id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1109.6052
|
V. R. Lesser
|
V. R. Lesser, R. Mailler
|
Asynchronous Partial Overlay: A New Algorithm for Solving Distributed
Constraint Satisfaction Problems
| null |
Journal Of Artificial Intelligence Research, Volume 25, pages
529-576, 2006
|
10.1613/jair.1786
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distributed Constraint Satisfaction (DCSP) has long been considered an
important problem in multi-agent systems research. This is because many
real-world problems can be represented as constraint satisfaction and these
problems often present themselves in a distributed form. In this article, we
present a new complete, distributed algorithm called Asynchronous Partial
Overlay (APO) for solving DCSPs that is based on a cooperative mediation
process. The primary ideas behind this algorithm are that agents, when acting
as a mediator, centralize small, relevant portions of the DCSP, that these
centralized subproblems overlap, and that agents increase the size of their
subproblems along critical paths within the DCSP as the problem solving
unfolds. We present empirical evidence that shows that APO outperforms other
known, complete DCSP techniques.
|
[
{
"version": "v1",
"created": "Tue, 27 Sep 2011 22:05:46 GMT"
}
] | 2011-09-29T00:00:00 |
[
[
"Lesser",
"V. R.",
""
],
[
"Mailler",
"R.",
""
]
] |
new_dataset
| 0.963744 |
1109.6270
|
Pabitra Pal Choudhury
|
Avishek Ghosh, Joydeep Banerjee, Sk. S. Hassan, P. Pal Choudhury
|
Fractal String Generation and Its Application in Music Composition
| null | null | null | null |
cs.SD cs.DM
|
http://creativecommons.org/licenses/by/3.0/
|
Music is a string of some of the notes out of 12 notes (Sa, Komal_re, Re,
Komal_ga, Ga, Ma, Kari_ma, Pa, Komal_dha, Dha, Komal_ni, Ni) and their
harmonics. Each note corresponds to a particular frequency. When such strings
are encoded to form discrete sequences, different frequencies present in the
music corresponds to different amplitude levels (value) of the discrete
sequence. Initially, a class of discrete sequences has been generated using
logistic map. All these discrete sequences have at most n-different amplitude
levels (value) (depending on the particular raga). Without loss of generality,
we have chosen two discrete sequences of two types of Indian raga viz. Bhairabi
and Bhupali having same number of amplitude levels to obtain/search close
relatives from the class. The relative / closeness can be assured through
correlation coefficient.The search is unbiased, random and non-adaptive. The
obtained string is that which maximally resembles the given two sequences. The
same can be thought of as a music composition of the given two strings. It is
to be noted that all these string are fractal string which can be persuaded by
fractal dimension.
|
[
{
"version": "v1",
"created": "Tue, 27 Sep 2011 10:04:45 GMT"
}
] | 2011-09-29T00:00:00 |
[
[
"Ghosh",
"Avishek",
""
],
[
"Banerjee",
"Joydeep",
""
],
[
"Hassan",
"Sk. S.",
""
],
[
"Choudhury",
"P. Pal",
""
]
] |
new_dataset
| 0.991496 |
1109.6279
|
Michael Sagraloff
|
Michael Sagraloff
|
When Newton meets Descartes: A Simple and Fast Algorithm to Isolate the
Real Roots of a Polynomial
| null | null | null | null |
cs.SC cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new algorithm denoted DSC2 to isolate the real roots of a
univariate square-free polynomial f with integer coefficients. The algorithm
iteratively subdivides an initial interval which is known to contain all real
roots of f. The main novelty of our approach is that we combine Descartes' Rule
of Signs and Newton iteration. More precisely, instead of using a fixed
subdivision strategy such as bisection in each iteration, a Newton step based
on the number of sign variations for an actual interval is considered, and,
only if the Newton step fails, we fall back to bisection. Following this
approach, our analysis shows that, for most iterations, we can achieve
quadratic convergence towards the real roots. In terms of complexity, our
method induces a recursion tree of almost optimal size O(nlog(n tau)), where n
denotes the degree of the polynomial and tau the bitsize of its coefficients.
The latter bound constitutes an improvement by a factor of tau upon all
existing subdivision methods for the task of isolating the real roots. In
addition, we provide a bit complexity analysis showing that DSC2 needs only
\tilde{O}(n^3tau) bit operations to isolate all real roots of f. This matches
the best bound known for this fundamental problem. However, in comparison to
the much more involved algorithms by Pan and Sch\"onhage (for the task of
isolating all complex roots) which achieve the same bit complexity, DSC2
focuses on real root isolation, is very easy to access and easy to implement.
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2011 17:39:07 GMT"
}
] | 2011-09-29T00:00:00 |
[
[
"Sagraloff",
"Michael",
""
]
] |
new_dataset
| 0.999542 |
0910.0777
|
Brent Heeringa
|
Glencora Borradaile, Brent Heeringa, Gordon Wilfong
|
The Knapsack Problem with Neighbour Constraints
|
Full version of IWOCA 2011 paper
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study a constrained version of the knapsack problem in which dependencies
between items are given by the adjacencies of a graph. In the 1-neighbour
knapsack problem, an item can be selected only if at least one of its
neighbours is also selected. In the all-neighbours knapsack problem, an item
can be selected only if all its neighbours are also selected. We give
approximation algorithms and hardness results when the nodes have both uniform
and arbitrary weight and profit functions, and when the dependency graph is
directed and undirected.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 14:34:09 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Feb 2010 16:59:28 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Jul 2011 16:25:45 GMT"
},
{
"version": "v4",
"created": "Tue, 27 Sep 2011 01:03:05 GMT"
}
] | 2011-09-28T00:00:00 |
[
[
"Borradaile",
"Glencora",
""
],
[
"Heeringa",
"Brent",
""
],
[
"Wilfong",
"Gordon",
""
]
] |
new_dataset
| 0.993972 |
1011.1783
|
Benedikt Meurer
|
Benedikt Meurer
|
OCamlJIT 2.0 - Faster Objective Caml
|
23 pages, 12 figures
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the current state of an ongoing research project to
improve the performance of the OCaml byte-code interpreter using Just-In-Time
native code generation. Our JIT engine OCamlJIT2 currently runs on x86-64
processors, mimicing precisely the behavior of the OCaml virtual machine. Its
design and implementation is described, and performance measures are given.
|
[
{
"version": "v1",
"created": "Mon, 8 Nov 2010 12:16:37 GMT"
},
{
"version": "v2",
"created": "Wed, 11 May 2011 08:35:02 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Sep 2011 14:12:46 GMT"
}
] | 2011-09-28T00:00:00 |
[
[
"Meurer",
"Benedikt",
""
]
] |
new_dataset
| 0.998228 |
1109.5717
|
H. H. Hoos
|
H. H. Hoos, W. Pullan
|
Dynamic Local Search for the Maximum Clique Problem
| null |
Journal Of Artificial Intelligence Research, Volume 25, pages
159-185, 2006
|
10.1613/jair.1815
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we introduce DLS-MC, a new stochastic local search algorithm
for the maximum clique problem. DLS-MC alternates between phases of iterative
improvement, during which suitable vertices are added to the current clique,
and plateau search, during which vertices of the current clique are swapped
with vertices not contained in the current clique. The selection of vertices is
solely based on vertex penalties that are dynamically adjusted during the
search, and a perturbation mechanism is used to overcome search stagnation. The
behaviour of DLS-MC is controlled by a single parameter, penalty delay, which
controls the frequency at which vertex penalties are reduced. We show
empirically that DLS-MC achieves substantial performance improvements over
state-of-the-art algorithms for the maximum clique problem over a large range
of the commonly used DIMACS benchmark instances.
|
[
{
"version": "v1",
"created": "Mon, 26 Sep 2011 20:24:56 GMT"
}
] | 2011-09-28T00:00:00 |
[
[
"Hoos",
"H. H.",
""
],
[
"Pullan",
"W.",
""
]
] |
new_dataset
| 0.993101 |
1109.1454
|
Anis Ismail
|
Anis Ismail, Abd El Salam AL Hajjar and Mohammad Hajjar
|
A Prototype System for Controlling a Computer by Head Movements and
Voice Commands
|
11 pages, 4 figures
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a new prototype system for controlling a PC by head
movements and also with voice commands. Our system is a multimodal interface
concerned with controlling the computer. The selected modes of interaction are
speech and gestures. We are seeing the revolutionary of computers and
information technologies into daily practice. Healthy people use keyboard,
mouse, trackball, or touchpad for controlling the PC. However these peripheries
are usually not suitable for handicapped people. They may have problems using
these standard peripheries, for example when they suffer from myopathy, or
cannot move their hands after an injury. Our system has been developed to
provide computer access for people with severe disabilities. This system tracks
the computer user's Head movements with a video camera and translates them into
the movements of the mouse pointer on the screen and the voice as button
presses. Therefore we are coming with a proposal system that can be used with
handicapped people to control the PC.
|
[
{
"version": "v1",
"created": "Tue, 6 Sep 2011 10:26:17 GMT"
}
] | 2011-09-27T00:00:00 |
[
[
"Ismail",
"Anis",
""
],
[
"Hajjar",
"Abd El Salam AL",
""
],
[
"Hajjar",
"Mohammad",
""
]
] |
new_dataset
| 0.998398 |
1109.5282
|
Elena Villarreal Zapata
|
Elena Villarreal Zapata, Francisco Cruz Ordaz Salazar
|
Aut\'omatas celulares elementales aplicados a la encriptaci\'on de datos
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For data ciphering a key is usually needed as a base, so it is indispensable
to have one that is strong and trustworthy, so as to keep others from accessing
the ciphered data. This requires a pseudo-random number generator that would
provide such a key, so it is proposed to work with cellular automata helped
along with \emph{Mathematica} to check that the rules and to what level are
actually pseudo-random. This project centers on the examination of possible
mathematical rules, analyzing their characteristics in a detailed manner, and
submitting them to a set of randomness tests with the end of knowing which of
them will enable us to obtain those pseudo-random numbers that will conform the
key for data ciphering.
|
[
{
"version": "v1",
"created": "Sat, 24 Sep 2011 16:14:07 GMT"
}
] | 2011-09-27T00:00:00 |
[
[
"Zapata",
"Elena Villarreal",
""
],
[
"Salazar",
"Francisco Cruz Ordaz",
""
]
] |
new_dataset
| 0.980842 |
1109.5323
|
Jeremy Lee
|
Jeremy Lee
|
Squiggle - A Glyph Recognizer for Gesture Input
|
10 pages
| null | null | null |
cs.HC cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Squiggle is a template-based glyph recognizer in the lineage of `$1
Recognizer' and `Protractor'. It seeks a good fit linear affine mapping between
the input and template glyphs which are represented as a list of milestone
points along the glyph path. The algorithm can recognize input glyphs invariant
of rotation, scaling, skew, and reflection symmetries. In practice the
algorithm is fast and robust enough to recognize user-generated glyphs as they
are being drawn in real time, and to project `shadows' of the matching
templates as feedback.
|
[
{
"version": "v1",
"created": "Sun, 25 Sep 2011 04:41:35 GMT"
}
] | 2011-09-27T00:00:00 |
[
[
"Lee",
"Jeremy",
""
]
] |
new_dataset
| 0.981139 |
1109.5665
|
D. McDermott
|
D. McDermott
|
PDDL2.1 - The Art of the Possible? Commentary on Fox and Long
| null |
Journal Of Artificial Intelligence Research, Volume 20, pages
145-148, 2003
|
10.1613/jair.1996
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
PDDL2.1 was designed to push the envelope of what planning algorithms can do,
and it has succeeded. It adds two important features: durative actions,which
take time (and may have continuous effects); and objective functions for
measuring the quality of plans. The concept of durative actions is flawed; and
the treatment of their semantics reveals too strong an attachment to the way
many contemporary planners work. Future PDDL innovators should focus on
producing a clean semantics for additions to the language, and let planner
implementers worry about coupling their algorithms to problems expressed in the
latest version of the language.
|
[
{
"version": "v1",
"created": "Mon, 26 Sep 2011 18:44:25 GMT"
}
] | 2011-09-27T00:00:00 |
[
[
"McDermott",
"D.",
""
]
] |
new_dataset
| 0.991522 |
1109.5683
|
Andrea Sportiello
|
Frederique Bassino, Julien David and Andrea Sportiello
|
Asymptotic enumeration of Minimal Automata
|
12+5 pages, 2 figures, submitted to STACS 2012
| null | null | null |
cs.FL math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We determine the asymptotic proportion of minimal automata, within n-state
accessible deterministic complete automata over a k-letter alphabet, with the
uniform distribution over the possible transition structures, and a binomial
distribution over terminal states, with arbitrary parameter b. It turns out
that a fraction ~ 1-C(k,b) n^{-k+2} of automata is minimal, with C(k,b) a
function, explicitly determined, involving the solution of a transcendental
equation.
|
[
{
"version": "v1",
"created": "Mon, 26 Sep 2011 19:39:56 GMT"
}
] | 2011-09-27T00:00:00 |
[
[
"Bassino",
"Frederique",
""
],
[
"David",
"Julien",
""
],
[
"Sportiello",
"Andrea",
""
]
] |
new_dataset
| 0.999598 |
1109.4683
|
Alper Ayvaci
|
Alper Ayvaci and Stefano Soatto
|
Detachable Object Detection: Segmentation and Depth Ordering From
Short-Baseline Video
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe an approach for segmenting an image into regions that correspond
to surfaces in the scene that are partially surrounded by the medium. It
integrates both appearance and motion statistics into a cost functional, that
is seeded with occluded regions and minimized efficiently by solving a linear
programming problem. Where a short observation time is insufficient to
determine whether the object is detachable, the results of the minimization can
be used to seed a more costly optimization based on a longer sequence of video
data. The result is an entirely unsupervised scheme to detect and segment an
arbitrary and unknown number of objects. We test our scheme to highlight the
potential, as well as limitations, of our approach.
|
[
{
"version": "v1",
"created": "Thu, 22 Sep 2011 00:55:32 GMT"
}
] | 2011-09-23T00:00:00 |
[
[
"Ayvaci",
"Alper",
""
],
[
"Soatto",
"Stefano",
""
]
] |
new_dataset
| 0.994683 |
1109.4906
|
Odile Piton
|
Odile Piton (SAMM), Slim Mesfar (RIADI), H\'el\`ene Pignot (SAMM)
|
Automatic transcription of 17th century English text in Contemporary
English with NooJ: Method and Evaluation
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Since 2006 we have undertaken to describe the differences between 17th
century English and contemporary English thanks to NLP software. Studying a
corpus spanning the whole century (tales of English travellers in the Ottoman
Empire in the 17th century, Mary Astell's essay A Serious Proposal to the
Ladies and other literary texts) has enabled us to highlight various lexical,
morphological or grammatical singularities. Thanks to the NooJ linguistic
platform, we created dictionaries indexing the lexical variants and their
transcription in CE. The latter is often the result of the validation of forms
recognized dynamically by morphological graphs. We also built syntactical
graphs aimed at transcribing certain archaic forms in contemporary English. Our
previous research implied a succession of elementary steps alternating textual
analysis and result validation. We managed to provide examples of
transcriptions, but we have not created a global tool for automatic
transcription. Therefore we need to focus on the results we have obtained so
far, study the conditions for creating such a tool, and analyze possible
difficulties. In this paper, we will be discussing the technical and linguistic
aspects we have not yet covered in our previous work. We are using the results
of previous research and proposing a transcription method for words or
sequences identified as archaic.
|
[
{
"version": "v1",
"created": "Thu, 22 Sep 2011 18:37:17 GMT"
}
] | 2011-09-23T00:00:00 |
[
[
"Piton",
"Odile",
"",
"SAMM"
],
[
"Mesfar",
"Slim",
"",
"RIADI"
],
[
"Pignot",
"Hélène",
"",
"SAMM"
]
] |
new_dataset
| 0.993888 |
1109.4433
|
Johanne Cohen
|
Olivier Bournez, J\'er\'emie Chalopin, Johanne Cohen, Xavier Koegler,
Mikael Rabie
|
Asymetric Pavlovian Populations
| null | null | null | null |
cs.DC cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Population protocols have been introduced by Angluin et al. as a model of
networks consisting of very limited mobile agents that interact in pairs but
with no control over their own movement. A collection of anonymous agents,
modeled by finite automata, interact pairwise according to some rules that
update their states. Predicates on the initial configurations that can be
computed by such protocols have been characterized as semi-linear predicates.
In an orthogonal way, several distributed systems have been termed in
literature as being realizations of games in the sense of game theory. We
investigate under which conditions population protocols, or more generally
pairwise interaction rules, correspond to games. We show that restricting to
asymetric games is not really a restric- tion: all predicates computable by
protocols can actually be computed by protocols corresponding to games, i.e.
any semi-linear predicate can be computed by a Pavlovian population
multi-protocol.
|
[
{
"version": "v1",
"created": "Tue, 20 Sep 2011 21:17:02 GMT"
}
] | 2011-09-22T00:00:00 |
[
[
"Bournez",
"Olivier",
""
],
[
"Chalopin",
"Jérémie",
""
],
[
"Cohen",
"Johanne",
""
],
[
"Koegler",
"Xavier",
""
],
[
"Rabie",
"Mikael",
""
]
] |
new_dataset
| 0.99937 |
1109.4455
|
Jianqin Zhou
|
Jianqin Zhou
|
Periodic sequences with stable $k$-error linear complexity
| null | null | null | null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
The linear complexity of a sequence has been used as an important measure of
keystream strength, hence designing a sequence which possesses high linear
complexity and $k$-error linear complexity is a hot topic in cryptography and
communication. Niederreiter first noticed many periodic sequences with high
$k$-error linear complexity over GF(q). In this paper, the concept of stable
$k$-error linear complexity is presented to study sequences with high $k$-error
linear complexity. By studying linear complexity of binary sequences with
period $2^n$, the method using cube theory to construct sequences with maximum
stable $k$-error linear complexity is presented. It is proved that a binary
sequence with period $2^n$ can be decomposed into some disjoint cubes. The cube
theory is a new tool to study $k$-error linear complexity. Finally, it is
proved that the maximum $k$-error linear complexity is $2^n-(2^l-1)$ over all
$2^n$-periodic binary sequences, where $2^{l-1}\le k<2^{l}$.
|
[
{
"version": "v1",
"created": "Wed, 21 Sep 2011 01:48:36 GMT"
}
] | 2011-09-22T00:00:00 |
[
[
"Zhou",
"Jianqin",
""
]
] |
new_dataset
| 0.955589 |
1109.4552
|
Alexander Kornyushkin
|
A. Kornyushkin
|
About a Discrete Cellular Soliton (computer simulation)
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For the first time a mathematical object is presented - a reversible cellular
Automaton - with many paradoxical qualities, the main ones among them are: a
frequent quickly return to its original state, the presence of a large number
of conservation laws and paradoxical "fuzzy" symmetries, which connects the
current position of the automaton with its signature Main Integral.
|
[
{
"version": "v1",
"created": "Fri, 26 Aug 2011 20:15:18 GMT"
}
] | 2011-09-22T00:00:00 |
[
[
"Kornyushkin",
"A.",
""
]
] |
new_dataset
| 0.983473 |
0902.0261
|
Tomoyuki Yamakami
|
Tomoyuki Yamakami
|
Immunity and Pseudorandomness of Context-Free Languages
|
A4, 23 pages, 10 pt. A complete revision of the initial version that
was posted in February 2009
|
Theoretical Computer Science, vol. 412, pp.6432-6450, 2011
|
10.1016/j.tcs.2011.07.013
| null |
cs.CC cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We discuss the computational complexity of context-free languages,
concentrating on two well-known structural properties---immunity and
pseudorandomness. An infinite language is REG-immune (resp., CFL-immune) if it
contains no infinite subset that is a regular (resp., context-free) language.
We prove that (i) there is a context-free REG-immune language outside REG/n and
(ii) there is a REG-bi-immune language that can be computed deterministically
using logarithmic space. We also show that (iii) there is a CFL-simple set,
where a CFL-simple language is an infinite context-free language whose
complement is CFL-immune. Similar to the REG-immunity, a REG-primeimmune
language has no polynomially dense subsets that are also regular. We further
prove that (iv) there is a context-free language that is REG/n-bi-primeimmune.
Concerning pseudorandomness of context-free languages, we show that (v) CFL
contains REG/n-pseudorandom languages. Finally, we prove that (vi) against
REG/n, there exists an almost 1-1 pseudorandom generator computable in
nondeterministic pushdown automata equipped with a write-only output tape and
(vii) against REG, there is no almost 1-1 weakly pseudorandom generator
computable deterministically in linear time by a single-tape Turing machine.
|
[
{
"version": "v1",
"created": "Mon, 2 Feb 2009 12:21:23 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jul 2011 13:18:33 GMT"
}
] | 2011-09-20T00:00:00 |
[
[
"Yamakami",
"Tomoyuki",
""
]
] |
new_dataset
| 0.989917 |
1107.4721
|
Jesse Alama
|
Jesse Alama
|
mizar-items: Exploring fine-grained dependencies in the Mizar
Mathematical Library
|
Accepted at CICM 2011: Conferences in Intelligent Computer
Mathematics, Track C: Systems and Projects
|
Intelligent Computer Mathematics, Lecture Notes in Computer
Science 6824, pp. 276-7, 2011
|
10.1007/978-3-642-22673-1_19
| null |
cs.DL math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Mizar Mathematical Library (MML) is a rich database of formalized
mathematical proofs (see http://mizar.org). Owing to its large size (it
contains more than 1100 "articles" summing to nearly 2.5 million lines of text,
expressing more than 50000 theorems and 10000 definitions using more than 7000
symbols), the nature of its contents (the MML is slanted toward pure
mathematics), and its classical foundations (first-order logic, set theory,
natural deduction), the MML is an especially attractive target for research on
foundations of mathematics. We have implemented a system, mizar-items, on which
a variety of such foundational experiements can be based. The heart of
mizar-items is a method for decomposing the contents of the MML into
fine-grained "items" (e.g., theorem, definition, notation, etc.) and computing
dependency relations among these items. mizar-items also comes equipped with a
website for exploring these dependencies and interacting with them.
|
[
{
"version": "v1",
"created": "Sun, 24 Jul 2011 04:25:44 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Sep 2011 15:50:13 GMT"
}
] | 2011-09-20T00:00:00 |
[
[
"Alama",
"Jesse",
""
]
] |
new_dataset
| 0.991889 |
1102.3504
|
Anh Le
|
Anh Le and Athina Markopoulou
|
Cooperative Defense against Pollution Attacks in Network Coding Using
SpaceMac
|
This is an extended version of a short version to appear in IEEE JSAC
on Cooperative Networking - Challenges and Applications 2011
| null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Intra-session network coding is known to be vulnerable to pollution attacks.
In this work, first, we introduce a novel homomorphic MAC scheme called
SpaceMac, which allows an intermediate node to verify if its received packets
belong to a specific subspace, even if the subspace is expanding over time.
Then, we use SpaceMac as a building block to design a cooperative scheme that
provides complete defense against pollution attacks: (i) it can detect polluted
packets early at intermediate nodes and (ii) it can identify the exact location
of all, even colluding, attackers, thus making it possible to eliminate them.
Our scheme is cooperative: parents and children of any node cooperate to detect
any corrupted packets sent by the node, and nodes in the network cooperate with
a central controller to identify the exact location of all attackers. We
implement SpaceMac in both C/C++ and Java as a library, and we make the library
available online. Our evaluation on both a PC and an Android device shows that
(i) SpaceMac's algorithms can be computed quickly and efficiently, and (ii) our
cooperative defense scheme has low computation and significantly lower
communication overhead than other comparable state-of-the-art schemes.
|
[
{
"version": "v1",
"created": "Thu, 17 Feb 2011 06:23:30 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Feb 2011 01:24:53 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Sep 2011 17:58:21 GMT"
},
{
"version": "v4",
"created": "Thu, 15 Sep 2011 19:22:12 GMT"
},
{
"version": "v5",
"created": "Fri, 16 Sep 2011 00:06:22 GMT"
}
] | 2011-09-19T00:00:00 |
[
[
"Le",
"Anh",
""
],
[
"Markopoulou",
"Athina",
""
]
] |
new_dataset
| 0.997173 |
1109.2696
|
Quentin Godfroy
|
Cyril Gavoille (LaBRI, INRIA Bordeaux - Sud-Ouest, IUF), Quentin
Godfroy (LaBRI), Laurent Viennot (INRIA Rocquencourt)
|
Node-Disjoint Multipath Spanners and their Relationship with
Fault-Tolerant Spanners
| null | null | null | null |
cs.NI cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by multipath routing, we introduce a multi-connected variant of
spanners. For that purpose we introduce the $p$-multipath cost between two
nodes $u$ and $v$ as the minimum weight of a collection of $p$ internally
vertex-disjoint paths between $u$ and $v$. Given a weighted graph $G$, a
subgraph $H$ is a $p$-multipath $s$-spanner if for all $u,v$, the $p$-multipath
cost between $u$ and $v$ in $H$ is at most $s$ times the $p$-multipath cost in
$G$. The $s$ factor is called the stretch. Building upon recent results on
fault-tolerant spanners, we show how to build $p$-multipath spanners of
constant stretch and of $\tO(n^{1+1/k})$ edges, for fixed parameters $p$ and
$k$, $n$ being the number of nodes of the graph. Such spanners can be
constructed by a distributed algorithm running in $O(k)$ rounds. Additionally,
we give an improved construction for the case $p=k=2$. Our spanner $H$ has
$O(n^{3/2})$ edges and the $p$-multipath cost in $H$ between any two node is at
most twice the corresponding one in $G$ plus $O(W)$, $W$ being the maximum edge
weight.
|
[
{
"version": "v1",
"created": "Tue, 13 Sep 2011 07:43:17 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Sep 2011 19:30:51 GMT"
}
] | 2011-09-19T00:00:00 |
[
[
"Gavoille",
"Cyril",
"",
"LaBRI, INRIA Bordeaux - Sud-Ouest, IUF"
],
[
"Godfroy",
"Quentin",
"",
"LaBRI"
],
[
"Viennot",
"Laurent",
"",
"INRIA Rocquencourt"
]
] |
new_dataset
| 0.999111 |
1109.3650
|
Rohan Agrawal
|
Rohan Agrawal
|
Bi-Objective Community Detection (BOCD) in Networks using Genetic
Algorithm
|
11 pages, 3 Figures, 3 Tables. arXiv admin note: substantial text
overlap with arXiv:0906.0612
| null |
10.1007/978-3-642-22606-9_5
| null |
cs.SI cs.AI cs.NE physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A lot of research effort has been put into community detection from all
corners of academic interest such as physics, mathematics and computer science.
In this paper I have proposed a Bi-Objective Genetic Algorithm for community
detection which maximizes modularity and community score. Then the results
obtained for both benchmark and real life data sets are compared with other
algorithms using the modularity and MNI performance metrics. The results show
that the BOCD algorithm is capable of successfully detecting community
structure in both real life and synthetic datasets, as well as improving upon
the performance of previous techniques.
|
[
{
"version": "v1",
"created": "Fri, 16 Sep 2011 15:48:29 GMT"
}
] | 2011-09-19T00:00:00 |
[
[
"Agrawal",
"Rohan",
""
]
] |
new_dataset
| 0.991226 |
1109.3317
|
Ayatullah Faruk Mollah
|
Ayatullah Faruk Mollah, Nabamita Majumder, Subhadip Basu, Mita
Nasipuri
|
Design of an Optical Character Recognition System for Camera-based
Handheld Devices
| null |
Int'l J. of Computer Science Issues, Vol. 8, Issue 4, pp. 283-289,
July 2011
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a complete Optical Character Recognition (OCR) system for
camera captured image/graphics embedded textual documents for handheld devices.
At first, text regions are extracted and skew corrected. Then, these regions
are binarized and segmented into lines and characters. Characters are passed
into the recognition module. Experimenting with a set of 100 business card
images, captured by cell phone camera, we have achieved a maximum recognition
accuracy of 92.74%. Compared to Tesseract, an open source desktop-based
powerful OCR engine, present recognition accuracy is worth contributing.
Moreover, the developed technique is computationally efficient and consumes low
memory so as to be applicable on handheld devices.
|
[
{
"version": "v1",
"created": "Thu, 15 Sep 2011 11:24:41 GMT"
}
] | 2011-09-16T00:00:00 |
[
[
"Mollah",
"Ayatullah Faruk",
""
],
[
"Majumder",
"Nabamita",
""
],
[
"Basu",
"Subhadip",
""
],
[
"Nasipuri",
"Mita",
""
]
] |
new_dataset
| 0.985827 |
1109.2489
|
Geo Taglioni
|
Anina Weber, Geo Taglioni
|
Swiss Elections to the National Council: First trials with e-voting in
elections at federal level
| null | null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
On October 23rd 2011, around 22'000 voters will be authorized to cast their
votes electronically in occasion of the elections to the National Council.
These are the first trials ever with e-voting in elections at federal level in
Switzerland. Four cantons are going to conduct trials with this new channel.
Only Swiss voters living abroad will be authorized to participate. The Swiss
Confederation pursues the long term goal of the introduction of e-voting as a
third, complementary voting method - in addition to voting in person at the
polling station and postal voting.
|
[
{
"version": "v1",
"created": "Fri, 9 Sep 2011 15:03:01 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Sep 2011 12:59:54 GMT"
}
] | 2011-09-15T00:00:00 |
[
[
"Weber",
"Anina",
""
],
[
"Taglioni",
"Geo",
""
]
] |
new_dataset
| 0.990379 |
1109.3150
|
Abhishek Sinha
|
Abhishek Sinha, Swagatam Das, Athanasios V. Vasilakos
|
On Periodic Node Deployment in Wireless Sensor Networks: A Statistical
Analysis
|
Submitted for review in Journal of Network and Systems Management
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Rapid progress made in the field of sensor technology, wireless
communication, and computer networks in recent past, led to the development of
wireless Ad-hoc sensor networks, consisting of small, low-cost sensors, which
can monitor wide and remote areas with precision and liveliness unseen to the
date without the intervention of a human operator. This work comes up with a
stochastic model for periodic sensor-deployment (in face of their limited
amount of battery-life) to maintain a minimal node-connectivity in wireless
sensor networks. The node deployment cannot be modeled by using results from
conventional continuous birth-death process, since new nodes are added to the
network in bursts, i.e. the birth process is not continuous in practical
situations. We analyze the periodic node deployment process using discrete
birth-continuous death process and obtain two important statistical measures of
the existing number of nodes in the network, namely the mean and variance. We
show that the above mentioned sequences of mean and variances always converge
to finite steady state values, thus ensuring the stability of the system. We
also develop a cost function for the process of periodic deployment of sensor
nodes and minimize it to find the optimal time ({\tau}) and optimum number of
re-deployment (q) for maintaining minimum connectivity in the network.
|
[
{
"version": "v1",
"created": "Wed, 14 Sep 2011 17:51:36 GMT"
}
] | 2011-09-15T00:00:00 |
[
[
"Sinha",
"Abhishek",
""
],
[
"Das",
"Swagatam",
""
],
[
"Vasilakos",
"Athanasios V.",
""
]
] |
new_dataset
| 0.999354 |
1107.4530
|
John B. Little
|
John B. Little
|
Remarks on generalized toric codes
|
14 pages, 4 figures Version 2 corrects some typos, adds a new
reference
| null | null | null |
cs.IT math.AG math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This note presents some new information on how the minimum distance of the
generalized toric code corresponding to a fixed set of integer lattice points S
in R^2 varies with the base field. The main results show that in some cases,
over sufficiently large fields, the minimum distance of the code corresponding
to a set S will be the same as that of the code corresponding to the convex
hull of S. In an example, we will also discuss a [49,12,28] generalized toric
code over GF(8), better than any previously known code according to M. Grassl's
online tables, as of July 2011.
|
[
{
"version": "v1",
"created": "Fri, 22 Jul 2011 14:35:02 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Sep 2011 21:35:17 GMT"
}
] | 2011-09-14T00:00:00 |
[
[
"Little",
"John B.",
""
]
] |
new_dataset
| 0.997842 |
1108.2700
|
Paul Ginsparg
|
Paul Ginsparg (Cornell University)
|
It was twenty years ago today ...
|
9 pages. v2: additional edifying comments interspersed throughout
| null | null | null |
cs.DL astro-ph.IM cond-mat.other gr-qc hep-ph hep-th math.HO physics.soc-ph quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To mark the 20th anniversary of the (14 Aug 1991) commencement of
[email protected] (now arXiv.org), I've adapted this article from one that
first appeared in Physics World (2008), was later reprinted (with permission)
in Learned Publishing (2009), but never appeared in arXiv. I trace some
historical context and early development of the resource, its later trajectory,
and close with some thoughts about the future.
This version is closer to my original draft, with some updates for this
occasion, plus an astounding $2^5$ added footnotes.
|
[
{
"version": "v1",
"created": "Sun, 14 Aug 2011 22:34:32 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Sep 2011 02:40:53 GMT"
}
] | 2011-09-14T00:00:00 |
[
[
"Ginsparg",
"Paul",
"",
"Cornell University"
]
] |
new_dataset
| 0.979617 |
1109.2654
|
EPTCS
|
Enrique Mart\'inez (University of Castilla-La Mancha), M. Emilia
Cambronero (University of Castilla-La Mancha), Gregorio D\'iaz (University of
Castilla-La Mancha), Gerardo Schneider (Chalmers | University of Gothenburg)
|
Timed Automata Semantics for Visual e-Contracts
|
In Proceedings FLACOS 2011, arXiv:1109.2399
|
EPTCS 68, 2011, pp. 7-21
|
10.4204/EPTCS.68.3
| null |
cs.LO cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
C-O Diagrams have been introduced as a means to have a more visual
representation of electronic contracts, where it is possible to represent the
obligations, permissions and prohibitions of the different signatories, as well
as what are the penalties in case of not fulfillment of their obligations and
prohibitions. In such diagrams we are also able to represent absolute and
relative timing constraints. In this paper we present a formal semantics for
C-O Diagrams based on timed automata extended with an ordering of states and
edges in order to represent different deontic modalities.
|
[
{
"version": "v1",
"created": "Tue, 13 Sep 2011 01:25:23 GMT"
}
] | 2011-09-14T00:00:00 |
[
[
"Martínez",
"Enrique",
"",
"University of Castilla-La Mancha"
],
[
"Cambronero",
"M. Emilia",
"",
"University of Castilla-La Mancha"
],
[
"Díaz",
"Gregorio",
"",
"University of\n Castilla-La Mancha"
],
[
"Schneider",
"Gerardo",
"",
"Chalmers | University of Gothenburg"
]
] |
new_dataset
| 0.995993 |
1109.2655
|
EPTCS
|
Adrian Francalanza Ph.D (University of Malta), Andrew Gauci M.Sc
(University of Malta), Gordon Pace Ph.D (University of Malta)
|
Distributed System Contract Monitoring
|
In Proceedings FLACOS 2011, arXiv:1109.2399
|
EPTCS 68, 2011, pp. 23-37
|
10.4204/EPTCS.68.4
| null |
cs.LO cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The use of behavioural contracts, to specify, regulate and verify systems, is
particularly relevant to runtime monitoring of distributed systems. System
distribution poses major challenges to contract monitoring, from
monitoring-induced information leaks to computation load balancing,
communication overheads and fault-tolerance. We present mDPi, a location-aware
process calculus, for reasoning about monitoring of distributed systems. We
define a family of Labelled Transition Systems for this calculus, which allow
formal reasoning about different monitoring strategies at different levels of
abstractions. We also illustrate the expressivity of the calculus by showing
how contracts in a simple contract language can be synthesised into different
mDPi monitors.
|
[
{
"version": "v1",
"created": "Tue, 13 Sep 2011 01:25:29 GMT"
}
] | 2011-09-14T00:00:00 |
[
[
"D",
"Adrian Francalanza Ph.",
"",
"University of Malta"
],
[
"Sc",
"Andrew Gauci M.",
"",
"University of Malta"
],
[
"D",
"Gordon Pace Ph.",
"",
"University of Malta"
]
] |
new_dataset
| 0.97779 |
1109.2684
|
Sali Emruli
|
Sali Emruli, Tahir Zejneli and Florin Agai
|
YouTube and political communication -- Macedonian case
|
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue
4, No 1, July 2011 ISSN (Online): 1694-0814 http://www.IJCSI.org
| null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Analysis how to use Internet influence to the process of political
communication, marketing and the management of public relations, what kind of
online communication methods are used by political parties, and to assess
satisfaction, means of communication and the services they provide to their
party's voters (people) and other interest groups and whether social networks
can affect the political and economic changes in the state, and the political
power of one party.
|
[
{
"version": "v1",
"created": "Tue, 13 Sep 2011 07:03:56 GMT"
}
] | 2011-09-14T00:00:00 |
[
[
"Emruli",
"Sali",
""
],
[
"Zejneli",
"Tahir",
""
],
[
"Agai",
"Florin",
""
]
] |
new_dataset
| 0.996302 |
0909.3976
|
Vadim Madgazin
|
Vadim R. Madgazin
|
The Information Theory of Emotions of Musical Chords
|
18 pages, 2 figures, in English, and copy in Russian
| null | null | null |
cs.SD q-bio.NC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper offers a solution to the centuries-old puzzle - why the major
chords are perceived as happy and the minor chords as sad - based on the
information theory of emotions. A theory and a formula of musical emotions were
created. They define the sign and the amplitude of the utilitarian emotional
coloration of separate major and minor chords through relative pitches of
constituent sounds. Keywords: chord, major, minor, the formula of musical
emotions, the information theory of emotions.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 12:24:19 GMT"
},
{
"version": "v2",
"created": "Sat, 10 Sep 2011 12:02:21 GMT"
}
] | 2011-09-13T00:00:00 |
[
[
"Madgazin",
"Vadim R.",
""
]
] |
new_dataset
| 0.992192 |
1104.4656
|
Deniz Sarioz
|
Radoslav Fulek, Noushin Saeedi and Deniz Sarioz
|
Convex obstacle numbers of outerplanar graphs and bipartite permutation
graphs
|
11 pages, 6 figures
| null | null | null |
cs.DM cs.CG math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The disjoint convex obstacle number of a graph G is the smallest number h
such that there is a set of h pairwise disjoint convex polygons (obstacles) and
a set of n points in the plane (corresponding to V(G)) so that a vertex pair uv
is an edge if and only if the corresponding segment uv does not meet any
obstacle.
We show that the disjoint convex obstacle number of an outerplanar graph is
always at most 5, and of a bipartite permutation graph at most 4. The former
answers a question raised by Alpert, Koch, and Laison. We complement the upper
bound for outerplanar graphs with the lower bound of 4.
|
[
{
"version": "v1",
"created": "Sun, 24 Apr 2011 21:45:28 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Apr 2011 00:34:43 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Sep 2011 19:22:18 GMT"
}
] | 2011-09-13T00:00:00 |
[
[
"Fulek",
"Radoslav",
""
],
[
"Saeedi",
"Noushin",
""
],
[
"Sarioz",
"Deniz",
""
]
] |
new_dataset
| 0.999784 |
1109.2155
|
S. Kambhampati
|
S. Kambhampati, M.H.L. van den Briel
|
Optiplan: Unifying IP-based and Graph-based Planning
| null |
Journal Of Artificial Intelligence Research, Volume 24, pages
919-931, 2005
|
10.1613/jair.1698
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Optiplan planning system is the first integer programming-based planner
that successfully participated in the international planning competition. This
engineering note describes the architecture of Optiplan and provides the
integer programming formulation that enabled it to perform reasonably well in
the competition. We also touch upon some recent developments that make integer
programming encodings significantly more competitive.
|
[
{
"version": "v1",
"created": "Fri, 9 Sep 2011 20:43:37 GMT"
}
] | 2011-09-13T00:00:00 |
[
[
"Kambhampati",
"S.",
""
],
[
"Briel",
"M. H. L. van den",
""
]
] |
new_dataset
| 0.976455 |
1109.2247
|
Robert Kent
|
Robert E. Kent
|
The Standard Aspect of Dialectical Logic
|
An abstracted version of this paper, entitled "Dialectical Program
Semantics", was accepted for presentation at the 1st International Conference
on Algebraic Methodology and Software Technology (AMAST'89), University of
Iowa, Iowa City, Iowa, 1989
| null | null | null |
cs.LO cs.PL math.CT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dialectical logic is the logic of dialectical processes. The goal of
dialectical logic is to introduce dynamic notions into logical computational
systems. The fundamental notions of proposition and truth-value in standard
logic are subsumed by the notions of process and flow in dialectical logic.
Dialectical logic has a standard aspect, which can be defined in terms of the
"local cartesian closure" of subtypes. The standard aspect of dialectical logic
provides a natural program semantics which incorporates Hoare's
precondition/postcondition semantics and extends the standard Kripke semantics
of dynamic logic. The goal of the standard aspect of dialectical logic is to
unify the logic of small-scale and large-scale programming.
|
[
{
"version": "v1",
"created": "Sat, 10 Sep 2011 18:23:07 GMT"
}
] | 2011-09-13T00:00:00 |
[
[
"Kent",
"Robert E.",
""
]
] |
new_dataset
| 0.982696 |
1109.2417
|
Sali Emruli
|
Sali Emruli and Miroslav Baca
|
Internet and political communication - Macedonian case
| null |
IJCSI International Journal of Computer Science Issues, Vol. 8,
Issue 3, No. 1, May 2011
| null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Analysis how to use Internet influence to the process of political
communication, marketing and the management of public relations, what kind of
online communication methods are used by political parties, and to assess
satisfaction, means of communication and the services they provide to their
partys voters (people) and other interest groups and whether social networks
can affect the political and economic changes in the state, and the political
power of one party.
|
[
{
"version": "v1",
"created": "Mon, 12 Sep 2011 09:48:41 GMT"
}
] | 2011-09-13T00:00:00 |
[
[
"Emruli",
"Sali",
""
],
[
"Baca",
"Miroslav",
""
]
] |
new_dataset
| 0.992144 |
1109.2418
|
Sali Emruli
|
Sali Emruli, Tahir Zejneli and Florin Agai
|
Facebook and political communication -- Macedonian case
| null |
IJCSI International Journal of Computer Science Issues, Vol. 8,
Issue 4, No 1, July 2011, 451-459
| null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Analysis how to use Internet influence to the process of political
communication, marketing and the management of public relations, what kind of
online communication methods are used by political parties, and to assess
satisfaction, means of communication and the services they provide to their
partys voters (people) and other interest groups and whether social networks
can affect the political and economic changes in the state, and the political
power of one party.
|
[
{
"version": "v1",
"created": "Mon, 12 Sep 2011 09:53:18 GMT"
}
] | 2011-09-13T00:00:00 |
[
[
"Emruli",
"Sali",
""
],
[
"Zejneli",
"Tahir",
""
],
[
"Agai",
"Florin",
""
]
] |
new_dataset
| 0.997591 |
1109.2430
|
Prasenjit Chanak
|
Indrajit Banerjee, Prasenjit Chanak, Hafizur Rahaman
|
CCABC: Cyclic Cellular Automata Based Clustering For Energy Conservation
in Sensor Networks
| null | null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Sensor network has been recognized as the most significant technology for
next century. Despites of its potential application, wireless sensor network
encounters resource restriction such as low power, reduced bandwidth and
specially limited power sources. This work proposes an efficient technique for
the conservation of energy in a wireless sensor network (WSN) by forming an
effective cluster of the network nodes distributed over a wide range of
geographical area. The clustering scheme is developed around a specified class
of cellular automata (CA) referred to as the modified cyclic cellular automata
(mCCA). It sets a number of nodes in stand-by mode at an instance of time
without compromising the area of network coverage and thereby conserves the
battery power. The proposed scheme also determines an effective cluster size
where the inter-cluster and intra-cluster communication cost is minimum. The
simulation results establish that the cyclic cellular automata based clustering
for energy conservation in sensor networks (CCABC) is more reliable than the
existing schemes where clustering and CA based energy saving technique is used.
|
[
{
"version": "v1",
"created": "Mon, 12 Sep 2011 11:05:21 GMT"
}
] | 2011-09-13T00:00:00 |
[
[
"Banerjee",
"Indrajit",
""
],
[
"Chanak",
"Prasenjit",
""
],
[
"Rahaman",
"Hafizur",
""
]
] |
new_dataset
| 0.997184 |
1109.1681
|
Gabriele Nebe
|
Gabriele Nebe
|
On extremal self-dual ternary codes of length 48
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
All extremal ternary codes of length 48 that have some automorphism of prime
order $p\geq 5$ are equivalent to one of the two known codes, the Pless code or
the extended quadratic residue code.
|
[
{
"version": "v1",
"created": "Thu, 8 Sep 2011 10:22:02 GMT"
}
] | 2011-09-09T00:00:00 |
[
[
"Nebe",
"Gabriele",
""
]
] |
new_dataset
| 0.999023 |
1109.1525
|
Robert Kent
|
Robert E. Kent
|
Conceptual Knowledge Markup Language: The central core
|
Presented at the Twelfth Workshop on Knowledge Acquisition, Modeling
and Management (KAW'99), 1999
| null | null | null |
cs.DL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The conceptual knowledge framework OML/CKML needs several components for a
successful design. One important, but previously overlooked, component is the
central core of OML/CKML. The central core provides a theoretical link between
the ontological specification in OML and the conceptual knowledge
representation in CKML. This paper discusses the formal semantics and syntactic
styles of the central core, and also the important role it plays in defining
interoperability between OML/CKML, RDF/S and Ontolingua.
|
[
{
"version": "v1",
"created": "Wed, 7 Sep 2011 18:09:49 GMT"
}
] | 2011-09-08T00:00:00 |
[
[
"Kent",
"Robert E.",
""
]
] |
new_dataset
| 0.99243 |
1106.2530
|
Marats Golovkins
|
Marats Golovkins, Maksim Kravtsev, and Vasilijs Kravcevs
|
Quantum Finite Automata and Probabilistic Reversible Automata: R-trivial
Idempotent Languages
|
30 pages, 3 figures
|
MFCS 2011, Lecture Notes in Computer Science, Vol. 6907, pp.
351-363, 2011
| null | null |
cs.FL quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the recognition of R-trivial idempotent (R1) languages by various
models of "decide-and-halt" quantum finite automata (QFA) and probabilistic
reversible automata (DH-PRA). We introduce bistochastic QFA (MM-BQFA), a model
which generalizes both Nayak's enhanced QFA and DH-PRA. We apply tools from
algebraic automata theory and systems of linear inequalities to give a complete
characterization of R1 languages recognized by all these models. We also find
that "forbidden constructions" known so far do not include all of the languages
that cannot be recognized by measure-many QFA.
|
[
{
"version": "v1",
"created": "Mon, 13 Jun 2011 19:37:22 GMT"
}
] | 2011-09-07T00:00:00 |
[
[
"Golovkins",
"Marats",
""
],
[
"Kravtsev",
"Maksim",
""
],
[
"Kravcevs",
"Vasilijs",
""
]
] |
new_dataset
| 0.998829 |
1109.1247
|
Vikas Dongre
|
Vikas J Dongre, Vijay H Mankar
|
Devnagari document segmentation using histogram approach
|
8 pages; 4 figures; 8 tables; journal paper: International Journal of
Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1,
No.3, August 2011
|
International Journal of Computer Science, Engineering and
Information Technology (IJCSEIT), Vol.1, No.3, 2011, 46-53
|
10.5121/ijcseit.2011.1305
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Document segmentation is one of the critical phases in machine recognition of
any language. Correct segmentation of individual symbols decides the accuracy
of character recognition technique. It is used to decompose image of a sequence
of characters into sub images of individual symbols by segmenting lines and
words. Devnagari is the most popular script in India. It is used for writing
Hindi, Marathi, Sanskrit and Nepali languages. Moreover, Hindi is the third
most popular language in the world. Devnagari documents consist of vowels,
consonants and various modifiers. Hence proper segmentation of Devnagari word
is challenging. A simple histogram based approach to segment Devnagari
documents is proposed in this paper. Various challenges in segmentation of
Devnagari script are also discussed.
|
[
{
"version": "v1",
"created": "Tue, 6 Sep 2011 17:56:58 GMT"
}
] | 2011-09-07T00:00:00 |
[
[
"Dongre",
"Vikas J",
""
],
[
"Mankar",
"Vijay H",
""
]
] |
new_dataset
| 0.999587 |
1104.3152
|
Christopher Marriott
|
Chris Marriott and Carlos Gershenson
|
Polyethism in a colony of artificial ants
|
8 pages, 4 figures, submitted to ECAL 11
|
Advances in Artificial Life, ECAL 2011: Proceedings of the
Eleventh European Conference on the Synthesis and Simulation of Living
Systems, pp. 498-505, 2011
| null |
C3 Report 2011.03
|
cs.AI nlin.AO q-bio.PE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We explore self-organizing strategies for role assignment in a foraging task
carried out by a colony of artificial agents. Our strategies are inspired by
various mechanisms of division of labor (polyethism) observed in eusocial
insects like ants, termites, or bees. Specifically we instantiate models of
caste polyethism and age or temporal polyethism to evaluated the benefits to
foraging in a dynamic environment. Our experiment is directly related to the
exploration/exploitation trade of in machine learning.
|
[
{
"version": "v1",
"created": "Fri, 15 Apr 2011 20:24:54 GMT"
}
] | 2011-09-06T00:00:00 |
[
[
"Marriott",
"Chris",
""
],
[
"Gershenson",
"Carlos",
""
]
] |
new_dataset
| 0.999245 |
1109.0827
|
Vijayvaradharaj Muralidharan
|
Vijayvaradharaj T Muralidharan, B. Sundar Rajan
|
A Trellis Coded Modulation Scheme for the Fading Relay Channel
|
18 pages, 17 figures, 2 tables
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A decode and forward protocol based Trellis Coded Modulation (TCM) scheme for
the half-duplex relay channel, in a Rayleigh fading environment, is presented.
The proposed scheme can achieve any spectral efficiency greater than or equal
to one bit per channel use (bpcu). A near-ML decoder for the suggested TCM
scheme is proposed. It is shown that the high SNR performance of this near-ML
decoder approaches the performance of the optimal ML decoder. The high SNR
performance of this near-ML decoder is independent of the strength of the
Source-Relay link and approaches the performance of the optimal ML decoder with
an ideal Source-Relay link. Based on the derived Pair-wise Error Probability
(PEP) bounds, design criteria to maximize the diversity and coding gains are
obtained. Simulation results show a large gain in SNR for the proposed TCM
scheme over uncoded communication as well as the direct transmission without
the relay. Also, it is shown that even for the uncoded transmission scheme, the
choice of the labelling scheme (mapping from bits to complex symbols) used at
the source and the relay significantly impacts the BER vs SNR performance. We
provide a good labelling scheme for $2^l$-PSK signal set, where $l\geq 2$ is an
integer.
|
[
{
"version": "v1",
"created": "Mon, 5 Sep 2011 08:23:06 GMT"
}
] | 2011-09-06T00:00:00 |
[
[
"Muralidharan",
"Vijayvaradharaj T",
""
],
[
"Rajan",
"B. Sundar",
""
]
] |
new_dataset
| 0.979639 |
1109.0971
|
Prateek Mittal
|
Prateek Mittal, Matthew Caesar, Nikita Borisov
|
X-Vine: Secure and Pseudonymous Routing Using Social Networks
|
15 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distributed hash tables suffer from several security and privacy
vulnerabilities, including the problem of Sybil attacks. Existing social
network-based solutions to mitigate the Sybil attacks in DHT routing have a
high state requirement and do not provide an adequate level of privacy. For
instance, such techniques require a user to reveal their social network
contacts. We design X-Vine, a protection mechanism for distributed hash tables
that operates entirely by communicating over social network links. As with
traditional peer-to-peer systems, X-Vine provides robustness, scalability, and
a platform for innovation. The use of social network links for communication
helps protect participant privacy and adds a new dimension of trust absent from
previous designs. X-Vine is resilient to denial of service via Sybil attacks,
and in fact is the first Sybil defense that requires only a logarithmic amount
of state per node, making it suitable for large-scale and dynamic settings.
X-Vine also helps protect the privacy of users social network contacts and
keeps their IP addresses hidden from those outside of their social circle,
providing a basis for pseudonymous communication. We first evaluate our design
with analysis and simulations, using several real world large-scale social
networking topologies. We show that the constraints of X-Vine allow the
insertion of only a logarithmic number of Sybil identities per attack edge; we
show this mitigates the impact of malicious attacks while not affecting the
performance of honest nodes. Moreover, our algorithms are efficient, maintain
low stretch, and avoid hot spots in the network. We validate our design with a
PlanetLab implementation and a Facebook plugin.
|
[
{
"version": "v1",
"created": "Mon, 5 Sep 2011 18:05:25 GMT"
}
] | 2011-09-06T00:00:00 |
[
[
"Mittal",
"Prateek",
""
],
[
"Caesar",
"Matthew",
""
],
[
"Borisov",
"Nikita",
""
]
] |
new_dataset
| 0.977167 |
1109.0456
|
EPTCS
|
Roberto Di Cosmo (Univ Paris Diderot, Sorbonne Paris Cite, and INRIA
Rocquencourt, Paris, France), Olivier Lhomme (IBM France, Sophia Antipolis,
France), Claude Michel (I3S (UNS-CNRS), Sophia Antipolis Cedex, France)
|
Aligning component upgrades
|
In Proceedings LoCoCo 2011, arXiv:1108.6097
|
EPTCS 65, 2011, pp. 1-11
|
10.4204/EPTCS.65.1
| null |
cs.SE cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modern software systems, like GNU/Linux distributions or Eclipse-based
development environment, are often deployed by selecting components out of
large component repositories. Maintaining such software systems by performing
component upgrades is a complex task, and the users need to have an expressive
preferences language at their disposal to specify the kind of upgrades they are
interested in. Recent research has shown that it is possible to develop solvers
that handle preferences expressed as a combination of a few basic criteria used
in the MISC competition, ranging from the number of new components to the
freshness of the final configuration. In this work we introduce a set of new
criteria that allow the users to specify their preferences for solutions with
components aligned to the same upstream sources, provide an efficient encoding
and report on the experimental results that prove that optimising these
alignment criteria is a tractable problem in practice.
|
[
{
"version": "v1",
"created": "Thu, 1 Sep 2011 07:34:01 GMT"
}
] | 2011-09-05T00:00:00 |
[
[
"Di Cosmo",
"Roberto",
"",
"Univ Paris Diderot, Sorbonne Paris Cite, and INRIA\n Rocquencourt, Paris, France"
],
[
"Lhomme",
"Olivier",
"",
"IBM France, Sophia Antipolis,\n France"
],
[
"Michel",
"Claude",
"",
"I3S"
]
] |
new_dataset
| 0.971645 |
1101.1895
|
Jean-Claude Belfiore
|
Patrick Sol\'e and Jean-Claude Belfiore
|
Constructive spherical codes near the Shannon bound
|
11 pages, 2 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Shannon gave a lower bound in 1959 on the binary rate of spherical codes of
given minimum Euclidean distance $\rho$. Using nonconstructive codes over a
finite alphabet, we give a lower bound that is weaker but very close for small
values of $\rho$. The construction is based on the Yaglom map combined with
some finite sphere packings obtained from nonconstructive codes for the
Euclidean metric. Concatenating geometric codes meeting the TVZ bound with a
Lee metric BCH code over $GF(p),$ we obtain spherical codes that are polynomial
time constructible. Their parameters outperform those obtained by Lachaud and
Stern in 1994. At very high rate they are above 98 per cent of the Shannon
bound.
|
[
{
"version": "v1",
"created": "Mon, 10 Jan 2011 17:26:33 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Sep 2011 08:56:14 GMT"
}
] | 2011-09-02T00:00:00 |
[
[
"Solé",
"Patrick",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
] |
new_dataset
| 0.9864 |
1108.5148
|
Mohammad Iftekhar Husain
|
Mohammad Iftekhar Husain, Suyash Mahant, Ramalingam Sridhar
|
CD-PHY: Physical Layer Security in Wireless Networks through
Constellation Diversity
|
9 pages, 15 figures
| null | null | null |
cs.CR cs.CC cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A common approach for introducing security at the physical layer is to rely
on the channel variations of the wireless environment. This type of approach is
not always suitable for wireless networks where the channel remains static for
most of the network lifetime. For these scenarios, a channel independent
physical layer security measure is more appropriate which will rely on a secret
known to the sender and the receiver but not to the eavesdropper. In this
paper, we propose CD-PHY, a physical layer security technique that exploits the
constellation diversity of wireless networks which is independent of the
channel variations. The sender and the receiver use a custom bit sequence to
constellation symbol mapping to secure the physical layer communication which
is not known a priori to the eavesdropper. Through theoretical modeling and
experimental simulation, we show that this information theoretic construct can
achieve Shannon secrecy and any brute force attack from the eavesdropper incurs
high overhead and minuscule probability of success. Our results also show that
the high bit error rate also makes decoding practically infeasible for the
eavesdropper, thus securing the communication between the sender and receiver.
|
[
{
"version": "v1",
"created": "Thu, 25 Aug 2011 18:26:44 GMT"
}
] | 2011-09-02T00:00:00 |
[
[
"Husain",
"Mohammad Iftekhar",
""
],
[
"Mahant",
"Suyash",
""
],
[
"Sridhar",
"Ramalingam",
""
]
] |
new_dataset
| 0.999685 |
1109.0077
|
Sheikh Shanawaz Mostafa
|
Sheikh Shanawaz Mostafa, Md. Mahbub Hossian, Khondker Jahid Reza and
Gazi Maniur Rashid
|
A Radio Based Intelligent Railway Grade Crossing System to Avoid
Collision
|
5 pages,4 figures, International Journal of Computer Science Issues,
Vol. 7, Issue 6, November 2010
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Railway grade crossing is become the major headache for the transportation
system. This paper describes an intelligent railway crossing control system for
multiple tracks that features a controller which receives messages from
incoming and outgoing trains by sensors. These messages contain detail
information including the direction and identity of a train. Depending on those
messages the controller device decides whenever the railroad crossing gate will
close or open.
|
[
{
"version": "v1",
"created": "Thu, 1 Sep 2011 03:18:32 GMT"
}
] | 2011-09-02T00:00:00 |
[
[
"Mostafa",
"Sheikh Shanawaz",
""
],
[
"Hossian",
"Md. Mahbub",
""
],
[
"Reza",
"Khondker Jahid",
""
],
[
"Rashid",
"Gazi Maniur",
""
]
] |
new_dataset
| 0.998253 |
1109.0264
|
Dimitris S. Papailiopoulos
|
Dimitris S. Papailiopoulos, Jianqiang Luo, Alexandros G. Dimakis,
Cheng Huang, and Jin Li
|
Simple Regenerating Codes: Network Coding for Cloud Storage
|
9 pages, 10 figures, submitted for publication
| null | null | null |
cs.IT cs.DC cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Network codes designed specifically for distributed storage systems have the
potential to provide dramatically higher storage efficiency for the same
availability. One main challenge in the design of such codes is the exact
repair problem: if a node storing encoded information fails, in order to
maintain the same level of reliability we need to create encoded information at
a new node. One of the main open problems in this emerging area has been the
design of simple coding schemes that allow exact and low cost repair of failed
nodes and have high data rates. In particular, all prior known explicit
constructions have data rates bounded by 1/2.
In this paper we introduce the first family of distributed storage codes that
have simple look-up repair and can achieve arbitrarily high rates. Our
constructions are very simple to implement and perform exact repair by simple
XORing of packets. We experimentally evaluate the proposed codes in a realistic
cloud storage simulator and show significant benefits in both performance and
reliability compared to replication and standard Reed-Solomon codes.
|
[
{
"version": "v1",
"created": "Thu, 1 Sep 2011 19:10:38 GMT"
}
] | 2011-09-02T00:00:00 |
[
[
"Papailiopoulos",
"Dimitris S.",
""
],
[
"Luo",
"Jianqiang",
""
],
[
"Dimakis",
"Alexandros G.",
""
],
[
"Huang",
"Cheng",
""
],
[
"Li",
"Jin",
""
]
] |
new_dataset
| 0.9936 |
1011.5534
|
Dhananjoy Dey
|
Dhananjoy Dey, Prasanna Raghaw Mishra1, Indranath Sengupta
|
GB-hash : Hash Functions Using Groebner Basis
|
The paper has been withdrawn. The authors have found some weaknesses
in this design
| null | null | null |
cs.CR math.AC
|
http://creativecommons.org/licenses/by/3.0/
|
In this paper we present an improved version of HF-hash, viz., GB-hash : Hash
Functions Using Groebner Basis. In case of HF-hash, the compression function
consists of 32 polynomials with 64 variables which were taken from the first 32
polynomials of hidden field equations challenge-1 by forcing last 16 variables
as 0. In GB-hash we have designed the compression function in such way that
these 32 polynomials with 64 variables form a minimal Groebner basis of the
ideal generated by them with respect to graded lexicographical (grlex) ordering
as well as with respect to graded reverse lexicographical (grevlex) ordering.
In this paper we will prove that GB-hash is more secure than HF-hash as well as
more secure than SHA-256. We have also compared the efficiency of our GB-hash
with SHA-256 and HF-hash.
|
[
{
"version": "v1",
"created": "Thu, 25 Nov 2010 00:14:19 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Aug 2011 05:04:51 GMT"
}
] | 2011-08-31T00:00:00 |
[
[
"Dey",
"Dhananjoy",
""
],
[
"Mishra1",
"Prasanna Raghaw",
""
],
[
"Sengupta",
"Indranath",
""
]
] |
new_dataset
| 0.998302 |
1108.5667
|
Stef De Pooter
|
Stef De Pooter, Johan Wittocx and Marc Denecker
|
A prototype of a knowledge-based programming environment
|
6 pages, appears in the Proceedings of the 19th International
Conference on Applications of Declarative Programming and Knowledge
Management (INAP 2011)
| null | null | null |
cs.AI cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present a proposal for a knowledge-based programming
environment. In such an environment, declarative background knowledge,
procedures, and concrete data are represented in suitable languages and
combined in a flexible manner. This leads to a highly declarative programming
style. We illustrate our approach on an example and report about our prototype
implementation.
|
[
{
"version": "v1",
"created": "Mon, 29 Aug 2011 17:38:33 GMT"
}
] | 2011-08-31T00:00:00 |
[
[
"De Pooter",
"Stef",
""
],
[
"Wittocx",
"Johan",
""
],
[
"Denecker",
"Marc",
""
]
] |
new_dataset
| 0.998795 |
1108.5720
|
Michael Noelle
|
Michael N\"olle and Martin Suda
|
Conjugate Variables as a Resource in Signal and Image Processing
|
22 pages, 2 tables, 6 figures
| null | null | null |
cs.CV physics.data-an quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we develop a new technique to model joint distributions of
signals. Our technique is based on quantum mechanical conjugate variables. We
show that the transition probability of quantum states leads to a distance
function on the signals. This distance function obeys the triangle inequality
on all quantum states and becomes a metric on pure quantum states. Treating
signals as conjugate variables allows us to create a new approach to segment
them.
Keywords: Quantum information, transition probability, Euclidean distance,
Fubini-study metric, Bhattacharyya coefficients, conjugate variable,
signal/sensor fusion, signal and image segmentation.
|
[
{
"version": "v1",
"created": "Mon, 29 Aug 2011 19:28:13 GMT"
}
] | 2011-08-30T00:00:00 |
[
[
"Nölle",
"Michael",
""
],
[
"Suda",
"Martin",
""
]
] |
new_dataset
| 0.993058 |
1101.4564
|
Vadim E. Levit
|
Vadim E. Levit and Eugen Mandrescu
|
A Set and Collection Lemma
|
7 pages, 3 figures
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A set S is independent if no two vertices from S are adjacent. In this paper
we prove that if F is a collection of maximum independent sets of a graph, then
there is a matching from S-{intersection of all members of F} into {union of
all members of F}-S, for every independent set S. Based on this finding we give
alternative proofs for a number of well-known lemmata, as the "Maximum Stable
Set Lemma" due to Claude Berge and the "Clique Collection Lemma" due to
Andr\'as Hajnal.
|
[
{
"version": "v1",
"created": "Mon, 24 Jan 2011 15:20:24 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Feb 2011 15:47:14 GMT"
},
{
"version": "v3",
"created": "Thu, 28 Apr 2011 16:51:14 GMT"
},
{
"version": "v4",
"created": "Thu, 18 Aug 2011 11:28:40 GMT"
},
{
"version": "v5",
"created": "Thu, 25 Aug 2011 13:50:06 GMT"
}
] | 2011-08-26T00:00:00 |
[
[
"Levit",
"Vadim E.",
""
],
[
"Mandrescu",
"Eugen",
""
]
] |
new_dataset
| 0.957283 |
1108.5095
|
Marcin Kik
|
Marcin Kik
|
RBO Protocol: Broadcasting Huge Databases for Tiny Receivers
| null | null | null | null |
cs.DS cs.DB cs.DC cs.DM cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a protocol (called RBO) for broadcasting long streams of
single-packet messages over radio channel for tiny, battery powered, receivers.
The messages are labeled by the keys from some linearly ordered set. The sender
repeatedly broadcasts a sequence of many (possibly millions) of messages, while
each receiver is interested in reception of a message with a specified key
within this sequence. The transmission is arranged so that the receiver can
wake up in arbitrary moment and find the nearest transmission of its searched
message. Even if it does not know the position of the message in the sequence,
it needs only to receive a small number of (the headers of) other messages to
locate it properly. Thus it can save energy by keeping the radio switched off
most of the time. We show that bit-reversal permutation has "recursive
bisection properties" and, as a consequence, RBO can be implemented very
efficiently with only constant number of $\log_2 n$-bit variables, where $n$ is
the total number of messages in the sequence. The total number of the required
receptions is at most $2\log_2 n +2$ in the model with perfect synchronization.
The basic procedure of RBO (computation of the time slot for the next required
reception) requires only $O(\log^3 n)$ bit-wise operations. We propose
implementation mechanisms for realistic model (with imperfect synchronization),
for operating systems (such as e.g. TinyOS).
|
[
{
"version": "v1",
"created": "Thu, 25 Aug 2011 14:05:30 GMT"
}
] | 2011-08-26T00:00:00 |
[
[
"Kik",
"Marcin",
""
]
] |
new_dataset
| 0.998418 |
1003.4719
|
Giorgi Japaridze
|
Giorgi Japaridze
|
Introduction to clarithmetic I
| null |
Information and Computation 209 (2011), pp. 1312-1354
|
10.1016/j.ic.2011.07.002
| null |
cs.LO cs.CC math.LO math.NT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
"Clarithmetic" is a generic name for formal number theories similar to Peano
arithmetic, but based on computability logic (see
http://www.cis.upenn.edu/~giorgi/cl.html) instead of the more traditional
classical or intuitionistic logics. Formulas of clarithmetical theories
represent interactive computational problems, and their "truth" is understood
as existence of an algorithmic solution. Imposing various complexity
constraints on such solutions yields various versions of clarithmetic. The
present paper introduces a system of clarithmetic for polynomial time
computability, which is shown to be sound and complete. Sound in the sense that
every theorem T of the system represents an interactive number-theoretic
computational problem with a polynomial time solution and, furthermore, such a
solution can be efficiently extracted from a proof of T. And complete in the
sense that every interactive number-theoretic problem with a polynomial time
solution is represented by some theorem T of the system. The paper is written
in a semitutorial style and targets readers with no prior familiarity with
computability logic.
|
[
{
"version": "v1",
"created": "Wed, 24 Mar 2010 19:33:44 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Apr 2010 06:29:45 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Apr 2010 15:45:55 GMT"
},
{
"version": "v4",
"created": "Tue, 12 Jul 2011 13:58:06 GMT"
},
{
"version": "v5",
"created": "Sun, 24 Jul 2011 11:50:45 GMT"
},
{
"version": "v6",
"created": "Tue, 23 Aug 2011 12:10:10 GMT"
}
] | 2011-08-24T00:00:00 |
[
[
"Japaridze",
"Giorgi",
""
]
] |
new_dataset
| 0.993867 |
1008.4177
|
Dung Nguyen
|
Dung Viet Nguyen, Shashi Kiran Chilappagari, Michael W. Marcellin,
Bane Vasic
|
LDPC Codes from Latin Squares Free of Small Trapping Sets
|
This is a 21 page paper. It contains 18 figures and 4 tables. This
paper was submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is concerned with the construction of low-density parity-check
(LDPC) codes with low error floors. Two main contributions are made. First, a
new class of structured LDPC codes is introduced. The parity check matrices of
these codes are arrays of permutation matrices which are obtained from Latin
squares and form a finite field under some matrix operations. Second, a method
to construct LDPC codes with low error floors on the binary symmetric channel
(BSC) is presented. Codes are constructed so that their Tanner graphs are free
of certain small trapping sets. These trapping sets are selected from the
Trapping Set Ontology for the Gallager A/B decoder. They are selected based on
their relative harmfulness for a given decoding algorithm. We evaluate the
relative harmfulness of different trapping sets for the sum product algorithm
(SPA) by using the topological relations among them and by analyzing the
decoding failures on one trapping set in the presence or absence of other
trapping sets.
|
[
{
"version": "v1",
"created": "Tue, 24 Aug 2010 23:42:09 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Aug 2011 17:15:09 GMT"
}
] | 2011-08-24T00:00:00 |
[
[
"Nguyen",
"Dung Viet",
""
],
[
"Chilappagari",
"Shashi Kiran",
""
],
[
"Marcellin",
"Michael W.",
""
],
[
"Vasic",
"Bane",
""
]
] |
new_dataset
| 0.999831 |
1108.3540
|
Elaine Render
|
Rupak Majumdar, Elaine Render and Paulo Tabuada
|
A theory of robust software synthesis
| null | null | null | null |
cs.SY cs.FL math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A key property for systems subject to uncertainty in their operating
environment is robustness, ensuring that unmodelled, but bounded, disturbances
have only a proportionally bounded effect upon the behaviours of the system.
Inspired by ideas from robust control and dissipative systems theory, we
present a formal definition of robustness and algorithmic tools for the design
of optimally robust controllers for omega-regular properties on discrete
transition systems. Formally, we define metric automata - automata equipped
with a metric on states - and strategies on metric automata which guarantee
robustness for omega-regular properties. We present fixed point algorithms to
construct optimally robust strategies in polynomial time. In contrast to
strategies computed by classical graph theoretic approaches, the strategies
computed by our algorithm ensure that the behaviours of the controlled system
gracefully degrade under the action of disturbances; the degree of degradation
is parameterized by the magnitude of the disturbance. We show an application of
our theory to the design of controllers that tolerate infinitely many transient
errors provided they occur infrequently enough.
|
[
{
"version": "v1",
"created": "Wed, 17 Aug 2011 18:30:58 GMT"
}
] | 2011-08-24T00:00:00 |
[
[
"Majumdar",
"Rupak",
""
],
[
"Render",
"Elaine",
""
],
[
"Tabuada",
"Paulo",
""
]
] |
new_dataset
| 0.985485 |
1108.4224
|
Graham Norton
|
Graham H. Norton
|
On Sequences with a Perfect Linear Complexity Profile
|
19 pages, 3 tables
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We derive B\'ezout identities for the minimal polynomials of a finite
sequence and use them to prove a theorem of Wang and Massey on binary sequences
with a perfect linear complexity profile. We give a new proof of Rueppel's
conjecture and simplify Dai's original proof. We obtain short proofs of results
of Niederreiter relating the linear complexity of a sequence s and K(s), which
was defined using continued fractions. We give an upper bound for the sum of
the linear complexities of any sequence. This bound is tight for sequences with
a perfect linear complexity profile and we apply it to characterise these
sequences in two new ways.
|
[
{
"version": "v1",
"created": "Mon, 22 Aug 2011 00:57:13 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Aug 2011 00:19:46 GMT"
}
] | 2011-08-24T00:00:00 |
[
[
"Norton",
"Graham H.",
""
]
] |
new_dataset
| 0.978245 |
0907.4573
|
Gregory Gutin
|
Noga Alon, Gregory Gutin, Eun Jung Kim, Stefan Szeider, and Anders Yeo
|
Solving MAX-r-SAT Above a Tight Lower Bound
| null | null | null | null |
cs.DS cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an exact algorithm that decides, for every fixed $r \geq 2$ in
time $O(m) + 2^{O(k^2)}$ whether a given multiset of $m$ clauses of size $r$
admits a truth assignment that satisfies at least $((2^r-1)m+k)/2^r$ clauses.
Thus \textsc{Max-$r$-Sat} is fixed-parameter tractable when parameterized by
the number of satisfied clauses above the tight lower bound $(1-2^{-r})m$. This
solves an open problem of Mahajan et al. (J. Comput. System Sci., 75, 2009).
Our algorithm is based on a polynomial-time data reduction procedure that
reduces a problem instance to an equivalent algebraically represented problem
with $O(k^2)$ variables. This is done by representing the instance as an
appropriate polynomial, and by applying a probabilistic argument combined with
some simple tools from Harmonic analysis to show that if the polynomial cannot
be reduced to one of size $O(k^2)$, then there is a truth assignment satisfying
the required number of clauses.
We introduce a new notion of bikernelization from a parameterized problem to
another one and apply it to prove that the above-mentioned parameterized
\textsc{Max-$r$-Sat} admits a polynomial-size kernel.
Combining another probabilistic argument with tools from graph matching
theory and signed graphs, we show that if an instance of \textsc{Max-2-Sat}
with $m$ clauses has at least $3k$ variables after application of certain
polynomial time reduction rules to it, then there is a truth assignment that
satisfies at least $(3m+k)/4$ clauses.
We also outline how the fixed-parameter tractability and polynomial-size
kernel results on \textsc{Max-$r$-Sat} can be extended to more general families
of Boolean Constraint Satisfaction Problems.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 09:10:25 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Jul 2009 07:45:35 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Nov 2009 14:48:23 GMT"
},
{
"version": "v4",
"created": "Mon, 22 Aug 2011 13:26:56 GMT"
}
] | 2011-08-23T00:00:00 |
[
[
"Alon",
"Noga",
""
],
[
"Gutin",
"Gregory",
""
],
[
"Kim",
"Eun Jung",
""
],
[
"Szeider",
"Stefan",
""
],
[
"Yeo",
"Anders",
""
]
] |
new_dataset
| 0.991122 |
1108.4048
|
Timothy Wang
|
Timothy Wang, Romain Jobredeaux, E. Feron
|
A graphical environment to express the semantics of control systems
| null | null | null | null |
cs.SY cs.PL math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the concept of a unified graphical environment for expressing the
semantics of control systems. The graphical control system design environment
in Simulink already allows engineers to insert a variety of assertions aimed
the verification and validation of the control software. We propose extensions
to a Simulink-like environment's annotation capabilities to include formal
control system stability, performance properties and their proofs. We provide a
conceptual description of a tool, that takes in a Simulink-like diagram of the
control system as the input, and generates a graphically annotated control
system diagram as the output. The annotations can either be inserted by the
user or generated automatically by a third party control analysis software such
as IQC$\beta$ or $\mu$-tool. We finally describe how the graphical
representation of the system and its properties can be translated to annotated
programs in a programming language used in verification and validation such as
Lustre or C.
|
[
{
"version": "v1",
"created": "Fri, 19 Aug 2011 20:49:52 GMT"
}
] | 2011-08-23T00:00:00 |
[
[
"Wang",
"Timothy",
""
],
[
"Jobredeaux",
"Romain",
""
],
[
"Feron",
"E.",
""
]
] |
new_dataset
| 0.996453 |
1108.4138
|
Sugata Sanyal
|
Suman Banik, Bibhash Roy, Parthi Dey, Nabendu Chaki, Sugata Sanyal
|
QoS Routing using OLSR with Optimization for Flooding
|
4 Pages, 3 Figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile Ad-hoc Network (MANET) is the self organizing collection of mobile
nodes. The communication in MANET is done via a wireless media. Ad hoc wireless
networks have massive commercial and military potential because of their
mobility support. Due to demanding real time multimedia applications, Quality
of Services (QoS) support in such infrastructure less networks have become
essential. QoS routing in mobile Ad-Hoc networks is challenging due to rapid
change in network topology. Consequently, the available state information for
routing is inherently imprecise. QoS routing may suffer badly due to several
factors including radio interference on available bandwidth, and inefficient
flooding of information to the adjacent nodes. As a result the performance of
the network degrades substantially. This paper aims at the solution for energy
efficient QoS routing by best utilization of network resources such as energy
and bandwidth. A comparative study shows that despite the overhead due to QoS
management, this solution performs better than classical OLSR protocol in terms
of QoS and efficient utilization of energy.
|
[
{
"version": "v1",
"created": "Sat, 20 Aug 2011 18:52:02 GMT"
}
] | 2011-08-23T00:00:00 |
[
[
"Banik",
"Suman",
""
],
[
"Roy",
"Bibhash",
""
],
[
"Dey",
"Parthi",
""
],
[
"Chaki",
"Nabendu",
""
],
[
"Sanyal",
"Sugata",
""
]
] |
new_dataset
| 0.992815 |
1108.4253
|
Thomas Braibant
|
Thomas Braibant (LIG)
|
Coquet: a Coq library for verifying hardware
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new library to model and verify hardware circuits in the Coq
proof assistant. This library allows one to easily build circuits by following
the usual pen-and-paper diagrams. We define a deep-embedding: we use a
(dependently typed) data-type that models the architecture of circuits, and a
meaning function. We propose tactics that ease the reasoning about the behavior
of the circuits, and we demonstrate that our approach is practicable by proving
the correctness of various circuits: a text-book divide and conquer adder of
parametric size, some higher-order combinators of circuits, and some sequential
circuits: a buffer, and a register.
|
[
{
"version": "v1",
"created": "Mon, 22 Aug 2011 08:14:38 GMT"
}
] | 2011-08-23T00:00:00 |
[
[
"Braibant",
"Thomas",
"",
"LIG"
]
] |
new_dataset
| 0.999645 |
1108.3850
|
Juraj Dzifcak
|
Chitta Baral and Juraj Dzifcak
|
Solving puzzles described in English by automated translation to answer
set programming and learning how to do that translation
| null | null | null | null |
cs.CL cs.AI cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a system capable of automatically solving combinatorial logic
puzzles given in (simplified) English. It involves translating the English
descriptions of the puzzles into answer set programming(ASP) and using ASP
solvers to provide solutions of the puzzles. To translate the descriptions, we
use a lambda-calculus based approach using Probabilistic Combinatorial
Categorial Grammars (PCCG) where the meanings of words are associated with
parameters to be able to distinguish between multiple meanings of the same
word. Meaning of many words and the parameters are learned. The puzzles are
represented in ASP using an ontology which is applicable to a large set of
logic puzzles.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2011 20:17:58 GMT"
}
] | 2011-08-22T00:00:00 |
[
[
"Baral",
"Chitta",
""
],
[
"Dzifcak",
"Juraj",
""
]
] |
new_dataset
| 0.990631 |
1108.3883
|
Wai Ho Mow
|
Yunghsiang S. Han, Rong Zheng and Wai Ho Mow
|
Exact Regenerating Codes for Byzantine Fault Tolerance in Distributed
Storage
|
Submitted to INFOCOM 2012 on 28 July 2011
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to the use of commodity software and hardware, crash-stop and Byzantine
failures are likely to be more prevalent in today's large-scale distributed
storage systems. Regenerating codes have been shown to be a more efficient way
to disperse information across multiple nodes and recover crash-stop failures
in the literature. In this paper, we present the design of regeneration codes
in conjunction with integrity check that allows exact regeneration of failed
nodes and data reconstruction in presence of Byzantine failures. A progressive
decoding mechanism is incorporated in both procedures to leverage computation
performed thus far. The fault-tolerance and security properties of the schemes
are also analyzed.
|
[
{
"version": "v1",
"created": "Fri, 19 Aug 2011 03:40:01 GMT"
}
] | 2011-08-22T00:00:00 |
[
[
"Han",
"Yunghsiang S.",
""
],
[
"Zheng",
"Rong",
""
],
[
"Mow",
"Wai Ho",
""
]
] |
new_dataset
| 0.998089 |
1108.3619
|
EPTCS
|
Golnaz Badkobeh (King's College London), Maxime Crochemore (King's
College London)
|
Finite-Repetition threshold for infinite ternary words
|
In Proceedings WORDS 2011, arXiv:1108.3412
|
EPTCS 63, 2011, pp. 37-43
|
10.4204/EPTCS.63.7
| null |
cs.FL cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The exponent of a word is the ratio of its length over its smallest period.
The repetitive threshold r(a) of an a-letter alphabet is the smallest rational
number for which there exists an infinite word whose finite factors have
exponent at most r(a). This notion was introduced in 1972 by Dejean who gave
the exact values of r(a) for every alphabet size a as it has been eventually
proved in 2009.
The finite-repetition threshold for an a-letter alphabet refines the above
notion. It is the smallest rational number FRt(a) for which there exists an
infinite word whose finite factors have exponent at most FRt(a) and that
contains a finite number of factors with exponent r(a). It is known from
Shallit (2008) that FRt(2)=7/3.
With each finite-repetition threshold is associated the smallest number of
r(a)-exponent factors that can be found in the corresponding infinite word. It
has been proved by Badkobeh and Crochemore (2010) that this number is 12 for
infinite binary words whose maximal exponent is 7/3.
We show that FRt(3)=r(3)=7/4 and that the bound is achieved with an infinite
word containing only two 7/4-exponent words, the smallest number.
Based on deep experiments we conjecture that FRt(4)=r(4)=7/5. The question
remains open for alphabets with more than four letters.
Keywords: combinatorics on words, repetition, repeat, word powers, word
exponent, repetition threshold, pattern avoidability, word morphisms.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2011 03:52:20 GMT"
}
] | 2011-08-19T00:00:00 |
[
[
"Badkobeh",
"Golnaz",
"",
"King's College London"
],
[
"Crochemore",
"Maxime",
"",
"King's\n College London"
]
] |
new_dataset
| 0.994827 |
1108.3623
|
EPTCS
|
Francine Blanchet-Sadri (University of North Carolina at Greensboro),
Aleksandar Chakarov (University of Colorado at Boulder), Lucas Manuelli
(Princeton University), Jarett Schwartz (Princeton University), Slater Stich
(Princeton University)
|
Recurrent Partial Words
|
In Proceedings WORDS 2011, arXiv:1108.3412
|
EPTCS 63, 2011, pp. 71-82
|
10.4204/EPTCS.63.11
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Partial words are sequences over a finite alphabet that may contain wildcard
symbols, called holes, which match or are compatible with all letters; partial
words without holes are said to be full words (or simply words). Given an
infinite partial word w, the number of distinct full words over the alphabet
that are compatible with factors of w of length n, called subwords of w, refers
to a measure of complexity of infinite partial words so-called subword
complexity. This measure is of particular interest because we can construct
partial words with subword complexities not achievable by full words. In this
paper, we consider the notion of recurrence over infinite partial words, that
is, we study whether all of the finite subwords of a given infinite partial
word appear infinitely often, and we establish connections between subword
complexity and recurrence in this more general framework.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2011 03:52:57 GMT"
}
] | 2011-08-19T00:00:00 |
[
[
"Blanchet-Sadri",
"Francine",
"",
"University of North Carolina at Greensboro"
],
[
"Chakarov",
"Aleksandar",
"",
"University of Colorado at Boulder"
],
[
"Manuelli",
"Lucas",
"",
"Princeton University"
],
[
"Schwartz",
"Jarett",
"",
"Princeton University"
],
[
"Stich",
"Slater",
"",
"Princeton University"
]
] |
new_dataset
| 0.99684 |
1108.3624
|
EPTCS
|
Fabio Burderi (Dipartimento di Matematica ed Applicazioni,
Universit\`a Degli Studi di Palermo)
|
Monoids and Maximal Codes
|
In Proceedings WORDS 2011, arXiv:1108.3412
|
EPTCS 63, 2011, pp. 83-92
|
10.4204/EPTCS.63.12
| null |
cs.FL math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years codes that are not Uniquely Decipherable (UD) are been
studied partitioning them in classes that localize the ambiguities of the code.
A natural question is how we can extend the notion of maximality to codes that
are not UD. In this paper we give an answer to this question. To do this we
introduce a partial order in the set of submonoids of a monoid showing the
existence, in this poset, of maximal elements that we call full monoids. Then a
set of generators of a full monoid is, by definition, a maximal code. We show
how this definition extends, in a natural way, the existing definition
concerning UD codes and we find a characteristic property of a monoid generated
by a maximal UD code.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2011 03:53:08 GMT"
}
] | 2011-08-19T00:00:00 |
[
[
"Burderi",
"Fabio",
"",
"Dipartimento di Matematica ed Applicazioni,\n Università Degli Studi di Palermo"
]
] |
new_dataset
| 0.995632 |
1108.3626
|
EPTCS
|
Stefano Crespi Reghizzi (Dipartimento di Elettronica e Informazione,
Politecnico di Milano), Pierluigi San Pietro (Dipartimento di Elettronica e
Informazione, Politecnico di Milano)
|
From Regular to Strictly Locally Testable Languages
|
In Proceedings WORDS 2011, arXiv:1108.3412
|
EPTCS 63, 2011, pp. 103-111
|
10.4204/EPTCS.63.14
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A classical result (often credited to Y. Medvedev) states that every language
recognized by a finite automaton is the homomorphic image of a local language,
over a much larger so-called local alphabet, namely the alphabet of the edges
of the transition graph. Local languages are characterized by the value k=2 of
the sliding window width in the McNaughton and Papert's infinite hierarchy of
strictly locally testable languages (k-slt). We generalize Medvedev's result in
a new direction, studying the relationship between the width and the alphabetic
ratio telling how much larger the local alphabet is. We prove that every
regular language is the image of a k-slt language on an alphabet of doubled
size, where the width logarithmically depends on the automaton size, and we
exhibit regular languages for which any smaller alphabetic ratio is
insufficient. More generally, we express the trade-off between alphabetic ratio
and width as a mathematical relation derived from a careful encoding of the
states. At last we mention some directions for theoretical development and
application.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2011 03:53:24 GMT"
}
] | 2011-08-19T00:00:00 |
[
[
"Reghizzi",
"Stefano Crespi",
"",
"Dipartimento di Elettronica e Informazione,\n Politecnico di Milano"
],
[
"Pietro",
"Pierluigi San",
"",
"Dipartimento di Elettronica e\n Informazione, Politecnico di Milano"
]
] |
new_dataset
| 0.995943 |
1108.3630
|
EPTCS
|
Irina A. Gorbunova (Ural Federal University), Arseny M. Shur (Ural
Federal University)
|
On Pansiot Words Avoiding 3-Repetitions
|
In Proceedings WORDS 2011, arXiv:1108.3412
|
EPTCS 63, 2011, pp. 138-146
|
10.4204/EPTCS.63.19
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The recently confirmed Dejean's conjecture about the threshold between
avoidable and unavoidable powers of words gave rise to interesting and
challenging problems on the structure and growth of threshold words. Over any
finite alphabet with k >= 5 letters, Pansiot words avoiding 3-repetitions form
a regular language, which is a rather small superset of the set of all
threshold words. Using cylindric and 2-dimensional words, we prove that, as k
approaches infinity, the growth rates of complexity for these regular languages
tend to the growth rate of complexity of some ternary 2-dimensional language.
The numerical estimate of this growth rate is about 1.2421.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2011 03:53:54 GMT"
}
] | 2011-08-19T00:00:00 |
[
[
"Gorbunova",
"Irina A.",
"",
"Ural Federal University"
],
[
"Shur",
"Arseny M.",
"",
"Ural\n Federal University"
]
] |
new_dataset
| 0.974249 |
1108.3638
|
EPTCS
|
Matthew J. Samuel (Rutgers, the State University of New Jersey)
|
Word posets, with applications to Coxeter groups
|
In Proceedings WORDS 2011, arXiv:1108.3412
|
EPTCS 63, 2011, pp. 226-230
|
10.4204/EPTCS.63.28
| null |
cs.DM cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We discuss the theory of certain partially ordered sets that capture the
structure of commutation classes of words in monoids. As a first application,
it follows readily that counting words in commutation classes is #P-complete.
We then apply the partially ordered sets to Coxeter groups. Some results are a
proof that enumerating the reduced words of elements of Coxeter groups is
#P-complete, a recursive formula for computing the number of commutation
classes of reduced words, as well as stronger bounds on the maximum number of
commutation classes than were previously known. This also allows us to improve
the known bounds on the number of primitive sorting networks.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2011 03:55:01 GMT"
}
] | 2011-08-19T00:00:00 |
[
[
"Samuel",
"Matthew J.",
"",
"Rutgers, the State University of New Jersey"
]
] |
new_dataset
| 0.99445 |
1108.3703
|
Nadeem Javaid
|
Nadeem Javaid, Ayesha Bibi, Akmal Javaid, Shahzad A. Malik
|
Modeling Routing Overhead Generated by Wireless Reactive Routing
Protocols
| null |
17th Asia-Pacific Conference on Communications (APCC2011)
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we have modeled the routing over- head generated by three
reactive routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic
Source Routing (DSR) and DYnamic MANET On-deman (DYMO). Routing performed by
reactive protocols consists of two phases; route discovery and route
maintenance. Total cost paid by a protocol for efficient routing is sum of the
cost paid in the form of energy consumed and time spent. These protocols
majorly focus on the optimization performed by expanding ring search algorithm
to control the flooding generated by the mechanism of blind flooding. So, we
have modeled the energy consumed and time spent per packet both for route
discovery and route maintenance. The proposed framework is evaluated in NS-2 to
compare performance of the chosen routing protocols.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2011 10:06:36 GMT"
}
] | 2011-08-19T00:00:00 |
[
[
"Javaid",
"Nadeem",
""
],
[
"Bibi",
"Ayesha",
""
],
[
"Javaid",
"Akmal",
""
],
[
"Malik",
"Shahzad A.",
""
]
] |
new_dataset
| 0.953134 |
1108.3412
|
EPTCS
|
Petr Ambro\v{z} (FNSPE, Czech Technical University in Prague),
\v{S}t\v{e}p\'an Holub (FMP, Charles University in Prague), Zuzana
Mas\'akov\'a (FNSPE, Czech Technical University in Prague)
|
Proceedings 8th International Conference Words 2011
|
EPTCS 63, 2011
| null |
10.4204/EPTCS.63
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
WORDS is the main international event in Combinatorics on Words. It is a
biannual conference devoted to research of words (i.e., finite or infinite
sequences of symbols over a finite alphabet) from combinatorial, algebraic and
algorithmic points of view. The emphasis of the conference is on mathematical
theory of words but the conference is also open to applications, mainly in
computer science, biology, linguistics and physics, gaining from the fact that
words arise as a natural object in many areas.
The eighth edition of the conference was organized in Prague from 12th to
16th September 2011 as a joint undertaking of the Czech Technical University
and the Charles University. This volume consists of contributed papers accepted
for presentation at the conference and summaries of invited lectures.
|
[
{
"version": "v1",
"created": "Wed, 17 Aug 2011 07:30:14 GMT"
}
] | 2011-08-18T00:00:00 |
[
[
"Ambrož",
"Petr",
"",
"FNSPE, Czech Technical University in Prague"
],
[
"Holub",
"Štěpán",
"",
"FMP, Charles University in Prague"
],
[
"Masáková",
"Zuzana",
"",
"FNSPE, Czech Technical University in Prague"
]
] |
new_dataset
| 0.992816 |
1108.3429
|
Bogdan Aman
|
Chiara Bodei, Linda Brodo
|
Brane Calculi Systems: A Static Preview of their Possible Behaviour
|
Presented at MeCBIC 2011
| null | null |
MeCBIC/2011/06
|
cs.LO cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We improve the precision of a previous Control Flow Analysis for Brane
Calculi, by adding information on the context and introducing causality
information on the membranes. This allows us to prove some biological
properties on the behaviour of systems specified in Brane Calculi.
|
[
{
"version": "v1",
"created": "Wed, 17 Aug 2011 09:04:48 GMT"
}
] | 2011-08-18T00:00:00 |
[
[
"Bodei",
"Chiara",
""
],
[
"Brodo",
"Linda",
""
]
] |
new_dataset
| 0.999684 |
1009.6134
|
Shoaib Saleem
|
Muhammad Shoaib Saleem, \'Eric Renault, Djamal Zeghlache
|
NetInf Mobile Node Architecture and Mobility Management based on LISP
Mobile Node
|
Accepted in IEEE Consumer Communications and Networking Conference
2011. Las Vegas, USA
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose an architecture for Network of Information mobile
node (NetInf MN). It bears characteristics and features of basic NetInf node
architecture with features introduced in the LISP MN architecture. We also
introduce a virtual node layer for mobility management in the Network of
Information. Therefore, by adopting this architecture no major changes in the
contemporary network topologies is required. Thus, making our approach more
practical.
|
[
{
"version": "v1",
"created": "Thu, 30 Sep 2010 13:52:18 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Aug 2011 10:51:02 GMT"
}
] | 2011-08-17T00:00:00 |
[
[
"Saleem",
"Muhammad Shoaib",
""
],
[
"Renault",
"Éric",
""
],
[
"Zeghlache",
"Djamal",
""
]
] |
new_dataset
| 0.997362 |
1108.3268
|
Al-Sakib Khan Pathan
|
Abdelgadir Tageldin Abdelgadir, Al-Sakib Khan Pathan, Mohiuddin Ahmed
|
On the Performance of MPI-OpenMP on a 12 nodes Multi-core Cluster
|
11 pages, to appear in ICA3PP'11 conference
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the increasing number of Quad-Core-based clusters and the introduction
of compute nodes designed with large memory capacity shared by multiple cores,
new problems related to scalability arise. In this paper, we analyze the
overall performance of a cluster built with nodes having a dual Quad-Core
Processor on each node. Some benchmark results are presented and some
observations are mentioned when handling such processors on a benchmark test. A
Quad-Core-based cluster's complexity arises from the fact that both local
communication and network communications between the running processes need to
be addressed. The potentials of an MPI-OpenMP approach are pinpointed because
of its reduced communication overhead. At the end, we come to a conclusion that
an MPI-OpenMP solution should be considered in such clusters since optimizing
network communications between nodes is as important as optimizing local
communications between processors in a multi-core cluster.
|
[
{
"version": "v1",
"created": "Tue, 16 Aug 2011 15:26:44 GMT"
}
] | 2011-08-17T00:00:00 |
[
[
"Abdelgadir",
"Abdelgadir Tageldin",
""
],
[
"Pathan",
"Al-Sakib Khan",
""
],
[
"Ahmed",
"Mohiuddin",
""
]
] |
new_dataset
| 0.997058 |
1108.3285
|
Kenta Kasai
|
Puripong Suthisopapan, Kenta Kasai, Anupap Meesomboon, Virasit
Imtawil, Kohichi Sakaniwa
|
Simple Low-Rate Non-Binary LDPC Coding for Relay Channels
|
submitted to IEEE JSAC
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Binary LDPC coded relay systems have been well studied previously with the
assumption of infinite codeword length. In this paper, we deal with non-binary
LDPC codes which can outperform their binary counterpart especially for
practical codeword length. We utilize non-binary LDPC codes and recently
invented non-binary coding techniques known as multiplicative repetition to
design the low-rate coding strategy for the decode-and-forward half-duplex
relay channel. We claim that the proposed strategy is simple since the
destination and the relay can decode with almost the same computational
complexity by sharing the same structure of decoder. Numerical experiments are
carried out to show that the performances obtained by non-binary LDPC coded
relay systems surpass the capacity of direct transmission and also approach
within less than 1.5 dB from the achievable rate of the relay channels.
|
[
{
"version": "v1",
"created": "Tue, 16 Aug 2011 17:13:31 GMT"
}
] | 2011-08-17T00:00:00 |
[
[
"Suthisopapan",
"Puripong",
""
],
[
"Kasai",
"Kenta",
""
],
[
"Meesomboon",
"Anupap",
""
],
[
"Imtawil",
"Virasit",
""
],
[
"Sakaniwa",
"Kohichi",
""
]
] |
new_dataset
| 0.992953 |
1012.2294
|
Steven Obua
|
Steven Obua
|
Syntax and Semantics of Babel-17
| null | null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present Babel-17, the first programming language for purely functional
structured programming (PFSP). Earlier work illustrated PFSP in the framework
of a toy research language. Babel-17 takes this earlier work to a new level by
showing how PFSP can be combined with pattern matching, object oriented
programming, and features like concurrency, lazy evaluation, memoization and
support for lenses.
|
[
{
"version": "v1",
"created": "Fri, 10 Dec 2010 15:37:06 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Jun 2011 07:34:05 GMT"
},
{
"version": "v3",
"created": "Thu, 21 Jul 2011 15:38:50 GMT"
},
{
"version": "v4",
"created": "Mon, 15 Aug 2011 09:21:52 GMT"
}
] | 2011-08-16T00:00:00 |
[
[
"Obua",
"Steven",
""
]
] |
new_dataset
| 0.994538 |
1108.2718
|
Seth Nielson
|
Seth James Nielson, Dan S. Wallach
|
The BitTorrent Anonymity Marketplace
|
15 page, 6 figure, technical report
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The very nature of operations in peer-to-peer systems such as BitTorrent
exposes information about participants to their peers. Nodes desiring
anonymity, therefore, often chose to route their peer-to-peer traffic through
anonymity relays, such as Tor. Unfortunately, these relays have little
incentive for contribution and struggle to scale with the high loads that P2P
traffic foists upon them. We propose a novel modification for BitTorrent that
we call the BitTorrent Anonymity Marketplace. Peers in our system trade in k
swarms obscuring the actual intent of the participants. But because peers can
cross-trade torrents, the k-1 cover traffic can actually serve a useful
purpose. This creates a system wherein a neighbor cannot determine if a node
actually wants a given torrent, or if it is only using it as leverage to get
the one it really wants. In this paper, we present our design, explore its
operation in simulation, and analyze its effectiveness. We demonstrate that the
upload and download characteristics of cover traffic and desired torrents are
statistically difficult to distinguish.
|
[
{
"version": "v1",
"created": "Fri, 12 Aug 2011 21:06:04 GMT"
}
] | 2011-08-16T00:00:00 |
[
[
"Nielson",
"Seth James",
""
],
[
"Wallach",
"Dan S.",
""
]
] |
new_dataset
| 0.988001 |
1108.2776
|
Mohammad Jalil Piran
|
Mohammad Jalil Piran, G. Rama Murthy, G. Praveen Babu
|
Vehicular Ad Hoc and Sensor Networks; Principles and Challenges
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The rapid increase of vehicular traffic and congestion on the highways began
hampering the safe and efficient movement of traffic. Consequently, year by
year, we see the ascending rate of car accidents and casualties in most of the
countries. Therefore, exploiting the new technologies, e.g. wireless sensor
networks, is required as a solution of reduction of these saddening and
reprehensible statistics. This has motivated us to propose a novel and
comprehensive system to utilize Wireless Sensor Networks for vehicular
networks. We coin the vehicular network employing wireless Sensor networks as
Vehicular Ad Hoc and Sensor Network, or VASNET in short. The proposed VASNET is
particularly for highway traffic .VASNET is a self-organizing Ad Hoc and sensor
network comprised of a large number of sensor nodes. In VASNET there are two
kinds of sensor nodes, some are embedded on the vehicles-vehicular nodes- and
others are deployed in predetermined distances besides the highway road, known
as Road Side Sensor nodes (RSS). The vehicular nodes are used to sense the
velocity of the vehicle for instance. We can have some Base Stations (BS) such
as Police Traffic Station, Firefighting Group and Rescue Team. The base
stations may be stationary or mobile. VASNET provides capability of wireless
communication between vehicular nodes and stationary nodes, to increase safety
and comfort for vehicles on the highway roads. In this paper we explain main
fundamentals and challenges of VASNET.
|
[
{
"version": "v1",
"created": "Sat, 13 Aug 2011 08:30:49 GMT"
}
] | 2011-08-16T00:00:00 |
[
[
"Piran",
"Mohammad Jalil",
""
],
[
"Murthy",
"G. Rama",
""
],
[
"Babu",
"G. Praveen",
""
]
] |
new_dataset
| 0.985689 |
1108.2846
|
Hyunseok Chang
|
Hyunseok Chang and Sae-Young Chung
|
Capacity of Strong and Very Strong Gaussian Interference
Relay-without-delay Channels
|
19 pages, 2 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we study the interference relay-without-delay channel which is
an interference channel with a relay helping the communication. We assume the
relay's transmit symbol depends not only on its past received symbols but also
on its current received symbol, which is an appropriate model for studying
amplify-and-forward type relaying when the overall delay spread is much smaller
than the inverse of the bandwidth. For the discrete memoryless interference
relay-without-delay channel, we show an outer bound using genie-aided outer
bounding. For the Gaussian interference relay-without-delay channel, we define
strong and very strong interference relay-without-delay channels and propose an
achievable scheme based on instantaneous amplify-and-forward (AF) relaying. We
also propose two outer bounds for the strong and very strong cases. Using the
proposed achievable scheme and outer bounds, we show that our scheme can
achieve the capacity exactly when the relay's transmit power is greater than a
certain threshold. This is surprising since the conventional AF relaying is
usually only asymptotically optimal, not exactly optimal. The proposed scheme
can be useful in many practical scenarios due to its optimality as well as its
simplicity.
|
[
{
"version": "v1",
"created": "Sun, 14 Aug 2011 07:31:21 GMT"
}
] | 2011-08-16T00:00:00 |
[
[
"Chang",
"Hyunseok",
""
],
[
"Chung",
"Sae-Young",
""
]
] |
new_dataset
| 0.997235 |
1108.2960
|
Alexander Lubotzky
|
Tali Kaufman, Alexander Lubotzky
|
Edge Transitive Ramanujan Graphs and Highly Symmetric LDPC Good Codes
| null | null | null | null |
cs.IT math.CO math.GR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a symmetric LDPC code with constant rate and constant distance
(i.e. good LDPC code) that its constraint space is generated by the orbit of
one constant weight constraint under a group action. Our construction provides
the first symmetric LDPC good codes. This solves the main open problem raised
by Kaufman and Wigderson in [4].
|
[
{
"version": "v1",
"created": "Mon, 15 Aug 2011 09:45:53 GMT"
}
] | 2011-08-16T00:00:00 |
[
[
"Kaufman",
"Tali",
""
],
[
"Lubotzky",
"Alexander",
""
]
] |
new_dataset
| 0.999749 |
1107.4624
|
Deniz Sarioz
|
Matthew P. Johnson and Deniz Sarioz
|
Computing the obstacle number of a plane graph
|
7 pages, 3 figures
| null | null | null |
cs.CG cs.DM cs.DS math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An obstacle representation of a plane graph G is V(G) together with a set of
opaque polygonal obstacles such that G is the visibility graph on V(G)
determined by the obstacles. We investigate the problem of computing an
obstacle representation of a plane graph (ORPG) with a minimum number of
obstacles. We call this minimum size the obstacle number of G.
First, we show that ORPG is NP-hard by reduction from planar vertex cover,
resolving a question posed by [8]. Second, we give a reduction from ORPG to
maximum degree 3 planar vertex cover. Since this reduction preserves solution
values, it follows that ORPG is fixed parameter tractable (FPT) and admits a
polynomial-time approximation scheme (PTAS).
|
[
{
"version": "v1",
"created": "Fri, 22 Jul 2011 20:43:21 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Aug 2011 18:43:00 GMT"
}
] | 2011-08-15T00:00:00 |
[
[
"Johnson",
"Matthew P.",
""
],
[
"Sarioz",
"Deniz",
""
]
] |
new_dataset
| 0.970259 |
1108.2358
|
EPTCS
|
Mar\'ia Alpuente (Universidad Polit\'ecnica de Valencia), Demis Ballis
(University of Udine), Javier Espert (Universidad Polit\'ecnica de Valencia),
Francisco Frechina (Universidad Polit\'ecnica de Valencia), Daniel Romero
(Universidad Polit\'ecnica de Valencia)
|
Debugging of Web Applications with Web-TLR
|
In Proceedings WWV 2011, arXiv:1108.2085
|
EPTCS 61, 2011, pp. 66-80
|
10.4204/EPTCS.61.5
| null |
cs.LO cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Web-TLR is a Web verification engine that is based on the well-established
Rewriting Logic--Maude/LTLR tandem for Web system specification and
model-checking. In Web-TLR, Web applications are expressed as rewrite theories
that can be formally verified by using the Maude built-in LTLR model-checker.
Whenever a property is refuted, a counterexample trace is delivered that
reveals an undesired, erroneous navigation sequence. Unfortunately, the
analysis (or even the simple inspection) of such counterexamples may be
unfeasible because of the size and complexity of the traces under examination.
In this paper, we endow Web-TLR with a new Web debugging facility that supports
the efficient manipulation of counterexample traces. This facility is based on
a backward trace-slicing technique for rewriting logic theories that allows the
pieces of information that we are interested to be traced back through inverse
rewrite sequences. The slicing process drastically simplifies the computation
trace by dropping useless data that do not influence the final result. By using
this facility, the Web engineer can focus on the relevant fragments of the
failing application, which greatly reduces the manual debugging effort and also
decreases the number of iterative verifications.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2011 09:27:47 GMT"
}
] | 2011-08-12T00:00:00 |
[
[
"Alpuente",
"María",
"",
"Universidad Politécnica de Valencia"
],
[
"Ballis",
"Demis",
"",
"University of Udine"
],
[
"Espert",
"Javier",
"",
"Universidad Politécnica de Valencia"
],
[
"Frechina",
"Francisco",
"",
"Universidad Politécnica de Valencia"
],
[
"Romero",
"Daniel",
"",
"Universidad Politécnica de Valencia"
]
] |
new_dataset
| 0.99886 |
1108.2482
|
Saurabh Shivale Mr
|
Saurabh Anandrao Shivale
|
Cryptovirology: Virus Approach
| null |
International Journal of Network Security & Its Applications
(IJNSA), Vol.3, No.4, July 2011
|
10.5121/ijnsa.2011.3404
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Traditionally, "Cryptography" is a benediction to information processing and
communications, it helps people to store information securely and the private
communications over long distances. Cryptovirology is the study of applications
of cryptography to build the malicious software. It is an investigation, how
modern cryptographic tools and paradigms can be used to strengthen, develop and
improve new malicious software attacks. Cryptovirology attacks have been
categorized as : give malware enhanced privacy and be more robust against
reverse-engineering, secondly give the attacker enhanced anonymity while
communicating with deployed malware. This paper presents the idea of
"Cryptovirology" which introduce a twist on how cryptography can also be used
offensively. Being offensive means, it can be used to mount extortion based
attacks that cause loss of access to information, loss of confidentiality, and
information leakage, tasks which cryptography usually prevents. Also analyze
threats and attacks that misuse of cryptography can cause when combined with
fraudulent software (viruses, Trojans). Public-key cryptography is very
essential for the attacks that based on cryptovirology. This paper also suggest
some of the countermeasures, mechanisms to cope with and prevent such attacks.
Even if the attackers actions on the host machine are being monitored, it still
cannot be proven beyond reasonable doubt that he or she is the attacker; and it
is an "originator-concealing attack". Evidence should be collected from the
"author's own system which was used for the attack". These attacks have
implications on how the use of cryptographic tools and techniques should be
audited and managed in general purpose computing environments, and imply that
access to the cryptographic tools should be in well control of the system(such
as API routines).
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2011 18:37:05 GMT"
}
] | 2011-08-12T00:00:00 |
[
[
"Shivale",
"Saurabh Anandrao",
""
]
] |
new_dataset
| 0.997492 |
1108.0496
|
Bogdan Aman
|
Bogdan Aman
|
Spatial Dynamic Structures and Mobility in Computation
|
20 pages, 1 figure, PhD Thesis (Extended Abstract)
| null | null |
FML-11-01
|
cs.DC math.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Membrane computing is a well-established and successful research field which
belongs to the more general area of molecular computing. Membrane computing
aims at defining parallel and non-deterministic computing models, called
membrane systems or P Systems, which abstract from the functioning and
structure of the cell. A membrane system consists of a spatial structure, a
hierarchy of membranes which do not intersect, with a distinguishable membrane
called skin surrounding all of them. A membrane without any other membranes
inside is elementary, while a non-elementary membrane is a composite membrane.
The membranes define demarcations between regions; for each membrane there is a
unique associated region. Since we have a one-to-one correspondence, we
sometimes use membrane instead of region, and vice-versa. The space outside the
skin membrane is called the environment.
In this thesis we define and investigate variants of systems of mobile
membranes as models for molecular computing and as modelling paradigms for
biological systems. On one hand, we follow the standard approach of research in
membrane computing: defining a notion of computation for systems of mobile
membranes, and investigating the computational power of such computing devices.
Specifically, we address issues concerning the power of operations for
modifying the membrane structure of a system of mobile membranes by mobility:
endocytosis (moving a membrane inside a neighbouring membrane) and endocytosis
(moving a membrane outside the membrane where it is placed). On the other hand,
we relate systems of mobile membranes to process algebra (mobile ambients,
timed mobile ambients, pi-calculus, brane calculus) by providing some encodings
and adding some concepts inspired from process algebra in the framework of
mobile membrane computing.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2011 07:17:06 GMT"
}
] | 2011-08-11T00:00:00 |
[
[
"Aman",
"Bogdan",
""
]
] |
new_dataset
| 0.999121 |
1108.2058
|
Muriel Dulieu
|
Boris Aronov, Muriel Dulieu, and Ferran Hurtado
|
Witness Rectangle Graphs
|
In Proceedings of the 12th International Symposium on Algorithms and
Data Structures (WADS), p.73-85, August 2011, New York, NY, USA
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a witness rectangle graph (WRG) on vertex point set P with respect to
witness points set W in the plane, two points x, y in P are adjacent whenever
the open isothetic rectangle with x and y as opposite corners contains at least
one point in W. WRGs are representative of a a larger family of witness
proximity graphs introduced in two previous papers. We study graph-theoretic
properties of WRGs. We prove that any WRG has at most two non-trivial connected
components. We bound the diameter of the non-trivial connected components of a
WRG in both the one-component and two-component cases. In the latter case, we
prove that a graph is representable as a WRG if and only if each component is a
connected co-interval graph, thereby providing a complete characterization of
WRGs of this type. We also completely characterize trees drawable as WRGs. In
addition, we prove that a WRG with no isolated vertices has domination number
at most four. Moreover, we show that any combinatorial graph can be drawn as a
WRG using a combination of positive and negative witnesses. Finally we conclude
with some related results on the number of points required to stab all the
rectangles defined by a set of n point.
|
[
{
"version": "v1",
"created": "Tue, 9 Aug 2011 22:04:20 GMT"
}
] | 2011-08-11T00:00:00 |
[
[
"Aronov",
"Boris",
""
],
[
"Dulieu",
"Muriel",
""
],
[
"Hurtado",
"Ferran",
""
]
] |
new_dataset
| 0.999738 |
1108.2063
|
Muriel Dulieu
|
Boris Aronov and Muriel Dulieu
|
How to Cover a Point Set with a V-Shape of Minimum Width
|
In Proceedings of the 12th International Symposium on Algorithms and
Data Structures (WADS), p.61-72, August 2011, New York, NY, USA
| null | null | null |
cs.CG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A balanced V-shape is a polygonal region in the plane contained in the union
of two crossing equal-width strips. It is delimited by two pairs of parallel
rays that emanate from two points x, y, are contained in the strip boundaries,
and are mirror-symmetric with respect to the line xy. The width of a balanced
V-shape is the width of the strips. We first present an O(n^2 log n) time
algorithm to compute, given a set of n points P, a minimum-width balanced
V-shape covering P. We then describe a PTAS for computing a
(1+epsilon)-approximation of this V-shape in time O((n/epsilon)log
n+(n/epsilon^(3/2))log^2(1/epsilon)). A much simpler constant-factor
approximation algorithm is also described.
|
[
{
"version": "v1",
"created": "Tue, 9 Aug 2011 22:29:31 GMT"
}
] | 2011-08-11T00:00:00 |
[
[
"Aronov",
"Boris",
""
],
[
"Dulieu",
"Muriel",
""
]
] |
new_dataset
| 0.999411 |
1108.2149
|
Tolga Mataracioglu
|
Tolga Mataracioglu, Sevgi Ozkan
|
User Awareness Measurement Through Social Engineering
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
TUBITAK National Research Institute of Electronics and Cryptology (UEKAE)
Department of Information Systems Security makes social engineering attacks to
Turkish public agencies within the frame of "Information Security Tests" [19].
This paper will make an analysis of the social engineering tests that have been
carried out in several Turkish public agencies. The tests include phone calling
to sample employees by the social engineer and trying to seize employees'
sensitive information by exploiting their good faith. The aim of this research
is to figure that the employees in Turkish public agencies have a lack of
information security awareness and they compromise the information security
principles which should be necessarily applied for any public agencies. Social
engineering, both with its low cost and ability to take advantage of low
technology, has taken its place in the information security literature as a
very effective form of attack [8].
|
[
{
"version": "v1",
"created": "Wed, 10 Aug 2011 10:59:10 GMT"
}
] | 2011-08-11T00:00:00 |
[
[
"Mataracioglu",
"Tolga",
""
],
[
"Ozkan",
"Sevgi",
""
]
] |
new_dataset
| 0.97298 |
1104.0779
|
Moti Medina
|
Guy Even, Yaniv Fais, Moti Medina, Shimon (Moni) Shahar, Alexander
Zadorojniy
|
Real-Time Video Streaming in Multi-hop Wireless Static Ad Hoc Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We deal with the problem of streaming multiple video streams between pairs of
nodes in a multi-hop wireless ad hoc network. The nodes are static, know their
locations, and are synchronized (via GPS). We introduce a new interference
model that uses variable interference radiuses. We present an algorithm for
computing a frequency assignment and a schedule whose goal is to maximize
throughput over all the video streams. In addition, we developed a localized
flow-control mechanism to stabilize the queue lengths.
We simulated traffic scheduled by the algorithm using OMNET++/MixiM (i.e.,
physical SINR interference model with 802.11g) to test whether the computed
throughput is achieved. The results of the simulation show that the computed
solution is \SINR-feasible and achieves predictable stable throughputs.
|
[
{
"version": "v1",
"created": "Tue, 5 Apr 2011 09:08:39 GMT"
},
{
"version": "v2",
"created": "Tue, 31 May 2011 09:28:35 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Jun 2011 17:15:19 GMT"
},
{
"version": "v4",
"created": "Sun, 7 Aug 2011 08:37:09 GMT"
}
] | 2011-08-09T00:00:00 |
[
[
"Even",
"Guy",
"",
"Moni"
],
[
"Fais",
"Yaniv",
"",
"Moni"
],
[
"Medina",
"Moti",
"",
"Moni"
],
[
"Shimon",
"",
"",
"Moni"
],
[
"Shahar",
"",
""
],
[
"Zadorojniy",
"Alexander",
""
]
] |
new_dataset
| 0.99828 |
1108.1421
|
Sheng Yang
|
Sheng Yang, Pablo Piantanida, Mari Kobayashi, Shlomo Shamai (Shitz)
|
On the Secrecy Degrees of Freedom of Multi-Antenna Wiretap Channels with
Delayed CSIT
|
5 pages, 1 figure, 1 table. This work has been presented at ISIT
2011. The current version fixes several bugs in the Proceedings
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The secrecy degrees of freedom (SDoF) of the Gaussian multiple-input and
single-output (MISO) wiretap channel is studied under the assumption that
delayed channel state information (CSI) is available at the transmitter and
each receiver knows its own instantaneous channel. We first show that a
strictly positive SDoF can be guaranteed whenever the transmitter has delayed
CSI (either on the legitimate channel or/and the eavesdropper channel). In
particular, in the case with delayed CSI on both channels, it is shown that the
optimal SDoF is 2/3. We then generalize the result to the two-user Gaussian
MISO broadcast channel with confidential messages and characterize the SDoF
region when the transmitter has delayed CSI of both receivers. Interestingly,
the artificial noise schemes exploiting several time instances are shown to
provide the optimal SDoF region by masking the confidential message to the
unintended receiver while aligning the interference at each receiver.
|
[
{
"version": "v1",
"created": "Fri, 5 Aug 2011 22:36:32 GMT"
}
] | 2011-08-09T00:00:00 |
[
[
"Yang",
"Sheng",
"",
"Shitz"
],
[
"Piantanida",
"Pablo",
"",
"Shitz"
],
[
"Kobayashi",
"Mari",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] |
new_dataset
| 0.959461 |
1108.1425
|
Radwan Abujassar
|
Radwan abujassar and Mohammed ghanbari
|
A Driven Backup Routing Table to Find Alternative Dijoint Path in Ad Hoc
Wireless
|
10pages
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The performances of the routing protocols are important since they compute
the primary path between source and destination. In addition, routing protocols
need to detect failure within a short period of time when nodes move to start
updating the routing table in order to find a new primary path to the
destination. Meantime, loss of packets and end-to- end delays will increase
thereby reducing throughput and degrading the performance of the network. This
paper proposes a new algorithm, DBRT (Driven Backup Routing Table), to improve
the existing proactive protocols such as DSDV (Destination Sequenced Distance
Vector) protocol by creating a backup routing table to provide multiple
alternative routes. The DBRT algorithm identifies adjacent nodes for each node
in the same range and then selects one of these as a backup next hop according
to the available path to the destination. The results show that loss of data
packets, throughput and end-to-end delay times between source and destination
are improved. The results show that the new protocol does not degrade the
network's performance despite sending extra messages to construct and update
the new backup routing table. Simulations (using an NS2 simulator) are
undertaken to demonstrate the difference between using a DSDV protocol with or
without the proposed schema.
|
[
{
"version": "v1",
"created": "Fri, 5 Aug 2011 23:24:46 GMT"
}
] | 2011-08-09T00:00:00 |
[
[
"abujassar",
"Radwan",
""
],
[
"ghanbari",
"Mohammed",
""
]
] |
new_dataset
| 0.961633 |
1108.1785
|
Wenji Wu
|
Wenji Wu, Phil DeMar, Don Holmgren, Amitoj Singh, Ruth Pordes
|
G-NetMon: A GPU-accelerated Network Performance Monitoring System for
Large Scale Scientific Collaborations
| null | null | null | null |
cs.NI
|
http://creativecommons.org/licenses/publicdomain/
|
Network traffic is difficult to monitor and analyze, especially in
high-bandwidth networks. Performance analysis, in particular, presents extreme
complexity and scalability challenges. GPU (Graphics Processing Unit)
technology has been utilized recently to accelerate general purpose scientific
and engineering computing. GPUs offer extreme thread-level parallelism with
hundreds of simple cores. Their data-parallel execution model can rapidly solve
large problems with inherent data parallelism. At Fermilab, we have prototyped
a GPU-accelerated network performance monitoring system, called G-NetMon, to
support large-scale scientific collaborations. In this work, we explore new
opportunities in network traffic monitoring and analysis with GPUs. Our system
exploits the data parallelism that exists within network flow data to provide
fast analysis of bulk data movement between Fermilab and collaboration sites.
Experiments demonstrate that our G-NetMon can rapidly detect sub-optimal bulk
data movements.
|
[
{
"version": "v1",
"created": "Mon, 8 Aug 2011 19:25:49 GMT"
}
] | 2011-08-09T00:00:00 |
[
[
"Wu",
"Wenji",
""
],
[
"DeMar",
"Phil",
""
],
[
"Holmgren",
"Don",
""
],
[
"Singh",
"Amitoj",
""
],
[
"Pordes",
"Ruth",
""
]
] |
new_dataset
| 0.986315 |
1108.1152
|
Jenny Blight
|
Oluwaranti Adeniran and Achimugu Philip
|
Development and Deployment of Fixed Wireless Access in South West
Nigeria: Performance and Evaluation
|
Submitted to Journal of Computer Science and Engineering, see
http://sites.google.com/site/jcseuk/volume-7-issue-2-june-2011
|
Journal of Computer Science and Engineering, Volume 7, Issue 2,
p51-57, June 2011
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fixed Wireless Access (FWA) involves the use of wireless technology to
replace copper to connect subscribers to the telephone network. It is a variant
of wireless broadband which provides an alternative in the so-called 'last
mile' connectivity between the subscriber and the fixed telecommunications
network. FWA could either be narrowband or broadband and it is predominantly
deployed using the Code Division Multiple Access (CDMA) technology. In
assessing the extent of development and deployment of FWA, the perspective of
the operators and users was elicited primarily through the use of
questionnaires. Issues like setup cost, tax, Government incentive, availability
of infrastructure and manpower applied to the operators while on the users'
part factors like quality of service, signal strength as well as call rate were
considered. The South western zone of Nigeria is regarded as one of the most
urbanized regions in the south of Sahara, this is not out of place considering
the fact that Lagos which is the nation's commercial nerve centre and a
mega-city is located within this region. The scope of this research covered
this very lively part of the country. The relationship between the parameters
or variables considered was established using an appropriate statistical
method: The Regression analysis. In terms of users' preference, Global System
of Mobile communication (GSM) was compared with FWA. Results were interpreted
and suitable conclusions were drawn to wrap up a quite revealing work.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2011 18:02:03 GMT"
}
] | 2011-08-08T00:00:00 |
[
[
"Adeniran",
"Oluwaranti",
""
],
[
"Philip",
"Achimugu",
""
]
] |
new_dataset
| 0.998506 |
1108.1302
|
Ashok Kumar Das
|
Ashok Kumar Das
|
A Key Establishment Scheme for Mobile Wireless Sensor Networks Using
Post-Deployment Knowledge
|
Published in International Journal of Computer Networks &
Communications (IJCNC) Vol.3, No.4, July 2011
| null |
10.5121/ijcnc.2011.3405
| null |
cs.CR
|
http://creativecommons.org/licenses/by/3.0/
|
Establishment of pairwise keys between sensor nodes in a sensor network is a
difficult problem due to resource limitations of sensor nodes as well as
vulnerability to physical captures of sensor nodes by the enemy. Public-key
cryptosystems are not much suited for most resource-constrained sensor
networks. Recently, elliptic curve cryptographic techniques show that public
key cryptosystem is also feasible for resource-constrained sensor networks.
However, most researchers accept that the symmetric key cryptosystems are
viable options for resource-constrained sensor networks. In this paper, we
first develop a basic principle to address the key pre-distribution problem in
mobile sensor networks. Then, using this developed basic principle, we propose
a scheme which takes the advantage of the post-deployment knowledge. Our scheme
is a modified version of the key prioritization technique proposed by Liu and
Ning. Our improved scheme provides reasonable network connectivity and
security. Moreover, the proposed scheme works for any deployment topology.
|
[
{
"version": "v1",
"created": "Fri, 5 Aug 2011 11:25:28 GMT"
}
] | 2011-08-08T00:00:00 |
[
[
"Das",
"Ashok Kumar",
""
]
] |
new_dataset
| 0.984753 |
1108.1341
|
Bingxuan Zhao
|
Bingxuan Zhao and Shigeru Shimamoto
|
Two-stage coordination multi-radio multi-channel mac protocol for
wireless mesh networks
|
18 pages 9 figures
|
International Journal of Computer Networks & Communications
(IJCNC), Vol.3, No.4, July 2011, pp.99-116
| null | null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Within the wireless mesh network, a bottleneck problem arises as the number
of concurrent traffic flows (NCTF) increases over a single common control
channel, as it is for most conventional networks. To alleviate this problem,
this paper proposes a two-stage coordination multi-radio multi-channel MAC
(TSC-M2MAC) protocol that designates all available channels as both control
channels and data channels in a time division manner through a two-stage
coordination. At the first stage, a load balancing breadth-first-search-based
vertex coloring algorithm for multi-radio conflict graph is proposed to
intelligently allocate multiple control channels. At the second stage, a
REQ/ACK/RES mechanism is proposed to realize dynamical channel allocation for
data transmission. At this stage, the Channel-and-Radio Utilization Structure
(CRUS) maintained by each node is able to alleviate the hidden nodes problem;
also, the proposed adaptive adjustment algorithm for the Channel Negotiation
and Allocation (CNA) sub-interval is able to cope with the variation of NCTF.
In addition, we design a power saving mechanism for the TSC-M2MAC to decrease
its energy consumption. Simulation results show that the proposed protocol is
able to achieve higher throughput and lower end-to-end packet delay than
conventional schemes. They also show that the TSC-M2MAC can achieve load
balancing, save energy, and remain stable when the network becomes saturated.
|
[
{
"version": "v1",
"created": "Fri, 5 Aug 2011 14:49:26 GMT"
}
] | 2011-08-08T00:00:00 |
[
[
"Zhao",
"Bingxuan",
""
],
[
"Shimamoto",
"Shigeru",
""
]
] |
new_dataset
| 0.989 |
1108.1344
|
Nenad Stojanovski
|
Nenad Stojanovski, Marjan Gusev
|
Architecture Of A Identity Based Firewall System
|
9 pages, 3 figures, 1 table; (ISSN: 0975- 2307); International
Journal of Network Security & Its Applications July 2011, Volume 3, Number 4
| null |
10.5121/ijnsa
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Classic firewall systems are built to filter traffic based on IP addresses,
source and destination ports and protocol types. The modern networks have grown
to a level where the possibility for users' mobility is a must. In such
networks, modern firewalls may introduce such complexity where administration
can become very frustrating since it needs the intervention of a firewall
administrator. The solution for this problem is an identity based firewall
system. In this paper we will present a new design of a firewall system that
uses the user's identity to filter the traffic. In the design phase we will
define key points which have to be satisfied as a crucial milestone for the
functioning of the whole Identity based firewall system.
|
[
{
"version": "v1",
"created": "Fri, 5 Aug 2011 14:54:25 GMT"
}
] | 2011-08-08T00:00:00 |
[
[
"Stojanovski",
"Nenad",
""
],
[
"Gusev",
"Marjan",
""
]
] |
new_dataset
| 0.981539 |
1108.1350
|
Ruichuan Chen
|
Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Liyong Tang, Zhong Chen
|
Phagocytes: A Holistic Defense and Protection Against Active P2P Worms
| null | null | null | null |
cs.NI cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Active Peer-to-Peer (P2P) worms present serious threats to the global
Internet by exploiting popular P2P applications to perform rapid topological
self-propagation. Active P2P worms pose more deadly threats than normal
scanning worms because they do not exhibit easily detectable anomalies, thus
many existing defenses are no longer effective.
We propose an immunity system with Phagocytes --- a small subset of elected
P2P hosts that are immune with high probability and specialized in finding and
"eating" worms in the P2P overlay. The Phagocytes will monitor their managed
P2P hosts' connection patterns and traffic volume in an attempt to detect
active P2P worm attacks. Once detected, local isolation, alert propagation and
software patching will take place for containment. The Phagocytes further
provide the access control and filtering mechanisms for communication
establishment between the internal P2P overlay and the external hosts. We
design a novel adaptive and interaction-based computational puzzle scheme at
the Phagocytes to restrain external worms attacking the P2P overlay, without
influencing legitimate hosts' experiences significantly. We implement a
prototype system, and evaluate its performance based on realistic massive-scale
P2P network traces. The evaluation results illustrate that our Phagocytes are
capable of achieving a total defense against active P2P worms.
|
[
{
"version": "v1",
"created": "Fri, 5 Aug 2011 15:24:38 GMT"
}
] | 2011-08-08T00:00:00 |
[
[
"Chen",
"Ruichuan",
""
],
[
"Lua",
"Eng Keong",
""
],
[
"Crowcroft",
"Jon",
""
],
[
"Tang",
"Liyong",
""
],
[
"Chen",
"Zhong",
""
]
] |
new_dataset
| 0.999636 |
1108.1353
|
Susheel Kumar k
|
K.Susheel Kumar, Vijay Bhaskar Semwal, R C Tripathi
|
Real time face recognition using adaboost improved fast PCA algorithm
|
14 pages; ISSN : 0975-900X (Online), 0976-2191 (Print)
|
International Journal of Artificial Intelligence & Applications
(IJAIA), Vol.2, No.3, July 2011, 45-58
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents an automated system for human face recognition in a real
time background world for a large homemade dataset of persons face. The task is
very difficult as the real time background subtraction in an image is still a
challenge. Addition to this there is a huge variation in human face image in
terms of size, pose and expression. The system proposed collapses most of this
variance. To detect real time human face AdaBoost with Haar cascade is used and
a simple fast PCA and LDA is used to recognize the faces detected. The matched
face is then used to mark attendance in the laboratory, in our case. This
biometric system is a real time attendance system based on the human face
recognition with a simple and fast algorithms and gaining a high accuracy
rate..
|
[
{
"version": "v1",
"created": "Fri, 5 Aug 2011 15:41:31 GMT"
}
] | 2011-08-08T00:00:00 |
[
[
"Kumar",
"K. Susheel",
""
],
[
"Semwal",
"Vijay Bhaskar",
""
],
[
"Tripathi",
"R C",
""
]
] |
new_dataset
| 0.980368 |
1108.1060
|
Antonio Fern\'andez Anta
|
Jos\'e Luis L\'opez-Presa and Antonio Fern\'andez Anta and Luis
N\'u\~nez Chiroque
|
Conauto-2.0: Fast Isomorphism Testing and Automorphism Group Computation
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present an algorithm, called conauto-2.0, that can
efficiently compute a set of generators of the automorphism group of a graph,
and test whether two graphs are isomorphic, finding an isomorphism if they are.
This algorithm uses the basic individualization/refinement technique, and is an
improved version of the algorithm conauto, which has been shown to be very fast
for random graphs and several families of hard graphs. In this paper, it is
proved that, under some circumstances, it is not only possible to prune the
search space (using already found generators of the automorphism group), but
also to infer new generators without the need of explicitly finding an
automorphism of the graph. This result is especially suited for graphs with
regularly connected components, and can be applied in any isomorphism testing
and canonical labeling algorithm (that use the individualization/refinement
technique) to significantly improve its performance. Additionally, a dynamic
target cell selection function is used to adapt to different graphs. The
resulting algorithm preserves all the nice features of conauto, but reduces the
time for testing graphs with regularly connected components and other hard
graph families. We run extensive experiments, which show that the most popular
algorithms (namely, nauty, bliss, Traces, and saucy) are slower than
conauto-2.0, among others, for the graph families based on components.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2011 12:16:27 GMT"
}
] | 2011-08-05T00:00:00 |
[
[
"López-Presa",
"José Luis",
""
],
[
"Anta",
"Antonio Fernández",
""
],
[
"Chiroque",
"Luis Núñez",
""
]
] |
new_dataset
| 0.990006 |
1107.2451
|
Shigeki Matsutani
|
Shigeki Matsutani, Kota Nakano, and Katsuhiko Shinjo
|
Surface tension of multi-phase flow with multiple junctions governed by
the variational principle
|
54 pages, 3 figures
| null |
10.1007/s11040-011-9096-0
| null |
cs.NA math-ph math.DG math.MP math.NA physics.comp-ph physics.flu-dyn
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We explore a computational model of an incompressible fluid with a
multi-phase field in three-dimensional Euclidean space. By investigating an
incompressible fluid with a two-phase field geometrically, we reformulate the
expression of the surface tension for the two-phase field found by Lafaurie,
Nardone, Scardovelli, Zaleski and Zanetti (J. Comp. Phys. \vol{113} \yr{1994}
\pages{134-147}) as a variational problem related to an infinite dimensional
Lie group, the volume-preserving diffeomorphism. The variational principle to
the action integral with the surface energy reproduces their Euler equation of
the two-phase field with the surface tension. Since the surface energy of
multiple interfaces even with singularities is not difficult to be evaluated in
general and the variational formulation works for every action integral, the
new formulation enables us to extend their expression to that of a multi-phase
($N$-phase, $N\ge2$) flow and to obtain a novel Euler equation with the surface
tension of the multi-phase field. The obtained Euler equation governs the
equation of motion of the multi-phase field with different surface tension
coefficients without any difficulties for the singularities at multiple
junctions. In other words, we unify the theory of multi-phase fields which
express low dimensional interface geometry and the theory of the incompressible
fluid dynamics on the infinite dimensional geometry as a variational problem.
We apply the equation to the contact angle problems at triple junctions. We
computed the fluid dynamics for a two-phase field with a wall numerically and
show the numerical computational results that for given surface tension
coefficients, the contact angles are generated by the surface tension as
results of balances of the kinematic energy and the surface energy.
|
[
{
"version": "v1",
"created": "Wed, 13 Jul 2011 02:11:11 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Jul 2011 02:27:51 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Aug 2011 22:02:10 GMT"
}
] | 2011-08-04T00:00:00 |
[
[
"Matsutani",
"Shigeki",
""
],
[
"Nakano",
"Kota",
""
],
[
"Shinjo",
"Katsuhiko",
""
]
] |
new_dataset
| 0.983656 |
1108.0466
|
EPTCS
|
Viviana Bono (Torino, Italy), Luca Padovani (Torino, Italy)
|
Polymorphic Endpoint Types for Copyless Message Passing
|
In Proceedings ICE 2011, arXiv:1108.0144
|
EPTCS 59, 2011, pp. 52-67
|
10.4204/EPTCS.59.5
| null |
cs.PL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present PolySing#, a calculus that models process interaction based on
copyless message passing, in the style of Singularity OS. We equip the calculus
with a type system that accommodates polymorphic endpoint types, which are a
variant of polymorphic session types, and we show that well-typed processes are
free from faults, leaks, and communication errors. The type system is
essentially linear, although linearity alone may leave room for scenarios where
well-typed processes leak memory. We identify a condition on endpoint types
that prevents these leaks from occurring.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2011 02:27:18 GMT"
}
] | 2011-08-03T00:00:00 |
[
[
"Bono",
"Viviana",
"",
"Torino, Italy"
],
[
"Padovani",
"Luca",
"",
"Torino, Italy"
]
] |
new_dataset
| 0.989859 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.