
2009-11-10T00:00:00
[ [ "Bhutani", "Gitanjali", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.1504
Sana Ullah
Sana Ullah, Yingji Zhong, S.M.Riazul Islam, Ahasanun Nessa, Kyung Sup Kwak
Throughput Limits of IEEE 802.11 and IEEE 802.15.3
4 pages, 6 figures, 1 table, 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08
null
10.1109/WiCom.2008.731
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
IEEE 802.11 and IEEE 802.15.3 are wireless standards originally designed for wireless local area network (WLAN) and wireless personal area network (WPAN). This paper studies MAC throughput analysis of both standards. We present a comparative analysis of both standards in terms of MAC throughput and bandwidth efficiency. Numerical results show that the performance of IEEE 802.15.3 transcends IEEE 802.11 in all cases.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 09:59:15 GMT" } ]
2009-11-10T00:00:00
[ [ "Ullah", "Sana", "" ], [ "Zhong", "Yingji", "" ], [ "Islam", "S. M. Riazul", "" ], [ "Nessa", "Ahasanun", "" ], [ "Kwak", "Kyung Sup", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0911.1507
Sana Ullah
Sana Ullah, Pervez Khan, Young-Woo Choi, Hyung-Soo Lee, Kyung Sup Kwak
MAC Layer Hurdles in BSNs
ICACT 2009
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The last few decades have seen considerable research progress in microelectronics and integrated circuits, system-on-chip design, wireless communication, and sensor technology. This progress has enabled the seamless integration of autonomous wireless sensor nodes around a human body to create a Body Sensor Network (BSN). The development of a proactive and ambulatory BSN induces a number of enormous issues and challenges. This paper presents the technical hurdles during the design and implementation of a low-power Medium Access Control (MAC) protocol for in-body and on-body sensor networks. We analyze the performance of IEEE 802.15.4 protocol for the on-body sensor network. We also provide a comprehensive insight into the heterogeneous characteristics of the in-body sensor network. A low-power technique called Pattern-Based Wake-up Table is proposed to handle the normal traffic in a BSN. The proposed technique provides a reliable solution towards low-power communication in the in-body sensor network.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 10:25:11 GMT" }, { "version": "v2", "created": "Tue, 27 Jul 2010 18:48:11 GMT" }, { "version": "v3", "created": "Thu, 25 Oct 2018 07:51:41 GMT" } ]
2018-10-26T00:00:00
[ [ "Ullah", "Sana", "" ], [ "Khan", "Pervez", "" ], [ "Choi", "Young-Woo", "" ], [ "Lee", "Hyung-Soo", "" ], [ "Kwak", "Kyung Sup", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.1508
Sana Ullah
Ahasanun Nessa, Qinghai Yang, Sana Ullah, Humaun Kabir, and Kyung Sup Kwak
Performance Analysis of Two-Hop Cooperative MIMO transmission with Relay Selection in Rayleigh Fading Channel
5 figures, 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08
null
10.1109/WiCom.2008.122
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless relaying is one of the promising solutions to overcome the channel impairments and provide high data rate coverage that appears for beyond 3G mobile communications. In this paper we present an end to end BER performance analysis of dual hop wireless communication systems equipped with multiple decode and forward relays over the Rayleigh fading channel with relay selection. We select the best relay based on end to end channel conditions. We apply orthogonal space time block coding (OSTBC) at source, and also present how the multiple antennas at the source terminal affects the end to end BER performance. This intermediate relay technique will cover long distance where destination is out of reach from source.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 10:30:32 GMT" } ]
2009-11-10T00:00:00
[ [ "Nessa", "Ahasanun", "" ], [ "Yang", "Qinghai", "" ], [ "Ullah", "Sana", "" ], [ "Kabir", "Humaun", "" ], [ "Kwak", "Kyung Sup", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.1509
Sana Ullah
Sana Ullah, Pervez Khan, and Kyung Sup Kwak
On the Development of Low Power MAC Protocol for WBANs
IMECS 2009
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current advances in wireless communication, microelectronics, semiconductor technologies, and intelligent sensors have contributed to the development of unobtrusive WBANs. These networks provide long term health monitoring of patients without any constraint in their normal activities. Traditional MAC protocols do not accommodate the assorted WBAN traffic requirements in a power efficient manner. In this paper, we present a brief discussion on the development process of a low power MAC protocol for WBANs. We observe the behavior of a beacon-enabled IEEE 802.15.4 for on-body sensor networks. We further propose a low power technique called traffic based wakeup mechanism for a WBAN that exploits the traffic patterns of the BAN Nodes to ensure power efficient and reliable communication.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 10:34:02 GMT" }, { "version": "v2", "created": "Tue, 2 Feb 2010 07:37:48 GMT" }, { "version": "v3", "created": "Tue, 27 Jul 2010 18:49:17 GMT" }, { "version": "v4", "created": "Thu, 25 Oct 2018 07:50:04 GMT" } ]
2018-10-26T00:00:00
[ [ "Ullah", "Sana", "" ], [ "Khan", "Pervez", "" ], [ "Kwak", "Kyung Sup", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.1510
Gitanjali Bhutani
Gitanjali Bhutani
A Near-Optimal Scheme for TCP ACK Pacing to Maintain Throughput in Wireless Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The advent of fourth generation technologies in wireless networks and the rapid growth of 3G have heralded an era that will require researchers to find reliable and easily implement-able solutions to the problem of poor TCP performance in the wireless environment. Since a large part of the Internet is TCP-based, solving this problem will be instrumental in determining if the move from wired to wireless will be seamless or not. This paper proposes a scheme that uses the base station's ability to predict the time at which the link may be going down and to estimate the period for which the mobile would be unreachable due to conditions like fading. By using cross-layer and ACK pacing algorithms, the base station prevents the fixed host from timing out while waiting for ACKs from the mobile. This in turn prevents TCP on the fixed host from bringing down the throughput drastically due to temporary network conditions, caused by mobility or the unreliability of wireless links. Experimental results indicate a reasonable increase in throughput when the ACK holding scheme is used.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 10:38:18 GMT" } ]
2009-11-10T00:00:00
[ [ "Bhutani", "Gitanjali", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.1511
Sana Ullah
Yingji Zhong, Kyung Sup Kwak, and Sana Ullah
MIMO Cluster Cooperative Assignment Cross Layer Scheme for Hybrid Wireless Sensor Networks
4 figures, 9th International Symposium on Communication and Information Technology 2009 (ISCIT 2009), September 28-30, 2009, South Korea
null
10.1109/ISCIT.2009.5341234
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dual-cross scenario of the hybrid wireless sensor networks (WSNs) is studied and a novel MIMO Cluster Cooperative Assignment Cross Layer Scheduling Scheme (MCCA-CLSS) is proposed in this paper. The comparison and the predominance of the proposed scheme are demonstrated, the clusters are optimized. With the help of the simulations, the relative energy consumption and the end-to-end blocking probability are all improved. The addressing ratio of success in the condition of the unchanged parameters and external information can be increased and the network can tolerate more hops to support reliable transportation by the proposed scheme.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 10:38:50 GMT" }, { "version": "v2", "created": "Wed, 23 Dec 2009 05:52:24 GMT" }, { "version": "v3", "created": "Fri, 6 Aug 2010 08:14:28 GMT" } ]
2010-08-09T00:00:00
[ [ "Zhong", "Yingji", "" ], [ "Kwak", "Kyung Sup", "" ], [ "Ullah", "Sana", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.1512
Sana Ullah
Yingji Zhong, Sana Ullah, and Kyung Sup Kwak
A Novel Cross Layer Scheme for Multi-Channel Hybrid Cognitive Ad-hoc Networks
3 figures, KICS Summer Conference 08, Jeju Island, South Korea
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A special scenario of the topology in the hybrid Cognitive Ad-hoc networks is studied and a novel cross layer scheme is proposed in this paper. The proposed scheme integrated the attributes both of the new performance evaluation machine check time metric and the topology space in special scenario. The topology and power consumption of each node can all be optimized due to the minimum link occupation with the help of this scheme. Simulation results show that the novel scheme can give schedule guarantee to the multi-channel networks in the variable node loads and transmission powers, and make the node stable to support multi-hops at the same time.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 10:40:52 GMT" } ]
2009-11-10T00:00:00
[ [ "Zhong", "Yingji", "" ], [ "Ullah", "Sana", "" ], [ "Kwak", "Kyung Sup", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.1514
Sana Ullah
Murad Ali, Sana Ullah, and Pervez Khan
Managing Innovation and Technology in Developing Countries
The 5th annual International New Exploratory Technologies Conference 2008 (NEXT 2008), Turku, Finland
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Innovation and technology management is an inevitable issue in the high end technological and innovative organizations. Today, most of the innovations are limited with developed countries like USA, Japan and Europe while developing countries are still behind in the field of innovation and management of technology. But it is also becoming a subject for rapid progress and development in developing countries. Innovation and technology environment in developing countries are by nature, problematic, characterized by poor business models, political instability and governance conditions, low education level and lack of world-class research universities, an underdeveloped and mediocre physical infrastructure, and lack of solid technology based on trained human resources. This paper provides a theoretical and conceptual framework analysis for managing innovation and technology in developing countries like India and China. We present the issues and challenges in innovation and technology management and come up with proposed solutions.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 10:51:47 GMT" } ]
2009-11-10T00:00:00
[ [ "Ali", "Murad", "" ], [ "Ullah", "Sana", "" ], [ "Khan", "Pervez", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0911.1516
Sana Ullah
Sana Ullah, M.A. Khan, Kyung Sup Kwak
A Discourse-based Approach in Text-based Machine Translation
1 figure, 3 tables, ICCIT 07, Vol. 3, pp 1073-1074, Busan, June 2007
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a theoretical research based approach to ellipsis resolution in machine translation. The formula of discourse is applied in order to resolve ellipses. The validity of the discourse formula is analyzed by applying it to the real world text, i.e., newspaper fragments. The source text is converted into mono-sentential discourses where complex discourses require further dissection either directly into primitive discourses or first into compound discourses and later into primitive ones. The procedure of dissection needs further improvement, i.e., discovering as many primitive discourse forms as possible. An attempt has been made to investigate new primitive discourses or patterns from the given text.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 10:57:04 GMT" }, { "version": "v2", "created": "Wed, 28 Jul 2010 08:49:34 GMT" } ]
2010-07-29T00:00:00
[ [ "Ullah", "Sana", "" ], [ "Khan", "M. A.", "" ], [ "Kwak", "Kyung Sup", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0911.1517
Sana Ullah
Sana Ullah, M.Asdaque Hussain, and Kyung Sup Kwak
Resolution of Unidentified Words in Machine Translation
4 pages, 2 figures, 2 tables, The 4th annual International New Exploratory Technologies Conference 2007 (NEXT 2007), Seoul, South Korea
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a mechanism of resolving unidentified lexical units in Text-based Machine Translation (TBMT). In a Machine Translation (MT) system it is unlikely to have a complete lexicon and hence there is intense need of a new mechanism to handle the problem of unidentified words. These unknown words could be abbreviations, names, acronyms and newly introduced terms. We have proposed an algorithm for the resolution of the unidentified words. This algorithm takes discourse unit (primitive discourse) as a unit of analysis and provides real time updates to the lexicon. We have manually applied the algorithm to news paper fragments. Along with anaphora and cataphora resolution, many unknown words especially names and abbreviations were updated to the lexicon.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 13:52:05 GMT" }, { "version": "v2", "created": "Wed, 28 Jul 2010 10:45:45 GMT" } ]
2010-07-29T00:00:00
[ [ "Ullah", "Sana", "" ], [ "Hussain", "M. Asdaque", "" ], [ "Kwak", "Kyung Sup", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0911.1520
Sana Ullah
Ahasanun Nessa, M.A. Ameen, Sana Ullah, and Kyung Sup Kwak
Applicability of Telemedicine in Bangladesh: Current Status and Future Prospects
ICCIT 08, Vol. 1, pp.948-953, Busan, November 2008
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Telemedicine refers to the use of information and communication technology to provide and support health care mainly for the purpose of providing consultation. It is also a way to provide medical procedures or examinations to remote locations. It has the potential to improve both the quality and the access to health care services delivery while lowering costs even in the scarcity of resources. Understanding the potentiality of telemedicine, many developing countries are implementing telemedicine to provide health care facility to remote area where health care facilities are deficient. Bangladesh is not an exception to this either. In this paper we mention the reasons why Bangladesh has to move for telemedicine. We also present the past and on-going telemedicine activities and projects in Bangladesh. Analyzing these projects we have found out some factors which should be assessed carefully for successful implementation of telemedicine application. Finally we propose a prototype telemedicine network for Bangladesh that can improve health facilities through telemedicine by making a connection between rural health facility providers and special hospitals.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 11:32:38 GMT" } ]
2009-11-10T00:00:00
[ [ "Nessa", "Ahasanun", "" ], [ "Ameen", "M. A.", "" ], [ "Ullah", "Sana", "" ], [ "Kwak", "Kyung Sup", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0911.1544
Sana Ullah
Sana Ullah, Xizhi An, and Kyung Sup Kwak
Towards Power Efficient MAC Protocol for In-Body and On-Body Sensor Networks
11 pages, 5 figures, 3 tables,KES AMSTA 09, LNAI 5559, pp.335-345, Uppsala, June 2009. arXiv admin note: text overlap with arXiv:0911.1507
null
10.1007/978-3-642-01665-3_34
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an empirical discussion on the design and implementation of a power-efficient Medium Access Control (MAC) protocol for in-body and on-body sensor networks. We analyze the performance of a beacon-enabled IEEE 802.15.4, PB-TDMA, and S-MAC protocols for on-body sensor networks. We further present a Traffic Based Wakeup Mechanism that utilizes the traffic patterns of the BAN Nodes (BNs) to accommodate the entire BSN traffic. To enable a logical connection between different BNs working on different frequency bands, a method called Bridging function is proposed. The Bridging function integrates all BNs working on different bands into a complete BSN.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 16:40:24 GMT" }, { "version": "v2", "created": "Tue, 2 Feb 2010 08:44:06 GMT" } ]
2018-10-26T00:00:00
[ [ "Ullah", "Sana", "" ], [ "An", "Xizhi", "" ], [ "Kwak", "Kyung Sup", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.1546
Sana Ullah
Sana Ullah, Henry Higgins, M.Arif Siddiqui, and Kyung Sup Kwak
A Study of Implanted and Wearable Body Sensor Networks
KES-AMSTA 08, LNAI 4953, pp. 464-473, Incheon, March 2008
null
10.1007/978-3-540-78582-8_47
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent advances in intelligent sensors, microelectronics and integrated circuit, system-on-chip design and low power wireless communication introduced the development of miniaturised and autonomous sensor nodes. These tiny sensor nodes can be deployed to develop a proactive Body Sensor Network (BSN). The rapid advancement in ultra low-power RF (radio frequency) technology enables invasive and non-invasive devices to communicate with a remote station. This communication revolutionizes healthcare system by enabling long term health monitoring of a patient and providing real time feedback to the medical experts. In this paper, we present In-body and On-body communication networks with a special focus on the methodologies of wireless communication between implanted medical devices with external monitoring equipment and recent technological growth in both areas. We also discuss open issues and challenges in a BSN.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 16:46:59 GMT" }, { "version": "v2", "created": "Thu, 12 Nov 2009 07:47:38 GMT" }, { "version": "v3", "created": "Tue, 30 Oct 2018 01:22:08 GMT" } ]
2018-10-31T00:00:00
[ [ "Ullah", "Sana", "" ], [ "Higgins", "Henry", "" ], [ "Siddiqui", "M. Arif", "" ], [ "Kwak", "Kyung Sup", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.1564
Guangwu Xu
T. Tony Cai, Lie Wang, Guangwu Xu
New Bounds for Restricted Isometry Constants
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we show that if the restricted isometry constant $\delta_k$ of the compressed sensing matrix satisfies \[ \delta_k < 0.307, \] then $k$-sparse signals are guaranteed to be recovered exactly via $\ell_1$ minimization when no noise is present and $k$-sparse signals can be estimated stably in the noisy case. It is also shown that the bound cannot be substantively improved. An explicitly example is constructed in which $\delta_{k}=\frac{k-1}{2k-1} < 0.5$, but it is impossible to recover certain $k$-sparse signals.
[ { "version": "v1", "created": "Sun, 8 Nov 2009 21:58:47 GMT" } ]
2009-11-10T00:00:00
[ [ "Cai", "T. Tony", "" ], [ "Wang", "Lie", "" ], [ "Xu", "Guangwu", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1582
Toby Walsh
Tyrel Russell and Toby Walsh
Manipulating Tournaments in Cup and Round Robin Competitions
Proceedings of Algorithmic Decision Theory, First International Conference, ADT 2009, Venice, Italy, October 20-23, 2009
null
10.1007/978-3-642-04428-1_3
null
cs.AI cs.GT cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In sports competitions, teams can manipulate the result by, for instance, throwing games. We show that we can decide how to manipulate round robin and cup competitions, two of the most popular types of sporting competitions in polynomial time. In addition, we show that finding the minimal number of games that need to be thrown to manipulate the result can also be determined in polynomial time. Finally, we show that there are several different variations of standard cup competitions where manipulation remains polynomial.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 03:57:45 GMT" } ]
2012-04-18T00:00:00
[ [ "Russell", "Tyrel", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0911.1583
Johan Bollen
Johan Bollen, Alberto Pepe and Huina Mao
Modeling public mood and emotion: Twitter sentiment and socio-economic phenomena
submitted to WWW2010
Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media (ICWSM 2011), 17-21 July 2011, Barcelona, Spain
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Microblogging is a form of online communication by which users broadcast brief text updates, also known as tweets, to the public or a selected circle of contacts. A variegated mosaic of microblogging uses has emerged since the launch of Twitter in 2006: daily chatter, conversation, information sharing, and news commentary, among others. Regardless of their content and intended use, tweets often convey pertinent information about their author's mood status. As such, tweets can be regarded as temporally-authentic microscopic instantiations of public mood state. In this article, we perform a sentiment analysis of all public tweets broadcasted by Twitter users between August 1 and December 20, 2008. For every day in the timeline, we extract six dimensions of mood (tension, depression, anger, vigor, fatigue, confusion) using an extended version of the Profile of Mood States (POMS), a well-established psychometric instrument. We compare our results to fluctuations recorded by stock market and crude oil price indices and major events in media and popular culture, such as the U.S. Presidential Election of November 4, 2008 and Thanksgiving Day. We find that events in the social, political, cultural and economic sphere do have a significant, immediate and highly specific effect on the various dimensions of public mood. We speculate that large scale analyses of mood can provide a solid platform to model collective emotive trends in terms of their predictive value with regards to existing social as well as economic indicators.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 04:07:03 GMT" } ]
2011-03-29T00:00:00
[ [ "Bollen", "Johan", "" ], [ "Pepe", "Alberto", "" ], [ "Mao", "Huina", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0911.1619
Paul D\"utting
Paul D\"utting, Monika Henzinger and Ingmar Weber
On the Pricing of Recommendations and Recommending Strategically
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
If you recommend a product to me and I buy it, how much should you be paid by the seller? And if your sole interest is to maximize the amount paid to you by the seller for a sequence of recommendations, how should you recommend optimally if I become more inclined to ignore you with each irrelevant recommendation you make? Finding an answer to these questions is a key challenge in all forms of marketing that rely on and explore social ties; ranging from personal recommendations to viral marketing. In the first part of this paper, we show that there can be no pricing mechanism that is "truthful" with respect to the seller, and we use solution concepts from coalitional game theory, namely the Core, the Shapley Value, and the Nash Bargaining Solution, to derive provably "fair" prices for settings with one or multiple recommenders. We then investigate pricing mechanisms for the setting where recommenders have different "purchase arguments". Here we show that it might be beneficial for the recommenders to withhold some of their arguments, unless anonymity-proof solution concepts, such as the anonymity-proof Shapley value, are used. In the second part of this paper, we analyze the setting where the recommendee loses trust in the recommender for each irrelevant recommendation. Here we prove that even if the recommendee regains her initial trust on each successful recommendation, the expected total profit the recommender can make over an infinite period is bounded. This can only be overcome when the recommendee also incrementally regains trust during periods without any recommendation. Here, we see an interesting connection to "banner blindness", suggesting that showing fewer ads can lead to a higher long-term profit.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 10:21:42 GMT" } ]
2009-11-10T00:00:00
[ [ "Dütting", "Paul", "" ], [ "Henzinger", "Monika", "" ], [ "Weber", "Ingmar", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0911.1626
Marek Cygan
Marek Cygan, Lukasz Kowalik, Marcin Mucha, Marcin Pilipczuk, Piotr Sankowski
Fast Approximation in Subspaces by Doubling Metric Decomposition
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose and study a new complexity model for approximation algorithms. The main motivation are practical problems over large data sets that need to be solved many times for different scenarios, e.g., many multicast trees that need to be constructed for different groups of users. In our model we allow a preprocessing phase, when some information of the input graph $G=(V,E)$ is stored in a limited size data structure. Next, the data structure enables processing queries of the form ``solve problem A for an input $S\subseteq V$''. We consider problems like {\sc Steiner Forest}, {\sc Facility Location}, {\sc $k$-Median}, {\sc $k$-Center} and {\sc TSP} in the case when the graph induces a doubling metric. Our main results are data structures of near-linear size that are able to answer queries in time close to linear in $|S|$. This improves over typical worst case reuniting time of approximation algorithms in the classical setting which is $\Omega(|E|)$ independently of the query size. In most cases, our approximation guarantees are arbitrarily close to those in the classical setting. Additionally, we present the first fully dynamic algorithm for the Steiner tree problem.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 10:29:49 GMT" }, { "version": "v2", "created": "Thu, 17 Jun 2010 08:01:58 GMT" } ]
2010-06-18T00:00:00
[ [ "Cygan", "Marek", "" ], [ "Kowalik", "Lukasz", "" ], [ "Mucha", "Marcin", "" ], [ "Pilipczuk", "Marcin", "" ], [ "Sankowski", "Piotr", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.1647
Ajinkya Kale
Ajinkya Kale, Ananth Chakravarthy, Nitin Jadhav
An extendible User-Command Framework based on tagging system
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Memorizing the user commands has been a problem since long. In this study we try to propose solutions to overcome two problems - the problem of selecting appropriate commands names during application development and the problem of memorizing these command names. The proposed solution includes a framework in which the applications can plug into, to get their application commands and corresponding tags in to the new command execution application.We also propose a mechanism where user can generate her own set of tags for a command and share those with peers.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 11:49:50 GMT" } ]
2009-11-10T00:00:00
[ [ "Kale", "Ajinkya", "" ], [ "Chakravarthy", "Ananth", "" ], [ "Jadhav", "Nitin", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0911.1672
Balaji Akula
Balaji Akula, James Cusick
Biological Computing Fundamentals and Futures
Introduction to Biological computing, 7 pages
null
null
null
cs.CE q-bio.OT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The fields of computing and biology have begun to cross paths in new ways. In this paper a review of the current research in biological computing is presented. Fundamental concepts are introduced and these foundational elements are explored to discuss the possibilities of a new computing paradigm. We assume the reader to possess a basic knowledge of Biology and Computer Science
[ { "version": "v1", "created": "Mon, 9 Nov 2009 13:16:01 GMT" } ]
2009-11-10T00:00:00
[ [ "Akula", "Balaji", "" ], [ "Cusick", "James", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Quantitative Biology", "code": "q-bio.OT", "description": "Work in quantitative biology that does not fit into the other q-bio classifications", "span": "(Other Quantitative Biology)" } ]
0911.1677
Bernd Schuh
Bernd R. Schuh
Logical Primes, Metavariables and Satisfiability
null
null
null
null
math.LO cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For formulas F of propositional calculus I introduce a "metavariable" MF and show how it can be used to define an algorithm for testing satisfiability. MF is a formula which is true/false under all possible truth assignments iff F is satisfiable/unsatisfiable. In this sense MF is a metavariable with the "meaning" 'F is SAT'. For constructing MF a group of transformations of the basic variables ai is used which corresponds to 'flipping" literals to their negation. The whole procedure corresponds to branching algorithms where a formula is split with respect to the truth values of its variables, one by one. Each branching step corresponds to an approximation to the metatheorem which doubles the chance to find a satisfying truth assignment but also doubles the length of the formulas to be tested, in principle. Simplifications arise by additional length reductions. I also discuss the notion of "logical primes" and show that each formula can be written as a uniquely defined product of such prime factors. Satisfying truth assignments can be found by determining the "missing" primes in the factorization of a formula.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 13:29:53 GMT" } ]
2009-11-10T00:00:00
[ [ "Schuh", "Bernd R.", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.1678
Joao Marques-Silva
Ashish Darbari and Bernd Fischer and Joao Marques-Silva
Industrial-Strength Formally Certified SAT Solving
null
null
null
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Boolean Satisfiability (SAT) solvers are now routinely used in the verification of large industrial problems. However, their application in safety-critical domains such as the railways, avionics, and automotive industries requires some form of assurance for the results, as the solvers can (and sometimes do) have bugs. Unfortunately, the complexity of modern, highly optimized SAT solvers renders impractical the development of direct formal proofs of their correctness. This paper presents an alternative approach where an untrusted, industrial-strength, SAT solver is plugged into a trusted, formally certified, SAT proof checker to provide industrial-strength certified SAT solving. The key novelties and characteristics of our approach are (i) that the checker is automatically extracted from the formal development, (ii), that the combined system can be used as a standalone executable program independent of any supporting theorem prover, and (iii) that the checker certifies any SAT solver respecting the agreed format for satisfiability and unsatisfiability claims. The core of the system is a certified checker for unsatisfiability claims that is formally designed and verified in Coq. We present its formal design and outline the correctness proofs. The actual standalone checker is automatically extracted from the the Coq development. An evaluation of the certified checker on a representative set of industrial benchmarks from the SAT Race Competition shows that, albeit it is slower than uncertified SAT checkers, it is significantly faster than certified checkers implemented on top of an interactive theorem prover.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 13:42:55 GMT" }, { "version": "v2", "created": "Thu, 17 Dec 2009 19:31:03 GMT" } ]
2009-12-17T00:00:00
[ [ "Darbari", "Ashish", "" ], [ "Fischer", "Bernd", "" ], [ "Marques-Silva", "Joao", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0911.1681
Sana Ullah
Sana Ullah, Murad Ali, Asdaque Hussain, Kyung Sup Kwak
Applications of UWB Technology
Report (informal)
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent advances in wideband impulse technology, low power communication along with unlicensed band have enabled ultra wide band (UWB) as a leading technology for future wireless applications. This paper outlines the applications of emerging UWB technology in a private and commercial sector. We further talk about UWB technology for a wireless body area network (WBAN).
[ { "version": "v1", "created": "Mon, 9 Nov 2009 13:54:06 GMT" }, { "version": "v2", "created": "Tue, 27 Jul 2010 16:42:49 GMT" }, { "version": "v3", "created": "Thu, 2 Apr 2015 13:32:18 GMT" } ]
2015-04-03T00:00:00
[ [ "Ullah", "Sana", "" ], [ "Ali", "Murad", "" ], [ "Hussain", "Asdaque", "" ], [ "Kwak", "Kyung Sup", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.1685
Damien Chablat
Liang Ma (IRCCyN), Wei Zhang (DIE), Damien Chablat (IRCCyN), Fouad Bennis (IRCCyN), Fran\c{c}ois Guillaume
Multi-Objective Optimisation Method for Posture Prediction and Analysis with Consideration of Fatigue Effect and its Application Case
null
Computers & Industrial Engineering 57, 4 (2009) 1235-1246
10.1016/j.cie.2009.06.003
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automation technique has been widely used in manufacturing industry, but there are still manual handling operations required in assembly and maintenance work in industry. Inappropriate posture and physical fatigue might result in musculoskeletal disorders (MSDs) in such physical jobs. In ergonomics and occupational biomechanics, virtual human modelling techniques have been employed to design and optimize the manual operations in design stage so as to avoid or decrease potential MSD risks. In these methods, physical fatigue is only considered as minimizing the muscle or joint stress, and the fatigue effect along time for the posture is not considered enough. In this study, based on the existing methods and multiple objective optimisation method (MOO), a new posture prediction and analysis method is proposed for predicting the optimal posture and evaluating the physical fatigue in the manual handling operation. The posture prediction and analysis problem is mathematically described and a special application case is demonstrated for analyzing a drilling assembly operation in European Aeronautic Defence & Space Company (EADS) in this paper.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 13:57:25 GMT" } ]
2009-11-10T00:00:00
[ [ "Ma", "Liang", "", "IRCCyN" ], [ "Zhang", "Wei", "", "DIE" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Bennis", "Fouad", "", "IRCCyN" ], [ "Guillaume", "François", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0911.1691
Rasmus Resen Amossen
Rasmus Resen Amossen
Vertical partitioning of relational OLTP databases using integer programming
null
null
null
null
cs.DB cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A way to optimize performance of relational row store databases is to reduce the row widths by vertically partitioning tables into table fractions in order to minimize the number of irrelevant columns/attributes read by each transaction. This paper considers vertical partitioning algorithms for relational row-store OLTP databases with an H-store-like architecture, meaning that we would like to maximize the number of single-sited transactions. We present a model for the vertical partitioning problem that, given a schema together with a vertical partitioning and a workload, estimates the costs (bytes read/written by storage layer access methods and bytes transferred between sites) of evaluating the workload on the given partitioning. The cost model allows for arbitrarily prioritizing load balancing of sites vs. total cost minimization. We show that finding a minimum-cost vertical partitioning in this model is NP-hard and present two algorithms returning solutions in which single-sitedness of read queries is preserved while allowing column replication (which may allow a drastically reduced cost compared to disjoint partitioning). The first algorithm is a quadratic integer program that finds optimal minimum-cost solutions with respect to the model, and the second algorithm is a more scalable heuristic based on simulated annealing. Experiments show that the algorithms can reduce the cost of the model objective by 37% when applied to the TPC-C benchmark and the heuristic is shown to obtain solutions with cost close to the ones found using the quadratic program.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 15:03:31 GMT" }, { "version": "v2", "created": "Mon, 11 Jan 2010 20:28:21 GMT" }, { "version": "v3", "created": "Tue, 16 Feb 2010 09:43:50 GMT" } ]
2010-02-16T00:00:00
[ [ "Amossen", "Rasmus Resen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0911.1696
Julia Kempe
Andris Ambainis, Julia Kempe, Or Sattath
A Quantum Lovasz Local Lemma
19 pages
Journal of the ACM, Volume 59 Issue 5, October 2012, Article No. 24
10.1145/2371656.2371659
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Lovasz Local Lemma (LLL) is a powerful tool in probability theory to show the existence of combinatorial objects meeting a prescribed collection of "weakly dependent" criteria. We show that the LLL extends to a much more general geometric setting, where events are replaced with subspaces and probability is replaced with relative dimension, which allows to lower bound the dimension of the intersection of vector spaces under certain independence conditions. Our result immediately applies to the k-QSAT problem: For instance we show that any collection of rank 1 projectors with the property that each qubit appears in at most $2^k/(e \cdot k)$ of them, has a joint satisfiable state. We then apply our results to the recently studied model of random k-QSAT. Recent works have shown that the satisfiable region extends up to a density of 1 in the large k limit, where the density is the ratio of projectors to qubits. Using a hybrid approach building on work by Laumann et al. we greatly extend the known satisfiable region for random k-QSAT to a density of $\Omega(2^k/k^2)$. Since our tool allows us to show the existence of joint satisfying states without the need to construct them, we are able to penetrate into regions where the satisfying states are conjectured to be entangled, avoiding the need to construct them, which has limited previous approaches to product states.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 15:07:25 GMT" } ]
2013-10-10T00:00:00
[ [ "Ambainis", "Andris", "" ], [ "Kempe", "Julia", "" ], [ "Sattath", "Or", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.1707
Michel Nabaa
Michel Nabaa (LITIS), Cyrille Bertelle (LITIS), Antoine Dutot (LITIS), Damien Olivier (LITIS), Pascal Mallet
A Dynamic Vulnerability Map to Assess the Risk of Road Network Traffic Utilization
null
International Symposium on Risk Models and Applications, Ki\`ev : Ukraine (2008)
null
null
cs.AI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Le Havre agglomeration (CODAH) includes 16 establishments classified Seveso with high threshold. In the literature, we construct vulnerability maps to help decision makers assess the risk. Such approaches remain static and do take into account the population displacement in the estimation of the vulnerability. We propose a decision making tool based on a dynamic vulnerability map to evaluate the difficulty of evacuation in the different sectors of CODAH. We use a Geographic Information system (GIS) to visualize the map which evolves with the road traffic state through a detection of communities in large graphs algorithm.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 15:43:54 GMT" } ]
2009-11-10T00:00:00
[ [ "Nabaa", "Michel", "", "LITIS" ], [ "Bertelle", "Cyrille", "", "LITIS" ], [ "Dutot", "Antoine", "", "LITIS" ], [ "Olivier", "Damien", "", "LITIS" ], [ "Mallet", "Pascal", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.1708
Pierrick Tranouez
Pierrick Tranouez (LITIS, IDEES), Antoine Dutot (LITIS)
Different goals in multiscale simulations and how to reach them
null
Complex Systems and Self-organization Modelling, Bertelle, Cyrille; Duchamp, G\'erard H.E.; Kadri-Dahmani, Hakima (Ed.) (2009) 29-39
10.1007/978-3-540-88073-8
null
cs.AI nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we sum up our works on multiscale programs, mainly simulations. We first start with describing what multiscaling is about, how it helps perceiving signal from a background noise in a ?ow of data for example, for a direct perception by a user or for a further use by another program. We then give three examples of multiscale techniques we used in the past, maintaining a summary, using an environmental marker introducing an history in the data and finally using a knowledge on the behavior of the different scales to really handle them at the same time.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 15:46:17 GMT" } ]
2016-11-25T00:00:00
[ [ "Tranouez", "Pierrick", "", "LITIS, IDEES" ], [ "Dutot", "Antoine", "", "LITIS" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
0911.1713
Mathieu Bogaerts
Mathieu Bogaerts
Isometries and Construction of Permutation Arrays
6 pages, 2 tables
null
null
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An (n,d)-permutation code is a subset C of Sym(n) such that the Hamming distance d_H between any two distinct elements of C is at least equal to d. In this paper, we use the characterisation of the isometry group of the metric space (Sym(n),d_H) in order to develop generating algorithms with rejection of isomorphic objects. To classify the (n,d)-permutation codes up to isometry, we construct invariants and study their efficiency. We give the numbers of non-isometric (4,3)- and (5,4)- permutation codes. Maximal and balanced (n,d)-permutation codes are enumerated in a constructive way.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 16:19:15 GMT" } ]
2009-11-10T00:00:00
[ [ "Bogaerts", "Mathieu", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1720
Carlos P. Roca
Carlos P. Roca, Jos\'e A. Cuesta and Angel S\'anchez
Evolutionary game theory: Temporal and spatial effects beyond replicator dynamics
Review, 48 pages, 26 figures
Physics of Life Reviews 6, 208-249 (2009)
10.1016/j.plrev.2009.08.001
null
q-bio.PE cs.GT physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Evolutionary game dynamics is one of the most fruitful frameworks for studying evolution in different disciplines, from Biology to Economics. Within this context, the approach of choice for many researchers is the so-called replicator equation, that describes mathematically the idea that those individuals performing better have more offspring and thus their frequency in the population grows. While very many interesting results have been obtained with this equation in the three decades elapsed since it was first proposed, it is important to realize the limits of its applicability. One particularly relevant issue in this respect is that of non-mean-field effects, that may arise from temporal fluctuations or from spatial correlations, both neglected in the replicator equation. This review discusses these temporal and spatial effects focusing on the non-trivial modifications they induce when compared to the outcome of replicator dynamics. Alongside this question, the hypothesis of linearity and its relation to the choice of the rule for strategy update is also analyzed. The discussion is presented in terms of the emergence of cooperation, as one of the current key problems in Biology and in other disciplines.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 16:29:47 GMT" } ]
2009-11-14T00:00:00
[ [ "Roca", "Carlos P.", "" ], [ "Cuesta", "José A.", "" ], [ "Sánchez", "Angel", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0911.1739
Shmuel Friedland
Shmuel Friedland
Graph isomorphism and volumes of convex bodies
9 pages
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that a nontrivial graph isomorphism problem of two undirected graphs, and more generally, the permutation similarity of two given $n\times n$ matrices, is equivalent to equalities of volumes of the induced three convex bounded polytopes intersected with a given sequence of balls, centered at the origin with radii $t_i\in (0,\sqrt{n-1})$, where $\{t_i\}$ is an increasing sequence converging to $\sqrt{n-1}$. These polytopes are characterized by $n^2$ inequalities in at most $n^2$ variables. The existence of fpras for computing volumes of convex bodies gives rise to a semi-frpas of order $O^*(n^{14})$ at most to find if given two undirected graphs are isomorphic.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 17:48:36 GMT" } ]
2009-11-10T00:00:00
[ [ "Friedland", "Shmuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.1741
Andrew King
Andrew D. King
Hitting all maximum cliques with a stable set using lopsided independent transversals
7 pages. v4: Correction to statement of Lemma 8 and clarified proof.
null
10.1002/jgt.20532
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rabern recently proved that any graph with omega >= (3/4)(Delta+1) contains a stable set meeting all maximum cliques. We strengthen this result, proving that such a stable set exists for any graph with omega > (2/3)(Delta+1). This is tight, i.e. the inequality in the statement must be strict. The proof relies on finding an independent transversal in a graph partitioned into vertex sets of unequal size.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 17:55:06 GMT" }, { "version": "v2", "created": "Thu, 3 Dec 2009 19:35:42 GMT" }, { "version": "v3", "created": "Tue, 2 Mar 2010 15:35:15 GMT" }, { "version": "v4", "created": "Wed, 10 Mar 2010 15:16:08 GMT" } ]
2011-02-11T00:00:00
[ [ "King", "Andrew D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0911.1743
Ryan Hinton
Ryan Hinton (University of Virginia and L-3 Communications CSW) and Stephen G. Wilson (University of Virginia)
Analysis of peeling decoder for MET ensembles
Preprint of submission to Information Theory Workshop (ITW) 2010. 5 pages, two figures (from seven files). Processed with PDFLaTeX including IEEEtran style, amsmath, amsfonts, cite, array, graphicx, and amsthm packages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The peeling decoder introduced by Luby, et al. allows analysis of LDPC decoding for the binary erasure channel (BEC). For irregular ensembles, they analyze the decoder state as a Markov process and present a solution to the differential equations describing the process mean. Multi-edge type (MET) ensembles allow greater precision through specifying graph connectivity. We generalize the the peeling decoder for MET ensembles and derive analogous differential equations. We offer a new change of variables and solution to the node fraction evolutions in the general (MET) case. This result is preparatory to investigating finite-length ensemble behavior.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 18:38:53 GMT" } ]
2009-11-10T00:00:00
[ [ "Hinton", "Ryan", "", "University of Virginia and L-3 Communications CSW" ], [ "Wilson", "Stephen G.", "", "University of Virginia" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1745
Tuvi Etzion
Tuvi Etzion
Sequence Folding, Lattice Tiling, and Multidimensional Coding
21 pages
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Folding a sequence $S$ into a multidimensional box is a well-known method which is used as a multidimensional coding technique. The operation of folding is generalized in a way that the sequence $S$ can be folded into various shapes and not just a box. The new definition of folding is based on a lattice tiling for the given shape $\cS$ and a direction in the $D$-dimensional integer grid. Necessary and sufficient conditions that a lattice tiling for $\cS$ combined with a direction define a folding of a sequence into $\cS$ are derived. The immediate and most impressive application is some new lower bounds on the number of dots in two-dimensional synchronization patterns. This can be also generalized for multidimensional synchronization patterns. The technique and its application for two-dimensional synchronization patterns, raise some interesting problems in discrete geometry. We will also discuss these problems. It is also shown how folding can be used to construct multidimensional error-correcting codes. Finally, by using the new definition of folding, multidimensional pseudo-random arrays with various shapes are generated.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 18:55:24 GMT" } ]
2009-11-10T00:00:00
[ [ "Etzion", "Tuvi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1763
Marc Harper
Marc Harper
The Replicator Equation as an Inference Dynamic
Added a discussion of the discrete dynamic.
null
null
null
math.DS cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The replicator equation is interpreted as a continuous inference equation and a formal similarity between the discrete replicator equation and Bayesian inference is described. Further connections between inference and the replicator equation are given including a discussion of information divergences and exponential families as solutions for the replicator dynamic, using Fisher information and information geometry.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 20:38:46 GMT" }, { "version": "v2", "created": "Tue, 1 Dec 2009 19:12:38 GMT" }, { "version": "v3", "created": "Mon, 3 May 2010 21:53:31 GMT" } ]
2010-05-05T00:00:00
[ [ "Harper", "Marc", "" ] ]
[ { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1764
Marc Harper
Marc Harper
Escort Evolutionary Game Theory
Minor typo correction
Physica D: Nonlinear Phenomena, Volume 240, Issue 18, 1 September 2011, Pages 1411-1415
10.1016/j.physd.2011.04.008
null
math.DS cs.IT math.DG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A family of replicator-like dynamics, called the escort replicator equation, is constructed using information-geometric concepts and generalized information entropies and diverenges from statistical thermodynamics. Lyapunov functions and escort generalizations of basic concepts and constructions in evolutionary game theory are given, such as an escorted Fisher's Fundamental theorem and generalizations of the Shahshahani geometry.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 20:41:48 GMT" }, { "version": "v2", "created": "Tue, 1 Dec 2009 19:14:40 GMT" }, { "version": "v3", "created": "Fri, 7 May 2010 20:27:20 GMT" }, { "version": "v4", "created": "Tue, 18 May 2010 00:06:49 GMT" }, { "version": "v5", "created": "Fri, 24 Feb 2012 07:53:20 GMT" } ]
2012-02-27T00:00:00
[ [ "Harper", "Marc", "" ] ]
[ { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.DG", "description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis", "span": "(Differential Geometry)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1765
Ion Mandoiu
Justin Kennedy, Ion I. Mandoiu, and Bogdan Pasaniuc
GEDI: Scalable Algorithms for Genotype Error Detection and Imputation
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Genome-wide association studies generate very large datasets that require scalable analysis algorithms. In this report we describe the GEDI software package, which implements efficient algorithms for performing several common tasks in the analysis of population genotype data, including genotype error detection and correction, imputation of both randomly missing and untyped genotypes, and genotype phasing. Experimental results show that GEDI achieves high accuracy with a runtime scaling linearly with the number of markers and samples. The open source C++ code of GEDI, released under the GNU General Public License, is available for download at http://dna.engr.uconn.edu/software/GEDI/
[ { "version": "v1", "created": "Mon, 9 Nov 2009 23:35:41 GMT" } ]
2016-09-08T00:00:00
[ [ "Kennedy", "Justin", "" ], [ "Mandoiu", "Ion I.", "" ], [ "Pasaniuc", "Bogdan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.1767
Yashodhan Kanoria
Yashodhan Kanoria, Mohsen Bayati, Christian Borgs, Jennifer Chayes and Andrea Montanari
A Natural Dynamics for Bargaining on Exchange Networks
28 pages, 1 figure, second part of this work with different analysis and stronger results available at arXiv:1004.2079v1 [cs.GT]. This paper unchanged in update.
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bargaining networks model the behavior of a set of players that need to reach pairwise agreements for making profits. Nash bargaining solutions are special outcomes of such games that are both stable and balanced. Kleinberg and Tardos proved a sharp algorithmic characterization of such outcomes, but left open the problem of how the actual bargaining process converges to them. A partial answer was provided by Azar et al. who proposed a distributed algorithm for constructing Nash bargaining solutions, but without polynomial bounds on its convergence rate. In this paper, we introduce a simple and natural model for this process, and study its convergence rate to Nash bargaining solutions. At each time step, each player proposes a deal to each of her neighbors. The proposal consists of a share of the potential profit in case of agreement. The share is chosen to be balanced in Nash's sense as far as this is feasible (with respect to the current best alternatives for both players). We prove that, whenever the Nash bargaining solution is unique (and satisfies a positive gap condition) this dynamics converges to it in polynomial time. Our analysis is based on an approximate decoupling phenomenon between the dynamics on different substructures of the network. This approach may be of general interest for the analysis of local algorithms on networks.
[ { "version": "v1", "created": "Tue, 10 Nov 2009 00:37:35 GMT" }, { "version": "v2", "created": "Fri, 7 May 2010 18:59:43 GMT" } ]
2010-05-10T00:00:00
[ [ "Kanoria", "Yashodhan", "" ], [ "Bayati", "Mohsen", "" ], [ "Borgs", "Christian", "" ], [ "Chayes", "Jennifer", "" ], [ "Montanari", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0911.1783
Anton Leykin
Anton Leykin
Numerical Algebraic Geometry for Macaulay2
7 pages
Numerical algebraic geometry. JSAG, 3:5-10, 2011
null
Mittag-Leffler-2011spring
math.AG cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Numerical Algebraic Geometry uses numerical data to describe algebraic varieties. It is based on the methods of numerical polynomial homotopy continuation, an alternative to the classical symbolic approaches of computational algebraic geometry. We present a package, the driving idea behind which is to interlink the existing symbolic methods of Macaulay2 and the powerful engine of numerical approximate computations. The core procedures of the package exhibit performance competitive with the other homotopy continuation software.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 21:17:43 GMT" }, { "version": "v2", "created": "Sun, 22 May 2011 09:40:47 GMT" } ]
2011-11-23T00:00:00
[ [ "Leykin", "Anton", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0911.1807
Jevin West
Jevin West and Theodore Bergstrom and Carl Bergstrom
Big Macs and Eigenfactor Scores: Don't Let Correlation Coefficients Fool You
Version 2 This is a response to Phil Davis's 2008 paper (arXiv:0807.2678)
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Eigenfactor Metrics provide an alternative way of evaluating scholarly journals based on an iterative ranking procedure analogous to Google's PageRank algorithm. These metrics have recently been adopted by Thomson-Reuters and are listed alongside the Impact Factor in the Journal Citation Reports. But do these metrics differ sufficiently so as to be a useful addition to the bibliometric toolbox? Davis (2008) has argued otherwise, based on his finding of a 0.95 correlation coefficient between Eigenfactor score and Total Citations for a sample of journals in the field of medicine. This conclusion is mistaken; here we illustrate the basic statistical fallacy to which Davis succumbed. We provide a complete analysis of the 2006 Journal Citation Reports and demonstrate that there are statistically and economically significant differences between the information provided by the Eigenfactor Metrics and that provided by Impact Factor and Total Citations.
[ { "version": "v1", "created": "Tue, 10 Nov 2009 00:44:12 GMT" }, { "version": "v2", "created": "Fri, 30 Apr 2010 00:24:18 GMT" } ]
2010-05-03T00:00:00
[ [ "West", "Jevin", "" ], [ "Bergstrom", "Theodore", "" ], [ "Bergstrom", "Carl", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0911.1813
Aaron Roth
Aaron Roth, Tim Roughgarden
Interactive Privacy via the Median Mechanism
Appeared in STOC 2010
null
null
null
cs.CR cs.CC cs.DB cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define a new interactive differentially private mechanism -- the median mechanism -- for answering arbitrary predicate queries that arrive online. Relative to fixed accuracy and privacy constraints, this mechanism can answer exponentially more queries than the previously best known interactive privacy mechanism (the Laplace mechanism, which independently perturbs each query result). Our guarantee is almost the best possible, even for non-interactive privacy mechanisms. Conceptually, the median mechanism is the first privacy mechanism capable of identifying and exploiting correlations among queries in an interactive setting. We also give an efficient implementation of the median mechanism, with running time polynomial in the number of queries, the database size, and the domain size. This efficient implementation guarantees privacy for all input databases, and accurate query results for almost all input databases. The dependence of the privacy on the number of queries in this mechanism improves over that of the best previously known efficient mechanism by a super-polynomial factor, even in the non-interactive setting.
[ { "version": "v1", "created": "Tue, 10 Nov 2009 03:55:44 GMT" }, { "version": "v2", "created": "Wed, 19 Jan 2011 16:09:18 GMT" } ]
2011-01-20T00:00:00
[ [ "Roth", "Aaron", "" ], [ "Roughgarden", "Tim", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.1826
William Martin
J. H. Koolen (USTC), W. S. Lee (POSTECH), W. J. Martin (WPI), H. Tanaka (Tohoku)
Arithmetic completely regular codes
26 pages, 1 figure
Discrete Math. Theor. Comput. Sci. 17 (2016) 59-76
10.46298/dmtcs.2150
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we explore completely regular codes in the Hamming graphs and related graphs. Experimental evidence suggests that many completely regular codes have the property that the eigenvalues of the code are in arithmetic progression. In order to better understand these "arithmetic completely regular codes", we focus on cartesian products of completely regular codes and products of their corresponding coset graphs in the additive case. Employing earlier results, we are then able to prove a theorem which nearly classifies these codes in the case where the graph admits a completely regular partition into such codes (e.g, the cosets of some additive completely regular code). Connections to the theory of distance-regular graphs are explored and several open questions are posed.
[ { "version": "v1", "created": "Tue, 10 Nov 2009 04:32:59 GMT" }, { "version": "v2", "created": "Tue, 28 Jan 2014 19:50:32 GMT" }, { "version": "v3", "created": "Thu, 11 Feb 2016 00:35:24 GMT" } ]
2021-11-02T00:00:00
[ [ "Koolen", "J. H.", "", "USTC" ], [ "Lee", "W. S.", "", "POSTECH" ], [ "Martin", "W. J.", "", "WPI" ], [ "Tanaka", "H.", "", "Tohoku" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1842
Laurent Romary
Nancy Ide (INRIA Lorraine - LORIA), Laurent Romary (INRIA Lorraine - LORIA)
Standards for Language Resources
Colloque avec actes et comit\'e de lecture. internationale
IRCS Workshop on Linguistic Databases, Philadelphia : United States (2001)
null
A01-R-287 || ide01b
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of this paper is two-fold: to present an abstract data model for linguistic annotations and its implementation using XML, RDF and related standards; and to outline the work of a newly formed committee of the International Standards Organization (ISO), ISO/TC 37/SC 4 Language Resource Management, which will use this work as its starting point.
[ { "version": "v1", "created": "Tue, 10 Nov 2009 07:12:03 GMT" } ]
2009-11-11T00:00:00
[ [ "Ide", "Nancy", "", "INRIA Lorraine - LORIA" ], [ "Romary", "Laurent", "", "INRIA Lorraine -\n LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0911.1849
Omar El Ayach
Omar El Ayach, Steven W. Peters, and Robert W. Heath Jr
The Feasibility of Interference Alignment over Measured MIMO-OFDM Channels
13 double column pages, 16 figures, accepted for publication in IEEE Transactions on Vehicular Technology
IEEE Transactions on Vehicular Technology, vol. 59, no. 9, pp. 4309-4321, November 2010
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interference alignment (IA) has been shown to achieve the maximum achievable degrees of freedom in the interference channel. This results in sum rate scaling linearly with the number of users in the high signal-to-noise-ratio (SNR) regime. Linear scaling is achieved by precoding transmitted signals to align interference subspaces at the receivers, given channel knowledge of all transmit-receive pairs, effectively reducing the number of discernible interferers. The theory of IA was derived under assumptions about the richness of scattering in the propagation channel; practical channels do not guarantee such ideal characteristics. This paper presents the first experimental study of IA in measured multiple-input multiple-output orthogonal frequency-division multiplexing (MIMO-OFDM) interference channels. Our measurement campaign includes a variety of indoor and outdoor measurement scenarios at The University of Texas at Austin. We show that IA achieves the claimed scaling factors, or degrees of freedom, in several measured channel settings for a 3 user, 2 antennas per node setup. In addition to verifying the claimed performance, we characterize the effect of Kronecker spatial correlation on sum rate and present two other correlation measures, which we show are more tightly related to the achieved sum rate.
[ { "version": "v1", "created": "Tue, 10 Nov 2009 18:36:04 GMT" }, { "version": "v2", "created": "Fri, 26 Feb 2010 06:42:10 GMT" }, { "version": "v3", "created": "Wed, 13 Oct 2010 23:01:48 GMT" } ]
2013-04-15T00:00:00
[ [ "Ayach", "Omar El", "" ], [ "Peters", "Steven W.", "" ], [ "Heath", "Robert W.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.1851
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Functional units for natural numbers
17 pages; notational mistakes in tables 5 and 6 corrected; erroneous definition at bottom of page 9 corrected
null
null
PRG0913
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interaction with services provided by an execution environment forms part of the behaviours exhibited by instruction sequences under execution. Mechanisms related to the kind of interaction in question have been proposed in the setting of thread algebra. Like thread, service is an abstract behavioural concept. The concept of a functional unit is similar to the concept of a service, but more concrete. A state space is inherent in the concept of a functional unit, whereas it is not inherent in the concept of a service. In this paper, we establish the existence of a universal computable functional unit for natural numbers and related results.
[ { "version": "v1", "created": "Tue, 10 Nov 2009 08:09:33 GMT" }, { "version": "v2", "created": "Sat, 8 May 2010 12:36:02 GMT" }, { "version": "v3", "created": "Sun, 17 Oct 2010 20:26:13 GMT" } ]
2010-10-19T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.1862
EPTCS
Luca Aceto (Reykjavik University), Anna Ingolfsdottir (Reykjavik University), Joshua Sack (Reykjavik University)
Characteristic Formulae for Fixed-Point Semantics: A General Framework
null
EPTCS 8, 2009, pp. 1-15
10.4204/EPTCS.8.1
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The literature on concurrency theory offers a wealth of examples of characteristic-formula constructions for various behavioural relations over finite labelled transition systems and Kripke structures that are defined in terms of fixed points of suitable functions. Such constructions and their proofs of correctness have been developed independently, but have a common underlying structure. This study provides a general view of characteristic formulae that are expressed in terms of logics with a facility for the recursive definition of formulae. It is shown how several examples of characteristic-formula constructions from the literature can be recovered as instances of the proposed general framework, and how the framework can be used to yield novel constructions.
[ { "version": "v1", "created": "Tue, 10 Nov 2009 09:14:55 GMT" } ]
2009-11-11T00:00:00
[ [ "Aceto", "Luca", "", "Reykjavik University" ], [ "Ingolfsdottir", "Anna", "", "Reykjavik\n University" ], [ "Sack", "Joshua", "", "Reykjavik University" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.1891
Juha Partala
Juha Partala
A note on conjugacy search and racks
6 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that for every effective left conjugacy closed left quasigroup, there is an induced rack that retains the conjugation structure of the left translations. This means that cryptographic protocols relying on conjugacy search can be secure only if conjugacy search of left translations is infeasible in the induced rack. We note that, in fact, protocols based on conjugacy search could be simply implemented using a rack. We give an exposition of the Anshel-Anshel-Goldfeld protocol in such a case.
[ { "version": "v1", "created": "Tue, 10 Nov 2009 11:57:34 GMT" } ]
2009-11-11T00:00:00
[ [ "Partala", "Juha", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.1900
Daniel Raible
Daniel Raible, Henning Fernau
A Faster Exact Algorithm for the Directed Maximum Leaf Spanning Tree Problem
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a directed graph $G=(V,A)$, the Directed Maximum Leaf Spanning Tree problem asks to compute a directed spanning tree (i.e., an out-branching) with as many leaves as possible. By designing a Branch-and-Reduced algorithm combined with the Measure & Conquer technique for running time analysis, we show that the problem can be solved in time $\Oh^*(1.9043^n)$ using polynomial space. Hitherto, there have been only few examples. Provided exponential space this run time upper bound can be lowered to $\Oh^*(1.8139^n)$.
[ { "version": "v1", "created": "Tue, 10 Nov 2009 12:50:07 GMT" }, { "version": "v2", "created": "Wed, 11 Nov 2009 14:12:27 GMT" } ]
2009-11-11T00:00:00
[ [ "Raible", "Daniel", "" ], [ "Fernau", "Henning", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.1934
Gustavo L. Gilardoni
Gustavo L. Gilardoni
On a Gel'fand-Yaglom-Peres theorem for f-divergences
1+4 pages, no figures
null
null
null
cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown that the $f$-divergence between two probability measures $P$ and $R$ equals the supremum of the same $f$-divergence computed over all finite measurable partitions of the original space, thus generalizing results previously proved by Gel'fand and Yaglom and by Peres for the Information Divergence and more recently by Dukkipati, Bhatnagar and Murty for the Tsallis' and Renyi's divergences.
[ { "version": "v1", "created": "Tue, 10 Nov 2009 15:58:57 GMT" } ]
2009-11-11T00:00:00
[ [ "Gilardoni", "Gustavo L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0911.1965
Nitin Madnani
Nitin Madnani, Hongyan Jing, Nanda Kambhatla and Salim Roukos
Active Learning for Mention Detection: A Comparison of Sentence Selection Strategies
12 pages, 9 figures
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose and compare various sentence selection strategies for active learning for the task of detecting mentions of entities. The best strategy employs the sum of confidences of two statistical classifiers trained on different views of the data. Our experimental results show that, compared to the random selection strategy, this strategy reduces the amount of required labeled training data by over 50% while achieving the same performance. The effect is even more significant when only named mentions are considered: the system achieves the same performance by using only 42% of the training data required by the random selection strategy.
[ { "version": "v1", "created": "Tue, 10 Nov 2009 19:52:01 GMT" } ]
2009-11-11T00:00:00
[ [ "Madnani", "Nitin", "" ], [ "Jing", "Hongyan", "" ], [ "Kambhatla", "Nanda", "" ], [ "Roukos", "Salim", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0911.1972
Neal Patwari
Neal Patwari and Joey Wilson
People-Sensing Spatial Characteristics of RF Sensor Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An "RF sensor" network can monitor RSS values on links in the network and perform device-free localization, i.e., locating a person or object moving in the area in which the network is deployed. This paper provides a statistical model for the RSS variance as a function of the person's position w.r.t. the transmitter (TX) and receiver (RX). We show that the ensemble mean of the RSS variance has an approximately linear relationship with the expected total affected power (ETAP). We then use analysis to derive approximate expressions for the ETAP as a function of the person's position, for both scattering and reflection. Counterintuitively, we show that reflection, not scattering, causes the RSS variance contours to be shaped like Cassini ovals. Experimental tests reported here and in past literature are shown to validate the analysis.
[ { "version": "v1", "created": "Tue, 10 Nov 2009 19:31:07 GMT" } ]
2009-11-11T00:00:00
[ [ "Patwari", "Neal", "" ], [ "Wilson", "Joey", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.2022
Wei Liu
Wei Liu and Biao Chen
Interference Channels With Arbitrarily Correlated Sources
Submitted to IEEE Transaction on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Communicating arbitrarily correlated sources over interference channels is considered in this paper. A sufficient condition is found for the lossless transmission of a pair of correlated sources over a discrete memoryless interference channel. With independent sources, the sufficient condition reduces to the Han-Kobayashi achievable rate region for the interference channel. For a special correlation structure (in the sense of Slepian-Wolf, 1973), the proposed region reduces to the known achievable region for interference channels with common information. A simple example is given to show that the separation approach, with Slepian-Wolf encoding followed by optimal channel coding, is strictly suboptimal.
[ { "version": "v1", "created": "Tue, 10 Nov 2009 22:42:13 GMT" } ]
2009-11-12T00:00:00
[ [ "Liu", "Wei", "" ], [ "Chen", "Biao", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.2023
Aditya Mahajan
Aditya Mahajan and Sekhar Tatikonda
Opportunistic capacity and error exponent regions for compound channel with feedback
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Variable length communication over a compound channel with feedback is considered. Traditionally, capacity of a compound channel without feedback is defined as the maximum rate that is determined before the start of communication such that communication is reliable. This traditional definition is pessimistic. In the presence of feedback, an opportunistic definition is given. Capacity is defined as the maximum rate that is determined at the end of communication such that communication is reliable. Thus, the transmission rate can adapt to the channel chosen by nature. Under this definition, feedback communication over a compound channel is conceptually similar to multi-terminal communication. Transmission rate is a vector rather than a scalar; channel capacity is a region rather than a scalar; error exponent is a region rather than a scalar. In this paper, variable length communication over a compound channel with feedback is formulated, its opportunistic capacity region is characterized, and lower bounds for its error exponent region are provided..
[ { "version": "v1", "created": "Tue, 10 Nov 2009 22:52:23 GMT" }, { "version": "v2", "created": "Tue, 6 Apr 2010 20:35:30 GMT" }, { "version": "v3", "created": "Wed, 29 Jun 2011 18:10:44 GMT" } ]
2011-06-30T00:00:00
[ [ "Mahajan", "Aditya", "" ], [ "Tatikonda", "Sekhar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.2033
EPTCS
Tom\'a\v{s} Babiak, Vojt\v{e}ch \v{R}eh\'ak, Jan Strej\v{c}ek
Almost Linear B\"uchi Automata
null
EPTCS 8, 2009, pp. 16-25
10.4204/EPTCS.8.2
null
cs.FL cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new fragment of Linear temporal logic (LTL) called LIO and a new class of Buechi automata (BA) called Almost linear Buechi automata (ALBA). We provide effective translations between LIO and ALBA showing that the two formalisms are expressively equivalent. While standard translations of LTL into BA use some intermediate formalisms, the presented translation of LIO into ALBA is direct. As we expect applications of ALBA in model checking, we compare the expressiveness of ALBA with other classes of Buechi automata studied in this context and we indicate possible applications.
[ { "version": "v1", "created": "Wed, 11 Nov 2009 00:48:28 GMT" } ]
2009-11-12T00:00:00
[ [ "Babiak", "Tomáš", "" ], [ "Řehák", "Vojtěch", "" ], [ "Strejček", "Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0911.2034
EPTCS
Edgar G. Daylight (Institute of Logic, Language, and Computation, University of Amsterdam), Sandeep K. Shukla (Department of Electrical and Computer Engineering, Virginia Tech), Davide Sergio (Institute of Logic, Language, and Computation, University of Amsterdam)
Expressing the Behavior of Three Very Different Concurrent Systems by Using Natural Extensions of Separation Logic
null
EPTCS 8, 2009, pp. 26-40
10.4204/EPTCS.8.3
null
cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Separation Logic is a non-classical logic used to verify pointer-intensive code. In this paper, however, we show that Separation Logic, along with its natural extensions, can also be used as a specification language for concurrent-system design. To do so, we express the behavior of three very different concurrent systems: a Subway, a Stopwatch, and a 2x2 Switch. The Subway is originally implemented in LUSTRE, the Stopwatch in Esterel, and the 2x2 Switch in Bluespec.
[ { "version": "v1", "created": "Wed, 11 Nov 2009 00:53:07 GMT" } ]
2009-11-12T00:00:00
[ [ "Daylight", "Edgar G.", "", "Institute of Logic, Language, and Computation,\n University of Amsterdam" ], [ "Shukla", "Sandeep K.", "", "Department of Electrical and\n Computer Engineering, Virginia Tech" ], [ "Sergio", "Davide", "", "Institute of Logic,\n Language, and Computation, University of Amsterdam" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0911.2035
EPTCS
Maciej Gazda, Wan Fokkink
Modal Logic and the Approximation Induction Principle
null
EPTCS 8, 2009, pp. 41-50
10.4204/EPTCS.8.4
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove a compactness theorem in the context of Hennessy-Milner logic. It is used to derive a sufficient condition on modal characterizations for the Approximation Induction Principle to be sound modulo the corresponding process equivalence. We show that this condition is necessary when the equivalence in question is compositional with respect to the projection operators.
[ { "version": "v1", "created": "Wed, 11 Nov 2009 00:57:55 GMT" } ]
2009-11-12T00:00:00
[ [ "Gazda", "Maciej", "" ], [ "Fokkink", "Wan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.2036
EPTCS
Joshua Guttman (Worcester Polytechnic Institute)
Security Theorems via Model Theory
null
EPTCS 8, 2009, pp. 51-65
10.4204/EPTCS.8.5
null
cs.CR cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A model-theoretic approach can establish security theorems for cryptographic protocols. Formulas expressing authentication and non-disclosure properties of protocols have a special form. They are quantified implications for all xs . (phi implies for some ys . psi). Models (interpretations) for these formulas are *skeletons*, partially ordered structures consisting of a number of local protocol behaviors. Realized skeletons contain enough local sessions to explain all the behavior, when combined with some possible adversary behaviors. We show two results. (1) If phi is the antecedent of a security goal, then there is a skeleton A_phi such that, for every skeleton B, phi is satisfied in B iff there is a homomorphism from A_phi to B. (2) A protocol enforces for all xs . (phi implies for some ys . psi) iff every realized homomorphic image of A_phi satisfies psi. Hence, to verify a security goal, one can use the Cryptographic Protocol Shapes Analyzer CPSA (TACAS, 2007) to identify minimal realized skeletons, or "shapes," that are homomorphic images of A_phi. If psi holds in each of these shapes, then the goal holds.
[ { "version": "v1", "created": "Wed, 11 Nov 2009 01:00:15 GMT" } ]
2009-11-12T00:00:00
[ [ "Guttman", "Joshua", "", "Worcester Polytechnic Institute" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.2053
I-Hsiang Wang
I-Hsiang Wang and David N. C. Tse
Interference Mitigation Through Limited Receiver Cooperation
Submitted to IEEE Transactions on Information Theory. 69 pages, 14 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interference is a major issue limiting the performance in wireless networks. Cooperation among receivers can help mitigate interference by forming distributed MIMO systems. The rate at which receivers cooperate, however, is limited in most scenarios. How much interference can one bit of receiver cooperation mitigate? In this paper, we study the two-user Gaussian interference channel with conferencing decoders to answer this question in a simple setting. We identify two regions regarding the gain from receiver cooperation: linear and saturation regions. In the linear region receiver cooperation is efficient and provides a degrees-of-freedom gain, which is either one cooperation bit buys one more bit or two cooperation bits buy one more bit until saturation. In the saturation region receiver cooperation is inefficient and provides a power gain, which is at most a constant regardless of the rate at which receivers cooperate. The conclusion is drawn from the characterization of capacity region to within two bits. The proposed strategy consists of two parts: (1) the transmission scheme, where superposition encoding with a simple power split is employed, and (2) the cooperative protocol, where one receiver quantize-bin-and-forwards its received signal, and the other after receiving the side information decode-bin-and-forwards its received signal.
[ { "version": "v1", "created": "Wed, 11 Nov 2009 05:08:39 GMT" } ]
2009-11-12T00:00:00
[ [ "Wang", "I-Hsiang", "" ], [ "Tse", "David N. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.2075
Guoqiang Zhang
Guoqiang Zhang
A scientific understanding of network designing
8 pages, 6 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the Internet becomes severely overburdened with exponentially growing traffic demand, it becomes a general belief that a new generation data network is in urgent need today. However, standing at this crossroad, we find that we are in a situation that lacks a theory of network designing. This issue becomes even more serious as the recent progress of network measurement and modeling challenges the foundation of network research in the past decades. This paper tries to set up a scientific foundation for network designing by formalizing it as a multi-objective optimization process and quantifying the way different designing choices independently and collectively influence these objectives. A cartesian coordinate system is introduced to map the effect of each designing scheme to a coordinate. We investigated the achievable area of the network designing space and proved some boundary conditions. It is shown that different kind of networks display different shapes of achievable areas in the cartesian coordinate and exhibit different abilities to achieve cost-effective and scalable designing. In particular, we found that the philosophy underlying current empirical network designing and engineering fails to meet the cost-effective and evolvable requirements of network designing. We demonstrated that the efficient routing combined with effective betweenness based link bandwidth allocation scheme is a cost-effective and scalable design for BA-like scale-free networks, whereas if other designing choices cannot be determined beforehand, ER network is a markedly good candidate for cost-effective and scalable design.
[ { "version": "v1", "created": "Wed, 11 Nov 2009 08:09:07 GMT" } ]
2009-11-12T00:00:00
[ [ "Zhang", "Guoqiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.2142
Amit Patel
Herbert Edelsbrunner, Dmitriy Morozov, Amit Patel
Quantifying Transversality by Measuring the Robustness of Intersections
null
null
null
null
cs.CG math.GM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
By definition, transverse intersections are stable under infinitesimal perturbations. Using persistent homology, we extend this notion to a measure. Given a space of perturbations, we assign to each homology class of the intersection its robustness, the magnitude of a perturbations in this space necessary to kill it, and prove that robustness is stable. Among the applications of this result is a stable notion of robustness for fixed points of continuous mappings and a statement of stability for contours of smooth mappings.
[ { "version": "v1", "created": "Wed, 11 Nov 2009 14:18:41 GMT" }, { "version": "v2", "created": "Tue, 20 Apr 2010 20:24:31 GMT" } ]
2010-04-22T00:00:00
[ [ "Edelsbrunner", "Herbert", "" ], [ "Morozov", "Dmitriy", "" ], [ "Patel", "Amit", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.GM", "description": "Mathematical material of general interest, topics not covered elsewhere", "span": "(General Mathematics)" } ]
0911.2174
Dirk Pleiter
H. Baier, H. Boettiger, M. Drochner, N. Eicker, U. Fischer, Z. Fodor, A. Frommer, C. Gomez, G. Goldrian, S. Heybrock, D. Hierl, M. H\"usken, T. Huth, B. Krill, J. Lauritsen, T. Lippert, T. Maurer, B. Mendl, N. Meyer, A. Nobile, I. Ouda, M. Pivanti, D. Pleiter, M. Ries, A. Sch\"afer, H. Schick, F. Schifano, H. Simma, S. Solbrig, T. Streuer, K.-H. Sulanke, R. Tripiccione, J.-S. Vogt, T. Wettig, F. Winter
QPACE -- a QCD parallel computer based on Cell processors
21 pages. Poster by T. Maurer and plenary talk by D. Pleiter presented at the "XXVII International Symposium on Lattice Field Theory", July 26-31 2009, Peking University, Beijing, China. Information on recent Green500 ranking added and list of authors extended
PoS LAT2009:001,2009
null
null
hep-lat cs.AR
http://creativecommons.org/licenses/by-nc-sa/3.0/
QPACE is a novel parallel computer which has been developed to be primarily used for lattice QCD simulations. The compute power is provided by the IBM PowerXCell 8i processor, an enhanced version of the Cell processor that is used in the Playstation 3. The QPACE nodes are interconnected by a custom, application optimized 3-dimensional torus network implemented on an FPGA. To achieve the very high packaging density of 26 TFlops per rack a new water cooling concept has been developed and successfully realized. In this paper we give an overview of the architecture and highlight some important technical details of the system. Furthermore, we provide initial performance results and report on the installation of 8 QPACE racks providing an aggregate peak performance of 200 TFlops.
[ { "version": "v1", "created": "Wed, 11 Nov 2009 16:47:22 GMT" }, { "version": "v2", "created": "Wed, 11 Nov 2009 23:30:20 GMT" }, { "version": "v3", "created": "Thu, 24 Dec 2009 01:26:43 GMT" } ]
2010-11-05T00:00:00
[ [ "Baier", "H.", "" ], [ "Boettiger", "H.", "" ], [ "Drochner", "M.", "" ], [ "Eicker", "N.", "" ], [ "Fischer", "U.", "" ], [ "Fodor", "Z.", "" ], [ "Frommer", "A.", "" ], [ "Gomez", "C.", "" ], [ "Goldrian", "G.", "" ], [ "Heybrock", "S.", "" ], [ "Hierl", "D.", "" ], [ "Hüsken", "M.", "" ], [ "Huth", "T.", "" ], [ "Krill", "B.", "" ], [ "Lauritsen", "J.", "" ], [ "Lippert", "T.", "" ], [ "Maurer", "T.", "" ], [ "Mendl", "B.", "" ], [ "Meyer", "N.", "" ], [ "Nobile", "A.", "" ], [ "Ouda", "I.", "" ], [ "Pivanti", "M.", "" ], [ "Pleiter", "D.", "" ], [ "Ries", "M.", "" ], [ "Schäfer", "A.", "" ], [ "Schick", "H.", "" ], [ "Schifano", "F.", "" ], [ "Simma", "H.", "" ], [ "Solbrig", "S.", "" ], [ "Streuer", "T.", "" ], [ "Sulanke", "K. -H.", "" ], [ "Tripiccione", "R.", "" ], [ "Vogt", "J. -S.", "" ], [ "Wettig", "T.", "" ], [ "Winter", "F.", "" ] ]
[ { "class": "Physics", "code": "hep-lat", "description": "Lattice field theory. Phenomenology from lattice field theory. Algorithms for lattice field theory. Hardware for lattice field theory.", "span": "(High Energy Physics - Lattice)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0911.2193
Erik Wilde
Erik Wilde
Feeds as Query Result Serializations
null
null
null
UCB ISchool Report 2009-030
cs.NI
http://creativecommons.org/licenses/by/3.0/
Many Web-based data sources and services are available as feeds, a model that provides consumers with a loosely coupled way of interacting with providers. The current feed model is limited in its capabilities, however. Though it is simple to implement and scales well, it cannot be transferred to a wider range of application scenarios. This paper conceptualizes feeds as a way to serialize query results, describes the current hardcoded query semantics of such a perspective, and surveys the ways in which extensions of this hardcoded model have been proposed or implemented. Our generalized view of feeds as query result serializations has implications for the applicability of feeds as a generic Web service for any collection that is providing access to individual information items. As one interesting and compelling class of applications, we describe a simple way in which a query-based approach to feeds can be used to support location-based services.
[ { "version": "v1", "created": "Wed, 11 Nov 2009 18:04:30 GMT" } ]
2009-11-12T00:00:00
[ [ "Wilde", "Erik", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0911.2197
P. G. L. Porta Mana
P. G. L. Porta Mana
On the relation between plausibility logic and the maximum-entropy principle: a numerical study
24 pages of main text and references, 8 pages of tables, 7 pages of additional references
null
null
Perimeter Institute pi-other-154
math.PR cs.IT math.IT physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
What is the relationship between plausibility logic and the principle of maximum entropy? When does the principle give unreasonable or wrong results? When is it appropriate to use the rule `expectation = average'? Can plausibility logic give the same answers as the principle, and better answers if those of the principle are unreasonable? To try to answer these questions, this study offers a numerical collection of plausibility distributions given by the maximum-entropy principle and by plausibility logic for a set of fifteen simple problems: throwing dice.
[ { "version": "v1", "created": "Wed, 11 Nov 2009 20:38:23 GMT" } ]
2016-05-19T00:00:00
[ [ "Mana", "P. G. L. Porta", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0911.2214
Warren Schudy
Marek Karpinski and Warren Schudy
Approximation Schemes for the Betweenness Problem in Tournaments and Related Ranking Problems
15 pages. Minor changes to presentation from version 2
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We design the first polynomial time approximation schemes (PTASs) for the Minimum Betweenness problem in tournaments and some related higher arity ranking problems. This settles the approximation status of the Betweenness problem in tournaments along with other ranking problems which were open for some time now. The results depend on a new technique of dealing with fragile ranking constraints and could be of independent interest.
[ { "version": "v1", "created": "Wed, 11 Nov 2009 20:36:49 GMT" }, { "version": "v2", "created": "Wed, 23 Jun 2010 00:25:34 GMT" }, { "version": "v3", "created": "Fri, 9 Jul 2010 00:13:29 GMT" } ]
2010-07-12T00:00:00
[ [ "Karpinski", "Marek", "" ], [ "Schudy", "Warren", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.2233
Zhi Xu
Ehsan Chiniforooshan, Lila Kari and Zhi Xu
Pseudo-Power Avoidance
null
null
null
null
cs.FL cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Repetition avoidance has been studied since Thue's work. In this paper, we considered another type of repetition, which is called pseudo-power. This concept is inspired by Watson-Crick complementarity in DNA sequence and is defined over an antimorphic involution $\phi$. We first classify the alphabet $\Sigma$ and the antimorphic involution $\phi$, under which there exists sufficiently long pseudo-$k$th-power-free words. Then we present algorithms to test whether a finite word $w$ is pseudo-$k$th-power-free.
[ { "version": "v1", "created": "Wed, 11 Nov 2009 21:07:36 GMT" } ]
2009-11-13T00:00:00
[ [ "Chiniforooshan", "Ehsan", "" ], [ "Kari", "Lila", "" ], [ "Xu", "Zhi", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.2258
Tomoki Ohsawa
Tomoki Ohsawa, Anthony M. Bloch, Melvin Leok
Discrete Hamilton-Jacobi Theory
26 pages, 2 figures
SIAM J. Control Optim. 49 (2011), pp. 1829-1856
10.1137/090776822
null
math.OC cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a discrete analogue of Hamilton-Jacobi theory in the framework of discrete Hamiltonian mechanics. The resulting discrete Hamilton-Jacobi equation is discrete only in time. We describe a discrete analogue of Jacobi's solution and also prove a discrete version of the geometric Hamilton-Jacobi theorem. The theory applied to discrete linear Hamiltonian systems yields the discrete Riccati equation as a special case of the discrete Hamilton-Jacobi equation. We also apply the theory to discrete optimal control problems, and recover some well-known results, such as the Bellman equation (discrete-time HJB equation) of dynamic programming and its relation to the costate variable in the Pontryagin maximum principle. This relationship between the discrete Hamilton-Jacobi equation and Bellman equation is exploited to derive a generalized form of the Bellman equation that has controls at internal stages.
[ { "version": "v1", "created": "Wed, 11 Nov 2009 22:27:58 GMT" }, { "version": "v2", "created": "Wed, 8 Jun 2011 18:46:31 GMT" } ]
2011-08-15T00:00:00
[ [ "Ohsawa", "Tomoki", "" ], [ "Bloch", "Anthony M.", "" ], [ "Leok", "Melvin", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" } ]
0911.2270
Lianlin Li Dr
Lianlin Li, B. Jafarpour
An Iteratively Reweighted Algorithm for Sparse Reconstruction of Subsurface Flow Properties from Nonlinear Dynamic Data
null
null
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a practical algorithm based on sparsity regularization to effectively solve nonlinear dynamic inverse problems that are encountered in subsurface model calibration. We use an iteratively reweighted algorithm that is widely used to solve linear inverse problems with sparsity constraint known as compressed sensing to estimate permeability fields from nonlinear dynamic flow data.
[ { "version": "v1", "created": "Wed, 11 Nov 2009 23:27:03 GMT" }, { "version": "v2", "created": "Fri, 13 Nov 2009 14:32:28 GMT" } ]
2009-11-13T00:00:00
[ [ "Li", "Lianlin", "" ], [ "Jafarpour", "B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0911.2280
Bal\'azs Csan\'ad Cs\'aji
Bal\'azs Csan\'ad Cs\'aji, Rapha\"el M. Jungers, and Vincent D. Blondel
PageRank Optimization by Edge Selection
30 pages, 3 figures
Discrete Applied Mathematics, Volume 169, 2014, Pages 73-87
10.1016/j.dam.2014.01.007
null
cs.DS cs.CC cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The importance of a node in a directed graph can be measured by its PageRank. The PageRank of a node is used in a number of application contexts - including ranking websites - and can be interpreted as the average portion of time spent at the node by an infinite random walk. We consider the problem of maximizing the PageRank of a node by selecting some of the edges from a set of edges that are under our control. By applying results from Markov decision theory, we show that an optimal solution to this problem can be found in polynomial time. Our core solution results in a linear programming formulation, but we also provide an alternative greedy algorithm, a variant of policy iteration, which runs in polynomial time, as well. Finally, we show that, under the slight modification for which we are given mutually exclusive pairs of edges, the problem of PageRank optimization becomes NP-hard.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 12:57:09 GMT" }, { "version": "v2", "created": "Wed, 18 Jan 2012 09:09:34 GMT" } ]
2014-05-22T00:00:00
[ [ "Csáji", "Balázs Csanád", "" ], [ "Jungers", "Raphaël M.", "" ], [ "Blondel", "Vincent D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" } ]
0911.2284
Fabio G. Guerrero-Moreno
Fabio G. Guerrero
A New Look at the Classical Entropy of Written English
Submitted to the IEEE Transactions on Information Theory. Reference on page 5 corrected. Weighted average of HL on page 12 corrected (average redundancy R has therefore been updated). Abstract slightly changed
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A simple method for finding the entropy and redundancy of a reasonable long sample of English text by direct computer processing and from first principles according to Shannon theory is presented. As an example, results on the entropy of the English language have been obtained based on a total of 20.3 million characters of written English, considering symbols from one to five hundred characters in length. Besides a more realistic value of the entropy of English, a new perspective on some classic entropy-related concepts is presented. This method can also be extended to other Latin languages. Some implications for practical applications such as plagiarism-detection software, and the minimum number of words that should be used in social Internet network messaging, are discussed.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 01:48:12 GMT" }, { "version": "v2", "created": "Thu, 19 Nov 2009 03:15:30 GMT" } ]
2009-11-19T00:00:00
[ [ "Guerrero", "Fabio G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0911.2293
Michael Bloem
Michael Bloem, Tansu Alpcan, and Tamer Basar
A Robust Control Framework for Malware Filtering
8 pages, 10 figures, IEEE format
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study and develop a robust control framework for malware filtering and network security. We investigate the malware filtering problem by capturing the tradeoff between increased security on one hand and continued usability of the network on the other. We analyze the problem using a linear control system model with a quadratic cost structure and develop algorithms based on H infinity-optimal control theory. A dynamic feedback filter is derived and shown via numerical analysis to be an improvement over various heuristic approaches to malware filtering. The results are verified and demonstrated with packet level simulations on the Ns-2 network simulator.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 03:13:37 GMT" } ]
2009-11-13T00:00:00
[ [ "Bloem", "Michael", "" ], [ "Alpcan", "Tansu", "" ], [ "Basar", "Tamer", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0911.2317
EPTCS
Farid Ablayev, Alexander Vasiliev
Algorithms for Quantum Branching Programs Based on Fingerprinting
null
EPTCS 9, 2009, pp. 1-11
10.4204/EPTCS.9.1
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the paper we develop a method for constructing quantum algorithms for computing Boolean functions by quantum ordered read-once branching programs (quantum OBDDs). Our method is based on fingerprinting technique and representation of Boolean functions by their characteristic polynomials. We use circuit notation for branching programs for desired algorithms presentation. For several known functions our approach provides optimal QOBDDs. Namely we consider such functions as Equality, Palindrome, and Permutation Matrix Test. We also propose a generalization of our method and apply it to the Boolean variant of the Hidden Subgroup Problem.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 08:24:23 GMT" } ]
2009-11-13T00:00:00
[ [ "Ablayev", "Farid", "" ], [ "Vasiliev", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0911.2319
EPTCS
Luca Bernardinello, Lucia Pomello, Stefania Rombol\`a
Orthomodular Lattices Induced by the Concurrency Relation
null
EPTCS 9, 2009, pp. 12-21
10.4204/EPTCS.9.2
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We apply to locally finite partially ordered sets a construction which associates a complete lattice to a given poset; the elements of the lattice are the closed subsets of a closure operator, defined starting from the concurrency relation. We show that, if the partially ordered set satisfies a property of local density, i.e.: N-density, then the associated lattice is also orthomodular. We then consider occurrence nets, introduced by C.A. Petri as models of concurrent computations, and define a family of subsets of the elements of an occurrence net; we call those subsets "causally closed" because they can be seen as subprocesses of the whole net which are, intuitively, closed with respect to the forward and backward local state changes. We show that, when the net is K-dense, the causally closed sets coincide with the closed sets induced by the closure operator defined starting from the concurrency relation. K-density is a property of partially ordered sets introduced by Petri, on the basis of former axiomatizations of special relativity theory.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 08:36:43 GMT" } ]
2009-11-13T00:00:00
[ [ "Bernardinello", "Luca", "" ], [ "Pomello", "Lucia", "" ], [ "Rombolà", "Stefania", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0911.2320
EPTCS
Paola Bonizzoni, Clelia De Felice, Rosalba Zizza
Circular Languages Generated by Complete Splicing Systems and Pure Unitary Languages
null
EPTCS 9, 2009, pp. 22-31
10.4204/EPTCS.9.3
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Circular splicing systems are a formal model of a generative mechanism of circular words, inspired by a recombinant behaviour of circular DNA. Some unanswered questions are related to the computational power of such systems, and finding a characterization of the class of circular languages generated by circular splicing systems is still an open problem. In this paper we solve this problem for complete systems, which are special finite circular splicing systems. We show that a circular language L is generated by a complete system if and only if the set Lin(L) of all words corresponding to L is a pure unitary language generated by a set closed under the conjugacy relation. The class of pure unitary languages was introduced by A. Ehrenfeucht, D. Haussler, G. Rozenberg in 1983, as a subclass of the class of context-free languages, together with a characterization of regular pure unitary languages by means of a decidable property. As a direct consequence, we characterize (regular) circular languages generated by complete systems. We can also decide whether the language generated by a complete system is regular. Finally, we point out that complete systems have the same computational power as finite simple systems, an easy type of circular splicing system defined in the literature from the very beginning, when only one rule is allowed. From our results on complete systems, it follows that finite simple systems generate a class of context-free languages containing non-regular languages, showing the incorrectness of a longstanding result on simple systems.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 08:40:12 GMT" } ]
2009-11-13T00:00:00
[ [ "Bonizzoni", "Paola", "" ], [ "De Felice", "Clelia", "" ], [ "Zizza", "Rosalba", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0911.2322
EPTCS
Amin Coja-Oghlan
Random Constraint Satisfaction Problems
null
EPTCS 9, 2009, pp. 32-37
10.4204/EPTCS.9.4
null
cs.DM cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Random instances of constraint satisfaction problems such as k-SAT provide challenging benchmarks. If there are m constraints over n variables there is typically a large range of densities r=m/n where solutions are known to exist with probability close to one due to non-constructive arguments. However, no algorithms are known to find solutions efficiently with a non-vanishing probability at even much lower densities. This fact appears to be related to a phase transition in the set of all solutions. The goal of this extended abstract is to provide a perspective on this phenomenon, and on the computational challenge that it poses.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 08:42:42 GMT" } ]
2009-11-13T00:00:00
[ [ "Coja-Oghlan", "Amin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0911.2323
EPTCS
Mariangiola Dezani-Ciancaglini (Dipartimento di Informatica, Universit\`a di Torino), Paola Giannini (Dipartimento di Informatica, Universit\`a del Piemonte Orientale), Angelo Troina (Dipartimento di Informatica, Universit\`a di Torino)
A Type System for Required/Excluded Elements in CLS
null
EPTCS 9, 2009, pp. 38-48
10.4204/EPTCS.9.5
null
cs.LO cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The calculus of looping sequences is a formalism for describing the evolution of biological systems by means of term rewriting rules. We enrich this calculus with a type discipline to guarantee the soundness of reduction rules with respect to some biological properties deriving from the requirement of certain elements, and the repellency of others. As an example, we model a toy system where the repellency of a certain element is captured by our type system and forbids another element to exit a compartment.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 08:44:27 GMT" } ]
2009-11-13T00:00:00
[ [ "Dezani-Ciancaglini", "Mariangiola", "", "Dipartimento di Informatica,\n Università di Torino" ], [ "Giannini", "Paola", "", "Dipartimento di Informatica,\n Università del Piemonte Orientale" ], [ "Troina", "Angelo", "", "Dipartimento di\n Informatica, Università di Torino" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0911.2324
EPTCS
Martin F\"urer
Deterministic Autopoietic Automata
null
EPTCS 9, 2009, pp. 49-53
10.4204/EPTCS.9.6
null
cs.NE cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies two issues related to the paper on Computing by Self-reproduction: Autopoietic Automata by Jiri Wiedermann. It is shown that all results presented there extend to deterministic computations. In particular, nondeterminism is not needed for a lineage to generate all autopoietic automata.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 08:48:38 GMT" } ]
2009-11-13T00:00:00
[ [ "Fürer", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0911.2325
EPTCS
Walid Gomaa (Alexandria University)
Characterizing Polynomial Time Computability of Rational and Real Functions
null
EPTCS 9, 2009, pp. 54-64
10.4204/EPTCS.9.7
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recursive analysis was introduced by A. Turing [1936], A. Grzegorczyk [1955], and D. Lacombe [1955]. It is based on a discrete mechanical framework that can be used to model computation over the real numbers. In this context the computational complexity of real functions defined over compact domains has been extensively studied. However, much less have been done for other kinds of real functions. This article is divided into two main parts. The first part investigates polynomial time computability of rational functions and the role of continuity in such computation. On the one hand this is interesting for its own sake. On the other hand it provides insights into polynomial time computability of real functions for the latter, in the sense of recursive analysis, is modeled as approximations of rational computations. The main conclusion of this part is that continuity does not play any role in the efficiency of computing rational functions. The second part defines polynomial time computability of arbitrary real functions, characterizes it, and compares it with the corresponding notion over rational functions. Assuming continuity, the main conclusion is that there is a conceptual difference between polynomial time computation over the rationals and the reals manifested by the fact that there are polynomial time computable rational functions whose extensions to the reals are not polynomial time computable and vice versa.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 08:50:28 GMT" } ]
2009-11-13T00:00:00
[ [ "Gomaa", "Walid", "", "Alexandria University" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0911.2327
EPTCS
Ozan Kahramano\u{g}ullari, Luca Cardelli, Emmanuelle Caron
An Intuitive Automated Modelling Interface for Systems Biology
null
EPTCS 9, 2009, pp. 73-86
10.4204/EPTCS.9.9
null
cs.PL cs.CE cs.LO q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a natural language interface for building stochastic pi calculus models of biological systems. In this language, complex constructs describing biochemical events are built from basic primitives of association, dissociation and transformation. This language thus allows us to model biochemical systems modularly by describing their dynamics in a narrative-style language, while making amendments, refinements and extensions on the models easy. We demonstrate the language on a model of Fc-gamma receptor phosphorylation during phagocytosis. We provide a tool implementation of the translation into a stochastic pi calculus language, Microsoft Research's SPiM.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 08:56:05 GMT" } ]
2009-11-13T00:00:00
[ [ "Kahramanoğullari", "Ozan", "" ], [ "Cardelli", "Luca", "" ], [ "Caron", "Emmanuelle", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0911.2330
EPTCS
Zoran Konkoli
Diffusion Controlled Reactions, Fluctuation Dominated Kinetics, and Living Cell Biochemistry
null
EPTCS 9, 2009, pp. 98-107
10.4204/EPTCS.9.11
null
cs.CE cs.OH q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years considerable portion of the computer science community has focused its attention on understanding living cell biochemistry and efforts to understand such complication reaction environment have spread over wide front, ranging from systems biology approaches, through network analysis (motif identification) towards developing language and simulators for low level biochemical processes. Apart from simulation work, much of the efforts are directed to using mean field equations (equivalent to the equations of classical chemical kinetics) to address various problems (stability, robustness, sensitivity analysis, etc.). Rarely is the use of mean field equations questioned. This review will provide a brief overview of the situations when mean field equations fail and should not be used. These equations can be derived from the theory of diffusion controlled reactions, and emerge when assumption of perfect mixing is used.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 09:04:01 GMT" } ]
2009-11-13T00:00:00
[ [ "Konkoli", "Zoran", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0911.2346
Soheil Mohajer
Soheil Mohajer, Chao Tian, Suhas N. Diggavi
Asymmetric Multilevel Diversity Coding and Asymmetric Gaussian Multiple Descriptions
42 pages, 9 figures, submitted to IEEE transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the asymmetric multilevel diversity (A-MLD) coding problem, where a set of $2^K-1$ information sources, ordered in a decreasing level of importance, is encoded into $K$ messages (or descriptions). There are $2^K-1$ decoders, each of which has access to a non-empty subset of the encoded messages. Each decoder is required to reproduce the information sources up to a certain importance level depending on the combination of descriptions available to it. We obtain a single letter characterization of the achievable rate region for the 3-description problem. In contrast to symmetric multilevel diversity coding, source-separation coding is not sufficient in the asymmetric case, and ideas akin to network coding need to be used strategically. Based on the intuitions gained in treating the A-MLD problem, we derive inner and outer bounds for the rate region of the asymmetric Gaussian multiple description (MD) problem with three descriptions. Both the inner and outer bounds have a similar geometric structure to the rate region template of the A-MLD coding problem, and moreover, we show that the gap between them is small, which results in an approximate characterization of the asymmetric Gaussian three description rate region.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 10:15:08 GMT" } ]
2009-11-13T00:00:00
[ [ "Mohajer", "Soheil", "" ], [ "Tian", "Chao", "" ], [ "Diggavi", "Suhas N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0911.2364
Loet Leydesdorff
Wilfred Dolfsma, Loet Leydesdorff
Journals as constituents of scientific discourse: economic heterodoxy
null
Wilfred Dolfsma & Loet Leydesdorff, Journals as Constituents of Scientific Discourse: Economic Heterodoxy, On the Horizon 16(4), 214-225, 2008
null
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Purpose: to provide a view and analysis of the immediate field of journals which surround a number of key heterodox economics journals. Design/methodology/approach: Using citation data from the Science and Social Science Citation Index, the individual and collective networks of a number of journals in this field are analyzed. Findings: The size and shape of the citation networks of journals can differ substantially, even if in a broadly similar category. Heterodox economics cannot (yet) be considered as an integrated specialty: authors in several journals in heterodox economics cite more from mainstream economics than from other heterodox journals. There are also strong links with other disciplinary fields such as geography, development studies, women studies, etc.
[ { "version": "v1", "created": "Thu, 12 Nov 2009 11:12:11 GMT" } ]
2009-11-13T00:00:00
[ [ "Dolfsma", "Wilfred", "" ], [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]