id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1203.1869
Min Li
Min Li, Osvaldo Simeone, Aylin Yener
Degraded Broadcast Diamond Channels with Non-Causal State Information at the Source
Submitted to IEEE Transactions on Information Theory, Feb. 2012
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A state-dependent degraded broadcast diamond channel is studied where the source-to-relays cut is modeled with two noiseless, finite-capacity digital links with a degraded broadcasting structure, while the relays-to-destination cut is a general multiple access channel controlled by a random state. It is assumed that the source has non-causal channel state information and the relays have no state information. Under this model, first, the capacity is characterized for the case where the destination has state information, i.e., has access to the state sequence. It is demonstrated that in this case, a joint message and state transmission scheme via binning is optimal. Next, the case where the destination does not have state information, i.e., the case with state information at the source only, is considered. For this scenario, lower and upper bounds on the capacity are derived for the general discrete memoryless model. Achievable rates are then computed for the case in which the relays-to-destination cut is affected by an additive Gaussian state. Numerical results are provided that illuminate the performance advantages that can be accrued by leveraging non-causal state information at the source.
[ { "version": "v1", "created": "Thu, 8 Mar 2012 18:04:19 GMT" } ]
2015-03-20T00:00:00
[ [ "Li", "Min", "" ], [ "Simeone", "Osvaldo", "" ], [ "Yener", "Aylin", "" ] ]
new_dataset
0.998956
1203.4349
Hyon Lim
Hyon Lim, Hyeonbeom Lee and H. Jin Kim
Onboard Flight Control of a Small Quadrotor Using Single Strapdown Optical Flow Sensor
I would like to remove this article due to copyright problem. Please remove my article as soon as possible
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers onboard control of a small-sized quadrotor using a strapdown embedded optical flow sensor which is conventionally used for desktop mice. The vehicle considered in this paper can carry only few dozen grams of payload, therefore conventional camera-based optical flow methods are not applicable. We present hovering control of the small-sized quadrotor using a single-chip optical flow sensor, implemented on an 8-bit microprocessor without external sensors or communication with a ground control station. Detailed description of all the system components is provided along with evaluation of the accuracy. Experimental results from flight tests are validated with the ground-truth data provided by a high-accuracy reference system.
[ { "version": "v1", "created": "Tue, 20 Mar 2012 09:16:49 GMT" }, { "version": "v2", "created": "Tue, 27 Mar 2012 05:11:36 GMT" } ]
2015-03-20T00:00:00
[ [ "Lim", "Hyon", "" ], [ "Lee", "Hyeonbeom", "" ], [ "Kim", "H. Jin", "" ] ]
new_dataset
0.997705
1203.5822
Cheng Wan
Cheng Wan
Coalitions in nonatomic network congestion games
22 pages, 2 figures
null
null
null
cs.GT cs.SI math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work shows that the formation of a finite number of coalitions in a nonatomic network congestion game benefits everyone. At the equilibrium of the composite game played by coalitions and individuals, the average cost to each coalition and the individuals' common cost are all lower than in the corresponding nonatomic game (without coalitions). The individuals' cost is lower than the average cost to any coalition. Similarly, the average cost to a coalition is lower than that to any larger coalition. Whenever some members of a coalition become individuals, the individuals' payoff is increased. In the case of a unique coalition, both the average cost to the coalition and the individuals' cost are decreasing with respect to the size of the coalition. In a sequence of composite games, if a finite number of coalitions are fixed, while the size of the remaining coalitions goes to zero, the equilibria of these games converge to the equilibrium of a composite game played by the same fixed coalitions and the remaining individuals.
[ { "version": "v1", "created": "Mon, 26 Mar 2012 21:22:23 GMT" }, { "version": "v2", "created": "Sat, 12 May 2012 10:28:56 GMT" } ]
2015-03-20T00:00:00
[ [ "Wan", "Cheng", "" ] ]
new_dataset
0.987747
1203.6027
Chiranjib Choudhuri
Chiranjib Choudhuri, Young-Han Kim, and Urbashi Mitra
Causal State Communication
25 pages, 1 figure
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of state communication over a discrete memoryless channel with discrete memoryless state is studied when the state information is available strictly causally at the encoder. It is shown that block Markov encoding, in which the encoder communicates a description of the state sequence in the previous block by incorporating side information about the state sequence at the decoder, yields the minimum state estimation error. When the same channel is used to send additional independent information at the expense of a higher channel state estimation error, the optimal tradeoff between the rate of the independent information and the state estimation error is characterized via the capacity- distortion function. It is shown that any optimal tradeoff pair can be achieved via rate-splitting. These coding theorems are then extended optimally to the case of causal channel state information at the encoder using the Shannon strategy.
[ { "version": "v1", "created": "Tue, 27 Mar 2012 17:06:40 GMT" } ]
2015-03-20T00:00:00
[ [ "Choudhuri", "Chiranjib", "" ], [ "Kim", "Young-Han", "" ], [ "Mitra", "Urbashi", "" ] ]
new_dataset
0.986429
1204.1672
Gabriele Fici
Gabriele Fici
A Characterization of Bispecial Sturmian Words
Accepted to MFCS 2012
LNCS 7464, pp. 383-394, 2012
10.1007/978-3-642-32589-2_35
null
cs.FL cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A finite Sturmian word w over the alphabet {a,b} is left special (resp. right special) if aw and bw (resp. wa and wb) are both Sturmian words. A bispecial Sturmian word is a Sturmian word that is both left and right special. We show as a main result that bispecial Sturmian words are exactly the maximal internal factors of Christoffel words, that are words coding the digital approximations of segments in the Euclidean plane. This result is an extension of the known relation between central words and primitive Christoffel words. Our characterization allows us to give an enumerative formula for bispecial Sturmian words. We also investigate the minimal forbidden words for the set of Sturmian words.
[ { "version": "v1", "created": "Sat, 7 Apr 2012 18:56:05 GMT" }, { "version": "v2", "created": "Wed, 11 Apr 2012 20:08:21 GMT" }, { "version": "v3", "created": "Mon, 11 Jun 2012 11:47:23 GMT" }, { "version": "v4", "created": "Mon, 18 Jun 2012 16:25:36 GMT" } ]
2015-03-20T00:00:00
[ [ "Fici", "Gabriele", "" ] ]
new_dataset
0.978879
1204.2080
Zouheir Rezki Dr.
Zouheir Rezk and Mohamed-Slim Alouini
Ergodic Capacity of Cognitive Radio under Imperfect Channel State Information
To appear in IEEE TVT. 12 pages, 8 figures, 1 table. Matlab codes to reproduce results are available upon request. Please contact one of the authors for this purpose
IEEE Transactions on Vehicular Technology, 2012
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A spectrum-sharing communication system where the secondary user is aware of the instantaneous channel state information (CSI) of the secondary link, but knows only the statistics and an estimated version of the secondary transmitter-primary receiver (ST-PR) link, is investigated. The optimum power profile and the ergodic capacity of the secondary link are derived for general fading channels (with continuous probability density function) under average and peak transmit-power constraints and with respect to two different interference constraints: an interference outage constraint and a signal-to-interference outage constraint. When applied to Rayleigh fading channels, our results show, for instance, that the interference constraint is harmful at high-power regime in the sense that the capacity does not increase with the power, whereas at low-power regime, it has a marginal impact and no-interference performance corresponding to the ergodic capacity under average or peak transmit power constraint in absence of the primary user, may be achieved.
[ { "version": "v1", "created": "Tue, 10 Apr 2012 08:38:42 GMT" } ]
2015-03-20T00:00:00
[ [ "Rezk", "Zouheir", "" ], [ "Alouini", "Mohamed-Slim", "" ] ]
new_dataset
0.990887
1204.3989
Chung-Chieh Fang
Chung-Chieh Fang
Closed-Form Critical Conditions of Saddle-Node Bifurcations for Buck Converters
Submitted to IEEE Transactions on Automatic Control on Jan. 9, 2012. Seven of my arXiv manuscripts have a common reviewer
Nonlinear Dynamics, 70(3), pp. 1767-1789, Nov. 2012
10.1007/s11071-012-0572-2
null
cs.SY math.DS nlin.CD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A general and exact critical condition of saddle-node bifurcation is derived in closed form for the buck converter. The critical condition is helpful for the converter designers to predict or prevent some jump instabilities or coexistence of multiple solutions associated with the saddle-node bifurcation. Some previously known critical conditions become special cases in this generalized framework. Given an arbitrary control scheme, a systematic procedure is proposed to derive the critical condition for that control scheme.
[ { "version": "v1", "created": "Wed, 18 Apr 2012 06:25:33 GMT" } ]
2015-03-20T00:00:00
[ [ "Fang", "Chung-Chieh", "" ] ]
new_dataset
0.957646
1204.4176
David Doty
Ho-Lin Chen, David Doty, David Soloveichik
Deterministic Function Computation with Chemical Reaction Networks
fixed errors in previous version
null
null
null
cs.CC cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Chemical reaction networks (CRNs) formally model chemistry in a well-mixed solution. CRNs are widely used to describe information processing occurring in natural cellular regulatory networks, and with upcoming advances in synthetic biology, CRNs are a promising language for the design of artificial molecular control circuitry. Nonetheless, despite the widespread use of CRNs in the natural sciences, the range of computational behaviors exhibited by CRNs is not well understood. CRNs have been shown to be efficiently Turing-universal when allowing for a small probability of error. CRNs that are guaranteed to converge on a correct answer, on the other hand, have been shown to decide only the semilinear predicates. We introduce the notion of function, rather than predicate, computation by representing the output of a function f:N^k --> N^l by a count of some molecular species, i.e., if the CRN starts with n_1,...,n_k molecules of some "input" species X1,...,Xk, the CRN is guaranteed to converge to having f(n_1,...,n_k) molecules of the "output" species Y1,...,Yl. We show that a function f:N^k --> N^l is deterministically computed by a CRN if and only if its graph {(x,y) | f(x) = y} is a semilinear set. Furthermore, each semilinear function f can be computed on input x in expected time O(polylog(|x|)).
[ { "version": "v1", "created": "Wed, 18 Apr 2012 19:57:14 GMT" }, { "version": "v2", "created": "Sat, 8 Sep 2012 21:25:31 GMT" }, { "version": "v3", "created": "Thu, 10 Jan 2013 08:18:05 GMT" } ]
2015-03-20T00:00:00
[ [ "Chen", "Ho-Lin", "" ], [ "Doty", "David", "" ], [ "Soloveichik", "David", "" ] ]
new_dataset
0.96846
1204.4204
Tuvi Etzion
Sarit Buzaglo and Tuvi Etzion
Tilings with $n$-Dimensional Chairs and their Applications to Asymmetric Codes
null
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An $n$-dimensional chair consists of an $n$-dimensional box from which a smaller $n$-dimensional box is removed. A tiling of an $n$-dimensional chair has two nice applications in coding for write-once memories. The first one is in the design of codes which correct asymmetric errors with limited-magnitude. The second one is in the design of $n$ cells $q$-ary write-once memory codes. We show an equivalence between the design of a tiling with an integer lattice and the design of a tiling from a generalization of splitting (or of Sidon sequences). A tiling of an $n$-dimensional chair can define a perfect code for correcting asymmetric errors with limited-magnitude. We present constructions for such tilings and prove cases where perfect codes for these type of errors do not exist.
[ { "version": "v1", "created": "Wed, 18 Apr 2012 20:45:11 GMT" }, { "version": "v2", "created": "Thu, 16 Aug 2012 18:11:35 GMT" }, { "version": "v3", "created": "Sun, 21 Oct 2012 12:59:13 GMT" } ]
2015-03-20T00:00:00
[ [ "Buzaglo", "Sarit", "" ], [ "Etzion", "Tuvi", "" ] ]
new_dataset
0.998435
1204.4209
Venkatesan Guruswami
Venkatesan Guruswami and Chaoping Xing
Folded Codes from Function Field Towers and Improved Optimal Rate List Decoding
Conference version appears at STOC 2012
null
null
null
cs.IT cs.DS math.AG math.IT math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a new construction of algebraic codes which are efficiently list decodable from a fraction $1-R-\eps$ of adversarial errors where $R$ is the rate of the code, for any desired positive constant $\eps$. The worst-case list size output by the algorithm is $O(1/\eps)$, matching the existential bound for random codes up to constant factors. Further, the alphabet size of the codes is a constant depending only on $\eps$ - it can be made $\exp(\tilde{O}(1/\eps^2))$ which is not much worse than the lower bound of $\exp(\Omega(1/\eps))$. The parameters we achieve are thus quite close to the existential bounds in all three aspects - error-correction radius, alphabet size, and list-size - simultaneously. Our code construction is Monte Carlo and has the claimed list decoding property with high probability. Once the code is (efficiently) sampled, the encoding/decoding algorithms are deterministic with a running time $O_\eps(N^c)$ for an absolute constant $c$, where $N$ is the code's block length. Our construction is based on a linear-algebraic approach to list decoding folded codes from towers of function fields, and combining it with a special form of subspace-evasive sets. Instantiating this with the explicit "asymptotically good" Garcia-Stichtenoth tower of function fields yields the above parameters. To illustrate the method in a simpler setting, we also present a construction based on Hermitian function fields, which offers similar guarantees with a list and alphabet size polylogarithmic in the block length $N$. Along the way, we shed light on how to use automorphisms of certain function fields to enable list decoding of the folded version of the associated algebraic-geometric codes.
[ { "version": "v1", "created": "Wed, 18 Apr 2012 21:02:36 GMT" } ]
2015-03-20T00:00:00
[ [ "Guruswami", "Venkatesan", "" ], [ "Xing", "Chaoping", "" ] ]
new_dataset
0.965268
1204.4880
Yngve Villanger
Fedor V. Fomin and Saket Saurabh and Yngve Villanger
A Polynomial kernel for Proper Interval Vertex Deletion
13 pages, 1 figure
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is known that the problem of deleting at most k vertices to obtain a proper interval graph (Proper Interval Vertex Deletion) is fixed parameter tractable. However, whether the problem admits a polynomial kernel or not was open. Here, we answers this question in affirmative by obtaining a polynomial kernel for Proper Interval Vertex Deletion. This resolves an open question of van Bevern, Komusiewicz, Moser, and Niedermeier.
[ { "version": "v1", "created": "Sun, 22 Apr 2012 11:24:42 GMT" } ]
2015-03-20T00:00:00
[ [ "Fomin", "Fedor V.", "" ], [ "Saurabh", "Saket", "" ], [ "Villanger", "Yngve", "" ] ]
new_dataset
0.999547
1204.5057
Jan K\v{r}et\'insk\'y
Jan K\v{r}et\'insk\'y and Javier Esparza
Deterministic Automata for the (F,G)-fragment of LTL
null
null
null
null
cs.LO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When dealing with linear temporal logic properties in the setting of e.g. games or probabilistic systems, one often needs to express them as deterministic omega-automata. In order to translate LTL to deterministic omega-automata, the traditional approach first translates the formula to a non-deterministic B\"uchi automaton. Then a determinization procedure such as of Safra is performed yielding a deterministic \omega-automaton. We present a direct translation of the (F,G)-fragment of LTL into deterministic \omega-automata with no determinization procedure involved. Since our approach is tailored to LTL, we often avoid the typically unnecessarily large blowup caused by general determinization algorithms. We investigate the complexity of this translation and provide experimental results and compare them to the traditional method.
[ { "version": "v1", "created": "Mon, 23 Apr 2012 13:19:24 GMT" } ]
2015-03-20T00:00:00
[ [ "Křetínský", "Jan", "" ], [ "Esparza", "Javier", "" ] ]
new_dataset
0.965625
1204.5317
Jarek Duda dr
Jaros{\l}aw Duda, Pawe{\l} Korus
Correction Trees as an Alternative to Turbo Codes and Low Density Parity Check Codes
14 pages, 7 figures, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rapidly improving performance of modern hardware renders convolutional codes obsolete, and allows for the practical implementation of more sophisticated correction codes such as low density parity check (LDPC) and turbo codes (TC). Both are decoded by iterative algorithms, which require a disproportional computational effort for low channel noise. They are also unable to correct higher noise levels, still below the Shannon theoretical limit. In this paper, we discuss an enhanced version of a convolutional-like decoding paradigm which adopts very large spaces of possible system states, of the order of $2^{64}$. Under such conditions, the traditional convolution operation is rendered useless and needs to be replaced by a carefully designed state transition procedure. The size of the system state space completely changes the correction philosophy, as state collisions are virtually impossible and the decoding procedure becomes a correction tree. The proposed decoding algorithm is practically cost-free for low channel noise. As the channel noise approaches the Shannon limit, it is still possible to perform correction, although its cost increases to infinity. In many applications, the implemented decoder can essentially outperform both LDPC and TC. This paper describes the proposed correction paradigm and theoretically analyzes the asymptotic correction performance. The considered encoder and decoder were verified experimentally for the binary symmetric channel. The correction process remains practically cost-free for channel error rates below 0.05 and 0.13 for the 1/2 and 1/4 rate codes, respectively. For the considered resource limit, the output bit error rates reach the order of $10^{-3}$ for channel error rates 0.08 and 0.18. The proposed correction paradigm can be easily extended to other communication channels; the appropriate generalizations are also discussed in this study.
[ { "version": "v1", "created": "Tue, 24 Apr 2012 09:25:24 GMT" }, { "version": "v2", "created": "Thu, 24 May 2012 14:35:37 GMT" } ]
2015-03-20T00:00:00
[ [ "Duda", "Jarosław", "" ], [ "Korus", "Paweł", "" ] ]
new_dataset
0.985911
1204.6291
Michael Elberfeld
Michael Elberfeld, Martin Grohe, Till Tantau
Where First-Order and Monadic Second-Order Logic Coincide
null
null
null
null
cs.LO cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study on which classes of graphs first-order logic (FO) and monadic second-order logic (MSO) have the same expressive power. We show that for all classes C of graphs that are closed under taking subgraphs, FO and MSO have the same expressive power on C if, and only if, C has bounded tree depth. Tree depth is a graph invariant that measures the similarity of a graph to a star in a similar way that tree width measures the similarity of a graph to a tree. For classes just closed under taking induced subgraphs, we show an analogous result for guarded second-order logic (GSO), the variant of MSO that not only allows quantification over vertex sets but also over edge sets. A key tool in our proof is a Feferman-Vaught-type theorem that is constructive and still works for unbounded partitions.
[ { "version": "v1", "created": "Fri, 27 Apr 2012 18:52:15 GMT" } ]
2015-03-20T00:00:00
[ [ "Elberfeld", "Michael", "" ], [ "Grohe", "Martin", "" ], [ "Tantau", "Till", "" ] ]
new_dataset
0.960126
1205.0913
Bjarki Holm
Anuj Dawar, Bjarki Holm
Pebble games with algebraic rules
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define a general framework of partition games for formulating two-player pebble games over finite structures. We show that one particular such game, which we call the invertible-map game, yields a family of polynomial-time approximations of graph isomorphism that is strictly stronger than the well-known Weisfeiler-Lehman method. The general framework we introduce includes as special cases the pebble games for finite-variable logics with and without counting. It also includes a matrix-equivalence game, introduced here, which characterises equivalence in the finite-variable fragments of matrix-rank logic. We show that the equivalence defined by the invertible-map game is a refinement of the equivalence defined by each of these games for finite-variable logics.
[ { "version": "v1", "created": "Fri, 4 May 2012 10:48:06 GMT" }, { "version": "v2", "created": "Mon, 7 May 2012 14:04:23 GMT" } ]
2015-03-20T00:00:00
[ [ "Dawar", "Anuj", "" ], [ "Holm", "Bjarki", "" ] ]
new_dataset
0.999193
1205.4839
Thomas Degris
Thomas Degris, Martha White, Richard S. Sutton
Off-Policy Actor-Critic
Full version of the paper, appendix and errata included; Proceedings of the 2012 International Conference on Machine Learning
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the first actor-critic algorithm for off-policy reinforcement learning. Our algorithm is online and incremental, and its per-time-step complexity scales linearly with the number of learned weights. Previous work on actor-critic algorithms is limited to the on-policy setting and does not take advantage of the recent advances in off-policy gradient temporal-difference learning. Off-policy techniques, such as Greedy-GQ, enable a target policy to be learned while following and obtaining data from another (behavior) policy. For many problems, however, actor-critic methods are more practical than action value methods (like Greedy-GQ) because they explicitly represent the policy; consequently, the policy can be stochastic and utilize a large action space. In this paper, we illustrate how to practically combine the generality and learning potential of off-policy learning with the flexibility in action selection given by actor-critic methods. We derive an incremental, linear time and space complexity algorithm that includes eligibility traces, prove convergence under assumptions similar to previous off-policy algorithms, and empirically show better or comparable performance to existing algorithms on standard reinforcement-learning benchmark problems.
[ { "version": "v1", "created": "Tue, 22 May 2012 08:36:41 GMT" }, { "version": "v2", "created": "Wed, 23 May 2012 14:36:42 GMT" }, { "version": "v3", "created": "Tue, 17 Jul 2012 20:40:47 GMT" }, { "version": "v4", "created": "Tue, 14 Aug 2012 07:08:17 GMT" }, { "version": "v5", "created": "Thu, 20 Jun 2013 10:53:42 GMT" } ]
2015-03-20T00:00:00
[ [ "Degris", "Thomas", "" ], [ "White", "Martha", "" ], [ "Sutton", "Richard S.", "" ] ]
new_dataset
0.955375
1205.5263
Jingjin Yu
Jingjin Yu and Daniela Rus
Pebble Motion on Graphs with Rotations: Efficient Feasibility Tests and Planning Algorithms
WAFR submission
null
null
null
cs.DS cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of planning paths for $p$ distinguishable pebbles (robots) residing on the vertices of an $n$-vertex connected graph with $p \le n$. A pebble may move from a vertex to an adjacent one in a time step provided that it does not collide with other pebbles. When $p = n$, the only collision free moves are synchronous rotations of pebbles on disjoint cycles of the graph. We show that the feasibility of such problems is intrinsically determined by the diameter of a (unique) permutation group induced by the underlying graph. Roughly speaking, the diameter of a group $\mathbf G$ is the minimum length of the generator product required to reach an arbitrary element of $\mathbf G$ from the identity element. Through bounding the diameter of this associated permutation group, which assumes a maximum value of $O(n^2)$, we establish a linear time algorithm for deciding the feasibility of such problems and an $O(n^3)$ algorithm for planning complete paths.
[ { "version": "v1", "created": "Wed, 23 May 2012 19:45:18 GMT" }, { "version": "v2", "created": "Sun, 15 Jul 2012 16:03:19 GMT" }, { "version": "v3", "created": "Mon, 29 Oct 2012 19:52:09 GMT" }, { "version": "v4", "created": "Thu, 31 Jul 2014 04:22:50 GMT" } ]
2015-03-20T00:00:00
[ [ "Yu", "Jingjin", "" ], [ "Rus", "Daniela", "" ] ]
new_dataset
0.998892
1207.1187
Hardik Shah Mr
Hardik Shah, Andreas Raabe and Alois Knoll
Dynamic Priority Queue: An SDRAM Arbiter With Bounded Access Latencies for Tight WCET Calculation
null
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report introduces a shared resource arbitration scheme "DPQ - Dynamic Priority Queue" which provides bandwidth guarantees and low worst case latency to each master in an MPSoC. Being a non-trivial candidate for timing analysis, SDRAM has been chosen as a showcase, but the approach is valid for any shared resource arbitration. Due to its significant cost, data rate and physical size advantages, SDRAM is a potential candidate for cost sensitive, safety critical and space conserving systems. The variable access latency is a major drawback of SDRAM that induces largely over estimated Worst Case Execution Time (WCET) bounds of applications. In this report we present the DPQ together with an algorithm to predict the shared SDRAM's worst case latencies. We use the approach to calculate WCET bounds of six hardware tasks executing on an Altera Cyclone III FPGA with shared DDR2 memory. The results show that the DPQ is a fair arbitration scheme and produces low WCET bounds.
[ { "version": "v1", "created": "Thu, 5 Jul 2012 08:20:02 GMT" } ]
2015-03-20T00:00:00
[ [ "Shah", "Hardik", "" ], [ "Raabe", "Andreas", "" ], [ "Knoll", "Alois", "" ] ]
new_dataset
0.996326
1207.3202
Michael Kerber
Michael Kerber
Embedding the dual complex of hyper-rectangular partitions
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A rectangular partition is the partition of an (axis-aligned) rectangle into interior-disjoint rectangles. We ask whether a rectangular partition permits a "nice" drawing of its dual, that is, a straight-line embedding of it such that each dual vertex is placed into the rectangle that it represents. We show that deciding whether such a drawing exists is NP-complete. Moreover, we consider the drawing where a vertex is placed in the center of the represented rectangle and consider sufficient conditions for this drawing to be nice. This question is studied both in the plane and for the higher-dimensional generalization of rectangular partitions.
[ { "version": "v1", "created": "Fri, 13 Jul 2012 11:19:35 GMT" }, { "version": "v2", "created": "Fri, 8 Mar 2013 20:50:25 GMT" } ]
2015-03-20T00:00:00
[ [ "Kerber", "Michael", "" ] ]
new_dataset
0.953984
1207.4017
Shohreh Sharif Mansouri
Shohreh Sharif Mansouri and Elena Dubrova
Ring Oscillator Physical Unclonable Function with Multi Level Supply Voltages
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most common types of Physical Unclonable Functions (PUFs) is the ring oscillator PUF (RO-PUF), in which the output bits are obtained by comparing the oscillation frequencies of different ring oscillators. In this paper we design a new type of ring oscillator PUF in which the different inverters composing the ring oscillators can be supplied by different voltages. The new RO-PUF can be used to (1) increase the maximum number of possible challenge/response pairs produced by the PUF; (2) generate a high number of bits while consuming a low area; (3) improve the reliability of the PUF in case of temperature variations. We present the basic idea of the new RO-PUF and then discuss its applications.
[ { "version": "v1", "created": "Tue, 17 Jul 2012 14:46:16 GMT" } ]
2015-03-20T00:00:00
[ [ "Mansouri", "Shohreh Sharif", "" ], [ "Dubrova", "Elena", "" ] ]
new_dataset
0.998672
1207.5419
Andreas Cord-Landwehr
Andreas Cord-Landwehr and Martina H\"ullmann and Peter Kling and Alexander Setzer
Basic Network Creation Games with Communication Interests
An extended abstract of this paper has been accepted for publication in the proceedings of the 5th International Symposium on Algorithmic Game Theory (SAGT)
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network creation games model the creation and usage costs of networks formed by a set of selfish peers. Each peer has the ability to change the network in a limited way, e.g., by creating or deleting incident links. In doing so, a peer can reduce its individual communication cost. Typically, these costs are modeled by the maximum or average distance in the network. We introduce a generalized version of the basic network creation game (BNCG). In the BNCG (by Alon et al., SPAA 2010), each peer may replace one of its incident links by a link to an arbitrary peer. This is done in a selfish way in order to minimize either the maximum or average distance to all other peers. That is, each peer works towards a network structure that allows himself to communicate efficiently with all other peers. However, participants of large networks are seldom interested in all peers. Rather, they want to communicate efficiently only with a small subset of peers. Our model incorporates these (communication) interests explicitly. In the MAX-version, each node tries to minimize its maximum distance to nodes it is interested in. Given peers with interests and a communication network forming a tree, we prove several results on the structure and quality of equilibria in our model. For the MAX-version, we give an upper worst case bound of O(\sqrt{n}) for the private costs in an equilibrium of n peers. Moreover, we give an equilibrium for a circular interest graph where a node has private cost \Omega(\sqrt{n}), showing that our bound is tight. This example can be extended such that we get a tight bound of \Theta(\sqrt{n}) for the price of anarchy. For the case of general communication networks we show the price of anarchy to be \Theta(n). Additionally, we prove an interesting connection between a maximum independent set in the interest graph and the private costs of the peers.
[ { "version": "v1", "created": "Mon, 23 Jul 2012 15:01:11 GMT" } ]
2015-03-20T00:00:00
[ [ "Cord-Landwehr", "Andreas", "" ], [ "Hüllmann", "Martina", "" ], [ "Kling", "Peter", "" ], [ "Setzer", "Alexander", "" ] ]
new_dataset
0.976032
1208.0798
Michael Mitzenmacher
Michael Mitzenmacher, George Varghese
Biff (Bloom Filter) Codes : Fast Error Correction for Large Data Sets
5 pages, Corrected typos from ISIT 2012 conference version
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large data sets are increasingly common in cloud and virtualized environments. For example, transfers of multiple gigabytes are commonplace, as are replicated blocks of such sizes. There is a need for fast error-correction or data reconciliation in such settings even when the expected number of errors is small. Motivated by such cloud reconciliation problems, we consider error-correction schemes designed for large data, after explaining why previous approaches appear unsuitable. We introduce Biff codes, which are based on Bloom filters and are designed for large data. For Biff codes with a message of length $L$ and $E$ errors, the encoding time is $O(L)$, decoding time is $O(L + E)$ and the space overhead is $O(E)$. Biff codes are low-density parity-check codes; they are similar to Tornado codes, but are designed for errors instead of erasures. Further, Biff codes are designed to be very simple, removing any explicit graph structures and based entirely on hash tables. We derive Biff codes by a simple reduction from a set reconciliation algorithm for a recently developed data structure, invertible Bloom lookup tables. While the underlying theory is extremely simple, what makes this code especially attractive is the ease with which it can be implemented and the speed of decoding. We present results from a prototype implementation that decodes messages of 1 million words with thousands of errors in well under a second.
[ { "version": "v1", "created": "Fri, 3 Aug 2012 17:15:53 GMT" } ]
2015-03-20T00:00:00
[ [ "Mitzenmacher", "Michael", "" ], [ "Varghese", "George", "" ] ]
new_dataset
0.989094
1208.4165
Joseph Hellerstein
Joe Hellerstein, Christopher R\'e, Florian Schoppmann, Daisy Zhe Wang, Eugene Fratkin, Aleksander Gorajek, Kee Siong Ng, Caleb Welton, Xixuan Feng, Kun Li, Arun Kumar
The MADlib Analytics Library or MAD Skills, the SQL
VLDB2012
Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 12, pp. 1700-1711 (2012)
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
MADlib is a free, open source library of in-database analytic methods. It provides an evolving suite of SQL-based algorithms for machine learning, data mining and statistics that run at scale within a database engine, with no need for data import/export to other tools. The goal is for MADlib to eventually serve a role for scalable database systems that is similar to the CRAN library for R: a community repository of statistical methods, this time written with scale and parallelism in mind. In this paper we introduce the MADlib project, including the background that led to its beginnings, and the motivation for its open source nature. We provide an overview of the library's architecture and design patterns, and provide a description of various statistical methods in that context. We include performance and speedup results of a core design pattern from one of those methods over the Greenplum parallel DBMS on a modest-sized test cluster. We then report on two initial efforts at incorporating academic research into MADlib, which is one of the project's goals. MADlib is freely available at http://madlib.net, and the project is open for contributions of both new methods, and ports to additional database platforms.
[ { "version": "v1", "created": "Tue, 21 Aug 2012 02:52:27 GMT" } ]
2015-03-20T00:00:00
[ [ "Hellerstein", "Joe", "" ], [ "Ré", "Christopher", "" ], [ "Schoppmann", "Florian", "" ], [ "Wang", "Daisy Zhe", "" ], [ "Fratkin", "Eugene", "" ], [ "Gorajek", "Aleksander", "" ], [ "Ng", "Kee Siong", "" ], [ "Welton", "Caleb", "" ], [ "Feng", "Xixuan", "" ], [ "Li", "Kun", "" ], [ "Kumar", "Arun", "" ] ]
new_dataset
0.993376
1208.4405
Alexander Fish
Alexander Fish, Shamgar Gurevich, Ronny Hadani, Akbar Sayeed, and Oded Schwartz
Delay-Doppler Channel Estimation with Almost Linear Complexity
11 pages
null
null
null
cs.IT math.IT math.NT math.RT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A fundamental task in wireless communication is Channel Estimation: Compute the channel parameters a signal undergoes while traveling from a transmitter to a receiver. In the case of delay-Doppler channel, a widely used method is the Matched Filter algorithm. It uses a pseudo-random sequence of length N, and, in case of non-trivial relative velocity between transmitter and receiver, its computational complexity is O(N^{2}log(N)). In this paper we introduce a novel approach of designing sequences that allow faster channel estimation. Using group representation techniques we construct sequences, which enable us to introduce a new algorithm, called the flag method, that significantly improves the matched filter algorithm. The flag method finds the channel parameters in O(mNlog(N)) operations, for channel of sparsity m. We discuss applications of the flag method to GPS, radar system, and mobile communication as well.
[ { "version": "v1", "created": "Wed, 22 Aug 2012 00:10:18 GMT" }, { "version": "v2", "created": "Thu, 23 Aug 2012 21:16:48 GMT" } ]
2015-03-20T00:00:00
[ [ "Fish", "Alexander", "" ], [ "Gurevich", "Shamgar", "" ], [ "Hadani", "Ronny", "" ], [ "Sayeed", "Akbar", "" ], [ "Schwartz", "Oded", "" ] ]
new_dataset
0.999473
1208.4434
Roman Vetter
Roman Vetter, Norbert Stoop, Thomas Jenni, Falk K. Wittel, Hans J. Herrmann
Subdivision Shell Elements with Anisotropic Growth
20 pages, 12 figures, 1 table
Int. J. Numer. Meth. Eng. 95, 791-810 (2013)
10.1002/nme.4536
null
cs.NA cs.CE physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A thin shell finite element approach based on Loop's subdivision surfaces is proposed, capable of dealing with large deformations and anisotropic growth. To this end, the Kirchhoff-Love theory of thin shells is derived and extended to allow for arbitrary in-plane growth. The simplicity and computational efficiency of the subdivision thin shell elements is outstanding, which is demonstrated on a few standard loading benchmarks. With this powerful tool at hand, we demonstrate the broad range of possible applications by numerical solution of several growth scenarios, ranging from the uniform growth of a sphere, to boundary instabilities induced by large anisotropic growth. Finally, it is shown that the problem of a slowly and uniformly growing sheet confined in a fixed hollow sphere is equivalent to the inverse process where a sheet of fixed size is slowly crumpled in a shrinking hollow sphere in the frictionless, quasi-static, elastic limit.
[ { "version": "v1", "created": "Wed, 22 Aug 2012 07:18:44 GMT" }, { "version": "v2", "created": "Wed, 27 Mar 2013 17:14:45 GMT" } ]
2015-03-20T00:00:00
[ [ "Vetter", "Roman", "" ], [ "Stoop", "Norbert", "" ], [ "Jenni", "Thomas", "" ], [ "Wittel", "Falk K.", "" ], [ "Herrmann", "Hans J.", "" ] ]
new_dataset
0.998577
1208.4877
Sonia Jahid
Sonia Jahid and Nikita Borisov
PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption
14 pages, Under review in TDSC
null
null
null
cs.CR cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Access control to data in traditional enterprises is typically enforced through reference monitors. However, as more and more enterprise data is outsourced, trusting third party storage servers is getting challenging. As a result, cryptography, specifically Attribute-based encryption (ABE) is getting popular for its expressiveness. The challenge of ABE is revocation. To address this challenge, we propose PIRATTE, an architecture that supports fine-grained access control policies and dynamic group membership. PIRATTE is built using attribute-based encryption; a key and novel feature of our architecture, however, is that it is possible to remove access from a user without issuing new keys to other users or re-encrypting existing ciphertexts. We achieve this by introducing a proxy that participates in the decryption process and enforces revocation constraints. The proxy is minimally trusted and cannot decrypt ciphertexts or provide access to previously revoked users. We describe the PIRATTE construction and provide a security analysis along with performance evaluation.We also describe an architecture for online social network that can use PIRATTE, and prototype application of PIRATTE on Facebook.
[ { "version": "v1", "created": "Thu, 23 Aug 2012 23:42:22 GMT" } ]
2015-03-20T00:00:00
[ [ "Jahid", "Sonia", "" ], [ "Borisov", "Nikita", "" ] ]
new_dataset
0.997985
1209.1482
Haya Shulman
Amir Herzberg and Haya Shulman
Unilateral Antidotes to DNS Cache Poisoning
null
SecureComm 2011
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate defenses against DNS cache poisoning focusing on mechanisms that can be readily deployed unilaterally by the resolving organisation, preferably in a single gateway or a proxy. DNS poisoning is (still) a major threat to Internet security; determined spoofing attackers are often able to circumvent currently deployed antidotes such as port randomisation. The adoption of DNSSEC, which would foil DNS poisoning, remains a long-term challenge. We discuss limitations of the prominent resolver-only defenses, mainly port and IP randomisation, 0x20 encoding and birthday protection. We then present two new (unilateral) defenses: the sandwich antidote and the NAT antidote. The defenses are simple, effective and efficient, and can be implemented in a gateway connecting the resolver to the Internet. The sandwich antidote is composed of two phases: poisoning-attack detection and then prevention. The NAT antidote adds entropy to DNS requests by switching the resolver's IP address to a random address (belonging to the same autonomous system). Finally, we show how to implement the birthday protection mechanism in the gateway, thus allowing to restrict the number of DNS requests with the same query to 1 even when the resolver does not support this.
[ { "version": "v1", "created": "Fri, 7 Sep 2012 10:28:00 GMT" } ]
2015-03-20T00:00:00
[ [ "Herzberg", "Amir", "" ], [ "Shulman", "Haya", "" ] ]
new_dataset
0.993584
1503.05287
Abhisek Ukil
A. Ukil, R. Zivanovic
Adjusted Haar Wavelet for Application in the Power Systems Disturbance Analysis
13 pages in final printed version
Digital Signal Processing, Elsevier, vol. 18, issue 2, pp. 103-115, 2008
10.1016/j.dsp.2007.04.001
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Abrupt change detection based on the wavelet transform and threshold method is very effective in detecting the abrupt changes and hence segmenting the signals recorded during disturbances in the electrical power network. The wavelet method estimates the time-instants of the changes in the signal model parameters during the pre-fault condition, after initiation of fault, after circuit-breaker opening and auto-reclosure. Certain kinds of disturbance signals do not show distinct abrupt changes in the signal parameters. In those cases, the standard mother wavelets fail to achieve correct event-specific segmentations. A new adjustment technique to the standard Haar wavelet is proposed in this paper, by introducing 2n adjusting zeros in the Haar wavelet scaling filter, n being a positive integer. This technique is quite effective in segmenting those fault signals into pre- and post-fault segments, and it is an improvement over the standard mother wavelets for this application. This paper presents many practical examples where recorded signals from the power network in South Africa have been used.
[ { "version": "v1", "created": "Wed, 18 Mar 2015 05:50:39 GMT" } ]
2015-03-20T00:00:00
[ [ "Ukil", "A.", "" ], [ "Zivanovic", "R.", "" ] ]
new_dataset
0.999704
1503.05619
Mathew Samimi
Mathew K. Samimi and Theodore S. Rappaport
3-D Statistical Channel Model for Millimeter-Wave Outdoor Mobile Broadband Communications
7 pages, 6 figures, ICC 2015 (London, UK, to appear)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an omnidirectional spatial and temporal 3-dimensional statistical channel model for 28 GHz dense urban non-line of sight environments. The channel model is developed from 28 GHz ultrawideband propagation measurements obtained with a 400 megachips per second broadband sliding correlator channel sounder and highly directional, steerable horn antennas in New York City. A 3GPP-like statistical channel model that is easy to implement in software or hardware is developed from measured power delay profiles and a synthesized method for providing absolute propagation delays recovered from 3-D ray-tracing, as well as measured angle of departure and angle of arrival power spectra. The extracted statistics are used to implement a MATLAB-based statistical simulator that generates 3-D millimeter-wave temporal and spatial channel coefficients that reproduce realistic impulse responses of measured urban channels. The methods and model presented here can be used for millimeter-wave system-wide simulations, and air interface design and capacity analyses.
[ { "version": "v1", "created": "Thu, 19 Mar 2015 00:08:21 GMT" } ]
2015-03-20T00:00:00
[ [ "Samimi", "Mathew K.", "" ], [ "Rappaport", "Theodore S.", "" ] ]
new_dataset
0.99608
1503.05667
Sourish Dasgupta
Sourish Dasgupta, Gaurav Maheshwari, Priyansh Trivedi
BitSim: An Algebraic Similarity Measure for Description Logics Concepts
null
null
null
null
cs.AI
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, we propose an algebraic similarity measure {\sigma}BS (BS stands for BitSim) for assigning semantic similarity score to concept definitions in ALCH+ an expressive fragment of Description Logics (DL). We define an algebraic interpretation function, I_B, that maps a concept definition to a unique string ({\omega}_B) called bit-code) over an alphabet {\Sigma}_B of 11 symbols belonging to L_B - the language over P B. IB has semantic correspondence with conventional model-theoretic interpretation of DL. We then define {\sigma}_BS on L_B. A detailed analysis of I_B and {\sigma}_BS has been given.
[ { "version": "v1", "created": "Thu, 19 Mar 2015 08:05:03 GMT" } ]
2015-03-20T00:00:00
[ [ "Dasgupta", "Sourish", "" ], [ "Maheshwari", "Gaurav", "" ], [ "Trivedi", "Priyansh", "" ] ]
new_dataset
0.996532
1503.05704
Chinnappillai Durairajan
P. Chella Pandian and C. Durairajan
On Various Parameters of $Z_q$-Simplex codes for an even integer q
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we defined the $Z_q$-linear codes and discussed its various parameters. We constructed $Z_q$-Simplex code and $Z_q$-MacDonald code and found its parameters. We have given a lower and an upper bounds of its covering radius for q is an even integer.
[ { "version": "v1", "created": "Thu, 19 Mar 2015 10:57:26 GMT" } ]
2015-03-20T00:00:00
[ [ "Pandian", "P. Chella", "" ], [ "Durairajan", "C.", "" ] ]
new_dataset
0.999522
1503.05733
Steve Kerrison
Steve Kerrison and Kerstin Eder
A software controlled voltage tuning system using multi-purpose ring oscillators
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel software driven voltage tuning method that utilises multi-purpose Ring Oscillators (ROs) to provide process variation and environment sensitive energy reductions. The proposed technique enables voltage tuning based on the observed frequency of the ROs, taken as a representation of the device speed and used to estimate a safe minimum operating voltage at a given core frequency. A conservative linear relationship between RO frequency and silicon speed is used to approximate the critical path of the processor. Using a multi-purpose RO not specifically implemented for critical path characterisation is a unique approach to voltage tuning. The parameters governing the relationship between RO and silicon speed are obtained through the testing of a sample of processors from different wafer regions. These parameters can then be used on all devices of that model. The tuning method and software control framework is demonstrated on a sample of XMOS XS1-U8A-64 embedded microprocessors, yielding a dynamic power saving of up to 25% with no performance reduction and no negative impact on the real-time constraints of the embedded software running on the processor.
[ { "version": "v1", "created": "Thu, 19 Mar 2015 12:16:33 GMT" } ]
2015-03-20T00:00:00
[ [ "Kerrison", "Steve", "" ], [ "Eder", "Kerstin", "" ] ]
new_dataset
0.964984
1503.05767
Francois Chung
Fran\c{c}ois Chung and Tom\'as Rodr\'iguez
Automatic Pollen Grain and Exine Segmentation from Microscope Images
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we propose an automatic method for the segmentation of pollen grains from microscope images, followed by the automatic segmentation of their exine. The objective of exine segmentation is to separate the pollen grain in two regions of interest: exine and inner part. A coarse-to-fine approach ensures a smooth and accurate segmentation of both structures. As a rough stage, grain segmentation is performed by a procedure involving clustering and morphological operations, while the exine is approximated by an iterative procedure consisting in consecutive cropping steps of the pollen grain. A snake-based segmentation is performed to refine the segmentation of both structures. Results have shown that our segmentation method is able to deal with different pollen types, as well as with different types of exine and inner part appearance. The proposed segmentation method aims to be generic and has been designed as one of the core steps of an automatic pollen classification framework.
[ { "version": "v1", "created": "Thu, 19 Mar 2015 13:58:15 GMT" } ]
2015-03-20T00:00:00
[ [ "Chung", "François", "" ], [ "Rodríguez", "Tomás", "" ] ]
new_dataset
0.998398
1503.05881
Roman Chyla
Roman Chyla, Alberto Accomazzi, Alexandra Holachek, Carolyn S. Grant, Jonathan Elliott, Edwin A. Henneken, Donna M. Thompson, Michael J. Kurtz, Stephen S. Murray, Vladimir Sudilovsky
ADS 2.0: new architecture, API and services
ADASS Conference 2014
null
null
null
cs.DL
http://creativecommons.org/licenses/publicdomain/
The ADS platform is undergoing the biggest rewrite of its 20-year history. While several components have been added to its architecture over the past couple of years, this talk will concentrate on the underpinnings of ADS's search layer and its API. To illustrate the design of the components in the new system, we will show how the new ADS user interface is built exclusively on top of the API using RESTful web services. Taking one step further, we will discuss how we plan to expose the treasure trove of information hosted by ADS (10 million records and fulltext for much of the Astronomy and Physics refereed literature) to partners interested in using this API. This will provide you (and your intelligent applications) with access to ADS's underlying data to enable the extraction of new knowledge and the ingestion of these results back into the ADS. Using this framework, researchers could run controlled experiments with content extraction, machine learning, natural language processing, etc. In this talk, we will discuss what is already implemented, what will be available soon, and where we are going next.
[ { "version": "v1", "created": "Thu, 19 Mar 2015 18:54:03 GMT" } ]
2015-03-20T00:00:00
[ [ "Chyla", "Roman", "" ], [ "Accomazzi", "Alberto", "" ], [ "Holachek", "Alexandra", "" ], [ "Grant", "Carolyn S.", "" ], [ "Elliott", "Jonathan", "" ], [ "Henneken", "Edwin A.", "" ], [ "Thompson", "Donna M.", "" ], [ "Kurtz", "Michael J.", "" ], [ "Murray", "Stephen S.", "" ], [ "Sudilovsky", "Vladimir", "" ] ]
new_dataset
0.993157
1503.05907
Daniel Christen Mr.
Daniel Christen
Syntagma Lexical Database
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses the structure of Syntagma's Lexical Database (focused on Italian). The basic database consists in four tables. Table Forms contains word inflections, used by the POS-tagger for the identification of input-words. Forms is related to Lemma. Table Lemma stores all kinds of grammatical features of words, word-level semantic data and restrictions. In the table Meanings meaning-related data are stored: definition, examples, domain, and semantic information. Table Valency contains the argument structure of each meaning, with syntactic and semantic features for each argument. The extended version of SLD contains the links to Syntagma's Semantic Net and to the WordNet synsets of other languages.
[ { "version": "v1", "created": "Thu, 19 Mar 2015 19:45:24 GMT" } ]
2015-03-20T00:00:00
[ [ "Christen", "Daniel", "" ] ]
new_dataset
0.981485
1102.3227
Stefano Rini
Stefano Riniy, Daniela Tuninetti, Natasha Devroye and Andrea Goldsmith
The Capacity of the Interference Channel with a Cognitive Relay in Very Strong Interference
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The interference channel with a cognitive relay consists of a classical interference channel with two sourcedestination pairs and with an additional cognitive relay that has a priori knowledge of the sources' messages and aids in the sources' transmission. We derive a new outer bound for this channel using an argument originally devised for the "more capable" broadcast channel, and show the achievability of the proposed outer bound in the "very strong interference" regime, a class of channels where there is no loss in optimality if both destinations decode both messages. This result is analogous to the "very strong interference" capacity result for the classical interference channel and for the cognitive interference channel, and is the first capacity known capacity result for the general interference channel with a cognitive relay.
[ { "version": "v1", "created": "Wed, 16 Feb 2011 03:24:38 GMT" } ]
2015-03-19T00:00:00
[ [ "Riniy", "Stefano", "" ], [ "Tuninetti", "Daniela", "" ], [ "Devroye", "Natasha", "" ], [ "Goldsmith", "Andrea", "" ] ]
new_dataset
0.992421
1102.3298
Laura Luzzi
Laura Luzzi and Fr\'ed\'erique Oggier
A family of fast-decodable MIDO codes from crossed-product algebras over Q
5 pages, 1 figure, conference
null
null
null
cs.IT math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple Input Double Output (MIDO) asymmetric space-time codes for 4 transmit antennas and 2 receive antennas can be employed in the downlink from base stations to portable devices. Previous MIDO code constructions with low Maximum Likelihood (ML) decoding complexity, full diversity and the non-vanishing determinant (NVD) property are mostly based on cyclic division algebras. In this paper, a new family of MIDO codes with the NVD property based on crossed-product algebras over Q is introduced. Fast decodability follows naturally from the structure of the codewords which consist of four generalized Alamouti blocks. The associated ML complexity order is the lowest known for full-rate MIDO codes (O(M^{10}) instead of O(M^{16}) with respect to the real constellation size M). Numerical simulations show that these codes have a performance from comparable up to 1dB gain compared to the best known MIDO code with the same complexity.
[ { "version": "v1", "created": "Wed, 16 Feb 2011 10:57:30 GMT" } ]
2015-03-19T00:00:00
[ [ "Luzzi", "Laura", "" ], [ "Oggier", "Frédérique", "" ] ]
new_dataset
0.996163
1102.5461
Hai Jiang
Zhou Zhang and Hai Jiang
Distributed Opportunistic Channel Access in Wireless Relay Networks
20 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the problem of distributed opportunistic channel access in wireless relaying is investigated. A relay network with multiple source-destination pairs and multiple relays is considered. All the source nodes contend through a random access procedure. A winner source node may give up its transmission opportunity if its link quality is poor. In this research, we apply the optimal stopping theory to analyze when a winner node should give up its transmission opportunity. By assuming the winner node has information of channel gains of links from itself to relays and from relays to its destination, the existence and uniqueness of an optimal stopping rule are rigorously proved. It is also found that the optimal stopping rule is a pure-threshold strategy. The case when the winner node does not have information of channel gains of links from relays to its destination is also studied. Two stopping problems exist, one in the main layer (for channel access of source nodes), and the other in the sub-layer (for channel access of relay nodes). An intuitive stopping rule, where the sub-layer and the main layer maximize their throughput respectively, is shown to be a semi-pure-threshold strategy. The intuitive stopping rule turns out to be non-optimal. An optimal stopping rule is then derived theoretically. Our research reveals that multi-user (including multi-source and multi-relay) diversity and time diversity can be fully utilized in a relay network by our proposed strategies.
[ { "version": "v1", "created": "Sat, 26 Feb 2011 23:56:03 GMT" } ]
2015-03-19T00:00:00
[ [ "Zhang", "Zhou", "" ], [ "Jiang", "Hai", "" ] ]
new_dataset
0.998261
1103.1353
Manfred Kufleitner
Manfred Kufleitner and Alexander Lauser
Around Dot-depth One
null
null
null
Technical report no. 2011/03, University of Stuttgart, Computer Science
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dot-depth hierarchy is a classification of star-free languages. It is related to the quantifier alternation hierarchy of first-order logic over finite words. We consider fragments of languages with dot-depth 1/2 and dot-depth 1 obtained by prohibiting the specification of prefixes or suffixes. As it turns out, these language classes are in one-to-one correspondence with fragments of existential first-order logic without min- or max-predicate. For all fragments, we obtain effective algebraic characterizations. Moreover, we give new combinatorial proofs for the decidability of the membership problem for dot-depth 1/2 and dot-depth 1.
[ { "version": "v1", "created": "Mon, 7 Mar 2011 19:45:33 GMT" } ]
2015-03-19T00:00:00
[ [ "Kufleitner", "Manfred", "" ], [ "Lauser", "Alexander", "" ] ]
new_dataset
0.953336
1103.2303
Emmanuel Lochin
Pascal Anelli and Remi Diana and Emmanuel Lochin
FavourQueue: a Parameterless Active Queue Management to Speed Up Short TCP Flows (and others too!)
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents and analyses the implementation of a novel active queue management (AQM) named FavorQueue that aims to improve delay transfer of short lived TCP flows over best-effort networks. The idea is to dequeue packets that do not belong to a flow previously enqueued first. The rationale is to mitigate the delay induced by long-lived TCP flows over the pace of short TCP data requests and to prevent dropped packets at the beginning of a connection and during recovery period. Although the main target of this AQM is to accelerate short TCP traffic, we show that FavorQueue does not only improve the performance of short TCP traffic but also improves the performance of all TCP traffic in terms of drop ratio and latency whatever the flow size. In particular, we demonstrate that FavorQueue reduces the loss of a retransmitted packet, decreases the number of dropped packets recovered by RTO and improves the latency up to 30% compared to DropTail. Finally, we show that this scheme remains compliant with recent TCP updates such as the increase of the initial slow-start value.
[ { "version": "v1", "created": "Fri, 11 Mar 2011 15:58:33 GMT" }, { "version": "v2", "created": "Thu, 24 Mar 2011 15:28:47 GMT" }, { "version": "v3", "created": "Fri, 27 Sep 2013 15:55:13 GMT" } ]
2015-03-19T00:00:00
[ [ "Anelli", "Pascal", "" ], [ "Diana", "Remi", "" ], [ "Lochin", "Emmanuel", "" ] ]
new_dataset
0.996894
1103.2793
Anastasios Zouzias
Anastasios Zouzias
A Matrix Hyperbolic Cosine Algorithm and Applications
16 pages, simplified proof and corrected acknowledging of prior work in (current) Section 4
null
10.1007/978-3-642-31594-7_71
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we generalize Spencer's hyperbolic cosine algorithm to the matrix-valued setting. We apply the proposed algorithm to several problems by analyzing its computational efficiency under two special cases of matrices; one in which the matrices have a group structure and an other in which they have rank-one. As an application of the former case, we present a deterministic algorithm that, given the multiplication table of a finite group of size $n$, it constructs an expanding Cayley graph of logarithmic degree in near-optimal O(n^2 log^3 n) time. For the latter case, we present a fast deterministic algorithm for spectral sparsification of positive semi-definite matrices, which implies an improved deterministic algorithm for spectral graph sparsification of dense graphs. In addition, we give an elementary connection between spectral sparsification of positive semi-definite matrices and element-wise matrix sparsification. As a consequence, we obtain improved element-wise sparsification algorithms for diagonally dominant-like matrices.
[ { "version": "v1", "created": "Mon, 14 Mar 2011 21:43:27 GMT" }, { "version": "v2", "created": "Sun, 26 Feb 2012 02:21:23 GMT" } ]
2015-03-19T00:00:00
[ [ "Zouzias", "Anastasios", "" ] ]
new_dataset
0.975257
1103.5421
Zoltan Esik
Zoltan Esik, Szabolcs Ivan
Context-free ordinals
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider context-free languages equipped with the lexicographic ordering. We show that when the lexicographic ordering of a context-free language is scattered, then its Hausdorff rank is less than $\omega^\omega$. As a corollary of this result we obtain that an ordinal is the order type of a well-ordered context-free language iff it is less than $\omega^{\omega^\omega}$.
[ { "version": "v1", "created": "Mon, 28 Mar 2011 17:12:05 GMT" } ]
2015-03-19T00:00:00
[ [ "Esik", "Zoltan", "" ], [ "Ivan", "Szabolcs", "" ] ]
new_dataset
0.975937
1104.0735
Vijayvaradharaj Muralidharan
Vijayvaradharaj T Muralidharan, B. Sundar Rajan
A Non-Orthogonal DF Scheme for the Single Relay Channel and the Effect of Labelling
10 pages, 14 figures, 4 tables
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the uncoded transmission over the half-duplex single relay channel, with a single antenna at the source, relay and destination nodes, in a Rayleigh fading environment. The phase during which the relay is in reception mode is referred to as Phase 1 and the phase during which the relay is in transmission mode is referred to as Phase 2. The following two cases are considered: the Non-Orthogonal Decode and Forward (NODF) scheme, in which both the source and the relay transmit during Phase 2 and the Orthogonal Decode and Forward (ODF) scheme, in which the relay alone transmits during Phase 2. A near ML decoder which gives full diversity (diversity order 2) for the NODF scheme is proposed. Due to the proximity of the relay to the destination, the Source-Destination link, in general, is expected to be much weaker than the Relay-Destination link. Hence it is not clear whether the transmission made by the source during Phase 2 in the NODF scheme, provides any performance improvement over the ODF scheme or not. In this regard, it is shown that the NODF scheme provides significant performance improvement over the ODF scheme. In fact, at high SNR, the performance of the NODF scheme with the non-ideal Source-Relay link, is same as that of the NODF scheme with an ideal Source-Relay link. In other words, to study the high SNR performance of the NODF scheme, one can assume that the Source-Relay link is ideal, whereas the same is not true for the ODF scheme. Further, it is shown that proper choice of the mapping of the bits on to the signal points at the source and the relay, provides a significant improvement in performance, for both the NODF and the ODF schemes.
[ { "version": "v1", "created": "Tue, 5 Apr 2011 05:15:45 GMT" } ]
2015-03-19T00:00:00
[ [ "Muralidharan", "Vijayvaradharaj T", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.997236
1104.0753
Matias Korman
J. M. D\'iaz-Ba\~nez and M. Korman and P. P\'erez-Lantero and I. Ventura
Locating a service facility and a rapid transit line
Abstract submitted to the XIV Spanish Meeting on Computational Geometry
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study a facility location problem in the plane in which a single point (facility) and a rapid transit line (highway) are simultaneously located in order to minimize the total travel time of the clients to the facility, using the $L_1$ or Manhattan metric. The rapid transit line is represented by a line segment with fixed length and arbitrary orientation. The highway is an alternative transportation system that can be used by the clients to reduce their travel time to the facility. This problem was introduced by Espejo and Ch\'ia in [7]. They gave both a characterization of the optimal solutions and an algorithm running in $O(n^3\log n)$ time, where $n$ represents the number of clients. In this paper we show that the Espejo and Ch\'ia's algorithm does not always work correctly. At the same time, we provide a proper characterization of the solutions with a simpler proof and give an algorithm solving the problem in $O(n^3)$ time.
[ { "version": "v1", "created": "Tue, 5 Apr 2011 07:43:46 GMT" }, { "version": "v2", "created": "Wed, 6 Apr 2011 12:19:51 GMT" }, { "version": "v3", "created": "Fri, 23 Mar 2012 12:56:09 GMT" } ]
2015-03-19T00:00:00
[ [ "Díaz-Bañez", "J. M.", "" ], [ "Korman", "M.", "" ], [ "Pérez-Lantero", "P.", "" ], [ "Ventura", "I.", "" ] ]
new_dataset
0.996669
1104.1044
Ming Lam Leung
Ming Lam Leung
Fixed Parameter Tractable Algorithm for Firefighting Problem
14 pages, 5 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The firefighter problem is defined as below. A fire initially breaks out at a vertex r on a graph G. In each step, a firefighter chooses to protect one vertex, which is not yet burnt. And the fire spreads out to its unprotected neighboring vertices afterwards. The objective of the problem is to choose a sequence of vertices to protect, in order to save maximum number of vertices from the fire. In this paper, we will introduce a parameter k into the firefighter problem and give several FPT algorithms using a random separation technique of Cai, Chan and Chan. We will prove firefighter problem is FPT on general graph if we take total number of vertices burnt to be a parameter. If we parameterize the number of protected vertices, we discover several FPT algorithms of the firefighter problem on degree bounded graph and unicyclic graph. Furthermore, we also study the firefighter problem on weighted and valued graph, and the problem with multiple fire sources on degree-bounded graph.
[ { "version": "v1", "created": "Wed, 6 Apr 2011 09:33:42 GMT" }, { "version": "v2", "created": "Fri, 8 Apr 2011 10:51:21 GMT" } ]
2015-03-19T00:00:00
[ [ "Leung", "Ming Lam", "" ] ]
new_dataset
0.971559
1104.1482
Christian Duncan
Christian A. Duncan and Emden R. Gansner and Yifan Hu and Michael Kaufmann and Stephen G. Kobourov
Optimal Polygonal Representation of Planar Graphs
26 pages, 14 figures. A preliminary version appeared in LATIN 2010, Oaxaca, Mexico
null
null
null
cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the problem of representing graphs by polygons whose sides touch. We show that at least six sides per polygon are necessary by constructing a class of planar graphs that cannot be represented by pentagons. We also show that the lower bound of six sides is matched by an upper bound of six sides with a linear-time algorithm for representing any planar graph by touching hexagons. Moreover, our algorithm produces convex polygons with edges having at most three slopes and with all vertices lying on an O(n)xO(n) grid.
[ { "version": "v1", "created": "Fri, 8 Apr 2011 05:10:36 GMT" } ]
2015-03-19T00:00:00
[ [ "Duncan", "Christian A.", "" ], [ "Gansner", "Emden R.", "" ], [ "Hu", "Yifan", "" ], [ "Kaufmann", "Michael", "" ], [ "Kobourov", "Stephen G.", "" ] ]
new_dataset
0.981911
1104.1601
Gregory Kucherov
Gregory Kucherov
On-line construction of position heaps
to appear in Journal of Discrete Algorithms
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a simple linear-time on-line algorithm for constructing a position heap for a string [Ehrenfeucht et al, 2011]. Our definition of position heap differs slightly from the one proposed in [Ehrenfeucht et al, 2011] in that it considers the suffixes ordered from left to right. Our construction is based on classic suffix pointers and resembles the Ukkonen's algorithm for suffix trees [Ukkonen, 1995]. Using suffix pointers, the position heap can be extended into the augmented position heap that allows for a linear-time string matching algorithm [Ehrenfeucht et al, 2011].
[ { "version": "v1", "created": "Fri, 8 Apr 2011 15:46:44 GMT" }, { "version": "v2", "created": "Sun, 17 Apr 2011 08:17:27 GMT" }, { "version": "v3", "created": "Mon, 17 Oct 2011 17:57:09 GMT" }, { "version": "v4", "created": "Tue, 22 Nov 2011 16:35:53 GMT" }, { "version": "v5", "created": "Thu, 4 Oct 2012 10:25:19 GMT" } ]
2015-03-19T00:00:00
[ [ "Kucherov", "Gregory", "" ] ]
new_dataset
0.997002
1104.2086
Slav Petrov
Slav Petrov, Dipanjan Das and Ryan McDonald
A Universal Part-of-Speech Tagset
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To facilitate future research in unsupervised induction of syntactic structure and to standardize best-practices, we propose a tagset that consists of twelve universal part-of-speech categories. In addition to the tagset, we develop a mapping from 25 different treebank tagsets to this universal set. As a result, when combined with the original treebank data, this universal tagset and mapping produce a dataset consisting of common parts-of-speech for 22 different languages. We highlight the use of this resource via two experiments, including one that reports competitive accuracies for unsupervised grammar induction without gold standard part-of-speech tags.
[ { "version": "v1", "created": "Mon, 11 Apr 2011 23:06:54 GMT" } ]
2015-03-19T00:00:00
[ [ "Petrov", "Slav", "" ], [ "Das", "Dipanjan", "" ], [ "McDonald", "Ryan", "" ] ]
new_dataset
0.997846
1104.2486
Dimitrios Thilikos
Juanjo Ru\'e, Ignasi Sau, and Dimitrios M. Thilikos
Dynamic Programming for Graphs on Surfaces
28 pages, 3 figures
null
null
null
cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a framework for the design and analysis of dynamic programming algorithms for surface-embedded graphs on n vertices and branchwidth at most k. Our technique applies to general families of problems where standard dynamic programming runs in 2^{O(k log k)} n steps. Our approach combines tools from topological graph theory and analytic combinatorics. In particular, we introduce a new type of branch decomposition called "surface cut decomposition", generalizing sphere cut decompositions of planar graphs introduced by Seymour and Thomas, which has nice combinatorial properties. Namely, the number of partial solutions that can be arranged on a surface cut decomposition can be upper-bounded by the number of non-crossing partitions on surfaces with boundary. It follows that partial solutions can be represented by a single-exponential (in the branchwidth k) number of configurations. This proves that, when applied on surface cut decompositions, dynamic programming runs in 2^{O(k)} n steps. That way, we considerably extend the class of problems that can be solved in running times with a single-exponential dependence on branchwidth and unify/improve most previous results in this direction.
[ { "version": "v1", "created": "Wed, 13 Apr 2011 13:32:08 GMT" }, { "version": "v2", "created": "Thu, 14 Apr 2011 09:41:52 GMT" }, { "version": "v3", "created": "Fri, 15 Apr 2011 20:16:42 GMT" }, { "version": "v4", "created": "Mon, 25 Apr 2011 16:03:53 GMT" } ]
2015-03-19T00:00:00
[ [ "Rué", "Juanjo", "" ], [ "Sau", "Ignasi", "" ], [ "Thilikos", "Dimitrios M.", "" ] ]
new_dataset
0.994172
1104.2547
Mingqiang Li
Mingqiang Li and Jiwu Shu
C-Codes: Cyclic Lowest-Density MDS Array Codes Constructed Using Starters for RAID 6
A revised version submitted to Designs, Codes and Cryptography for a second round of review. 22 pages; A revised version of IBM Research Report RC25218
null
null
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The distance-3 cyclic lowest-density MDS array code (called the C-Code) is a good candidate for RAID 6 because of its optimal storage efficiency, optimal update complexity, optimal length, and cyclic symmetry. In this paper, the underlying connections between C-Codes (or quasi-C-Codes) and starters in group theory are revealed. It is shown that each C-Code (or quasi-C-Code) of length $2n$ can be constructed using an even starter (or even multi-starter) in $(Z_{2n},+)$. It is also shown that each C-Code (or quasi-C-Code) has a twin C-Code (or quasi-C-Code). Then, four infinite families (three of which are new) of C-Codes of length $p-1$ are constructed, where $p$ is a prime. Besides the family of length $p-1$, C-Codes for some sporadic even lengths are also presented. Even so, there are still some even lengths (such as 8) for which C-Codes do not exist. To cover this limitation, two infinite families (one of which is new) of quasi-C-Codes of length $2(p-1)$ are constructed for these even lengths.
[ { "version": "v1", "created": "Wed, 13 Apr 2011 16:51:36 GMT" }, { "version": "v2", "created": "Tue, 1 Nov 2011 15:58:28 GMT" }, { "version": "v3", "created": "Thu, 1 Mar 2012 02:45:34 GMT" }, { "version": "v4", "created": "Sat, 24 Mar 2012 16:46:18 GMT" }, { "version": "v5", "created": "Fri, 24 Aug 2012 19:16:13 GMT" } ]
2015-03-19T00:00:00
[ [ "Li", "Mingqiang", "" ], [ "Shu", "Jiwu", "" ] ]
new_dataset
0.999661
1104.2809
Matthew Patitz
Bin Fu and Matthew J. Patitz and Robert T. Schweller and Bobby Sheline
Self-Assembly with Geometric Tiles
null
null
null
null
cs.CG cs.CC cs.DS cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we propose a generalization of Winfree's abstract Tile Assembly Model (aTAM) in which tile types are assigned rigid shapes, or geometries, along each tile face. We examine the number of distinct tile types needed to assemble shapes within this model, the temperature required for efficient assembly, and the problem of designing compact geometric faces to meet given compatibility specifications. Our results show a dramatic decrease in the number of tile types needed to assemble $n \times n$ squares to $\Theta(\sqrt{\log n})$ at temperature 1 for the most simple model which meets a lower bound from Kolmogorov complexity, and $O(\log\log n)$ in a model in which tile aggregates must move together through obstacle free paths within the plane. This stands in contrast to the $\Theta(\log n / \log\log n)$ tile types at temperature 2 needed in the basic aTAM. We also provide a general method for simulating a large and computationally universal class of temperature 2 aTAM systems with geometric tiles at temperature 1. Finally, we consider the problem of computing a set of compact geometric faces for a tile system to implement a given set of compatibility specifications. We show a number of bounds on the complexity of geometry size needed for various classes of compatibility specifications, many of which we directly apply to our tile assembly results to achieve non-trivial reductions in geometry size.
[ { "version": "v1", "created": "Thu, 14 Apr 2011 15:46:11 GMT" } ]
2015-03-19T00:00:00
[ [ "Fu", "Bin", "" ], [ "Patitz", "Matthew J.", "" ], [ "Schweller", "Robert T.", "" ], [ "Sheline", "Bobby", "" ] ]
new_dataset
0.991767
1104.4044
Mathilde Noual
Mathilde Noual
General Iteration graphs and Boolean automata circuits
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article is set in the field of regulation networks modeled by discrete dynamical systems. It focuses on Boolean automata networks. In such networks, there are many ways to update the states of every element. When this is done deterministically, at each time step of a discretised time flow and according to a predefined order, we say that the network is updated according to block-sequential update schedule (blocks of elements are updated sequentially while, within each block, the elements are updated synchronously). Many studies, for the sake of simplicity and with some biologically motivated reasons, have concentrated on networks updated with one particular block-sequential update schedule (more often the synchronous/parallel update schedule or the sequential update schedules). The aim of this paper is to give an argument formally proven and inspired by biological considerations in favour of the fact that the choice of a particular update schedule does not matter so much in terms of the possible and likely dynamical behaviours that networks may display.
[ { "version": "v1", "created": "Wed, 20 Apr 2011 14:46:38 GMT" } ]
2015-03-19T00:00:00
[ [ "Noual", "Mathilde", "" ] ]
new_dataset
0.98137
1104.4137
Giovanni Viglietta
Giovanni Viglietta
Searching Polyhedra by Rotating Half-Planes
45 pages, 26 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Searchlight Scheduling Problem was first studied in 2D polygons, where the goal is for point guards in fixed positions to rotate searchlights to catch an evasive intruder. Here the problem is extended to 3D polyhedra, with the guards now boundary segments who rotate half-planes of illumination. After carefully detailing the 3D model, several results are established. The first is a nearly direct extension of the planar one-way sweep strategy using what we call exhaustive guards, a generalization that succeeds despite there being no well-defined notion in 3D of planar "clockwise rotation". Next follow two results: every polyhedron with r>0 reflex edges can be searched by at most r^2 suitably placed guards, whereas just r guards suffice if the polyhedron is orthogonal. (Minimizing the number of guards to search a given polyhedron is easily seen to be NP-hard.) Finally we show that deciding whether a given set of guards has a successful search schedule is strongly NP-hard, and that deciding if a given target area is searchable at all is strongly PSPACE-hard, even for orthogonal polyhedra. A number of peripheral results are proved en route to these central theorems, and several open problems remain for future work.
[ { "version": "v1", "created": "Wed, 20 Apr 2011 22:26:26 GMT" }, { "version": "v2", "created": "Mon, 25 Apr 2011 21:27:37 GMT" }, { "version": "v3", "created": "Sat, 30 Apr 2011 05:29:30 GMT" }, { "version": "v4", "created": "Mon, 24 Oct 2011 07:05:57 GMT" }, { "version": "v5", "created": "Tue, 20 Dec 2011 18:18:02 GMT" } ]
2015-03-19T00:00:00
[ [ "Viglietta", "Giovanni", "" ] ]
new_dataset
0.983539
1105.0903
Georgios Zervas
John W. Byers, Michael Mitzenmacher, Michalis Potamias, and Georgios Zervas
A Month in the Life of Groupon
6 pages
null
10.1016/j.elerap.2012.11.006
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Groupon has become the latest Internet sensation, providing daily deals to customers in the form of discount offers for restaurants, ticketed events, appliances, services, and other items. We undertake a study of the economics of daily deals on the web, based on a dataset we compiled by monitoring Groupon over several weeks. We use our dataset to characterize Groupon deal purchases, and to glean insights about Groupon's operational strategy. Our focus is on purchase incentives. For the primary purchase incentive, price, our regression model indicates that demand for coupons is relatively inelastic, allowing room for price-based revenue optimization. More interestingly, mining our dataset, we find evidence that Groupon customers are sensitive to other, "soft", incentives, e.g., deal scheduling and duration, deal featuring, and limited inventory. Our analysis points to the importance of considering incentives other than price in optimizing deal sites and similar systems.
[ { "version": "v1", "created": "Wed, 4 May 2011 19:25:21 GMT" } ]
2015-03-19T00:00:00
[ [ "Byers", "John W.", "" ], [ "Mitzenmacher", "Michael", "" ], [ "Potamias", "Michalis", "" ], [ "Zervas", "Georgios", "" ] ]
new_dataset
0.999817
1105.2447
Gabriele D'Angelo
Gabriele D'Angelo and Stefano Ferretti
LUNES: Agent-based Simulation of P2P Systems (Extended Version)
Proceedings of the International Workshop on Modeling and Simulation of Peer-to-Peer Architectures and Systems (MOSPAS 2011). As part of the 2011 International Conference on High Performance Computing and Simulation (HPCS 2011)
null
10.1109/HPCSim.2011.5999879
null
cs.DC cs.MA cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present LUNES, an agent-based Large Unstructured NEtwork Simulator, which allows to simulate complex networks composed of a high number of nodes. LUNES is modular, since it splits the three phases of network topology creation, protocol simulation and performance evaluation. This permits to easily integrate external software tools into the main software architecture. The simulation of the interaction protocols among network nodes is performed via a simulation middleware that supports both the sequential and the parallel/distributed simulation approaches. In the latter case, a specific mechanism for the communication overhead-reduction is used; this guarantees high levels of performance and scalability. To demonstrate the efficiency of LUNES, we test the simulator with gossip protocols executed on top of networks (representing peer-to-peer overlays), generated with different topologies. Results demonstrate the effectiveness of the proposed approach.
[ { "version": "v1", "created": "Thu, 12 May 2011 12:26:40 GMT" }, { "version": "v2", "created": "Thu, 27 Dec 2012 08:58:52 GMT" }, { "version": "v3", "created": "Mon, 28 Jul 2014 09:38:29 GMT" } ]
2015-03-19T00:00:00
[ [ "D'Angelo", "Gabriele", "" ], [ "Ferretti", "Stefano", "" ] ]
new_dataset
0.999633
1105.3144
Lu Lu
Lu Lu and Soung Chang Liew
Asynchronous Physical-layer Network Coding
Full length version of APNC
IEEE Transactions on Wireless Communications, 2012
10.1109/TWC.2011.120911.111067
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A key issue in physical-layer network coding (PNC) is how to deal with the asynchrony between signals transmitted by multiple transmitters. That is, symbols transmitted by different transmitters could arrive at the receiver with symbol misalignment as well as relative carrier-phase offset. A second important issue is how to integrate channel coding with PNC to achieve reliable communication. This paper investigates these two issues and makes the following contributions: 1) We propose and investigate a general framework for decoding at the receiver based on belief propagation (BP). The framework can effectively deal with symbol and phase asynchronies while incorporating channel coding at the same time. 2) For unchannel-coded PNC, we show that for BPSK and QPSK modulations, our BP method can significantly reduce the asynchrony penalties compared with prior methods. 3) For unchannel-coded PNC, with half symbol offset between the transmitters, our BP method can drastically reduce the performance penalty due to phase asynchrony, from more than 6 dB to no more than 1 dB. 4) For channel-coded PNC, with our BP method, both symbol and phase asynchronies actually improve the system performance compared with the perfectly synchronous case. Furthermore, the performance spread due to different combinations of symbol and phase offsets between the transmitters in channel-coded PNC is only around 1 dB. The implication of 3) is that if we could control the symbol arrival times at the receiver, it would be advantageous to deliberately introduce a half symbol offset in unchannel-coded PNC. The implication of 4) is that when channel coding is used, symbol and phase asynchronies are not major performance concerns in PNC.
[ { "version": "v1", "created": "Mon, 16 May 2011 16:48:04 GMT" }, { "version": "v2", "created": "Thu, 19 May 2011 07:59:13 GMT" }, { "version": "v3", "created": "Sat, 21 May 2011 12:13:04 GMT" }, { "version": "v4", "created": "Sun, 5 Jun 2011 13:34:38 GMT" } ]
2015-03-19T00:00:00
[ [ "Lu", "Lu", "" ], [ "Liew", "Soung Chang", "" ] ]
new_dataset
0.992228
1105.3486
Ladislau B\"ol\"oni
Ladislau B\"ol\"oni
Xapagy: a cognitive architecture for narrative reasoning
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the Xapagy cognitive architecture: a software system designed to perform narrative reasoning. The architecture has been designed from scratch to model and mimic the activities performed by humans when witnessing, reading, recalling, narrating and talking about stories.
[ { "version": "v1", "created": "Tue, 17 May 2011 20:28:31 GMT" } ]
2015-03-19T00:00:00
[ [ "Bölöni", "Ladislau", "" ] ]
new_dataset
0.999472
1105.3977
Pei Liu
Pei Liu, Chun Nie, Thanasis Korakis, Elza Erkip, Shivendra Panwar, Francesco Verde, Anna Scaglione
STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs
This paper is a revised version of a paper with the same name submitted to IEEE Transaction on Wireless Communications. STiCMAC protocol with RTS/CTS turned off is presented in the appendix of this draft
null
10.1109/TWC.2012.020712.101900
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Relay-assisted cooperative wireless communication has been shown to have significant performance gains over the legacy direct transmission scheme. Compared with single relay based cooperation schemes, utilizing multiple relays further improves the reliability and rate of transmissions. Distributed space-time coding (DSTC), as one of the schemes to utilize multiple relays, requires tight coordination between relays and does not perform well in a distributed environment with mobility. In this paper, a cooperative medium access control (MAC) layer protocol, called \emph{STiCMAC}, is designed to allow multiple relays to transmit at the same time in an IEEE 802.11 network. The transmission is based on a novel DSTC scheme called \emph{randomized distributed space-time coding} (\emph{R-DSTC}), which requires minimum coordination. Unlike conventional cooperation schemes that pick nodes with good links, \emph{STiCMAC} picks a \emph{transmission mode} that could most improve the end-to-end data rate. Any station that correctly receives from the source can act as a relay and participate in forwarding. The MAC protocol is implemented in a fully decentralized manner and is able to opportunistically recruit relays on the fly, thus making it \emph{robust} to channel variations and user mobility. Simulation results show that the network capacity and delay performance are greatly improved, especially in a mobile environment.
[ { "version": "v1", "created": "Thu, 19 May 2011 20:01:44 GMT" }, { "version": "v2", "created": "Wed, 21 Sep 2011 15:37:09 GMT" } ]
2015-03-19T00:00:00
[ [ "Liu", "Pei", "" ], [ "Nie", "Chun", "" ], [ "Korakis", "Thanasis", "" ], [ "Erkip", "Elza", "" ], [ "Panwar", "Shivendra", "" ], [ "Verde", "Francesco", "" ], [ "Scaglione", "Anna", "" ] ]
new_dataset
0.999574
1106.3402
Anas Chaaban
Anas Chaaban and Aydin Sezgin
The Capacity Region of the Linear Shift Deterministic Y-Channel
to appear in ISIT 2011
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The linear shift deterministic Y-channel is studied. That is, we have three users and one relay, where each user wishes to broadcast one message to each other user via the relay, resulting in a multi-way relaying setup. The cut-set bounds for this setup are shown to be not sufficient to characterize its capacity region. New upper bounds are derived, which when combined with the cut-set bounds provide an outer bound on the capacity region. It is shown that this outer bound is achievable, and as a result, the capacity region of the linear shift deterministic Y-channel is characterized.
[ { "version": "v1", "created": "Fri, 17 Jun 2011 07:24:14 GMT" } ]
2015-03-19T00:00:00
[ [ "Chaaban", "Anas", "" ], [ "Sezgin", "Aydin", "" ] ]
new_dataset
0.976996
1106.5039
Mai Vu
Mai Vu
The Capacity of MIMO Channels with Per-Antenna Power Constraint
26 pages, 5 figures, submitted for publication
null
null
null
cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish the optimal input signaling and the capacity of MIMO channels under per-antenna power constraint. While admitting a linear eigenbeam structure, the optimal input is no longer diagonalizable by the channel right singular vectors as with sum power constraint. We formulate the capacity optimization as an SDP problem and solve in closed-form the optimal input covariance as a function of the dual variable. We then design an efficient algorithm to find this optimal input signaling for all channel sizes. The proposed algorithm allows for straightforward implementation in practical systems in real time. Simulation results show that with equal constraint per antenna, capacity with per-antenna power can be close to capacity with sum power, but as the constraint becomes more skew, the two capacities diverge. Forcing input eigenbeams to match the channel right singular vectors achieves no improvement over independent signaling and can even be detrimental to capacity.
[ { "version": "v1", "created": "Fri, 24 Jun 2011 19:14:33 GMT" } ]
2015-03-19T00:00:00
[ [ "Vu", "Mai", "" ] ]
new_dataset
0.996199
1107.0390
Ishay Haviv
Ishay Haviv and Michael Langberg
On Linear Index Coding for Random Graphs
16 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A sender wishes to broadcast an n character word x in F^n (for a field F) to n receivers R_1,...,R_n. Every receiver has some side information on x consisting of a subset of the characters of x. The side information of the receivers is represented by a graph G on n vertices in which {i,j} is an edge if R_i knows x_j. In the index coding problem the goal is to encode x using a minimum number of characters in F in a way that enables every R_i to retrieve the ith character x_i using the encoded message and the side information. An index code is linear if the encoding is linear, and in this case the minimum possible length is known to be equal to a graph parameter called minrank (Bar-Yossef et al., FOCS'06). Several bounds on the minimum length of an index code for side information graphs G were shown in the study of index coding. However, the minimum length of an index code for the random graph G(n,p) is far from being understood. In this paper we initiate the study of the typical minimum length of a linear index code for G(n,p) over a field F. First, we prove that for every constant size field F and a constant p, the minimum length of a linear index code for G(n,p) over F is almost surely Omega(\sqrt{n}). Second, we introduce and study the following two restricted models of index coding: 1. A locally decodable index code is an index code in which the receivers are allowed to query at most q characters from the encoded message. 2. A low density index code is a linear index code in which every character of the word x affects at most q characters in the encoded message. Equivalently, it is a linear code whose generator matrix has at most q nonzero entries in each row.
[ { "version": "v1", "created": "Sat, 2 Jul 2011 15:55:19 GMT" } ]
2015-03-19T00:00:00
[ [ "Haviv", "Ishay", "" ], [ "Langberg", "Michael", "" ] ]
new_dataset
0.963547
1107.1535
Aria Ghasemian Sahebi
Aria G. Sahebi and S. Sandeep Pradhan
Multilevel Polarization of Polar Codes Over Arbitrary Discrete Memoryless Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown that polar codes achieve the symmetric capacity of discrete memoryless channels with arbitrary input alphabet sizes. It is shown that in general, channel polarization happens in several, rather than only two levels so that the synthesized channels are either useless, perfect or "partially perfect". Any subset of the channel input alphabet which is closed under addition, induces a coset partition of the alphabet through its shifts. For any such partition of the input alphabet, there exists a corresponding partially perfect channel whose outputs uniquely determine the coset to which the channel input belongs. By a slight modification of the encoding and decoding rules, it is shown that perfect transmission of certain information symbols over partially perfect channels is possible. Our result is general regarding both the cardinality and the algebraic structure of the channel input alphabet; i.e we show that for any channel input alphabet size and any Abelian group structure on the alphabet, polar codes are optimal. It is also shown through an example that polar codes when considered as group/coset codes, do not achieve the capacity achievable using coset codes over arbitrary channels.
[ { "version": "v1", "created": "Thu, 7 Jul 2011 23:41:33 GMT" }, { "version": "v2", "created": "Mon, 25 Jul 2011 00:17:28 GMT" }, { "version": "v3", "created": "Fri, 1 Jun 2012 23:00:08 GMT" } ]
2015-03-19T00:00:00
[ [ "Sahebi", "Aria G.", "" ], [ "Pradhan", "S. Sandeep", "" ] ]
new_dataset
0.999324
1107.1829
Ka Hung Hui
Ka Hung Hui, Dongning Guo and Randall A. Berry
Medium Access Control for Wireless Networks with Peer-to-Peer State Exchange
12 pages, 17 figures, submitted to IEEE Transactions on Networking
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed medium access control (MAC) protocols are proposed for wireless networks assuming that one-hop peers can periodically exchange a small amount of state information. Each station maintains a state and makes state transitions and transmission decisions based on its state and recent state information collected from its one-hop peers. A station can adapt its packet length and the size of its state space to the amount of traffic in its neighborhood. It is shown that these protocols converge to a steady state, where stations take turns to transmit in each neighborhood without collision. In other words, an efficient time-division multiple access (TDMA) like schedule is formed in a distributed manner, as long as the topology of the network remains static or changes slowly with respect to the execution of the protocol.
[ { "version": "v1", "created": "Sun, 10 Jul 2011 03:47:17 GMT" } ]
2015-03-19T00:00:00
[ [ "Hui", "Ka Hung", "" ], [ "Guo", "Dongning", "" ], [ "Berry", "Randall A.", "" ] ]
new_dataset
0.99965
1108.1522
Fanggang Wang
Fanggang Wang, Soung Chang Liew, Dongning Guo
Wireless MIMO Switching with Zero-forcing Relaying and Network-coded Relaying
This version is to appear in IEEE Journal on Selected Areas in Communications later in 2012
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A wireless relay with multiple antennas is called a multiple-input-multiple-output (MIMO) switch if it maps its input links to its output links using "precode-and-forward." Namely, the MIMO switch precodes the received signal vector in the uplink using some matrix for transmission in the downlink. This paper studies the scenario of $K$ stations and a MIMO switch, which has full channel state information. The precoder at the MIMO switch is either a zero-forcing matrix or a network-coded matrix. With the zero-forcing precoder, each destination station receives only its desired signal with enhanced noise but no interference. With the network-coded precoder, each station receives not only its desired signal and noise, but possibly also self-interference, which can be perfectly canceled. Precoder design for optimizing the received signal-to-noise ratios at the destinations is investigated. For zero-forcing relaying, the problem is solved in closed form in the two-user case, whereas in the case of more users, efficient algorithms are proposed and shown to be close to what can be achieved by extensive random search. For network-coded relaying, we present efficient iterative algorithms that can boost the throughput further.
[ { "version": "v1", "created": "Sun, 7 Aug 2011 02:42:26 GMT" }, { "version": "v2", "created": "Sat, 13 Aug 2011 14:46:51 GMT" }, { "version": "v3", "created": "Sun, 17 Jun 2012 16:05:04 GMT" } ]
2015-03-19T00:00:00
[ [ "Wang", "Fanggang", "" ], [ "Liew", "Soung Chang", "" ], [ "Guo", "Dongning", "" ] ]
new_dataset
0.993947
1108.5586
Petra Hofstedt
Denny Schneeweiss and Petra Hofstedt
FdConfig: A Constraint-Based Interactive Product Configurator
19th International Conference on Applications of Declarative Programming and Knowledge Management (INAP 2011)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a constraint-based approach to interactive product configuration. Our configurator tool FdConfig is based on feature models for the representation of the product domain. Such models can be directly mapped into constraint satisfaction problems and dealt with by appropriate constraint solvers. During the interactive configuration process the user generates new constraints as a result of his configuration decisions and even may retract constraints posted earlier. We discuss the configuration process, explain the underlying techniques and show optimizations.
[ { "version": "v1", "created": "Mon, 29 Aug 2011 14:55:47 GMT" } ]
2015-03-19T00:00:00
[ [ "Schneeweiss", "Denny", "" ], [ "Hofstedt", "Petra", "" ] ]
new_dataset
0.986843
1109.0628
Chunming Tang
Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu
The Weight Distributions of Cyclic Codes and Elliptic Curves
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyclic codes with two zeros and their dual codes as a practically and theoretically interesting class of linear codes, have been studied for many years. However, the weight distributions of cyclic codes are difficult to determine. From elliptic curves, this paper determines the weight distributions of dual codes of cyclic codes with two zeros for a few more cases.
[ { "version": "v1", "created": "Sat, 3 Sep 2011 15:30:25 GMT" } ]
2015-03-19T00:00:00
[ [ "Wang", "Baocheng", "" ], [ "Tang", "Chunming", "" ], [ "Qi", "Yanfeng", "" ], [ "Yang", "Yixian", "" ], [ "Xu", "Maozhi", "" ] ]
new_dataset
0.999592
1109.3687
Josef Urban
Jesse Alama, Lionel Mamane, Josef Urban
Dependencies in Formal Mathematics: Applications and Extraction for Coq and Mizar
null
null
null
null
cs.DL cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two methods for extracting detailed formal dependencies from the Coq and Mizar system are presented and compared. The methods are used for dependency extraction from two large mathematical repositories: the Coq Repository at Nijmegen and the Mizar Mathematical Library. Several applications of the detailed dependency analysis are described and proposed. Motivated by the different applications, we discuss the various kinds of dependencies that we are interested in,and the suitability of various dependency extraction methods.
[ { "version": "v1", "created": "Fri, 16 Sep 2011 18:25:18 GMT" }, { "version": "v2", "created": "Fri, 16 Mar 2012 19:20:02 GMT" } ]
2015-03-19T00:00:00
[ [ "Alama", "Jesse", "" ], [ "Mamane", "Lionel", "" ], [ "Urban", "Josef", "" ] ]
new_dataset
0.981155
1109.3791
Fangfei Zhou
Fangfei Zhou, Liang Zhang, Eric Franco, Richard Revis, Alan Mislove, Ravi Sundaram
WebCloud: Recruiting web browsers for content distribution
This paper is withdraw by the author because we don't want to make it publicly available for now
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are at the beginning of a shift in how content is created and exchanged over the web. While content was previously created primarily by a small set of entities, today, individual users -- empowered by devices like digital cameras and services like online social networks -- are creating content that represents a significant fraction of Internet traffic. As a result, content today is increasingly generated and exchanged at the edge of the network. Unfortunately, the existing techniques and infrastructure that are still used to serve this content, such as centralized content distribution networks, are ill-suited for these new patterns of content exchange. In this paper, we take a first step towards addressing this situation by introducing WebCloud, a content distribution system for online social networking sites that works by re- purposing web browsers to help serve content. In other words, when a user browses content, WebCloud tries to fetch it from one of that user's friend's browsers, instead of from the social networking site. The result is a more direct exchange of content ; essentially, WebCloud leverages the spatial and temporal locality of interest between social network users. Because WebCloud is built using techniques already present in many web browsers, it can be applied today to many social networking sites. We demonstrate the practicality of WebCloud with microbenchmarks, simulations, and a prototype deployment.
[ { "version": "v1", "created": "Sat, 17 Sep 2011 15:28:07 GMT" }, { "version": "v2", "created": "Wed, 21 Sep 2011 21:12:24 GMT" } ]
2015-03-19T00:00:00
[ [ "Zhou", "Fangfei", "" ], [ "Zhang", "Liang", "" ], [ "Franco", "Eric", "" ], [ "Revis", "Richard", "" ], [ "Mislove", "Alan", "" ], [ "Sundaram", "Ravi", "" ] ]
new_dataset
0.999581
1109.4179
Negin Golrezaei
Karthikeyan Shanmugam, Negin Golrezaei, Alexandros G. Dimakis, Andreas F. Molisch, and Giuseppe Caire
FemtoCaching: Wireless Video Content Delivery through Distributed Caching Helpers
15 pages, 6 figures
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Video on-demand streaming from Internet-based servers is becoming one of the most important services offered by wireless networks today. In order to improve the area spectral efficiency of video transmission in cellular systems, small cells heterogeneous architectures (e.g., femtocells, WiFi off-loading) are being proposed, such that video traffic to nomadic users can be handled by short-range links to the nearest small cell access points (referred to as "helpers"). As the helper deployment density increases, the backhaul capacity becomes the system bottleneck. In order to alleviate such bottleneck we propose a system where helpers with low-rate backhaul but high storage capacity cache popular video files. Files not available from helpers are transmitted by the cellular base station. We analyze the optimum way of assigning files to the helpers, in order to minimize the expected downloading time for files. We distinguish between the uncoded case (where only complete files are stored) and the coded case, where segments of Fountain-encoded versions of the video files are stored at helpers. We show that the uncoded optimum file assignment is NP-hard, and develop a greedy strategy that is provably within a factor 2 of the optimum. Further, for a special case we provide an efficient algorithm achieving a provably better approximation ratio of $1-(1-1/d)^d$, where $d$ is the maximum number of helpers a user can be connected to. We also show that the coded optimum cache assignment problem is convex that can be further reduced to a linear program. We present numerical results comparing the proposed schemes.
[ { "version": "v1", "created": "Mon, 19 Sep 2011 22:01:40 GMT" }, { "version": "v2", "created": "Sat, 7 Apr 2012 01:20:40 GMT" }, { "version": "v3", "created": "Sun, 2 Jun 2013 01:18:59 GMT" }, { "version": "v4", "created": "Mon, 16 Sep 2013 05:00:04 GMT" } ]
2015-03-19T00:00:00
[ [ "Shanmugam", "Karthikeyan", "" ], [ "Golrezaei", "Negin", "" ], [ "Dimakis", "Alexandros G.", "" ], [ "Molisch", "Andreas F.", "" ], [ "Caire", "Giuseppe", "" ] ]
new_dataset
0.997354
1110.1221
Ahmet Kara
Ahmet Kara, Thomas Schwentick, Tony Tan
Feasible Automata for Two-Variable Logic with Successor on Data Words
21 pages
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce an automata model for data words, that is words that carry at each position a symbol from a finite alphabet and a value from an unbounded data domain. The model is (semantically) a restriction of data automata, introduced by Bojanczyk, et. al. in 2006, therefore it is called weak data automata. It is strictly less expressive than data automata and the expressive power is incomparable with register automata. The expressive power of weak data automata corresponds exactly to existential monadic second order logic with successor +1 and data value equality \sim, EMSO2(+1,\sim). It follows from previous work, David, et. al. in 2010, that the nonemptiness problem for weak data automata can be decided in 2-NEXPTIME. Furthermore, we study weak B\"uchi automata on data omega-strings. They can be characterized by the extension of EMSO2(+1,\sim) with existential quantifiers for infinite sets. Finally, the same complexity bound for its nonemptiness problem is established by a nondeterministic polynomial time reduction to the nonemptiness problem of weak data automata.
[ { "version": "v1", "created": "Thu, 6 Oct 2011 10:54:25 GMT" } ]
2015-03-19T00:00:00
[ [ "Kara", "Ahmet", "" ], [ "Schwentick", "Thomas", "" ], [ "Tan", "Tony", "" ] ]
new_dataset
0.999448
1110.2480
Mary Schurgot
Mary R. Schurgot, Cristina Comaniciu, Katia Jaffr\`es-Runser
Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication
8 pages, 4 figures, 1 table
Schurgot, M.R.; Comaniciu, C.; Jaffres-Runser, K.; , "Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication," IEEE Communications Magazine, vol.50, no.7, pp.155-162, July 2012
10.1109/MCOM.2012.6231292
null
cs.NI cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article examines the evolution of routing protocols for intermittently connected ad hoc networks and discusses the trend toward social-based routing protocols. A survey of current routing solutions is presented, where routing protocols for opportunistic networks are classified based on the network graph employed. The need to capture performance tradeoffs from a multi-objective perspective is highlighted.
[ { "version": "v1", "created": "Tue, 11 Oct 2011 19:56:20 GMT" }, { "version": "v2", "created": "Mon, 3 Sep 2012 21:19:55 GMT" } ]
2015-03-19T00:00:00
[ [ "Schurgot", "Mary R.", "" ], [ "Comaniciu", "Cristina", "" ], [ "Jaffrès-Runser", "Katia", "" ] ]
new_dataset
0.950889
1111.3439
Zoltan Esik
Zoltan Esik, Satoshi Okawa
On context-free languages of scattered words
null
null
null
null
cs.FL cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is known that if a B\"uchi context-free language (BCFL) consists of scattered words, then there is an integer $n$, depending only on the language, such that the Hausdorff rank of each word in the language is bounded by $n$. Every BCFL is a M\"uller context-free language (MCFL). In the first part of the paper, we prove that an MCFL of scattered words is a BCFL iff the rank of every word in the language is bounded by an integer depending only on the language. Then we establish operational characterizations of the BCFLs of well-ordered and scattered words. We prove that a language is a BCFL consisting of well-ordered words iff it can be generated from the singleton languages containing the letters of the alphabet by substitution into ordinary context-free languages and the $\omega$-power operation. We also establish a corresponding result for BCFLs of scattered words and define expressions denoting BCFLs of well-ordered and scattered words. In the final part of the paper we give some applications.
[ { "version": "v1", "created": "Tue, 15 Nov 2011 07:02:14 GMT" } ]
2015-03-19T00:00:00
[ [ "Esik", "Zoltan", "" ], [ "Okawa", "Satoshi", "" ] ]
new_dataset
0.999032
1111.3606
Hamid A. Toussi
Hamid A. Toussi
tym: Typed Matlab
Presented at University of Sistan and Baluchestan, 2011
null
null
null
cs.PL cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although, many scientists and engineers use Octave or MATLAB as their preferred programming language, dynamic nature of these languages can lead to slower running-time of programs written in these languages compared to programs written in languages which are not as dynamic, like C, C++ and Fortran. In this work we developed a translator for a new programming language (tym) which tries to address performance issues, common in scientific programs, by adding new constructs to a subset of Octave/MATLAB language. Our translator compiles programs written in tym, to efficient C++ code.
[ { "version": "v1", "created": "Tue, 15 Nov 2011 18:32:29 GMT" }, { "version": "v2", "created": "Thu, 10 Jan 2013 19:28:21 GMT" }, { "version": "v3", "created": "Thu, 12 Feb 2015 13:12:12 GMT" } ]
2015-03-19T00:00:00
[ [ "Toussi", "Hamid A.", "" ] ]
new_dataset
0.99976
1112.0564
Ayan Chaudhury
Amlan Chakrabarti, Susmita Sur-Kolay, Ayan Chaudhury
Linear Nearest Neighbor Synthesis of Reversible Circuits by Graph Partitioning
null
null
null
null
cs.ET quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear Nearest Neighbor (LNN) synthesis in reversible circuits has emerged as an important issue in terms of technological implementation for quantum computation. The objective is to obtain a LNN architecture with minimum gate cost. As achieving optimal synthesis is a hard problem, heuristic methods have been proposed in recent literature. In this work we present a graph partitioning based approach for LNN synthesis with reduction in circuit cost. In particular, the number of SWAP gates required to convert a given gate-level quantum circuit to its equivalent LNN configuration is minimized. Our algorithm determines the reordering of indices of the qubit line(s) for both single control and multiple controlled gates. Experimental results for placing the target qubits of Multiple Controlled Toffoli (MCT) library of benchmark circuits show a significant reduction in gate count and quantum gate cost compared to those of related research works.
[ { "version": "v1", "created": "Fri, 2 Dec 2011 16:30:08 GMT" }, { "version": "v2", "created": "Thu, 27 Dec 2012 03:02:39 GMT" } ]
2015-03-19T00:00:00
[ [ "Chakrabarti", "Amlan", "" ], [ "Sur-Kolay", "Susmita", "" ], [ "Chaudhury", "Ayan", "" ] ]
new_dataset
0.981376
1112.1158
Xi Fang
Xi Fang and Dejun Yang and Guoliang Xue
Wireless Communications and Networking Technologies for Smart Grid: Paradigms and Challenges
7 pages, 6 figures, keywords: Smart grid, wireless communications, wireless networking, smart home, microgrid, vehicle-to-grid, paradigm, challenge, vision
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Smart grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. In this work we present our vision on smart grid from the perspective of wireless communications and networking technologies. We present wireless communication and networking paradigms for four typical scenarios in the future smart grid and also point out the research challenges of the wireless communication and networking technologies used in smart grid
[ { "version": "v1", "created": "Tue, 6 Dec 2011 04:55:32 GMT" } ]
2015-03-19T00:00:00
[ [ "Fang", "Xi", "" ], [ "Yang", "Dejun", "" ], [ "Xue", "Guoliang", "" ] ]
new_dataset
0.964456
1112.1181
Hassan Halabian
Hassan Halabian, Ioannis Lambadaris, Chung-Horng Lung
On the Stability Region of Multi-Queue Multi-Server Queueing Systems with Stationary Channel Distribution
5 pages, 2 figures, Proc. ISIT 2011
null
null
null
cs.IT cs.SY math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we characterize the stability region of multi-queue multi-server (MQMS) queueing systems with stationary channel and packet arrival processes. Toward this, the necessary and sufficient conditions for the stability of the system are derived under general arrival processes with finite first and second moments. We show that when the arrival processes are stationary, the stability region form is a polytope for which we explicitly find the coefficients of the linear inequalities which characterize the stability region polytope.
[ { "version": "v1", "created": "Tue, 6 Dec 2011 07:47:01 GMT" } ]
2015-03-19T00:00:00
[ [ "Halabian", "Hassan", "" ], [ "Lambadaris", "Ioannis", "" ], [ "Lung", "Chung-Horng", "" ] ]
new_dataset
0.968222
1112.1554
Tristan Crolard
Tristan Crolard and Emmanuel Polonowski
A program logic for higher-order procedural variables and non-local jumps
null
null
null
TR-LACL-2011-4
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Relying on the formulae-as-types paradigm for classical logic, we define a program logic for an imperative language with higher-order procedural variables and non-local jumps. Then, we show how to derive a sound program logic for this programming language. As a by-product, we obtain a non-dependent type system which is more permissive than what is usually found in statically typed imperative languages. As a generic example, we encode imperative versions of delimited continuations operators shift and reset.
[ { "version": "v1", "created": "Wed, 7 Dec 2011 13:23:37 GMT" } ]
2015-03-19T00:00:00
[ [ "Crolard", "Tristan", "" ], [ "Polonowski", "Emmanuel", "" ] ]
new_dataset
0.990019
1201.0946
Athanasios Kehagias
Athanasios Kehagias and Dieter Mitsche and Pawel Pralat
Cops and Invisible Robbers: the Cost of Drunkenness
null
null
null
null
cs.DM cs.GT cs.RO math.CO math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We examine a version of the Cops and Robber (CR) game in which the robber is invisible, i.e., the cops do not know his location until they capture him. Apparently this game (CiR) has received little attention in the CR literature. We examine two variants: in the first the robber is adversarial (he actively tries to avoid capture); in the second he is drunk (he performs a random walk). Our goal in this paper is to study the invisible Cost of Drunkenness (iCOD), which is defined as the ratio ct_i(G)/dct_i(G), with ct_i(G) and dct_i(G) being the expected capture times in the adversarial and drunk CiR variants, respectively. We show that these capture times are well defined, using game theory for the adversarial case and partially observable Markov decision processes (POMDP) for the drunk case. We give exact asymptotic values of iCOD for several special graph families such as $d$-regular trees, give some bounds for grids, and provide general upper and lower bounds for general classes of graphs. We also give an infinite family of graphs showing that iCOD can be arbitrarily close to any value in [2,infinty). Finally, we briefly examine one more CiR variant, in which the robber is invisible and "infinitely fast"; we argue that this variant is significantly different from the Graph Search game, despite several similarities between the two games.
[ { "version": "v1", "created": "Wed, 4 Jan 2012 17:50:01 GMT" } ]
2015-03-19T00:00:00
[ [ "Kehagias", "Athanasios", "" ], [ "Mitsche", "Dieter", "" ], [ "Pralat", "Pawel", "" ] ]
new_dataset
0.971725
1503.02675
Clemens Arth
Clemens Arth, Christian Pirchheim, Jonathan Ventura, Vincent Lepetit
Global 6DOF Pose Estimation from Untextured 2D City Models
9 pages excluding supplementary material
null
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
We propose a method for estimating the 3D pose for the camera of a mobile device in outdoor conditions, using only an untextured 2D model. Previous methods compute only a relative pose using a SLAM algorithm, or require many registered images, which are cumbersome to acquire. By contrast, our method returns an accurate, absolute camera pose in an absolute referential using simple 2D+height maps, which are broadly available, to refine a first estimate of the pose provided by the device's sensors. We show how to first estimate the camera absolute orientation from straight line segments, and then how to estimate the translation by aligning the 2D map with a semantic segmentation of the input image. We demonstrate the robustness and accuracy of our approach on a challenging dataset.
[ { "version": "v1", "created": "Mon, 9 Mar 2015 20:18:19 GMT" }, { "version": "v2", "created": "Wed, 18 Mar 2015 12:11:35 GMT" } ]
2015-03-19T00:00:00
[ [ "Arth", "Clemens", "" ], [ "Pirchheim", "Christian", "" ], [ "Ventura", "Jonathan", "" ], [ "Lepetit", "Vincent", "" ] ]
new_dataset
0.999296
1503.05269
Diana Maamari Diana Maamari
Diana Maamari, Natasha Devroye, Daniela Tuninetti
Coverage in mmWave Cellular Networks with Base station Cooperation
30 pages, 8 figures
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The presence of signal outage, due to shadowing and blockage, is expected to be the main bottleneck in millimeter wave (mmWave) networks. Moreover, with the anticipated vision that mmWave networks would have a dense deployment of base stations, interference from strong line-of-sight base stations increases too, thus further increasing the probability of outage. To address the issue of reducing outage, this paper explores the possibility of base station cooperation in the downlink of a mmWave heterogenous network. The main focus of this work is showing that, in a stochastic geometry framework, cooperation from randomly located base stations decreases outage probability. With the presumed vision that less severe fading will be experienced due to highly directional transmissions, one might expect that cooperation would increase the coverage probability; our numerical examples suggest that is in fact the case. Coverage probabilities are derived accounting for: different fading distributions, antenna directionality and blockage. Numerical results suggest that coverage with base station cooperation in dense mmWave systems and with no small scale fading considerably exceeds coverage with no cooperation. In contrast, an insignificant increase is reported when mmWave networks are less dense with a high probability of signal blockage and with Rayleigh fading.
[ { "version": "v1", "created": "Wed, 18 Mar 2015 02:36:11 GMT" } ]
2015-03-19T00:00:00
[ [ "Maamari", "Diana", "" ], [ "Devroye", "Natasha", "" ], [ "Tuninetti", "Daniela", "" ] ]
new_dataset
0.960705
1503.05271
Qinqin Chen
Jiadi Chen, Hang Long, Qiang Zheng, Minyao Xing, Wenbo Wang
An SMDP-based Resource Management Scheme for Distributed Cloud Systems
5 pages, 5 figures, conference
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the resource management problem in geographically distributed cloud systems is considered. The Follow Me Cloud concept which enables service migration across federated data centers (DCs) is adopted. Therefore, there are two types of service requests to the DC, i.e., new requests (NRs) initiated in the local service area and migration requests (MRs) generated when mobile users move across service areas. A novel resource management scheme is proposed to help the resource manager decide whether to accept the service requests (NRs or MRs) or not and determine how much resources should be allocated to each service (if accepted). The optimization objective is to maximize the average system reward and keep the rejection probability of service requests under a certain threshold. Numerical results indicate that the proposed scheme can significantly improve the overall system utility as well as the user experience compared with other resource management schemes.
[ { "version": "v1", "created": "Wed, 18 Mar 2015 02:47:58 GMT" } ]
2015-03-19T00:00:00
[ [ "Chen", "Jiadi", "" ], [ "Long", "Hang", "" ], [ "Zheng", "Qiang", "" ], [ "Xing", "Minyao", "" ], [ "Wang", "Wenbo", "" ] ]
new_dataset
0.997942
1101.4667
Adrian Dumitrescu
Adrian Dumitrescu and Minghui Jiang
Sweeping an oval to a vanishing point
9 pages, 4 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a convex region in the plane, and a sweep-line as a tool, what is best way to reduce the region to a single point by a sequence of sweeps? The problem of sweeping points by orthogonal sweeps was first studied in [2]. Here we consider the following \emph{slanted} variant of sweeping recently introduced in [1]: In a single sweep, the sweep-line is placed at a start position somewhere in the plane, then moved continuously according to a sweep vector $\vec v$ (not necessarily orthogonal to the sweep-line) to another parallel end position, and then lifted from the plane. The cost of a sequence of sweeps is the sum of the lengths of the sweep vectors. The (optimal) sweeping cost of a region is the infimum of the costs over all finite sweeping sequences for that region. An optimal sweeping sequence for a region is one with a minimum total cost, if it exists. Another parameter of interest is the number of sweeps. We show that there exist convex regions for which the optimal sweeping cost cannot be attained by two sweeps. This disproves a conjecture of Bousany, Karker, O'Rourke, and Sparaco stating that two sweeps (with vectors along the two adjacent sides of a minimum-perimeter enclosing parallelogram) always suffice [1]. Moreover, we conjecture that for some convex regions, no finite sweeping sequence is optimal. On the other hand, we show that both the 2-sweep algorithm based on minimum-perimeter enclosing rectangle and the 2-sweep algorithm based on minimum-perimeter enclosing parallelogram achieve a $4/\pi \approx 1.27$ approximation in this sweeping model.
[ { "version": "v1", "created": "Mon, 24 Jan 2011 21:33:39 GMT" } ]
2015-03-18T00:00:00
[ [ "Dumitrescu", "Adrian", "" ], [ "Jiang", "Minghui", "" ] ]
new_dataset
0.97199
1101.5569
Piotr Jacek Puczynski
Piotr J. Puczynski
T2Script Programming Language
27 pages, 9 figures
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Event-driven programming is used in many fields of modern Computer Science. In event-driven programming languages user interacts with a program by triggering the events. We propose a new approach that we denote command-event driven programming in which the user interacts with a program by means of events and commands. We describe a new programming language, T2Script, which is based on command-event driven paradigm. T2Script has been already implemented and used in one of industrial products. We describe the rationale, basic concepts and advanced programming techniques of new T2Script language. We evaluate the new language and show what advantages and limitations it has.
[ { "version": "v1", "created": "Fri, 28 Jan 2011 16:42:00 GMT" } ]
2015-03-18T00:00:00
[ [ "Puczynski", "Piotr J.", "" ] ]
new_dataset
0.999288
1101.5830
Imdadullah Khan
Imdadullah Khan
Perfect matching in 3-uniform hypergraphs with large vertex degree
arXiv admin note: text overlap with arXiv:1101.5675
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A perfect matching in a 3-uniform hypergraph on $n=3k$ vertices is a subset of $\frac{n}{3}$ disjoint edges. We prove that if $H$ is a 3-uniform hypergraph on $n=3k$ vertices such that every vertex belongs to at least ${n-1\choose 2} - {2n/3\choose 2}+1$ edges then $H$ contains a perfect matching. We give a construction to show that this result is best possible.
[ { "version": "v1", "created": "Sun, 30 Jan 2011 23:05:17 GMT" }, { "version": "v2", "created": "Tue, 1 Feb 2011 10:36:41 GMT" }, { "version": "v3", "created": "Sat, 7 Jul 2012 16:04:16 GMT" } ]
2015-03-18T00:00:00
[ [ "Khan", "Imdadullah", "" ] ]
new_dataset
0.992154
1102.0755
Min Li
Min Li, Osvaldo Simeone, Aylin Yener
Message and State Cooperation in a Relay Channel When the Relay Has Strictly Causal State Information
6 pages, 3 figures, to appear in Information Theory and Applications Workshop, February 2011
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A state-dependent relay channel is studied in which strictly causal channel state information is available at the relay and no state information is available at the source and destination. Source and relay are connected via two unidirectional out-of-band orthogonal links of finite capacity, and a state-dependent memoryless channel connects source and relay, on one side, and the destination, on the other. Via the orthogonal links, the source can convey information about the message to be delivered to the destination to the relay while the relay can forward state information to the source. This exchange enables cooperation between source and relay on both transmission of message and state information to the destination. First, an achievable scheme, inspired by noisy network coding, is proposed that exploits both message and state cooperation. Next, based on the given achievable rate and appropriate upper bounds, capacity results are identified for some special cases. Finally, a Gaussian model is studied, along with corresponding numerical results that illuminate the relative merits of state and message cooperation.
[ { "version": "v1", "created": "Thu, 3 Feb 2011 19:41:59 GMT" } ]
2015-03-18T00:00:00
[ [ "Li", "Min", "" ], [ "Simeone", "Osvaldo", "" ], [ "Yener", "Aylin", "" ] ]
new_dataset
0.999831
1102.0768
Min Li
Min Li, Osvaldo Simeone, Aylin Yener
Message and State Cooperation in a Relay Channel When Only the Relay Knows the State
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A state-dependent relay channel is studied in which strictly causal channel state information is available at the relay and no state information is available at the source and destination. The source and the relay are connected via two unidirectional out-of-band orthogonal links of finite capacity, and a state-dependent memoryless channel connects the source and the relay, on one side, and the destination, on the other. Via the orthogonal links, the source can convey information about the message to be delivered to the destination to the relay while the relay can forward state information to the source. This exchange enables cooperation between the source and the relay on transmission of message and state information to the destination. First, two achievable schemes are proposed that exploit both message and state cooperation. It is shown that a transmission scheme inspired by noisy network coding performs better than a strategy based on block Markov coding and backward decoding. Next, based on the given achievable schemes and appropriate upper bounds, capacity results are identified for some special cases. Finally, a Gaussian model is studied, along with corresponding numerical results that illuminate the relative merits of state and message cooperation.
[ { "version": "v1", "created": "Thu, 3 Feb 2011 20:21:45 GMT" }, { "version": "v2", "created": "Sun, 13 Jul 2014 23:45:44 GMT" } ]
2015-03-18T00:00:00
[ [ "Li", "Min", "" ], [ "Simeone", "Osvaldo", "" ], [ "Yener", "Aylin", "" ] ]
new_dataset
0.99986
1102.1064
Sherif Sakr
Sherif Sakr and Mohammad Alomari
A Decade of Database Research Publications
null
null
null
null
cs.DL cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze the database research publications of four major core database technology conferences (SIGMOD, VLDB, ICDE, EDBT), two main theoretical database conferences (PODS, ICDT) and three database journals (TODS, VLDB Journal, TKDE) over a period of 10 years (2001 - 2010). Our analysis considers only regular papers as we do not include short papers, demo papers, posters, tutorials or panels into our statistics. We rank the research scholars according to their number of publication in each conference/journal separately and in combined. We also report about the growth in the number of research publications and the size of the research community in the last decade.
[ { "version": "v1", "created": "Sat, 5 Feb 2011 11:52:53 GMT" } ]
2015-03-18T00:00:00
[ [ "Sakr", "Sherif", "" ], [ "Alomari", "Mohammad", "" ] ]
new_dataset
0.959447
1102.1408
Zhenghao Zhang
Zhenghao Zhang, Shuping Gong, Husheng Li, Changxing Pei
Time Stamp Attack on Wide Area Monitoring System in Smart Grid
This paper has been withdrawn by the author due to a crucial sign error in derivation
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.
[ { "version": "v1", "created": "Mon, 7 Feb 2011 20:27:56 GMT" }, { "version": "v2", "created": "Wed, 7 Sep 2011 23:38:31 GMT" } ]
2015-03-18T00:00:00
[ [ "Zhang", "Zhenghao", "" ], [ "Gong", "Shuping", "" ], [ "Li", "Husheng", "" ], [ "Pei", "Changxing", "" ] ]
new_dataset
0.990977
1102.1609
Kenneth Shum
Kenneth W. Shum and Yuchong Hu
Exact Minimum-Repair-Bandwidth Cooperative Regenerating Codes for Distributed Storage Systems
5 pages, 4 figures, presented at IEEE ISIT 2011
null
null
null
cs.IT cs.DC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to provide high data reliability, distributed storage systems disperse data with redundancy to multiple storage nodes. Regenerating codes is a new class of erasure codes to introduce redundancy for the purpose of improving the data repair performance in distributed storage. Most of the studies on regenerating codes focus on the single-failure recovery, but it is not uncommon to see two or more node failures at the same time in large storage networks. To exploit the opportunity of repairing multiple failed nodes simultaneously, a cooperative repair mechanism, in the sense that the nodes to be repaired can exchange data among themselves, is investigated. A lower bound on the repair-bandwidth for cooperative repair is derived and a construction of a family of exact cooperative regenerating codes matching this lower bound is presented.
[ { "version": "v1", "created": "Tue, 8 Feb 2011 14:11:58 GMT" }, { "version": "v2", "created": "Wed, 11 May 2011 12:03:54 GMT" }, { "version": "v3", "created": "Wed, 1 Jun 2011 03:56:38 GMT" } ]
2015-03-18T00:00:00
[ [ "Shum", "Kenneth W.", "" ], [ "Hu", "Yuchong", "" ] ]
new_dataset
0.971591
1503.01180
Chenhao Tan
Chenhao Tan and Lillian Lee
All Who Wander: On the Prevalence and Characteristics of Multi-community Engagement
11 pages, data available at https://chenhaot.com/pages/multi-community.html, Proceedings of WWW 2015 (updated references)
null
10.1145/2736277.2741661
null
cs.SI cs.CL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although analyzing user behavior within individual communities is an active and rich research domain, people usually interact with multiple communities both on- and off-line. How do users act in such multi-community environments? Although there are a host of intriguing aspects to this question, it has received much less attention in the research community in comparison to the intra-community case. In this paper, we examine three aspects of multi-community engagement: the sequence of communities that users post to, the language that users employ in those communities, and the feedback that users receive, using longitudinal posting behavior on Reddit as our main data source, and DBLP for auxiliary experiments. We also demonstrate the effectiveness of features drawn from these aspects in predicting users' future level of activity. One might expect that a user's trajectory mimics the "settling-down" process in real life: an initial exploration of sub-communities before settling down into a few niches. However, we find that the users in our data continually post in new communities; moreover, as time goes on, they post increasingly evenly among a more diverse set of smaller communities. Interestingly, it seems that users that eventually leave the community are "destined" to do so from the very beginning, in the sense of showing significantly different "wandering" patterns very early on in their trajectories; this finding has potentially important design implications for community maintainers. Our multi-community perspective also allows us to investigate the "situation vs. personality" debate from language usage across different communities.
[ { "version": "v1", "created": "Wed, 4 Mar 2015 01:05:41 GMT" }, { "version": "v2", "created": "Mon, 16 Mar 2015 20:00:27 GMT" } ]
2015-03-18T00:00:00
[ [ "Tan", "Chenhao", "" ], [ "Lee", "Lillian", "" ] ]
new_dataset
0.974838
1503.05025
Mathieu Hoyrup
Mathieu Hoyrup
A Rice-like theorem for primitive recursive functions
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide an explicit characterization of the properties of primitive recursive functions that are decidable or semi-decidable, given a primitive recursive index for the function. The result is much more general as it applies to any c.e. class of total computable functions. This is an analog of Rice and Rice-Shapiro theorem, for restricted classes of total computable functions.
[ { "version": "v1", "created": "Tue, 17 Mar 2015 12:56:59 GMT" } ]
2015-03-18T00:00:00
[ [ "Hoyrup", "Mathieu", "" ] ]
new_dataset
0.991231
1001.4457
Nicolas Nisse
J\'er\'emie Chalopin, Victor Chepoi, Nicolas Nisse, Yann Vax\`es
Cop and robber games when the robber can hide and ride
null
SIAM J. Discrete Math. 25(2011) 333-359
null
INRIA-RR7178
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the classical cop and robber game, two players, the cop C and the robber R, move alternatively along edges of a finite graph G. The cop captures the robber if both players are on the same vertex at the same moment of time. A graph G is called cop win if the cop always captures the robber after a finite number of steps. Nowakowski, Winkler (1983) and Quilliot (1983) characterized the cop-win graphs as graphs admitting a dismantling scheme. In this paper, we characterize in a similar way the class CW(s,s') of cop-win graphs in the game in which the cop and the robber move at different speeds s' and s, s'<= s. We also establish some connections between cop-win graphs for this game with s'<s and Gromov's hyperbolicity. In the particular case s'=1 and s=2, we prove that the class of cop-win graphs is exactly the well-known class of dually chordal graphs. We show that all classes CW(s,1), s>=3, coincide and we provide a structural characterization of these graphs. We also investigate several dismantling schemes necessary or sufficient for the cop-win graphs in the game in which the robber is visible only every k moves for a fixed integer k>1. We characterize the graphs which are cop-win for any value of k. Finally, we consider the game where the cop wins if he is at distance at most 1 from the robber and we characterize via a specific dismantling scheme the bipartite graphs where a single cop wins in this game.
[ { "version": "v1", "created": "Mon, 25 Jan 2010 15:23:59 GMT" } ]
2015-03-17T00:00:00
[ [ "Chalopin", "Jérémie", "" ], [ "Chepoi", "Victor", "" ], [ "Nisse", "Nicolas", "" ], [ "Vaxès", "Yann", "" ] ]
new_dataset
0.999553
1004.4804
Vadim E. Levit
Vadim E. Levit and Eugen Mandrescu
When G^2 is a Konig-Egervary graph?
6 pages, 4 figures
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The square of a graph G is the graph G^2 with the same vertex set as in G, and an edge of G^2 is joining two distinct vertices, whenever the distance between them in G is at most 2. G is a square-stable graph if it enjoys the property alpha(G)=alpha(G^2), where alpha(G) is the size of a maximum stable set in G. In this paper we show that G^2 is a Konig-Egervary graph if and only if G is a square-stable Konig-Egervary graph.
[ { "version": "v1", "created": "Tue, 27 Apr 2010 13:44:55 GMT" } ]
2015-03-17T00:00:00
[ [ "Levit", "Vadim E.", "" ], [ "Mandrescu", "Eugen", "" ] ]
new_dataset
0.980806
1004.4944
Stefano Rini
Stefano Rini, Daniela Tuninetti, and Natasha Devroye
Outer Bounds for the Interference Channel with a Cognitive Relay
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we first present an outer bound for a general interference channel with a cognitive relay, i.e., a relay that has non-causal knowledge of both independent messages transmitted in the interference channel. This outer bound reduces to the capacity region of the deterministic broadcast channel and of the deterministic cognitive interference channel through nulling of certain channel inputs. It does not, however, reduce to that of certain deterministic interference channels for which capacity is known. As such, we subsequently tighten the bound for channels whose outputs satisfy an "invertibility" condition. This second outer bound now reduces to the capacity of this special class of deterministic interference channels. The second outer bound is further tightened for the high SNR deterministic approximation of the Gaussian interference channel with a cognitive relay by exploiting the special structure of the interference. We provide an example that suggests that this third bound is tight in at least some parameter regimes for the high SNR deterministic approximation of the Gaussian channel. Another example shows that the third bound is capacity in the special case where there are no direct links between the non-cognitive transmitters.
[ { "version": "v1", "created": "Wed, 28 Apr 2010 02:53:34 GMT" }, { "version": "v2", "created": "Tue, 18 May 2010 19:35:04 GMT" } ]
2015-03-17T00:00:00
[ [ "Rini", "Stefano", "" ], [ "Tuninetti", "Daniela", "" ], [ "Devroye", "Natasha", "" ] ]
new_dataset
0.99641
1004.5157
Pascal Vontobel
Ali E. Pusane, Roxana Smarandache, Pascal O. Vontobel, Daniel J. Costello Jr
Deriving Good LDPC Convolutional Codes from LDPC Block Codes
Submitted to IEEE Transactions on Information Theory, April 2010; revised August 2010, revised November 2010 (essentially final version). (Besides many small changes, the first and second revised versions contain corrected entries in Tables I and II.)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low-density parity-check (LDPC) convolutional codes are capable of achieving excellent performance with low encoding and decoding complexity. In this paper we discuss several graph-cover-based methods for deriving families of time-invariant and time-varying LDPC convolutional codes from LDPC block codes and show how earlier proposed LDPC convolutional code constructions can be presented within this framework. Some of the constructed convolutional codes significantly outperform the underlying LDPC block codes. We investigate some possible reasons for this "convolutional gain," and we also discuss the --- mostly moderate --- decoder cost increase that is incurred by going from LDPC block to LDPC convolutional codes.
[ { "version": "v1", "created": "Wed, 28 Apr 2010 22:19:52 GMT" }, { "version": "v2", "created": "Thu, 19 Aug 2010 02:16:06 GMT" }, { "version": "v3", "created": "Wed, 1 Dec 2010 00:10:06 GMT" } ]
2015-03-17T00:00:00
[ [ "Pusane", "Ali E.", "" ], [ "Smarandache", "Roxana", "" ], [ "Vontobel", "Pascal O.", "" ], [ "Costello", "Daniel J.", "Jr" ] ]
new_dataset
0.96229
1005.0072
Rania El-Badry
Rania El-Badry, Ahmed Sultan and Moustafa Youssef
HyberLoc: Providing Physical Layer Location Privacy in Hybrid Sensor Networks
7 pages, 4 figures, ICC'10
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In many hybrid wireless sensor networks' applications, sensor nodes are deployed in hostile environments where trusted and un-trusted nodes co-exist. In anchor-based hybrid networks, it becomes important to allow trusted nodes to gain full access to the location information transmitted in beacon frames while, at the same time, prevent un-trusted nodes from using this information. The main challenge is that un-trusted nodes can measure the physical signal transmitted from anchor nodes, even if these nodes encrypt their transmission. Using the measured signal strength, un-trusted nodes can still tri-laterate the location of anchor nodes. In this paper, we propose HyberLoc, an algorithm that provides anchor physical layer location privacy in anchor-based hybrid sensor networks. The idea is for anchor nodes to dynamically change their transmission power following a certain probability distribution, degrading the localization accuracy at un-trusted nodes while maintaining high localization accuracy at trusted nodes. Given an average power constraint, our analysis shows that the discretized exponential distribution is the distribution that maximizes location uncertainty at the untrusted nodes. Detailed evaluation through analysis, simulation, and implementation shows that HyberLoc gives trusted nodes up to 3.5 times better localization accuracy as compared to untrusted nodes.
[ { "version": "v1", "created": "Sat, 1 May 2010 13:43:03 GMT" } ]
2015-03-17T00:00:00
[ [ "El-Badry", "Rania", "" ], [ "Sultan", "Ahmed", "" ], [ "Youssef", "Moustafa", "" ] ]
new_dataset
0.999649
1005.1062
David G. M. Mitchell
Michael Lentmaier, David G. M. Mitchell, Gerhard P. Fettweis, and Daniel J. Costello, Jr.
Asymptotically Regular LDPC Codes with Linear Distance Growth and Thresholds Close to Capacity
Presented at the 2010 Information Theory and Applications Workshop, San Diego, CA.
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Families of "asymptotically regular" LDPC block code ensembles can be formed by terminating (J,K)-regular protograph-based LDPC convolutional codes. By varying the termination length, we obtain a large selection of LDPC block code ensembles with varying code rates and substantially better iterative decoding thresholds than those of (J,K)-regular LDPC block code ensembles, despite the fact that the terminated ensembles are almost regular. Also, by means of an asymptotic weight enumerator analysis, we show that minimum distance grows linearly with block length for all of the ensembles in these families, i.e., the ensembles are asymptotically good. We find that, as the termination length increases, families of "asymptotically regular" codes with capacity approaching iterative decoding thresholds and declining minimum distance growth rates are obtained, allowing a code designer to trade-off between distance growth rate and threshold. Further, we show that the thresholds and the distance growth rates can be improved by carefully choosing the component protographs used in the code construction.
[ { "version": "v1", "created": "Thu, 6 May 2010 19:44:26 GMT" } ]
2015-03-17T00:00:00
[ [ "Lentmaier", "Michael", "" ], [ "Mitchell", "David G. M.", "" ], [ "Fettweis", "Gerhard P.", "" ], [ "Costello,", "Daniel J.", "Jr." ] ]
new_dataset
0.996144
1005.1475
Luca Saiu
Jean-Vincent Loddo and Luca Saiu
How to correctly prune tropical trees
To appear in "Artificial Intelligence and Symbolic Computation, 2010".
null
null
null
cs.AI cs.DM cs.GT cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present tropical games, a generalization of combinatorial min-max games based on tropical algebras. Our model breaks the traditional symmetry of rational zero-sum games where players have exactly opposed goals (min vs. max), is more widely applicable than min-max and also supports a form of pruning, despite it being less effective than alpha-beta. Actually, min-max games may be seen as particular cases where both the game and its dual are tropical: when the dual of a tropical game is also tropical, the power of alpha-beta is completely recovered. We formally develop the model and prove that the tropical pruning strategy is correct, then conclude by showing how the problem of approximated parsing can be modeled as a tropical game, profiting from pruning.
[ { "version": "v1", "created": "Mon, 10 May 2010 09:06:26 GMT" }, { "version": "v2", "created": "Tue, 11 May 2010 06:35:47 GMT" } ]
2015-03-17T00:00:00
[ [ "Loddo", "Jean-Vincent", "" ], [ "Saiu", "Luca", "" ] ]
new_dataset
0.965624
1005.1716
Christian Drescher
Christian Drescher and Martin Gebser and Benjamin Kaufmann and Torsten Schaub
Heuristics in Conflict Resolution
null
Proceedings of the Twelfth International Workshop on Nonmonotonic Reasoning (2008) 141-149
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern solvers for Boolean Satisfiability (SAT) and Answer Set Programming (ASP) are based on sophisticated Boolean constraint solving techniques. In both areas, conflict-driven learning and related techniques constitute key features whose application is enabled by conflict analysis. Although various conflict analysis schemes have been proposed, implemented, and studied both theoretically and practically in the SAT area, the heuristic aspects involved in conflict analysis have not yet received much attention. Assuming a fixed conflict analysis scheme, we address the open question of how to identify "good'' reasons for conflicts, and we investigate several heuristics for conflict analysis in ASP solving. To our knowledge, a systematic study like ours has not yet been performed in the SAT area, thus, it might be beneficial for both the field of ASP as well as the one of SAT solving.
[ { "version": "v1", "created": "Tue, 11 May 2010 05:32:37 GMT" } ]
2015-03-17T00:00:00
[ [ "Drescher", "Christian", "" ], [ "Gebser", "Martin", "" ], [ "Kaufmann", "Benjamin", "" ], [ "Schaub", "Torsten", "" ] ]
new_dataset
0.966923
1005.2443
Ernest Kurniawan
E. Kurniawan, S. Sun, K. Yen, and K. F. E. Chong
Network Coded Transmission of Fountain Codes over Cooperative Relay Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a transmission strategy of fountain codes over cooperative relay networks is proposed. When more than one relay nodes are available, we apply network coding to fountain-coded packets. By doing this, partial information is made available to the destination node about the upcoming message block. It is therefore able to reduce the required number of transmissions over erasure channels, hence increasing the effective throughput. Its application to wireless channels with Rayleigh fading and AWGN noise is also analysed, whereby the role of analogue network coding and optimal weight selection is demonstrated.
[ { "version": "v1", "created": "Fri, 14 May 2010 01:29:33 GMT" } ]
2015-03-17T00:00:00
[ [ "Kurniawan", "E.", "" ], [ "Sun", "S.", "" ], [ "Yen", "K.", "" ], [ "Chong", "K. F. E.", "" ] ]
new_dataset
0.99819