id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1108.0471
EPTCS
Massimo Bartoletti (Dipartimento di Matematica e Informatica, Universita' degli Studi di Cagliari, Italy), Emilio Tuosto (Department of Computer Science, University of Leicester, UK), Roberto Zunino (DISI-Universita' degli Studi di Trento and COSBI, Italy)
Contracts in distributed systems
In Proceedings ICE 2011, arXiv:1108.0144
EPTCS 59, 2011, pp. 130-147
10.4204/EPTCS.59.11
null
cs.PL cs.DC cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a parametric calculus for contract-based computing in distributed systems. By abstracting from the actual contract language, our calculus generalises both the contracts-as-processes and contracts-as-formulae paradigms. The calculus features primitives for advertising contracts, for reaching agreements, and for querying the fulfilment of contracts. Coordination among principals happens via multi-party sessions, which are created once agreements are reached. We present two instances of our calculus, by modelling contracts as (i) processes in a variant of CCS, and (ii) as formulae in a logic. With the help of a few examples, we discuss the primitives of our calculus, as well as some possible variants.
[ { "version": "v1", "created": "Tue, 2 Aug 2011 02:27:50 GMT" } ]
2011-08-03T00:00:00
[ [ "Bartoletti", "Massimo", "", "Dipartimento di Matematica e Informatica,\n Universita' degli Studi di Cagliari, Italy" ], [ "Tuosto", "Emilio", "", "Department of\n Computer Science, University of Leicester, UK" ], [ "Zunino", "Roberto", "", "DISI-Universita' degli Studi di Trento and COSBI, Italy" ] ]
new_dataset
0.999335
1004.2972
Marcin Pilipczuk
Marek Cygan and Marcin Pilipczuk and Michal Pilipczuk and Jakub Onufry Wojtaszczyk
Subset feedback vertex set is fixed parameter tractable
full version of a paper presented at ICALP'11
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The classical Feedback Vertex Set problem asks, for a given undirected graph G and an integer k, to find a set of at most k vertices that hits all the cycles in the graph G. Feedback Vertex Set has attracted a large amount of research in the parameterized setting, and subsequent kernelization and fixed-parameter algorithms have been a rich source of ideas in the field. In this paper we consider a more general and difficult version of the problem, named Subset Feedback Vertex Set (SUBSET-FVS in short) where an instance comes additionally with a set S ? V of vertices, and we ask for a set of at most k vertices that hits all simple cycles passing through S. Because of its applications in circuit testing and genetic linkage analysis SUBSET-FVS was studied from the approximation algorithms perspective by Even et al. [SICOMP'00, SIDMA'00]. The question whether the SUBSET-FVS problem is fixed-parameter tractable was posed independently by Kawarabayashi and Saurabh in 2009. We answer this question affirmatively. We begin by showing that this problem is fixed-parameter tractable when parametrized by |S|. Next we present an algorithm which reduces the given instance to 2^k n^O(1) instances with the size of S bounded by O(k^3), using kernelization techniques such as the 2-Expansion Lemma, Menger's theorem and Gallai's theorem. These two facts allow us to give a 2^O(k log k) n^O(1) time algorithm solving the Subset Feedback Vertex Set problem, proving that it is indeed fixed-parameter tractable.
[ { "version": "v1", "created": "Sat, 17 Apr 2010 17:19:47 GMT" }, { "version": "v2", "created": "Wed, 3 Nov 2010 12:56:53 GMT" }, { "version": "v3", "created": "Mon, 1 Aug 2011 17:57:56 GMT" } ]
2011-08-02T00:00:00
[ [ "Cygan", "Marek", "" ], [ "Pilipczuk", "Marcin", "" ], [ "Pilipczuk", "Michal", "" ], [ "Wojtaszczyk", "Jakub Onufry", "" ] ]
new_dataset
0.97259
1108.0232
EPTCS
Jos\'e Proen\c{c}a (KUL), Dave Clarke (KUL), Erik de Vink (TUE), Farhad Arbab (CWI)
Decoupled execution of synchronous coordination models via behavioural automata
In Proceedings FOCLASA 2011, arXiv:1107.5847
EPTCS 58, 2011, pp. 65-79
10.4204/EPTCS.58.5
null
cs.FL cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Synchronous coordination systems allow the exchange of data by logically indivisible actions involving all coordinated entities. This paper introduces behavioural automata, a logically synchronous coordination model based on the Reo coordination language, which focuses on relevant aspects for the concurrent evolution of these systems. We show how our automata model encodes the Reo and Linda coordination models and how it introduces an explicit predicate that captures the concurrent evolution, distinguishing local from global actions, and lifting the need of most synchronous models to involve all entities at each coordination step, paving the way to more scalable implementations.
[ { "version": "v1", "created": "Mon, 1 Aug 2011 03:58:23 GMT" } ]
2011-08-02T00:00:00
[ [ "Proença", "José", "", "KUL" ], [ "Clarke", "Dave", "", "KUL" ], [ "de Vink", "Erik", "", "TUE" ], [ "Arbab", "Farhad", "", "CWI" ] ]
new_dataset
0.991343
1104.0807
Lutz Bornmann Dr.
Lutz Bornmann, Werner Marx
The Anna Karenina principle: A concept for the explanation of success in science
null
null
null
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The first sentence of Leo Tolstoy's novel Anna Karenina is: "Happy families are all alike; every unhappy family is unhappy in its own way." Here Tolstoy means that for a family to be happy, several key aspects must be given (such as good health of all family members, acceptable financial security, and mutual affection). If there is a deficiency in any one or more of these key aspects, the family will be unhappy. In this paper we introduce the Anna Karenina principle as a concept that can explain success in science. Here we will refer to three central areas in modern science in which scarce resources will most usually lead to failure: (1) peer review of research grant proposals and manuscripts (money and journal space as scarce resources), (2) citation of publications (reception as a scarce resource), and (3) new scientific discoveries (recognition as a scarce resource). If resources are scarce (journal space, funds, reception, and recognition), there can be success only when several key prerequisites for the allocation of the resources are fulfilled. If any one of these prerequisites is not fulfilled, the grant proposal, manuscript submission, the published paper, or the discovery will not be successful.
[ { "version": "v1", "created": "Tue, 5 Apr 2011 10:48:21 GMT" }, { "version": "v2", "created": "Fri, 29 Jul 2011 08:31:24 GMT" } ]
2011-08-01T00:00:00
[ [ "Bornmann", "Lutz", "" ], [ "Marx", "Werner", "" ] ]
new_dataset
0.999605
1107.5370
Cristina Fernandes
Cristina G. Fernandes and Robin Thomas
Edge-coloring series-parallel multigraphs
null
null
null
null
cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a simpler proof of Seymour's Theorem on edge-coloring series-parallel multigraphs and derive a linear-time algorithm to check whether a given series-parallel multigraph can be colored with a given number of colors.
[ { "version": "v1", "created": "Wed, 27 Jul 2011 02:54:20 GMT" } ]
2011-08-01T00:00:00
[ [ "Fernandes", "Cristina G.", "" ], [ "Thomas", "Robin", "" ] ]
new_dataset
0.999371
1101.0309
Edward Grefenstette
Edward Grefenstette, Mehrnoosh Sadrzadeh, Stephen Clark, Bob Coecke and Stephen Pulman
Concrete Sentence Spaces for Compositional Distributional Models of Meaning
10 pages, presented at the International Conference on Computational Semantics 2011 (IWCS'11), to be published in proceedings
Proceedings of the 9th International Conference on Computational Semantics (2011)
null
null
cs.CL cs.AI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coecke, Sadrzadeh, and Clark (arXiv:1003.4394v1 [cs.CL]) developed a compositional model of meaning for distributional semantics, in which each word in a sentence has a meaning vector and the distributional meaning of the sentence is a function of the tensor products of the word vectors. Abstractly speaking, this function is the morphism corresponding to the grammatical structure of the sentence in the category of finite dimensional vector spaces. In this paper, we provide a concrete method for implementing this linear meaning map, by constructing a corpus-based vector space for the type of sentence. Our construction method is based on structured vector spaces whereby meaning vectors of all sentences, regardless of their grammatical structure, live in the same vector space. Our proposed sentence space is the tensor product of two noun spaces, in which the basis vectors are pairs of words each augmented with a grammatical role. This enables us to compare meanings of sentences by simply taking the inner product of their vectors.
[ { "version": "v1", "created": "Fri, 31 Dec 2010 23:57:06 GMT" } ]
2011-07-29T00:00:00
[ [ "Grefenstette", "Edward", "" ], [ "Sadrzadeh", "Mehrnoosh", "" ], [ "Clark", "Stephen", "" ], [ "Coecke", "Bob", "" ], [ "Pulman", "Stephen", "" ] ]
new_dataset
0.974131
1107.5782
Matilde Marcolli
Matilde Marcolli and Christopher Perez
Codes as fractals and noncommutative spaces
18 pages LaTeX, one png figure
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the CSS algorithm relating self-orthogonal classical linear codes to q-ary quantum stabilizer codes and we show that to such a pair of a classical and a quantum code one can associate geometric spaces constructed using methods from noncommutative geometry, arising from rational noncommutative tori and finite abelian group actions on Cuntz algebras and fractals associated to the classical codes.
[ { "version": "v1", "created": "Thu, 28 Jul 2011 17:59:09 GMT" } ]
2011-07-29T00:00:00
[ [ "Marcolli", "Matilde", "" ], [ "Perez", "Christopher", "" ] ]
new_dataset
0.997
1107.5399
Suzhi Bi
Suzhi Bi, Ying Jun (Angela) Zhang
TDMA Achieves the Optimal Diversity Gain in Relay-Assisted Cellular Networks
26 pages, 8 figures
null
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
In multi-access wireless networks, transmission scheduling is a key component that determines the efficiency and fairness of wireless spectrum allocation. At one extreme, greedy opportunistic scheduling that allocates airtime to the user with the largest instantaneous channel gain achieves the optimal spectrum efficiency and transmission reliability but the poorest user-level fairness. At the other extreme, fixed TDMA scheduling achieves the fairest airtime allocation but the lowest spectrum efficiency and transmission reliability. To balance the two competing objectives, extensive research efforts have been spent on designing opportunistic scheduling schemes that reach certain tradeoff points between the two extremes. In this paper and in contrast to the conventional wisdom, we find that in relay-assisted cellular networks, fixed TDMA achieves the same optimal diversity gain as greedy opportunistic scheduling. In addition, by incorporating very limited opportunism, a simple relaxed-TDMA scheme asymptotically achieves the same optimal system reliability in terms of outage probability as greedy opportunistic scheduling. This reveals a surprising fact: transmission reliability and user fairness are no longer contradicting each other in relay-assisted systems. They can be both achieved by the simple TDMA schemes. For practical implementations, we further propose a fully distributed algorithm to implement the relaxed-TDMA scheme. Our results here may find applications in the design of next-generation wireless communication systems with relay architectures such as LTE-advanced and WiMAX.
[ { "version": "v1", "created": "Wed, 27 Jul 2011 07:44:04 GMT" } ]
2011-07-28T00:00:00
[ [ "Bi", "Suzhi", "", "Angela" ], [ "Jun", "Ying", "", "Angela" ], [ "Zhang", "", "" ] ]
new_dataset
0.999469
1107.5462
Gabriela Ochoa
Edmund Burke, Tim Curtois, Matthew Hyde, Gabriela Ochoa, Jose A. Vazquez-Rodriguez
HyFlex: A Benchmark Framework for Cross-domain Heuristic Search
28 pages, 9 figures
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automating the design of heuristic search methods is an active research field within computer science, artificial intelligence and operational research. In order to make these methods more generally applicable, it is important to eliminate or reduce the role of the human expert in the process of designing an effective methodology to solve a given computational search problem. Researchers developing such methodologies are often constrained on the number of problem domains on which to test their adaptive, self-configuring algorithms; which can be explained by the inherent difficulty of implementing their corresponding domain specific software components. This paper presents HyFlex, a software framework for the development of cross-domain search methodologies. The framework features a common software interface for dealing with different combinatorial optimisation problems, and provides the algorithm components that are problem specific. In this way, the algorithm designer does not require a detailed knowledge the problem domains, and thus can concentrate his/her efforts in designing adaptive general-purpose heuristic search algorithms. Four hard combinatorial problems are fully implemented (maximum satisfiability, one dimensional bin packing, permutation flow shop and personnel scheduling), each containing a varied set of instance data (including real-world industrial applications) and an extensive set of problem specific heuristics and search operators. The framework forms the basis for the first International Cross-domain Heuristic Search Challenge (CHeSC), and it is currently in use by the international research community. In summary, HyFlex represents a valuable new benchmark of heuristic search generality, with which adaptive cross-domain algorithms are being easily developed, and reliably compared.
[ { "version": "v1", "created": "Wed, 27 Jul 2011 13:07:39 GMT" } ]
2011-07-28T00:00:00
[ [ "Burke", "Edmund", "" ], [ "Curtois", "Tim", "" ], [ "Hyde", "Matthew", "" ], [ "Ochoa", "Gabriela", "" ], [ "Vazquez-Rodriguez", "Jose A.", "" ] ]
new_dataset
0.987683
1107.5538
Jaydip Sen
Jaydip Sen
An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks
13 pages, 6 figures. First International Conference on Advances in Computing and Communication (ACC 2011), Kochi, India, July 22 - 24, 2011
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless broadband networks showing rapid progress and inspiring numerous compelling applications. A WMN comprises of a set of mesh routers (MRs) and mesh clients (MCs), where MRs are connected to the Internet backbone through the Internet gateways (IGWs). The MCs are wireless devices and communicate among themselves over possibly multi-hop paths with or without the involvement of MRs. User privacy and security have been primary concerns in WMNs due to their peer-to-peer network topology, shared wireless medium, stringent resource constraints, and highly dynamic environment. Moreover, to support real-time applications, WMNs must also be equipped with robust, reliable and efficient communication protocols so as to minimize the end-to-end latency and packet drops. Design of a secure and efficient communication protocol for WMNs, therefore, is of paramount importance. In this paper, we propose a security and privacy protocol that provides security and user anonymity while maintaining communication efficiency in a WMN. The security protocol ensures secure authentication and encryption in access and the backbone networks. The user anonymity, authentication and data privacy is achieved by application of a protocol that is based on Rivest's ring signature scheme. Simulation results demonstrate that while the protocols have minimal storage and communication overhead, they are robust and provide high level of security and privacy to the users of the network services.
[ { "version": "v1", "created": "Wed, 27 Jul 2011 17:01:28 GMT" } ]
2011-07-28T00:00:00
[ [ "Sen", "Jaydip", "" ] ]
new_dataset
0.999511
1107.5541
Jiangyuan Li
Jiangyuan Li and Athina Petropulu
Closed Form Secrecy Capacity of MIMO Wiretap Channels with Two Transmit Antennas
1 figure
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Gaussian multiple-input multiple-output (MIMO) wiretap channel model is considered. The input is a two-antenna transmitter, while the outputs are the legitimate receiver and an eavesdropper, both equipped with multiple antennas. All channels are assumed to be known. The problem of obtaining the optimal input covariance matrix that achieves secrecy capacity subject to a power constraint is addressed, and a closed-form expression for the secrecy capacity is obtained.
[ { "version": "v1", "created": "Wed, 27 Jul 2011 17:09:39 GMT" } ]
2011-07-28T00:00:00
[ [ "Li", "Jiangyuan", "" ], [ "Petropulu", "Athina", "" ] ]
new_dataset
0.97688
1107.5186
Preben Gr{\aa}berg Nes
Preben Gr{\aa}berg Nes
Fast multi-scale edge-detection in medical ultrasound signals
null
null
null
null
cs.CV physics.med-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we suggest a fast multi-scale edge-detection scheme for medical ultrasound signals. The edge-detector is based on well-known properties of the continuous wavelet trans- form. To achieve both good localization of edges and detect only significant edges, we study the maxima-lines of the wavelet transform. One can obtain the maxima-lines between two scales by computing the wavelet transform at several intermediate scales. To reduce computational effort and time we suggest a time-scale filtering procedure which uses only few scales to connect modulus-maxima across time-scale plane. The design of this procedure is based on a study of maxima-lines corresponding to edges typical for medical ultrasound signals. This study allows us to construct an algorithm for medical ultrasound signals which meets the demand for speed, but not on expense of reliability. The edge-detection algorithm has been applied to a large class of medical ultrasound sig- nals including tumour-, liver- and artery-images. Our results show that the proposed algorithm effectively detects major features in such signals, including edges with low contrast.
[ { "version": "v1", "created": "Tue, 26 Jul 2011 11:59:40 GMT" } ]
2011-07-27T00:00:00
[ [ "Nes", "Preben Gråberg", "" ] ]
new_dataset
0.984947
0901.2120
Mahdi Cheraghchi
Mahdi Cheraghchi, Frederic Didier, Amin Shokrollahi
Invertible Extractors and Wiretap Protocols
Full version. A preliminary summary of this work appears (under the same title) in proceedings of the 2009 IEEE International Symposium on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A wiretap protocol is a pair of randomized encoding and decoding functions such that knowledge of a bounded fraction of the encoding of a message reveals essentially no information about the message, while knowledge of the entire encoding reveals the message using the decoder. In this paper we study the notion of efficiently invertible extractors and show that a wiretap protocol can be constructed from such an extractor. We will then construct invertible extractors for symbol-fixing, affine, and general sources and apply them to create wiretap protocols with asymptotically optimal trade-offs between their rate (ratio of the length of the message versus its encoding) and resilience (ratio of the observed positions of the encoding and the length of the encoding). We will then apply our results to create wiretap protocols for challenging communication problems, such as active intruders who change portions of the encoding, network coding, and intruders observing arbitrary boolean functions of the encoding. As a by-product of our constructions we obtain new explicit extractors for a restricted family of affine sources over large fields (that in particular generalizes the notion of symbol-fixing sources) which is of independent interest. These extractors are able to extract the entire source entropy with zero error. Keywords: Wiretap Channel, Extractors, Network Coding, Active Intrusion, Exposure Resilient Cryptography.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 21:21:05 GMT" }, { "version": "v2", "created": "Fri, 22 Jul 2011 20:21:34 GMT" } ]
2011-07-26T00:00:00
[ [ "Cheraghchi", "Mahdi", "" ], [ "Didier", "Frederic", "" ], [ "Shokrollahi", "Amin", "" ] ]
new_dataset
0.986124
1106.0855
Eyal Ackerman
Eyal Ackerman, Tsachik Gelander, and Rom Pinchasi
Ice-Creams and Wedge Graphs
7 pages
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
What is the minimum angle $\alpha >0$ such that given any set of $\alpha$-directional antennas (that is, antennas each of which can communicate along a wedge of angle $\alpha$), one can always assign a direction to each antenna such that the resulting communication graph is connected? Here two antennas are connected by an edge if and only if each lies in the wedge assigned to the other. This problem was recently presented by Carmi, Katz, Lotker, and Ros\'en \cite{CKLR10} who also found the minimum such $\alpha$ namely $\alpha=\frac{\pi}{3}$. In this paper we give a simple proof of this result. Moreover, we obtain a much stronger and optimal result (see Theorem \ref{theorem:main}) saying in particular that one can chose the directions of the antennas so that the communication graph has diameter $\le 4$. Our main tool is a surprisingly basic geometric lemma that is of independent interest. We show that for every compact convex set $S$ in the plane and every $0 < \alpha < \pi$, there exist a point $O$ and two supporting lines to $S$ passing through $O$ and touching $S$ at two \emph{single points} $X$ and $Y$, respectively, such that $|OX|=|OY|$ and the angle between the two lines is $\alpha$.
[ { "version": "v1", "created": "Sat, 4 Jun 2011 20:24:50 GMT" }, { "version": "v2", "created": "Sun, 24 Jul 2011 13:07:44 GMT" } ]
2011-07-26T00:00:00
[ [ "Ackerman", "Eyal", "" ], [ "Gelander", "Tsachik", "" ], [ "Pinchasi", "Rom", "" ] ]
new_dataset
0.95645
1107.4138
Gilles Geeraerts
Gilles Geeraerts and Jean-Fran\c{c}ois Raskin and Nathalie Sznajder
Event-Clock Automata: From Theory to Practice
Full version of the FORMATS 2011 version
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Event clock automata (ECA) are a model for timed languages that has been introduced by Alur, Fix and Henzinger as an alternative to timed automata, with better theoretical properties (for instance, ECA are determinizable while timed automata are not). In this paper, we revisit and extend the theory of ECA. We first prove that no finite time abstract language equivalence exists for ECA, thereby disproving a claim in the original work on ECA. This means in particular that regions do not form a time abstract bisimulation. Nevertheless, we show that regions can still be used to build a finite automaton recognizing the untimed language of an ECA. Then, we extend the classical notions of zones and DBMs to let them handle event clocks instead of plain clocks (as in timed automata) by introducing event zones and Event DBMs (EDBMs). We discuss algorithms to handle event zones represented as EDBMs, as well as (semi-) algorithms based on EDBMs to decide language emptiness of ECA.
[ { "version": "v1", "created": "Wed, 20 Jul 2011 23:09:47 GMT" }, { "version": "v2", "created": "Fri, 22 Jul 2011 20:08:52 GMT" } ]
2011-07-26T00:00:00
[ [ "Geeraerts", "Gilles", "" ], [ "Raskin", "Jean-François", "" ], [ "Sznajder", "Nathalie", "" ] ]
new_dataset
0.997509
1107.4796
Ali Jowharpour
Ali Jowharpour, Masha allah abbasi dezfuli, Mohammad hosein Yektaee
Use Pronunciation by Analogy for text to speech system in Persian language
null
IJCSI Volume 8, Issue 3, May 2011
null
null
cs.CL
http://creativecommons.org/licenses/by/3.0/
The interest in text to speech synthesis increased in the world .text to speech have been developed formany popular languages such as English, Spanish and French and many researches and developmentshave been applied to those languages. Persian on the other hand, has been given little attentioncompared to other languages of similar importance and the research in Persian is still in its infancy.Persian language possess many difficulty and exceptions that increase complexity of text to speechsystems. For example: short vowels is absent in written text or existence of homograph words. in thispaper we propose a new method for persian text to phonetic that base on pronunciations by analogy inwords, semantic relations and grammatical rules for finding proper phonetic. Keywords:PbA, text to speech, Persian language, FPbA
[ { "version": "v1", "created": "Sun, 24 Jul 2011 20:37:57 GMT" } ]
2011-07-26T00:00:00
[ [ "Jowharpour", "Ali", "" ], [ "dezfuli", "Masha allah abbasi", "" ], [ "Yektaee", "Mohammad hosein", "" ] ]
new_dataset
0.998288
1107.4850
Debabala Swain
Debabala Swain, S.P. Panigrahi, S.K. Routray, P.K. Dash, R.R. Mohanty, S.K. Dash
WLAN location system: Background theories and future directions
null
null
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper presents background theories and required steps towards preparation of a WLAN location system. This paper targets on a software project and intention behind this paper is to motivate the young researchers in the area.
[ { "version": "v1", "created": "Mon, 25 Jul 2011 06:40:48 GMT" } ]
2011-07-26T00:00:00
[ [ "Swain", "Debabala", "" ], [ "Panigrahi", "S. P.", "" ], [ "Routray", "S. K.", "" ], [ "Dash", "P. K.", "" ], [ "Mohanty", "R. R.", "" ], [ "Dash", "S. K.", "" ] ]
new_dataset
0.999068
1107.4970
Joachim Spoerhase
Martin Fink, Jan-Henrik Haunert, Tamara Mchedlidze, Joachim Spoerhase, Alexander Wolff
Drawing Graphs with Vertices at Specified Positions and Crossings at Large Angles
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Point-set embeddings and large-angle crossings are two areas of graph drawing that independently have received a lot of attention in the past few years. In this paper, we consider problems in the intersection of these two areas. Given the point-set-embedding scenario, we are interested in how much we gain in terms of computational complexity, curve complexity, and generality if we allow large-angle crossings as compared to the planar case. We investigate two drawing styles where only bends or both bends and edges must be drawn on an underlying grid. We present various results for drawings with one, two, and three bends per edge.
[ { "version": "v1", "created": "Mon, 25 Jul 2011 15:10:12 GMT" } ]
2011-07-26T00:00:00
[ [ "Fink", "Martin", "" ], [ "Haunert", "Jan-Henrik", "" ], [ "Mchedlidze", "Tamara", "" ], [ "Spoerhase", "Joachim", "" ], [ "Wolff", "Alexander", "" ] ]
new_dataset
0.99243
1107.4463
Tao Ye
Wenqi Huang, Tao Ye, Duanbing Chen
Bottom-Left Placement Theorem for Rectangle Packing
null
null
null
null
cs.DM cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proves a bottom-left placement theorem for the rectangle packing problem, stating that if it is possible to orthogonally place n arbitrarily given rectangles into a rectangular container without overlapping, then we can achieve a feasible packing by successively placing a rectangle onto a bottom-left corner in the container. This theorem shows that even for the real-parameter rectangle packing problem, we can solve it after finite times of bottom-left placement actions. Based on this theorem, we might develop efficient heuristic algorithms for solving the rectangle packing problem.
[ { "version": "v1", "created": "Fri, 22 Jul 2011 09:27:23 GMT" } ]
2011-07-25T00:00:00
[ [ "Huang", "Wenqi", "" ], [ "Ye", "Tao", "" ], [ "Chen", "Duanbing", "" ] ]
new_dataset
0.956582
1107.4498
Damien Chablat
Michel Coste (IRMAR), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Singular surfaces and cusps in symmetric planar 3-RPR manipulators
IEEE/RSJ International Conference on Intelligent Robots and Systems, San Franisco : United States (2011)
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study in this paper a class of 3-RPR manipulators for which the direct kinematic problem (DKP) is split into a cubic problem followed by a quadratic one. These manipulators are geometrically characterized by the fact that the moving triangle is the image of the base triangle by an indirect isometry. We introduce a specific coordinate system adapted to this geometric feature and which is also well adapted to the splitting of the DKP. This allows us to obtain easily precise descriptions of the singularities and of the cusp edges. These latter second order singularities are important for nonsingular assembly mode changing. We show how to sort assembly modes and use this sorting for motion planning in the joint space.
[ { "version": "v1", "created": "Fri, 22 Jul 2011 12:39:45 GMT" } ]
2011-07-25T00:00:00
[ [ "Coste", "Michel", "", "IRMAR" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
new_dataset
0.965786
1107.4500
Georg B\"ocherer
Fabian Altenbach and Georg B\"ocherer and Rudolf Mathar
Short Huffman Codes Producing 1s Half of the Time
submitted to ICSPCS 2011, Honolulu
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The design of the channel part of a digital communication system (e.g., error correction, modulation) is heavily based on the assumption that the data to be transmitted forms a fair bit stream. However, simple source encoders such as short Huffman codes generate bit streams that poorly match this assumption. As a result, the channel input distribution does not match the original design criteria. In this work, a simple method called half Huffman coding (halfHc) is developed. halfHc transforms a Huffman code into a source code whose output is more similar to a fair bit stream. This is achieved by permuting the codewords such that the frequency of 1s at the output is close to 0.5. The permutations are such that the optimality in terms of achieved compression ratio is preserved. halfHc is applied in a practical example, and the resulting overall system performs better than when conventional Huffman coding is used.
[ { "version": "v1", "created": "Fri, 22 Jul 2011 12:41:22 GMT" } ]
2011-07-25T00:00:00
[ [ "Altenbach", "Fabian", "" ], [ "Böcherer", "Georg", "" ], [ "Mathar", "Rudolf", "" ] ]
new_dataset
0.996737
1107.4600
Stefano Rini
Stefano Rini, Daniela Tuninetti, Natasha Devroye, Andrea Goldsmith
On the Capacity of the Interference Channel with a Cognitive Relay
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The InterFerence Channel with a Cognitive Relay (IFC-CR) consists of the classical interference channel with two independent source-destination pairs whose communication is aided by an additional node, referred to as the cognitive relay, that has a priori knowledge of both sources' messages. This a priori message knowledge is termed cognition and idealizes the relay learning the messages of the two sources from their transmissions over a wireless channel. This paper presents new inner and outer bounds for the capacity region of the general memoryless IFC-CR that are shown to be tight for a certain class of channels. The new outer bound follows from arguments originally devised for broadcast channels among which Sato's observation that the capacity region of channels with non-cooperative receivers only depends on the channel output conditional marginal distributions. The new inner bound is shown to include all previously proposed coding schemes and it is thus the largest known achievable rate region to date. The new inner and outer bounds coincide for a subset of channel satisfying a strong interference condition. For these channels there is no loss in optimality if both destinations decode both messages. This result parallels analogous results for the classical IFC and for the cognitive IFC and is the first known capacity result for the general IFC-CR. Numerical evaluations of the proposed inner and outer bounds are presented for the Gaussian noise case.
[ { "version": "v1", "created": "Fri, 22 Jul 2011 19:49:13 GMT" } ]
2011-07-25T00:00:00
[ [ "Rini", "Stefano", "" ], [ "Tuninetti", "Daniela", "" ], [ "Devroye", "Natasha", "" ], [ "Goldsmith", "Andrea", "" ] ]
new_dataset
0.999679
1107.4230
Elzbieta Zielinska
Elzbieta Zielinska, Krzysztof Szczypiorski
Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802.15.4
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work addresses the issues related to network steganography in IEEE 802.15.4 Wireless Personal Area Networks (WPAN). The proposed communication scheme employs illicit Direct Sequence Spread Spectrum code sequences for the transmission of steganographic data. The presented approach is a compromise between minimising the probability of covert channel disclosure and providing robustness against random errors and a high steganographic data rate. The conducted analyses show that it is possible to create a covert channel with a data rate comparable to the raw data rate of IEEE 802.15.4 without much impact on the perceived receiver sensitivity, the Chip Error Rate and the Bit Error Rate.
[ { "version": "v1", "created": "Thu, 21 Jul 2011 10:37:29 GMT" } ]
2011-07-22T00:00:00
[ [ "Zielinska", "Elzbieta", "" ], [ "Szczypiorski", "Krzysztof", "" ] ]
new_dataset
0.988469
0904.1630
Aaron Sterling
Aaron Sterling
Self-Assembly of a Statistically Self-Similar Fractal
I am withdrawing all work I would like to polish before resubmitting, including this paper. Several typos fixed
null
null
null
cs.CC cs.DS cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We demonstrate existence of a tile assembly system that self-assembles the statistically self-similar Sierpinski Triangle in the Winfree-Rothemund Tile Assembly Model. This appears to be the first paper that considers self-assembly of a random fractal, instead of a deterministic fractal or a finite, bounded shape. Our technical contributions include a way to remember, and use, unboundedly-long prefixes of an infinite coding sequence at each stage of fractal construction; a tile assembly mechanism for nested recursion; and a definition of "almost-everywhere local determinism," to describe a tileset whose assembly is locally determined, conditional upon a zeta-dimension zero set of (infinitely many) "input" tiles. This last is similar to the definition of randomized computation for Turing machines, in which an algorithm is deterministic relative to an oracle sequence of coin flips that provides advice but does not itself compute. Keywords: tile self-assembly, statistically self-similar Sierpinski Triangle.
[ { "version": "v1", "created": "Fri, 10 Apr 2009 03:19:04 GMT" }, { "version": "v2", "created": "Sat, 11 Apr 2009 15:58:20 GMT" }, { "version": "v3", "created": "Wed, 20 Jul 2011 14:00:06 GMT" } ]
2011-07-21T00:00:00
[ [ "Sterling", "Aaron", "" ] ]
new_dataset
0.995217
1104.4426
Maurizio Serva
Maurizio Serva
Phylogeny and geometry of languages from normalized Levenshtein distance
Review paper
null
null
null
cs.CL q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The idea that the distance among pairs of languages can be evaluated from lexical differences seems to have its roots in the work of the French explorer Dumont D'Urville. He collected comparative words lists of various languages during his voyages aboard the Astrolabe from 1826 to 1829 and, in his work about the geographical division of the Pacific, he proposed a method to measure the degree of relation between languages. The method used by the modern lexicostatistics, developed by Morris Swadesh in the 1950s, measures distances from the percentage of shared cognates, which are words with a common historical origin. The weak point of this method is that subjective judgment plays a relevant role. Recently, we have proposed a new automated method which is motivated by the analogy with genetics. The new approach avoids any subjectivity and results can be easily replicated by other scholars. The distance between two languages is defined by considering a renormalized Levenshtein distance between pair of words with the same meaning and averaging on the words contained in a list. The renormalization, which takes into account the length of the words, plays a crucial role, and no sensible results can be found without it. In this paper we give a short review of our automated method and we illustrate it by considering the cluster of Malagasy dialects. We show that it sheds new light on their kinship relation and also that it furnishes a lot of new information concerning the modalities of the settlement of Madagascar.
[ { "version": "v1", "created": "Fri, 22 Apr 2011 12:20:56 GMT" }, { "version": "v2", "created": "Thu, 28 Apr 2011 18:07:21 GMT" }, { "version": "v3", "created": "Fri, 29 Apr 2011 06:26:36 GMT" } ]
2011-07-21T00:00:00
[ [ "Serva", "Maurizio", "" ] ]
new_dataset
0.998475
1106.2696
Peter Schaffer Dr.
Peter Schaffer, Djamila Aouada, Shishir Nagaraja
Who clicks there!: Anonymizing the photographer in a camera saturated society
null
null
null
null
cs.CR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, social media has played an increasingly important role in reporting world events. The publication of crowd-sourced photographs and videos in near real-time is one of the reasons behind the high impact. However, the use of a camera can draw the photographer into a situation of conflict. Examples include the use of cameras by regulators collecting evidence of Mafia operations; citizens collecting evidence of corruption at a public service outlet; and political dissidents protesting at public rallies. In all these cases, the published images contain fairly unambiguous clues about the location of the photographer (scene viewpoint information). In the presence of adversary operated cameras, it can be easy to identify the photographer by also combining leaked information from the photographs themselves. We call this the camera location detection attack. We propose and review defense techniques against such attacks. Defenses such as image obfuscation techniques do not protect camera-location information; current anonymous publication technologies do not help either. However, the use of view synthesis algorithms could be a promising step in the direction of providing probabilistic privacy guarantees.
[ { "version": "v1", "created": "Tue, 14 Jun 2011 12:49:48 GMT" } ]
2011-07-21T00:00:00
[ [ "Schaffer", "Peter", "" ], [ "Aouada", "Djamila", "" ], [ "Nagaraja", "Shishir", "" ] ]
new_dataset
0.981812
1107.3614
Zahid Mounir
Zahid Mounir
New construction of APN quaratic
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
The purpose of this paper is to detail the article of Carlet. Along the way I recall some interesting results in the theory of finite fields, I give (new) proofs of some known results, and then I generalize the construction of a family of APN function. The reference precedes each result, and in the absence of reference the proof is due to the author. Keywords: boolean, bent, APN
[ { "version": "v1", "created": "Tue, 19 Jul 2011 02:54:51 GMT" } ]
2011-07-20T00:00:00
[ [ "Mounir", "Zahid", "" ] ]
new_dataset
0.97005
1107.3622
Soubhik Chakraborty
Kiran Kumar Sundararajan, Mita Pal, Soubhik Chakraborty and N.C. Mahanti
K-sort: A new sorting algorithm that beats Heap sort for n <= 70 lakhs!
9 pages, 9 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sundararajan and Chakraborty (2007) introduced a new version of Quick sort removing the interchanges. Khreisat (2007) found this algorithm to be competing well with some other versions of Quick sort. However, it uses an auxiliary array thereby increasing the space complexity. Here, we provide a second version of our new sort where we have removed the auxiliary array. This second improved version of the algorithm, which we call K-sort, is found to sort elements faster than Heap sort for an appreciably large array size (n <= 70,00,000) for uniform U[0, 1] inputs.
[ { "version": "v1", "created": "Tue, 19 Jul 2011 04:21:58 GMT" } ]
2011-07-20T00:00:00
[ [ "Sundararajan", "Kiran Kumar", "" ], [ "Pal", "Mita", "" ], [ "Chakraborty", "Soubhik", "" ], [ "Mahanti", "N. C.", "" ] ]
new_dataset
0.978442
1107.3695
Abderrahim Bourouis
Abderrahim Bourouis, Mohamed Feham and Abdelhamid Bouchachia
Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE)
9 pages,5 figures
International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011
null
null
cs.NI
http://creativecommons.org/licenses/by/3.0/
Recent research in ubiquitous computing uses technologies of Body Area Networks (BANs) to monitor the person's kinematics and physiological parameters. In this paper we propose a real time mobile health system for monitoring elderly patients from indoor or outdoor environments. The system uses a bio- signal sensor worn by the patient and a Smartphone as a central node. The sensor data is collected and transmitted to the intelligent server through GPRS/UMTS to be analyzed. The prototype (UMHMSE) monitors the elderly mobility, location and vital signs such as Sp02 and Heart Rate. Remote users (family and medical personnel) might have a real time access to the collected information through a web application.
[ { "version": "v1", "created": "Tue, 19 Jul 2011 12:10:23 GMT" } ]
2011-07-20T00:00:00
[ [ "Bourouis", "Abderrahim", "" ], [ "Feham", "Mohamed", "" ], [ "Bouchachia", "Abdelhamid", "" ] ]
new_dataset
0.996163
1107.3785
Vladimir Tregub Mr
Vladimir Vasilich Tregub
Teaching Introductory Electrical Engineering Course to CS Students in a Russian University
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article is about the author's experience with developing and teaching an introductory electrical engineering course for students of Faculty (department) of Information Technology of a Russian university. The curriculum of this department conforms to typical computer science curricula of US engineering schools with a noticeable omission of comparable electrical engineering courses. When developing the course, I did my best to pay attention to learning preferences of the department's student body. I also hoped to contribute to a degree to meeting labor market demands for developers of electrical engineering CAD software. As for inspiration, I was enchanted with ideas of the Mead & Conway revolution, albeit indirectly related to my enterprise.
[ { "version": "v1", "created": "Tue, 19 Jul 2011 17:36:18 GMT" } ]
2011-07-20T00:00:00
[ [ "Tregub", "Vladimir Vasilich", "" ] ]
new_dataset
0.989076
1107.3363
Pankaj Sehgal Kumar
Rajender Nath and Pankaj Kumar Sehgal
SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network
8 pages, 11 figures, 1 table, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 6, November 2010
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Security remains as a major concern in the mobile ad hoc networks. This paper presents a new protocol SD-AODV, which is an extension of the exiting protocol AODV. The proposed protocol is made secure and dynamic against three main types of routing attacks- wormhole attack, byzantine attack and blackhole attack. SD-AODV protocol was evaluated through simulation experiments done on Glomosim and performance of the network was measured in terms of packet delivery fraction, average end-to-end delay, global throughput and route errors of a mobile ad hoc network where a defined percentage of nodes behave maliciously. Experimentally it was found that the performance of the network did not degrade in the presence of the above said attacks indicating that the proposed protocol was secure against these attacks.
[ { "version": "v1", "created": "Mon, 18 Jul 2011 06:34:38 GMT" } ]
2011-07-19T00:00:00
[ [ "Nath", "Rajender", "" ], [ "Sehgal", "Pankaj Kumar", "" ] ]
new_dataset
0.999589
1107.2437
Ignacio Vega-Paez M en C
Harold V. McIntosh
A CONVERT compiler of REC for PDP-8
This paper is seminal formal definition for REC language was published in "Acta Mexicana de Ciencia y Tecnolog\'ia" of IPN, Jan-April 1968. REC is a programming language of extremely simple structure and what it was proved that the well publicized inconvenience of programming without a goto was a myth in Sixties endings
Acta Mexicana de Ciencia y Tecnologia of IPN, Vol. II, No. 1, pp 33-43, Jan-April 1968, Mexico, D.F
null
IBP-Memo 2011-07
cs.PL
http://creativecommons.org/licenses/publicdomain/
REC (REGULAR EXPRESSION COMPILER) is a programming language of simple structure developed originally for the PDP-8 computer of the Digital Equipment, Corporation, but readily adaptable to any other general purpose computer. It has been used extensively in teaching Algebra and Numerical Analysis in the Escuela Superior de F\'isica y Matem\'aticas of the Instituto Polit\'ecnico Nacional. Moreover, the fact that the same control language, REC, is equally applicable and equally efficient over the whole range of computer facilities available to the students gives a very welcome coherence to the entire teaching program, including the course of Mathematical Logic which is devoted to the theoretical aspects of such matters. REC; derives its appeal from the fact that computers can be regarded reasonably well as Turing Machines. The REC notation is simply a manner of writing regular expression, somewhat more amenable to programming the Turing Machine which they control. If one does not wish to think so strictly in terms of Turing Machines, REC expressions still provide a means of defining the flow of control in a program which is quite convenient for many applications.
[ { "version": "v1", "created": "Tue, 12 Jul 2011 23:43:18 GMT" } ]
2011-07-15T00:00:00
[ [ "McIntosh", "Harold V.", "" ] ]
new_dataset
0.992168
1107.2683
Carlos Alberto Fernandez-y-Fernandez
Carlos Alberto Fernandez-y-Fernandez, Jose Angel Quintanar Morales and Hermenegildo Fernandez Santos
An IDE to Build and Check Task Flow Models
null
Fernandez-y-Fernandez, C.A., Quintanar Morales, J.A and Fernandez Santos, H. An IDE to Build and Check Task Flow Models. Advances in Computer Science and Applications, Research in Computer Science 53, 2011, pp. 23-33
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the Eclipse plug-ins for the Task Flow model in the Discovery Method. These plug-ins provide an IDE for the Task Algebra compiler and the model-checking tools. The Task Algebra is the formal representation for the Task Model and it is based on simple and compound tasks. The model-checking techniques were developed to validate Task Models represented in the algebra.
[ { "version": "v1", "created": "Wed, 13 Jul 2011 21:58:38 GMT" } ]
2011-07-15T00:00:00
[ [ "Fernandez-y-Fernandez", "Carlos Alberto", "" ], [ "Morales", "Jose Angel Quintanar", "" ], [ "Santos", "Hermenegildo Fernandez", "" ] ]
new_dataset
0.994217
1004.5367
Kenta Kasai
Kenta Kasai, David Declercq, Charly Poulliat, Kohichi Sakaniwa
Multiplicatively Repeated Non-Binary LDPC Codes
To appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
We propose non-binary LDPC codes concatenated with multiplicative repetition codes. By multiplicatively repeating the (2,3)-regular non-binary LDPC mother code of rate 1/3, we construct rate-compatible codes of lower rates 1/6, 1/9, 1/12,... Surprisingly, such simple low-rate non-binary LDPC codes outperform the best low-rate binary LDPC codes so far. Moreover, we propose the decoding algorithm for the proposed codes, which can be decoded with almost the same computational complexity as that of the mother code.
[ { "version": "v1", "created": "Thu, 29 Apr 2010 19:15:02 GMT" }, { "version": "v2", "created": "Wed, 13 Jul 2011 08:48:46 GMT" } ]
2011-07-14T00:00:00
[ [ "Kasai", "Kenta", "" ], [ "Declercq", "David", "" ], [ "Poulliat", "Charly", "" ], [ "Sakaniwa", "Kohichi", "" ] ]
new_dataset
0.995037
1107.2157
Matthew Sottile
Matthew J. Sottile and Craig E Rasmussen and Wayne N. Weseloh and Robert W. Robey and Daniel Quinlan and Jeffrey Overbey
ForOpenCL: Transformations Exploiting Array Syntax in Fortran for Accelerator Programming
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Emerging GPU architectures for high performance computing are well suited to a data-parallel programming model. This paper presents preliminary work examining a programming methodology that provides Fortran programmers with access to these emerging systems. We use array constructs in Fortran to show how this infrequently exploited, standardized language feature is easily transformed to lower-level accelerator code. The transformations in ForOpenCL are based on a simple mapping from Fortran to OpenCL. We demonstrate, using a stencil code solving the shallow-water fluid equations, that the performance of the ForOpenCL compiler-generated transformations is comparable with that of hand-optimized OpenCL code.
[ { "version": "v1", "created": "Mon, 11 Jul 2011 22:07:32 GMT" } ]
2011-07-13T00:00:00
[ [ "Sottile", "Matthew J.", "" ], [ "Rasmussen", "Craig E", "" ], [ "Weseloh", "Wayne N.", "" ], [ "Robey", "Robert W.", "" ], [ "Quinlan", "Daniel", "" ], [ "Overbey", "Jeffrey", "" ] ]
new_dataset
0.99412
cs/0703088
Ignacio Vega-Paez M en C
Ignacio Vega-Paez and Carlos Alberto Hernandez-Hernandez
Plot 94 in ambiance X-Window
null
Proceedings in Information Systems Analysis and Synthesis ISAS 1995, 5th, International Symposium on Systems Research, Informatics and Cybernetics, pp. 135-139, August 16-20, 95, Baden-Baden, Germany
null
IBP-TR1995-01
cs.CV cs.GR
null
<PLOT > is a collection of routines to draw surfaces, contours and so on. In this work we are presenting a version, that functions over work stations with the operative system UNIX, that count with the graphic ambiance X-WINDOW with the tools XLIB and OSF/MOTIF. This implant was realized for the work stations DEC 5000-200, DEC IPX, and DEC ALFA of the CINVESTAV (Center of Investigation and Advanced Studies). Also implanted in SILICON GRAPHICS of the CENAC (National Center of Calculation of the Polytechnic National Institute
[ { "version": "v1", "created": "Fri, 16 Mar 2007 00:18:11 GMT" } ]
2011-07-13T00:00:00
[ [ "Vega-Paez", "Ignacio", "" ], [ "Hernandez-Hernandez", "Carlos Alberto", "" ] ]
new_dataset
0.999368
0905.0740
Ignacio Vega-Paez M en C
Gerardo Cisneros
A FORTRAN coded regular expression Compiler for IBM 1130 Computing System
This version of REC is archaeological reconstruction of REC/A language on IBM1130 Simulator (SIMH IBM 1130 Emulator and Disk Monitor System R2V12) from Computer History Simulation Project (www.ibm1130.org), also see REC language is a live for Ignacio Vega-Paez
Acta Mexicana de Ciencia y Tecnologia Vol. IV No. 1, page 30-86, 1970
null
IBP-Memo 2008-12
cs.CL cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
REC (Regular Expression Compiler) is a concise programming language which allows students to write programs without knowledge of the complicated syntax of languages like FORTRAN and ALGOL. The language is recursive and contains only four elements for control. This paper describes an interpreter of REC written in FORTRAN.
[ { "version": "v1", "created": "Wed, 6 May 2009 04:29:51 GMT" } ]
2011-07-12T00:00:00
[ [ "Cisneros", "Gerardo", "" ] ]
new_dataset
0.999673
1009.0143
Jean Mairesse
Philippe Chassaing (IECN), Jean Mairesse (LIAFA)
A non-ergodic probabilistic cellular automaton with a unique invariant measure
To appear in Stochastic Processes and their Applications
null
null
null
cs.FL cs.DM math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We exhibit a Probabilistic Cellular Automaton (PCA) on the integers with an alphabet and a neighborhood of size 2 which is non-ergodic although it has a unique invariant measure. This answers by the negative an old open question on whether uniqueness of the invariant measure implies ergodicity for a PCA.
[ { "version": "v1", "created": "Wed, 1 Sep 2010 09:51:37 GMT" }, { "version": "v2", "created": "Mon, 11 Oct 2010 15:24:22 GMT" }, { "version": "v3", "created": "Fri, 8 Jul 2011 15:04:09 GMT" } ]
2011-07-11T00:00:00
[ [ "Chassaing", "Philippe", "", "IECN" ], [ "Mairesse", "Jean", "", "LIAFA" ] ]
new_dataset
0.992265
1107.1563
Jiadong Wang
Jiadong Wang, Thomas Courtade, Tsung-Yi Chen, Bike Xie and Richard Wesel
Designing Nonlinear Turbo Codes with a Target Ones Density
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Certain binary asymmetric channels, such as Z-channels in which one of the two crossover probabilities is zero, demand optimal ones densities different from 50%. Some broadcast channels, such as broadcast binary symmetric channels (BBSC) where each component channel is a binary symmetric channel, also require a non-uniform input distribution due to the superposition coding scheme, which is known to achieve the boundary of capacity region. This paper presents a systematic technique for designing nonlinear turbo codes that are able to support ones densities different from 50%. To demonstrate the effectiveness of our design technique, we design and simulate nonlinear turbo codes for the Z-channel and the BBSC. The best nonlinear turbo code is less than 0.02 bits from capacity.
[ { "version": "v1", "created": "Fri, 8 Jul 2011 06:05:55 GMT" } ]
2011-07-11T00:00:00
[ [ "Wang", "Jiadong", "" ], [ "Courtade", "Thomas", "" ], [ "Chen", "Tsung-Yi", "" ], [ "Xie", "Bike", "" ], [ "Wesel", "Richard", "" ] ]
new_dataset
0.961717
1107.1642
Yipeng Liu Dr.
Yipeng Liu and Qun Wan
Indirect Channel Sensing for Cognitive Amplify-and-Forward Relay Networks
5 pages, 5 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In cognitive radio network the primary channel information is beneficial. But it can not be obtained by direct channel estimation in cognitive system as pervious methods. And only one possible way is the primary receiver broadcasts the primary channel information to the cognitive users, but it would require the modification of the primary receiver and additional precious spectrum resource. Cooperative communication is also a promising technique. And this paper introduces an indirect channel sensing method for the primary channel in cognitive amplify-and-forward (AF) relay network. As the signal retransmitted from the primary AF relay node includes channel effects, the cognitive radio can receive retransmitted signal from AF node, and then extract the channel information from them. Afterwards, Least squares channel estimation and sparse channel estimation can be used to address the dense and sparse multipath channels respectively. Numerical experiment demonstrates that the proposed indirect channel sensing method has an acceptable performance.
[ { "version": "v1", "created": "Fri, 8 Jul 2011 14:24:03 GMT" } ]
2011-07-11T00:00:00
[ [ "Liu", "Yipeng", "" ], [ "Wan", "Qun", "" ] ]
new_dataset
0.998642
1107.1644
Jocelyne Troccaz
Michael Baumann (TIMC), Pierre Mozer, Vincent Daanen, Jocelyne Troccaz (TIMC)
Prostate biopsy tracking with deformation estimation
Medical Image Analysis (2011) epub ahead of print
null
10.1016/j.media.2011.01.008
null
cs.CV physics.med-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transrectal biopsies under 2D ultrasound (US) control are the current clinical standard for prostate cancer diagnosis. The isoechogenic nature of prostate carcinoma makes it necessary to sample the gland systematically, resulting in a low sensitivity. Also, it is difficult for the clinician to follow the sampling protocol accurately under 2D US control and the exact anatomical location of the biopsy cores is unknown after the intervention. Tracking systems for prostate biopsies make it possible to generate biopsy distribution maps for intra- and post-interventional quality control and 3D visualisation of histological results for diagnosis and treatment planning. They can also guide the clinician toward non-ultrasound targets. In this paper, a volume-swept 3D US based tracking system for fast and accurate estimation of prostate tissue motion is proposed. The entirely image-based system solves the patient motion problem with an a priori model of rectal probe kinematics. Prostate deformations are estimated with elastic registration to maximize accuracy. The system is robust with only 17 registration failures out of 786 (2%) biopsy volumes acquired from 47 patients during biopsy sessions. Accuracy was evaluated to 0.76$\pm$0.52mm using manually segmented fiducials on 687 registered volumes stemming from 40 patients. A clinical protocol for assisted biopsy acquisition was designed and implemented as a biopsy assistance system, which allows to overcome the draw-backs of the standard biopsy procedure.
[ { "version": "v1", "created": "Thu, 7 Jul 2011 06:31:05 GMT" } ]
2011-07-11T00:00:00
[ [ "Baumann", "Michael", "", "TIMC" ], [ "Mozer", "Pierre", "", "TIMC" ], [ "Daanen", "Vincent", "", "TIMC" ], [ "Troccaz", "Jocelyne", "", "TIMC" ] ]
new_dataset
0.997578
1107.1292
Christian Wulff-Nilsen
Christian Wulff-Nilsen
Separator Theorems for Minor-Free and Shallow Minor-Free Graphs with Applications
To appear at FOCS 2011
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Alon, Seymour, and Thomas generalized Lipton and Tarjan's planar separator theorem and showed that a $K_h$-minor free graph with $n$ vertices has a separator of size at most $h^{3/2}\sqrt n$. They gave an algorithm that, given a graph $G$ with $m$ edges and $n$ vertices and given an integer $h\geq 1$, outputs in $O(\sqrt{hn}m)$ time such a separator or a $K_h$-minor of $G$. Plotkin, Rao, and Smith gave an $O(hm\sqrt{n\log n})$ time algorithm to find a separator of size $O(h\sqrt{n\log n})$. Kawarabayashi and Reed improved the bound on the size of the separator to $h\sqrt n$ and gave an algorithm that finds such a separator in $O(n^{1 + \epsilon})$ time for any constant $\epsilon > 0$, assuming $h$ is constant. This algorithm has an extremely large dependency on $h$ in the running time (some power tower of $h$ whose height is itself a function of $h$), making it impractical even for small $h$. We are interested in a small polynomial time dependency on $h$ and we show how to find an $O(h\sqrt{n\log n})$-size separator or report that $G$ has a $K_h$-minor in $O(\poly(h)n^{5/4 + \epsilon})$ time for any constant $\epsilon > 0$. We also present the first $O(\poly(h)n)$ time algorithm to find a separator of size $O(n^c)$ for a constant $c < 1$. As corollaries of our results, we get improved algorithms for shortest paths and maximum matching. Furthermore, for integers $\ell$ and $h$, we give an $O(m + n^{2 + \epsilon}/\ell)$ time algorithm that either produces a $K_h$-minor of depth $O(\ell\log n)$ or a separator of size at most $O(n/\ell + \ell h^2\log n)$. This improves the shallow minor algorithm of Plotkin, Rao, and Smith when $m = \Omega(n^{1 + \epsilon})$. We get a similar running time improvement for an approximation algorithm for the problem of finding a largest $K_h$-minor in a given graph.
[ { "version": "v1", "created": "Thu, 7 Jul 2011 04:28:37 GMT" } ]
2011-07-08T00:00:00
[ [ "Wulff-Nilsen", "Christian", "" ] ]
new_dataset
0.998611
1107.1099
Steven Meyer
Steven Meyer
Selling train tickets by SMS
June 2010
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Selling train tickets has evolved in the last ten years from queuing in the railway station, to buying tickets on the internet and printing them. Both alternatives are still viable options, though they are time consuming or need printing devices. Nowadays it is essential to offer a service that is as fast and efficient as possible: mobile phones provide an accessible, affordable and widely available tool for supplying information and transferring data. The goal of this project is to design a train ticket contained in a SMS message. While there are several challenges related to the project, the main one is the security and how we can digitally sign a train ticket that is contained in 160 characters. The solution offered in this project is the implementation of the MOVA Signature (from the name of the inventors MOnnerat and VAudenay) that uses an interactive verification and therefore allows signature of 20 bits (roughly 4 characters).
[ { "version": "v1", "created": "Wed, 6 Jul 2011 11:21:34 GMT" } ]
2011-07-07T00:00:00
[ [ "Meyer", "Steven", "" ] ]
new_dataset
0.999438
1107.1101
Steven Meyer
Steven Meyer
Misbehavior in Mobile Application Markets
December 2010
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile application markets facilitate the distribution of applications and thus help developers advertise their work and customers find useful applications. In addition, the operators of mobile application markets can control the quality and the content of the applications. These markets are growing rapidly with more than 300'000 application in the App Store of Apple and more than 100'000 in the Android Market of Google. This is not only a great opportunity for phone manufacturers to earn money but also for indie developers (single or small teams of developers with small financial support) who can thus have a great distribution channel. Steve Demeter, the Trim game developer for iPhone, became millionaire with a single puzzle game . Obviously, as new markets generate a lot of money, the temptation of misbehavior to steal part of the benefits is big. The first famous case was the one of Molinker who self-rated his applications with 5 stars to pump up his ranking in order to increase its revenue stream. In this report, we will consider the problem of misbehavior in mobile application markets. We will investigate multiple attacks by misbehaving developers, users or network operators that aim at breaking rules for their own benefit, managing to outwit the operators' control on which applications can be installed. We notably suggest novel attacks that may affect mobile markets in the future: in particular, we show that it is possible to get revenue for applications created by someone else, trick a user to download and buy an application and new ways to pump up an application's ranking. We will also discuss possible solutions against spyware applications and cheating developer
[ { "version": "v1", "created": "Wed, 6 Jul 2011 11:30:13 GMT" } ]
2011-07-07T00:00:00
[ [ "Meyer", "Steven", "" ] ]
new_dataset
0.999821
1106.5156
Mallikarjun Hangarge Dr.
B.V.Dhandra, Mallikarjun Hangarge
Morphological Reconstruction for Word Level Script Identification
11 Pages, 8 Figures,5 Tables; Revised: 15-06-2007,Published: 30-06-2007
International Journal of Computer Science and Security (IJCSS),Volume (1) : Issue (1), 41 - 51, 2007
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A line of a bilingual document page may contain text words in regional language and numerals in English. For Optical Character Recognition (OCR) of such a document page, it is necessary to identify different script forms before running an individual OCR system. In this paper, we have identified a tool of morphological opening by reconstruction of an image in different directions and regional descriptors for script identification at word level, based on the observation that every text has a distinct visual appearance. The proposed system is developed for three Indian major bilingual documents, Kannada, Telugu and Devnagari containing English numerals. The nearest neighbour and k-nearest neighbour algorithms are applied to classify new word images. The proposed algorithm is tested on 2625 words with various font styles and sizes. The results obtained are quite encouraging
[ { "version": "v1", "created": "Sat, 25 Jun 2011 18:16:59 GMT" }, { "version": "v2", "created": "Mon, 4 Jul 2011 13:35:35 GMT" } ]
2011-07-05T00:00:00
[ [ "Dhandra", "B. V.", "" ], [ "Hangarge", "Mallikarjun", "" ] ]
new_dataset
0.999118
1107.0439
H. Reiju Mihara
Masahiro Kumabe, H. Reiju Mihara
The Nakamura numbers for computable simple games
24+1 pages
Social Choice and Welfare (2008) 31:621-640
10.1007/s00355-008-0300-5
null
cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Nakamura number of a simple game plays a critical role in preference aggregation (or multi-criterion ranking): the number of alternatives that the players can always deal with rationally is less than this number. We comprehensively study the restrictions that various properties for a simple game impose on its Nakamura number. We find that a computable game has a finite Nakamura number greater than three only if it is proper, nonstrong, and nonweak, regardless of whether it is monotonic or whether it has a finite carrier. The lack of strongness often results in alternatives that cannot be strictly ranked.
[ { "version": "v1", "created": "Sun, 3 Jul 2011 09:03:44 GMT" } ]
2011-07-05T00:00:00
[ [ "Kumabe", "Masahiro", "" ], [ "Mihara", "H. Reiju", "" ] ]
new_dataset
0.978721
1107.0011
Kundan Singh
Kundan Singh and Carol Davids
Flash-based Audio and Video Communication in the Cloud
Technical Implementation Report, 13 pages, 15 figures
null
null
null
cs.NI cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Internet telephony and multimedia communication protocols have matured over the last fifteen years. Recently, the web is evolving as a popular platform for everything we do on the Internet including email, text chat, voice calls, discussions, enterprise apps and multi-party collaboration. Unfortunately, there is a disconnect between web and traditional Internet telephony protocols as they have ignored the constraints and requirements of each other. Consequently, the Flash Player is being used as a web browser plugin by many developers for web-based voice and video calls. We describe the challenges of video communication using a web browser, present a simple API using a Flash Player application, show how it supports wide range of web communication scenarios in the cloud, and describe how it can interoperate with Session Initiation Protocol (SIP)-based systems. We describe both the advantages and challenges of Flash Player based communication applications. The presented API could guide future work on communication-related web protocol extensions.
[ { "version": "v1", "created": "Thu, 30 Jun 2011 20:06:50 GMT" } ]
2011-07-04T00:00:00
[ [ "Singh", "Kundan", "" ], [ "Davids", "Carol", "" ] ]
new_dataset
0.997583
1107.0026
M. J. Nederhof
M. J. Nederhof, G. Satta
IDL-Expressions: A Formalism for Representing and Parsing Finite Languages in Natural Language Processing
null
Journal Of Artificial Intelligence Research, Volume 21, pages 287-317, 2004
10.1613/jair.1309
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a formalism for representation of finite languages, referred to as the class of IDL-expressions, which combines concepts that were only considered in isolation in existing formalisms. The suggested applications are in natural language processing, more specifically in surface natural language generation and in machine translation, where a sentence is obtained by first generating a large set of candidate sentences, represented in a compact way, and then by filtering such a set through a parser. We study several formal properties of IDL-expressions and compare this new formalism with more standard ones. We also present a novel parsing algorithm for IDL-expressions and prove a non-trivial upper bound on its time complexity.
[ { "version": "v1", "created": "Thu, 30 Jun 2011 20:33:50 GMT" } ]
2011-07-04T00:00:00
[ [ "Nederhof", "M. J.", "" ], [ "Satta", "G.", "" ] ]
new_dataset
0.995035
1107.0028
M. Babaioff
M. Babaioff, N. Nisan
Concurrent Auctions Across The Supply Chain
null
Journal Of Artificial Intelligence Research, Volume 21, pages 595-629, 2004
10.1613/jair.1316
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the recent technological feasibility of electronic commerce over the Internet, much attention has been given to the design of electronic markets for various types of electronically-tradable goods. Such markets, however, will normally need to function in some relationship with markets for other related goods, usually those downstream or upstream in the supply chain. Thus, for example, an electronic market for rubber tires for trucks will likely need to be strongly influenced by the rubber market as well as by the truck market. In this paper we design protocols for exchange of information between a sequence of markets along a single supply chain. These protocols allow each of these markets to function separately, while the information exchanged ensures efficient global behavior across the supply chain. Each market that forms a link in the supply chain operates as a double auction, where the bids on one side of the double auction come from bidders in the corresponding segment of the industry, and the bids on the other side are synthetically generated by the protocol to express the combined information from all other links in the chain. The double auctions in each of the markets can be of several types, and we study several variants of incentive compatible double auctions, comparing them in terms of their efficiency and of the market revenue.
[ { "version": "v1", "created": "Thu, 30 Jun 2011 20:34:24 GMT" } ]
2011-07-04T00:00:00
[ [ "Babaioff", "M.", "" ], [ "Nisan", "N.", "" ] ]
new_dataset
0.998861
1106.6323
Sanjay Karmakar
Sanjay Karmakar and Mahesh K. Varanasi
The Diversity Multiplexing Tradeoff of the MIMO Half-Duplex Relay Channel
42 pages, 7 figures; submitted to the Trans. of IT
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The fundamental diversity-multiplexing tradeoff of the three-node, multi-input, multi-output (MIMO), quasi-static, Rayleigh faded, half-duplex relay channel is characterized for an arbitrary number of antennas at each node and in which opportunistic scheduling (or dynamic operation) of the relay is allowed, i.e., the relay can switch between receive and transmit modes at a channel dependent time. In this most general case, the diversity-multiplexing tradeoff is characterized as a solution to a simple, two-variable optimization problem. This problem is then solved in closed form for special classes of channels defined by certain restrictions on the numbers of antennas at the three nodes. The key mathematical tool developed here that enables the explicit characterization of the diversity-multiplexing tradeoff is the joint eigenvalue distribution of three mutually correlated random Wishart matrices. Previously, without actually characterizing the diversity-multiplexing tradeoff, the optimality in this tradeoff metric of the dynamic compress-and-forward (DCF) protocol based on the classical compress-and-forward scheme of Cover and El Gamal was shown by Yuksel and Erkip. However, this scheme requires global channel state information (CSI) at the relay. In this work, the so-called quantize-map and forward (QMF) coding scheme due to Avestimehr {\em et} {\em al} is adopted as the achievability scheme with the added benefit that it achieves optimal tradeoff with only the knowledge of the (channel dependent) switching time at the relay node. Moreover, in special classes of the MIMO half-duplex relay channel, the optimal tradeoff is shown to be attainable even without this knowledge. Such a result was previously known only for the half-duplex relay channel with a single antenna at each node, also via the QMF scheme.
[ { "version": "v1", "created": "Thu, 30 Jun 2011 18:16:20 GMT" } ]
2011-07-01T00:00:00
[ [ "Karmakar", "Sanjay", "" ], [ "Varanasi", "Mahesh K.", "" ] ]
new_dataset
0.993946
1106.6333
Kundan Singh
Carol Davids, Alan Johnston, Kundan Singh, Henry Sinnreich and Wilhelm Wimmreuter
SIP APIs for Voice and Video Communications on the Web
Accepted at IPTcomm 2011, 7 pages, 4 figures
null
null
null
cs.NI cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing standard protocols for the web and Internet telephony fail to deliver real-time interactive communication from within a web browser. In particular, the client-server web protocol over reliable TCP is not always suitable for end-to-end low latency media path needed for interactive voice and video communication. To solve this, we compare the available platform options using the existing technologies such as modifying the web programming language and protocol, using an existing web browser plugin, and a separate host resident application that the web browser can talk to. We argue that using a separate application as an adaptor is a promising short term as well as long-term strategy for voice and video communications on the web. Our project aims at developing the open technology and sample implementations for web-based real-time voice and video communication applications. We describe the architecture of our project including (1) a RESTful web communication API over HTTP inspired by SIP message flows, (2) a web-friendly set of metadata for session description, and (3) an UDP-based end-to-end media path. All other telephony functions reside in the web application itself and/or in web feature servers. The adaptor approach allows us to easily add new voice and video codecs and NAT traversal technologies such as Host Identity Protocol. We want to make web-based communication accessible to millions of web developers, maximize the end user experience and security, and preserve the huge global investment in and experience from SIP systems while adhering to web standards and development tools as much as possible. We have created an open source prototype that allows you to freely use the conference application by directing a browser to the conference URL.
[ { "version": "v1", "created": "Thu, 30 Jun 2011 18:40:48 GMT" } ]
2011-07-01T00:00:00
[ [ "Davids", "Carol", "" ], [ "Johnston", "Alan", "" ], [ "Singh", "Kundan", "" ], [ "Sinnreich", "Henry", "" ], [ "Wimmreuter", "Wilhelm", "" ] ]
new_dataset
0.992237
0911.2023
Aditya Mahajan
Aditya Mahajan and Sekhar Tatikonda
Opportunistic capacity and error exponent regions for compound channel with feedback
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Variable length communication over a compound channel with feedback is considered. Traditionally, capacity of a compound channel without feedback is defined as the maximum rate that is determined before the start of communication such that communication is reliable. This traditional definition is pessimistic. In the presence of feedback, an opportunistic definition is given. Capacity is defined as the maximum rate that is determined at the end of communication such that communication is reliable. Thus, the transmission rate can adapt to the channel chosen by nature. Under this definition, feedback communication over a compound channel is conceptually similar to multi-terminal communication. Transmission rate is a vector rather than a scalar; channel capacity is a region rather than a scalar; error exponent is a region rather than a scalar. In this paper, variable length communication over a compound channel with feedback is formulated, its opportunistic capacity region is characterized, and lower bounds for its error exponent region are provided..
[ { "version": "v1", "created": "Tue, 10 Nov 2009 22:52:23 GMT" }, { "version": "v2", "created": "Tue, 6 Apr 2010 20:35:30 GMT" }, { "version": "v3", "created": "Wed, 29 Jun 2011 18:10:44 GMT" } ]
2011-06-30T00:00:00
[ [ "Mahajan", "Aditya", "" ], [ "Tatikonda", "Sekhar", "" ] ]
new_dataset
0.996014
1106.5551
Hema Swetha Koppula
Hema Swetha Koppula, Abhishek Anand, Thorsten Joachims, Ashutosh Saxena
Labeling 3D scenes for Personal Assistant Robots
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inexpensive RGB-D cameras that give an RGB image together with depth data have become widely available. We use this data to build 3D point clouds of a full scene. In this paper, we address the task of labeling objects in this 3D point cloud of a complete indoor scene such as an office. We propose a graphical model that captures various features and contextual relations, including the local visual appearance and shape cues, object co-occurrence relationships and geometric relationships. With a large number of object classes and relations, the model's parsimony becomes important and we address that by using multiple types of edge potentials. The model admits efficient approximate inference, and we train it using a maximum-margin learning approach. In our experiments over a total of 52 3D scenes of homes and offices (composed from about 550 views, having 2495 segments labeled with 27 object classes), we get a performance of 84.06% in labeling 17 object classes for offices, and 73.38% in labeling 17 object classes for home scenes. Finally, we applied these algorithms successfully on a mobile robot for the task of finding an object in a large cluttered room.
[ { "version": "v1", "created": "Tue, 28 Jun 2011 02:02:00 GMT" } ]
2011-06-29T00:00:00
[ [ "Koppula", "Hema Swetha", "" ], [ "Anand", "Abhishek", "" ], [ "Joachims", "Thorsten", "" ], [ "Saxena", "Ashutosh", "" ] ]
new_dataset
0.993555
1106.5568
Lin Zhong
Ardalan Amiri Sani, Wolfgang Richter, Xuan Bao, Trevor Narayan, Mahadev Satyanarayanan, Lin Zhong, Romit Roy Choudhury
Opportunistic Content Search of Smartphone Photos
null
null
null
Technical Report TR0627-2011, Rice University
cs.IR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Photos taken by smartphone users can accidentally contain content that is timely and valuable to others, often in real-time. We report the system design and evaluation of a distributed search system, Theia, for crowd-sourced real-time content search of smartphone photos. Because smartphones are resource-constrained, Theia incorporates two key innovations to control search cost and improve search efficiency. Incremental Search expands search scope incrementally and exploits user feedback. Partitioned Search leverages the cloud to reduce the energy consumption of search in smartphones. Through user studies, measurement studies, and field studies, we show that Theia reduces the cost per relevant photo by an average of 59%. It reduces the energy consumption of search by up to 55% and 81% compared to alternative strategies of executing entirely locally or entirely in the cloud. Search results from smartphones are obtained in seconds. Our experiments also suggest approaches to further improve these results.
[ { "version": "v1", "created": "Tue, 28 Jun 2011 05:36:11 GMT" } ]
2011-06-29T00:00:00
[ [ "Sani", "Ardalan Amiri", "" ], [ "Richter", "Wolfgang", "" ], [ "Bao", "Xuan", "" ], [ "Narayan", "Trevor", "" ], [ "Satyanarayanan", "Mahadev", "" ], [ "Zhong", "Lin", "" ], [ "Choudhury", "Romit Roy", "" ] ]
new_dataset
0.997769
1106.5570
Ciprian Dobre
Ramiro Voicu, Iosif Legrand, Harvey Newman, Nicolae Tapus, Ciprian Dobre
A distributed service for on demand end to end optical circuits
17th International Conference on Control Systems and Computer Science (CSCS 17), Bucharest, Romania, May 26-29, 2009. Vol. 1, pp. 155-161, ISSN: 2066-4451
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a system for monitoring and controlling dynamic network circuits inside the USLHCNet network. This distributed service system provides in near real-time complete topological information for all the circuits, resource allocation and usage, accounting, detects automatically failures in the links and network equipment, generate alarms and has the functionality to take automatic actions. The system is developed based on the MonALISA framework, which provides a robust monitoring and controlling service oriented architecture, with no single points of failure.
[ { "version": "v1", "created": "Tue, 28 Jun 2011 06:01:49 GMT" } ]
2011-06-29T00:00:00
[ [ "Voicu", "Ramiro", "" ], [ "Legrand", "Iosif", "" ], [ "Newman", "Harvey", "" ], [ "Tapus", "Nicolae", "" ], [ "Dobre", "Ciprian", "" ] ]
new_dataset
0.996219
1106.5622
Luca Roversi
Emanuele Cesena and Marco Pedicini and Luca Roversi
Typing a Core Binary Field Arithmetic in a Light Logic
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We design a library for binary field arithmetic and we supply a core API which is completely developed in DLAL, extended with a fix point formula. Since DLAL is a restriction of linear logic where only functional programs with polynomial evaluation cost can be typed, we obtain the core of a functional programming setting for binary field arithmetic with built-in polynomial complexity.
[ { "version": "v1", "created": "Tue, 28 Jun 2011 10:39:42 GMT" } ]
2011-06-29T00:00:00
[ [ "Cesena", "Emanuele", "" ], [ "Pedicini", "Marco", "" ], [ "Roversi", "Luca", "" ] ]
new_dataset
0.999085
1106.5648
Xiaofu Wu Dr
Xiaofu Wu, Chunming Zhao, and Xiaohu You
Joint LDPC and Physical-layer Network Coding for Asynchronous Bi-directional Relaying
8 pages, 5 figures, submitted to IEEE Journal on Selected Areas in Communications - Special Issue on Theories and Methods for Advanced Wireless Relays
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In practical asynchronous bi-directional relaying, symbols transmitted by two sources cannot arrive at the relay with perfect frame and symbol alignments and the asynchronous multiple-access channel (MAC) should be seriously considered. Recently, Lu et al. proposed a Tanner-graph representation of the symbol-asynchronous MAC with rectangular-pulse shaping and further developed the message-passing algorithm for optimal decoding of the symbol-asynchronous physical-layer network coding. In this paper, we present a general channel model for the asynchronous MAC with arbitrary pulse-shaping. Then, the Bahl, Cocke, Jelinek, and Raviv (BCJR) algorithm is developed for optimal decoding of the asynchronous MAC channel. For Low-Density Parity-Check (LDPC)-coded BPSK signalling over the symbol-asynchronous MAC, we present a formal log-domain generalized sum-product-algorithm (Log-G-SPA) for efficient decoding. Furthermore, we propose to use cyclic codes for combating the frame-asynchronism and the resolution of the relative delay inherent in this approach can be achieved by employing the simple cyclic-redundancy-check (CRC) coding technique. Simulation results demonstrate the effectiveness of the proposed approach.
[ { "version": "v1", "created": "Tue, 28 Jun 2011 12:46:26 GMT" } ]
2011-06-29T00:00:00
[ [ "Wu", "Xiaofu", "" ], [ "Zhao", "Chunming", "" ], [ "You", "Xiaohu", "" ] ]
new_dataset
0.996809
1106.5736
Erik Demaine
Erik D. Demaine, Martin L. Demaine, Sarah Eisenstat, Anna Lubiw, Andrew Winslow
Algorithms for Solving Rubik's Cubes
34 pages, 9 figures. A short version of this paper is to appear at the 19th Annual European Symposium on Algorithms
null
null
null
cs.DS cs.CC cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Rubik's Cube is perhaps the world's most famous and iconic puzzle, well-known to have a rich underlying mathematical structure (group theory). In this paper, we show that the Rubik's Cube also has a rich underlying algorithmic structure. Specifically, we show that the n x n x n Rubik's Cube, as well as the n x n x 1 variant, has a "God's Number" (diameter of the configuration space) of Theta(n^2/log n). The upper bound comes from effectively parallelizing standard Theta(n^2) solution algorithms, while the lower bound follows from a counting argument. The upper bound gives an asymptotically optimal algorithm for solving a general Rubik's Cube in the worst case. Given a specific starting state, we show how to find the shortest solution in an n x O(1) x O(1) Rubik's Cube. Finally, we show that finding this optimal solution becomes NP-hard in an n x n x 1 Rubik's Cube when the positions and colors of some of the cubies are ignored (not used in determining whether the cube is solved).
[ { "version": "v1", "created": "Tue, 28 Jun 2011 17:35:09 GMT" } ]
2011-06-29T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Eisenstat", "Sarah", "" ], [ "Lubiw", "Anna", "" ], [ "Winslow", "Andrew", "" ] ]
new_dataset
0.956998
1004.0653
Oliver Kullmann
Oliver Kullmann
Exact Ramsey Theory: Green-Tao numbers and SAT
25 pages; a shortened version appears in LNCS (Springer), "Theory and Applications of Satisfiability Testing - SAT 2010", editors O. Strichman and S. Szeider. Revision contains new van-der-Waerden and Green-Tao numbers, especially "transversal numbers", corresponding to independence numbers of hypergraphs of arithmetic progressions. Some new comments discussing behaviour of vdW- and GT-numbers.
Theory and Applications of Satisfiability Testing - SAT 2010, LNCS 6175, 352-362
10.1007/978-3-642-14186-7_32
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the links between Ramsey theory in the integers, based on van der Waerden's theorem, and (boolean, CNF) SAT solving. We aim at using the problems from exact Ramsey theory, concerned with computing Ramsey-type numbers, as a rich source of test problems, where especially methods for solving hard problems can be developed. In order to control the growth of the problem instances, we introduce "transversal extensions" as a natural way of constructing mixed parameter tuples (k_1, ..., k_m) for van-der-Waerden-like numbers N(k_1, ..., k_m), such that the growth of these numbers is guaranteed to be linear. Based on Green-Tao's theorem we introduce the "Green-Tao numbers" grt(k_1, ..., k_m), which in a sense combine the strict structure of van der Waerden problems with the (pseudo-)randomness of the distribution of prime numbers. Using standard SAT solvers (look-ahead, conflict-driven, and local search) we determine the basic values. It turns out that already for this single form of Ramsey-type problems, when considering the best-performing solvers a wide variety of solver types is covered. For m > 2 the problems are non-boolean, and we introduce the "generic translation scheme", which offers an infinite variety of translations ("encodings") and covers the known methods. In most cases the special instance called "nested translation" proved to be far superior.
[ { "version": "v1", "created": "Mon, 5 Apr 2010 16:14:31 GMT" }, { "version": "v2", "created": "Sat, 24 Apr 2010 18:47:14 GMT" } ]
2011-06-28T00:00:00
[ [ "Kullmann", "Oliver", "" ] ]
new_dataset
0.987279
1106.5168
Ciprian Dobre
Iosif C. Legrand, Ciprian Dobre, Ramiro Voicu, Corina Stratan, Catalin Cirstoiu, Lucian Musat
LISA (Localhost Information Service Agent)
Proc. of the 15th International Conference on Control Systems and Computer Science (CSCS-15), Bucharest, Romania, 2005, pp. 127-130, ISBN: 973-8449-89-8
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Grid computing has gained an increasing importance in the last years, especially in the academic environments, offering the possibility to rapidly solve complex scientific problems. The monitoring of the Grid jobs has a vital importance for analyzing the system's performance, for providing the users an appropriate feed-back, and for obtaining historical data which may be used for performance prediction. Several monitoring systems have been developed, with different strategies to collect and store the information. We shall present here a solution based on MonALISA, a distributed service for monitoring, control and global optimization of complex systems, and LISA, a component application of MonALISA which can help in optimizing other applications by means of monitoring services. The advantages of this system are, among others, flexibility, dynamic configuration, high communication performance.
[ { "version": "v1", "created": "Sat, 25 Jun 2011 20:49:17 GMT" } ]
2011-06-28T00:00:00
[ [ "Legrand", "Iosif C.", "" ], [ "Dobre", "Ciprian", "" ], [ "Voicu", "Ramiro", "" ], [ "Stratan", "Corina", "" ], [ "Cirstoiu", "Catalin", "" ], [ "Musat", "Lucian", "" ] ]
new_dataset
0.999283
1106.5171
Ciprian Dobre
Ciprian Dobre, Ramiro Voicu, Adrian Muraru, Iosif C. Legrand
A Distributed Agent Based System to Control and Coordinate Large Scale Data Transfers
Proc. of 16th International Conference on Control Systems and Computer Science (CSCS-16), pp. 64-68, Bucharest, Romania, ISBN: 978-973-718-741-3
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a distributed agent based system used to monitor, configure and control complex, large scale data transfers in the Wide Area Network. The Localhost Information Service Agent (LISA) is a lightweight dynamic service that provides complete system and applications monitoring, is capable to dynamically configure system parameters and can help in optimizing distributed applications. As part of the MonALISA (Monitoring Agents in A Large Integrated Services Architecture) system, LISA is an end host agent capable to collect any type of monitoring information, to distribute them, and to take actions based on local or global decision units. The system has been used for the Bandwidth Challenge at Supercomputing 2006 to coordinate global large scale data transfers using Fast Data Transfer (FDT) application between hundreds of servers distributed on major Grid sites involved in processing High Energy Physics data for the future Large Hadron Collider experiments.
[ { "version": "v1", "created": "Sat, 25 Jun 2011 20:54:12 GMT" } ]
2011-06-28T00:00:00
[ [ "Dobre", "Ciprian", "" ], [ "Voicu", "Ramiro", "" ], [ "Muraru", "Adrian", "" ], [ "Legrand", "Iosif C.", "" ] ]
new_dataset
0.998379
1106.5260
M. Do
M. Do, S. Kambhampati
SAPA: A Multi-objective Metric Temporal Planner
null
Journal Of Artificial Intelligence Research, Volume 20, pages 155-194, 2003
10.1613/jair.1156
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SAPA is a domain-independent heuristic forward chaining planner that can handle durative actions, metric resource constraints, and deadline goals. It is designed to be capable of handling the multi-objective nature of metric temporal planning. Our technical contributions include (i) planning-graph based methods for deriving heuristics that are sensitive to both cost and makespan (ii) techniques for adjusting the heuristic estimates to take action interactions and metric resource limitations into account and (iii) a linear time greedy post-processing technique to improve execution flexibility of the solution plans. An implementation of SAPA using many of the techniques presented in this paper was one of the best domain independent planners for domains with metric and temporal constraints in the third International Planning Competition, held at AIPS-02. We describe the technical details of extracting the heuristics and present an empirical evaluation of the current implementation of SAPA.
[ { "version": "v1", "created": "Sun, 26 Jun 2011 21:03:40 GMT" } ]
2011-06-28T00:00:00
[ [ "Do", "M.", "" ], [ "Kambhampati", "S.", "" ] ]
new_dataset
0.958048
1106.5262
S. Kambhampati
S. Kambhampati, R. Sanchez
AltAltp: Online Parallelization of Plans with Heuristic State Search
null
Journal Of Artificial Intelligence Research, Volume 19, pages 631-657, 2003
10.1613/jair.1168
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite their near dominance, heuristic state search planners still lag behind disjunctive planners in the generation of parallel plans in classical planning. The reason is that directly searching for parallel solutions in state space planners would require the planners to branch on all possible subsets of parallel actions, thus increasing the branching factor exponentially. We present a variant of our heuristic state search planner AltAlt, called AltAltp which generates parallel plans by using greedy online parallelization of partial plans. The greedy approach is significantly informed by the use of novel distance heuristics that AltAltp derives from a graphplan-style planning graph for the problem. While this approach is not guaranteed to provide optimal parallel plans, empirical results show that AltAltp is capable of generating good quality parallel plans at a fraction of the cost incurred by the disjunctive planners.
[ { "version": "v1", "created": "Sun, 26 Jun 2011 21:04:32 GMT" } ]
2011-06-28T00:00:00
[ [ "Kambhampati", "S.", "" ], [ "Sanchez", "R.", "" ] ]
new_dataset
0.982194
1106.5299
Ciprian Dobre
Ciprian Dobre, Florin Pop, Valentin Cristea
DistHash: A robust P2P DHT-based system for replicated objects
Proceedings of 17th International Conference on Control Systems and Computer Science (CSCS 17), Bucharest, Romania, May 26-29, 2009. Vol. 1, pp. 453-460, ISSN: 2066-4451
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the Internet today, computing and communications environments are significantly more complex and chaotic than classical distributed systems, lacking any centralized organization or hierarchical control. There has been much interest in emerging Peer-to-Peer (P2P) network overlays because they provide a good substrate for creating large-scale data sharing, content distribution and application-level multicast applications. In this paper we present DistHash, a P2P overlay network designed to share large sets of replicated distributed objects in the context of large-scale highly dynamic infrastructures. We present original solutions to achieve optimal message routing in hop-count and throughput, provide an adequate consistency approach among replicas, as well as provide a fault-tolerant substrate.
[ { "version": "v1", "created": "Mon, 27 Jun 2011 05:49:21 GMT" } ]
2011-06-28T00:00:00
[ [ "Dobre", "Ciprian", "" ], [ "Pop", "Florin", "" ], [ "Cristea", "Valentin", "" ] ]
new_dataset
0.999507
1106.5304
Florin Pop Mr.
George Milescu, Gabriel Noaje, Florin Pop
OpenPh - Numerical Physics Library
(ISSN 1223-7027)
UPB Scientific Bulletin, Series A: Applied Mathematics and Physics, volume 68, number 1, pp: 73-78, 2006
null
null
cs.DL physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Numerical physics has gained a lot of importance in the last decade, its efficiency being motivated and sustained by the growth of computational power. This paper presents a concept that is to be developed in the next few years: OpenPh. OpenPh is a numerical physics library that makes use of the advantages of both open source software and MATLAB programming. Its aim is to deliver the instruments for providing numerical and graphical solutions for various physics problems. It has a modular structure, allowing the user to add new modules to the existing ones and to create its own modules according to its needs, being virtually unlimited extendable. The modules of OpenPh are implemented using MATLAB engine because it is the best solution used in engineering and science, providing a wide range of optimized methods to accomplish even the toughest jobs. Current version of OpenPh includes two modules, the first one providing tools for quantum physics and the second one for mechanics. The quantum physics module deals with the photoelectric effect, the radioactive decay of carbon-11, and the Schr\"odinger equation - particle in a box. The classical mechanics module includes the study of the uniform circular motion, the forced damped harmonic oscillations and the vibration of a fixed-fixed string.
[ { "version": "v1", "created": "Mon, 27 Jun 2011 06:03:50 GMT" } ]
2011-06-28T00:00:00
[ [ "Milescu", "George", "" ], [ "Noaje", "Gabriel", "" ], [ "Pop", "Florin", "" ] ]
new_dataset
0.975338
1106.5308
Florin Pop Mr.
Florin Pop, Diana Petrescu, \c{S}tefan Trau\c{s}an-Matu
Clasificarea distribuita a mesajelor de e-mail
ISSN 1453-1305
A Treia Conferin\c{t}\u{a} Na\c{t}ional\u{a} de Interac\c{t}iune Om-Calculator 2006, Informatica Economica, vol. X, Bucuresti, pp. 79-82, 2006
null
null
cs.HC cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A basic component in Internet applications is the electronic mail and its various implications. The paper proposes a mechanism for automatically classifying emails and create dynamic groups that belong to these messages. Proposed mechanisms will be based on natural language processing techniques and will be designed to facilitate human-machine interaction in this direction.
[ { "version": "v1", "created": "Mon, 27 Jun 2011 06:24:34 GMT" } ]
2011-06-28T00:00:00
[ [ "Pop", "Florin", "" ], [ "Petrescu", "Diana", "" ], [ "Trauşan-Matu", "Ştefan", "" ] ]
new_dataset
0.983737
1106.5309
Florin Pop Mr.
Diana Moise, Eliza Moise, Florin Pop, Valentin Cristea
Resource CoAllocation for Scheduling Tasks with Dependencies, in Grid
ISSN: 2065-0701
Proceedings of The Second International Workshop on High Performance in Grid Middleware (HiPerGRID 2008), Bucharest, Romania, Published by IEEE Romania, 2008, pages: 41-48
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scheduling applications on wide-area distributed systems is useful for obtaining quick and reliable results in an efficient manner. Optimized scheduling algorithms are fundamentally important in order to achieve optimized resources utilization. The existing and potential applications include many fields of activity like satellite image processing and medicine. The paper proposes a scheduling algorithm for tasks with dependencies in Grid environments. CoAllocation represents a strategy that provides a schedule for task with dependencies, having as main purpose the efficiency of the schedule, in terms of load balancing and minimum time for the execution of the tasks.
[ { "version": "v1", "created": "Mon, 27 Jun 2011 06:24:40 GMT" } ]
2011-06-28T00:00:00
[ [ "Moise", "Diana", "" ], [ "Moise", "Eliza", "" ], [ "Pop", "Florin", "" ], [ "Cristea", "Valentin", "" ] ]
new_dataset
0.996731
1106.5465
Ilango Sriram
Ilango Leonardo Sriram, Dave Cliff
SPECI-2: An open-source framework for predictive simulation of cloud-scale data-centres
To appear in Proceedings of SIMULTECH 2011, see also speci.org
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce Version 2 of SPECI, a system for predictive simulation modeling of large-scale data-centres, i.e. warehouse-sized facilities containing hundreds of thousands of servers, as used to provide cloud services.
[ { "version": "v1", "created": "Mon, 27 Jun 2011 18:01:03 GMT" } ]
2011-06-28T00:00:00
[ [ "Sriram", "Ilango Leonardo", "" ], [ "Cliff", "Dave", "" ] ]
new_dataset
0.997091
1106.4866
P. Liberatore
P. Liberatore
On Polynomial Sized MDP Succinct Policies
null
Journal Of Artificial Intelligence Research, Volume 21, pages 551-577, 2004
10.1613/jair.1134
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Policies of Markov Decision Processes (MDPs) determine the next action to execute from the current state and, possibly, the history (the past states). When the number of states is large, succinct representations are often used to compactly represent both the MDPs and the policies in a reduced amount of space. In this paper, some problems related to the size of succinctly represented policies are analyzed. Namely, it is shown that some MDPs have policies that can only be represented in space super-polynomial in the size of the MDP, unless the polynomial hierarchy collapses. This fact motivates the study of the problem of deciding whether a given MDP has a policy of a given size and reward. Since some algorithms for MDPs work by finding a succinct representation of the value function, the problem of deciding the existence of a succinct representation of a value function of a given size and reward is also considered.
[ { "version": "v1", "created": "Fri, 24 Jun 2011 00:57:19 GMT" } ]
2011-06-27T00:00:00
[ [ "Liberatore", "P.", "" ] ]
new_dataset
0.997102
1106.4869
T. C. Au
T. C. Au, O. Ilghami, U. Kuter, J. W. Murdock, D. S. Nau, D. Wu, F. Yaman
SHOP2: An HTN Planning System
null
Journal Of Artificial Intelligence Research, Volume 20, pages 379-404, 2003
10.1613/jair.1141
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The SHOP2 planning system received one of the awards for distinguished performance in the 2002 International Planning Competition. This paper describes the features of SHOP2 which enabled it to excel in the competition, especially those aspects of SHOP2 that deal with temporal and metric planning domains.
[ { "version": "v1", "created": "Fri, 24 Jun 2011 00:58:42 GMT" } ]
2011-06-27T00:00:00
[ [ "Au", "T. C.", "" ], [ "Ilghami", "O.", "" ], [ "Kuter", "U.", "" ], [ "Murdock", "J. W.", "" ], [ "Nau", "D. S.", "" ], [ "Wu", "D.", "" ], [ "Yaman", "F.", "" ] ]
new_dataset
0.966541
1101.0698
Gerhard de Koning Gans
Gerhard de Koning Gans and Eric R. Verheul
Best Effort and Practice Activation Codes
15 pages, 3 figures, TrustBus 2011
null
null
null
cs.CR cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent value. Even though this class of codes is extensively used there are no general guidelines for the design of Activation Code schemes. We discuss different methods that are used in practice and propose BEPAC, a new Activation Code scheme that provides both authenticity and confidentiality. The small message space of activation codes introduces some problems that are illustrated by an adaptive chosen-plaintext attack (CPA-2) on a general 3-round Feis- tel network of size 2^(2n) . This attack recovers the complete permutation from at most 2^(n+2) plaintext-ciphertext pairs. For this reason, BEPAC is designed in such a way that authenticity and confidentiality are in- dependent properties, i.e. loss of confidentiality does not imply loss of authenticity.
[ { "version": "v1", "created": "Tue, 4 Jan 2011 10:41:27 GMT" }, { "version": "v2", "created": "Thu, 23 Jun 2011 11:26:51 GMT" } ]
2011-06-24T00:00:00
[ [ "Gans", "Gerhard de Koning", "" ], [ "Verheul", "Eric R.", "" ] ]
new_dataset
0.97362
1106.4561
M. Fox
M. Fox, D. Long
PDDL2.1: An Extension to PDDL for Expressing Temporal Planning Domains
null
Journal Of Artificial Intelligence Research, Volume 20, pages 61-124, 2003
10.1613/jair.1129
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years research in the planning community has moved increasingly toward s application of planners to realistic problems involving both time and many typ es of resources. For example, interest in planning demonstrated by the space res earch community has inspired work in observation scheduling, planetary rover ex ploration and spacecraft control domains. Other temporal and resource-intensive domains including logistics planning, plant control and manufacturing have also helped to focus the community on the modelling and reasoning issues that must be confronted to make planning technology meet the challenges of application. The International Planning Competitions have acted as an important motivating fo rce behind the progress that has been made in planning since 1998. The third com petition (held in 2002) set the planning community the challenge of handling tim e and numeric resources. This necessitated the development of a modelling langua ge capable of expressing temporal and numeric properties of planning domains. In this paper we describe the language, PDDL2.1, that was used in the competition. We describe the syntax of the language, its formal semantics and the validation of concurrent plans. We observe that PDDL2.1 has considerable modelling power --- exceeding the capabilities of current planning technology --- and presents a number of important challenges to the research community.
[ { "version": "v1", "created": "Wed, 22 Jun 2011 20:20:10 GMT" } ]
2011-06-24T00:00:00
[ [ "Fox", "M.", "" ], [ "Long", "D.", "" ] ]
new_dataset
0.999151
1106.4578
J. Lang
J. Lang, P. Liberatore, P. Marquis
Propositional Independence - Formula-Variable Independence and Forgetting
null
Journal Of Artificial Intelligence Research, Volume 18, pages 391-443, 2003
10.1613/jair.1113
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Independence -- the study of what is relevant to a given problem of reasoning -- has received an increasing attention from the AI community. In this paper, we consider two basic forms of independence, namely, a syntactic one and a semantic one. We show features and drawbacks of them. In particular, while the syntactic form of independence is computationally easy to check, there are cases in which things that intuitively are not relevant are not recognized as such. We also consider the problem of forgetting, i.e., distilling from a knowledge base only the part that is relevant to the set of queries constructed from a subset of the alphabet. While such process is computationally hard, it allows for a simplification of subsequent reasoning, and can thus be viewed as a form of compilation: once the relevant part of a knowledge base has been extracted, all reasoning tasks to be performed can be simplified.
[ { "version": "v1", "created": "Wed, 22 Jun 2011 21:01:16 GMT" } ]
2011-06-24T00:00:00
[ [ "Lang", "J.", "" ], [ "Liberatore", "P.", "" ], [ "Marquis", "P.", "" ] ]
new_dataset
0.993806
1105.5553
Feng Shu
Shu Feng, Wang Mao, Shi Xiajie, Liu Junhao, Sheng Weixin, and Xie Renhong
A Frequency-domain Compensation Scheme for IQ-Imbalance in OFDM Receivers
17 pages, 6 figures
null
null
null
cs.NI cs.MM
http://creativecommons.org/licenses/by-nc-sa/3.0/
A pilot pattern across two OFDM symbols with special structure is devised for channel estimation in OFDM systems with IQ imbalance at receiver. Based on this pilot pattern, a high-efficiency time-domain (TD) least square (LS) channel estimator is proposed to significantly suppress channel noise by a factor N/(L+1) in comparison with the frequency-domain LS one in [1] where N and L+1 are the total number of subcarriers and the length of cyclic prefix, respectively. Following this, a low-complexity frequency-domain (FD) Gaussian elimination (GE) equalizer is proposed to eliminate IQ distortion by using only 2N complex multiplications per OFDM symbol. From simulation, the proposed scheme TD-LS/FD-GE using only two pilot OFDM symbols achieves the same bit error rate (BER) performance under ideal channel knowledge and no IQ imbalances at low and medium signal-to-noise ratio (SNR) regions whereas these compensation schemes including FD-LS/Post-FFT LS, FD-LS/Pre-FFT Corr, and SPP/Pre-FFT Corr in [1] require about twenty OFDM training symbols to reach the same performance where A/B denotes compensation scheme with A being channel estimator and B being equalizer.
[ { "version": "v1", "created": "Fri, 27 May 2011 13:08:30 GMT" }, { "version": "v2", "created": "Mon, 13 Jun 2011 10:06:07 GMT" }, { "version": "v3", "created": "Tue, 21 Jun 2011 11:19:14 GMT" } ]
2011-06-22T00:00:00
[ [ "Feng", "Shu", "" ], [ "Mao", "Wang", "" ], [ "Xiajie", "Shi", "" ], [ "Junhao", "Liu", "" ], [ "Weixin", "Sheng", "" ], [ "Renhong", "Xie", "" ] ]
new_dataset
0.981974
1106.4092
EPTCS
John Derrick, Siobh\'an North, Anthony J.H. Simons
Building a refinement checker for Z
In Proceedings Refine 2011, arXiv:1106.3488
EPTCS 55, 2011, pp. 37-52
10.4204/EPTCS.55.3
null
cs.SE cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In previous work we have described how refinements can be checked using a temporal logic based model-checker, and how we have built a model-checker for Z by providing a translation of Z into the SAL input language. In this paper we draw these two strands of work together and discuss how we have implemented refinement checking in our Z2SAL toolset. The net effect of this work is that the SAL toolset can be used to check refinements between Z specifications supplied as input files written in the LaTeX mark-up. Two examples are used to illustrate the approach and compare it with a manual translation and refinement check.
[ { "version": "v1", "created": "Tue, 21 Jun 2011 05:24:24 GMT" } ]
2011-06-22T00:00:00
[ [ "Derrick", "John", "" ], [ "North", "Siobhán", "" ], [ "Simons", "Anthony J. H.", "" ] ]
new_dataset
0.998033
1106.4184
Sebastian Gerling
Michael Backes and Sebastian Gerling and Philipp von Styp-Rekowsky
A Novel Attack against Android Phones
1 page
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissions.
[ { "version": "v1", "created": "Tue, 21 Jun 2011 12:32:00 GMT" } ]
2011-06-22T00:00:00
[ [ "Backes", "Michael", "" ], [ "Gerling", "Sebastian", "" ], [ "von Styp-Rekowsky", "Philipp", "" ] ]
new_dataset
0.999252
1106.4286
Ersen Ekrem
Ersen Ekrem and Sennur Ulukus
Multi-receiver Wiretap Channel with Public and Confidential Messages
Submitted to IEEE Transactions on Information Theory, June 2011
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the multi-receiver wiretap channel with public and confidential messages. In this channel, there is a transmitter that wishes to communicate with two legitimate users in the presence of an external eavesdropper. The transmitter sends a pair of public and confidential messages to each legitimate user. While there are no secrecy constraints on the public messages, confidential messages need to be transmitted in perfect secrecy. We study the discrete memoryless multi-receiver wiretap channel as well as its Gaussian multi-input multi-output (MIMO) instance. First, we consider the degraded discrete memoryless channel, and obtain an inner bound for the capacity region by using an achievable scheme that uses superposition coding and binning. Next, we obtain an outer bound, and show that this outer bound partially matches the inner bound, providing a partial characterization for the capacity region of the degraded channel model. Second, we obtain an inner bound for the general, not necessarily degraded, discrete memoryless channel by using Marton's inner bound, superposition coding, rate-splitting and binning. Third, we consider the degraded Gaussian MIMO channel, and show that, to evaluate both the inner and outer bounds, considering only jointly Gaussian auxiliary random variables and channel input is sufficient. Since the inner and outer bounds partially match, these sufficiency results provide a partial characterization of the capacity region of the degraded Gaussian MIMO channel. Finally, we provide an inner bound for the capacity region of the general, not necessarily degraded, Gaussian MIMO multi-receiver wiretap channel.
[ { "version": "v1", "created": "Tue, 21 Jun 2011 18:18:17 GMT" } ]
2011-06-22T00:00:00
[ [ "Ekrem", "Ersen", "" ], [ "Ulukus", "Sennur", "" ] ]
new_dataset
0.969194
1106.4300
Lin Zhong
Siqi Zhao and Lin Zhong and Jehan Wickramasuriya and Venu Vasudevan
Human as Real-Time Sensors of Social and Physical Events: A Case Study of Twitter and Sports Games
null
null
null
Technical Report TR0620-2011, Rice University and Motorola Labs, June 2011
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we study how Twitter can be used as a sensor to detect frequent and diverse social and physical events in real-time. We devise efficient data collection and event recognition solutions that work despite various limits on free access to Twitter data. We describe a web service implementation of our solution and report our experience with the 2010-2011 US National Football League (NFL) games. The service was able to recognize NFL game events within 40 seconds and with accuracy up to 90%. This capability will be very useful for not only real-time electronic program guide for live broadcast programs but also refined auction of advertisement slots. More importantly, it demonstrates for the first time the feasibility of using Twitter for real-time social and physical event detection for ubiquitous computing.
[ { "version": "v1", "created": "Tue, 21 Jun 2011 19:35:48 GMT" } ]
2011-06-22T00:00:00
[ [ "Zhao", "Siqi", "" ], [ "Zhong", "Lin", "" ], [ "Wickramasuriya", "Jehan", "" ], [ "Vasudevan", "Venu", "" ] ]
new_dataset
0.997172
1004.4063
Aline Parreau
Olivier Delmas (LaBRI), Sylvain Gravier (IF), Mickael Montassier (LaBRI), Aline Parreau (IF)
On two variations of identifying codes
null
Discrete Mathematics 311, 17 (2011) 1948-1956
10.1016/j.disc.2011.05.018
null
cs.DM cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Identifying codes have been introduced in 1998 to model fault-detection in multiprocessor systems. In this paper, we introduce two variations of identifying codes: weak codes and light codes. They correspond to fault-detection by successive rounds. We give exact bounds for those two definitions for the family of cycles.
[ { "version": "v1", "created": "Fri, 23 Apr 2010 07:51:31 GMT" }, { "version": "v2", "created": "Fri, 17 Jun 2011 14:48:12 GMT" } ]
2011-06-21T00:00:00
[ [ "Delmas", "Olivier", "", "LaBRI" ], [ "Gravier", "Sylvain", "", "IF" ], [ "Montassier", "Mickael", "", "LaBRI" ], [ "Parreau", "Aline", "", "IF" ] ]
new_dataset
0.999167
1106.2352
Nicolaie Popescu-Bodorin
Nicolaie Popescu-Bodorin, Luminita State
Cognitive Binary Logic - The Natural Unified Formal Theory of Propositional Binary Logic
null
Recent Advances in Computational Intelligence, Proc. 4th International Conference on Computational Intelligence, pp. 135-142, ISSN: 1790-5117, ISBN 978-960-474-179-3, WSEAS Press, April 2010
null
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a formal theory which describes propositional binary logic as a semantically closed formal language, and allows for syntactically and semantically well-formed formulae, formal proofs (demonstrability in Hilbertian acception), deduction (Gentzen's view of demonstrability), CNF-ization, and deconstruction to be expressed and tested in the same (computational) formal language, using the same data structure. It is also shown here that Cognitive Binary Logic is a self-described theory in which the Liar Paradox is deconstructed.
[ { "version": "v1", "created": "Sun, 12 Jun 2011 22:22:07 GMT" } ]
2011-06-21T00:00:00
[ [ "Popescu-Bodorin", "Nicolaie", "" ], [ "State", "Luminita", "" ] ]
new_dataset
0.990131
1106.3981
Kenneth Mackenthun Jr.
Kenneth M. Mackenthun Jr
Group Codes and the Schreier matrix form
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a group trellis, the sequence of branches that split from the identity path and merge to the identity path form two normal chains. The Schreier refinement theorem can be applied to these two normal chains. The refinement of the two normal chains can be written in the form of a matrix, called the Schreier matrix form, with rows and columns determined by the two normal chains. Based on the Schreier matrix form, we give an encoder structure for a group code which is an estimator. The encoder uses the important idea of shortest length generator sequences previously explained by Forney and Trott. In this encoder the generator sequences are shown to have an additional property: the components of the generators are coset representatives in a chain coset decomposition of the branch group B of the code. Therefore this encoder appears to be a natural form for a group code encoder. The encoder has a register implementation which is somewhat different from the classical shift register structure. This form of the encoder can be extended. We find a composition chain of the branch group B and give an encoder which uses coset representatives in the composition chain of B. When B is solvable, the generators are constructed using coset representatives taken from prime cyclic groups.
[ { "version": "v1", "created": "Mon, 20 Jun 2011 18:22:52 GMT" } ]
2011-06-21T00:00:00
[ [ "Mackenthun", "Kenneth M.", "Jr" ] ]
new_dataset
0.999263
1106.3498
Olivier Bailleux
Olivier Bailleux
On the expressive power of unit resolution
null
null
null
null
cs.AI cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This preliminary report addresses the expressive power of unit resolution regarding input data encoded with partial truth assignments of propositional variables. A characterization of the functions that are computable in this way, which we propose to call propagatable functions, is given. By establishing that propagatable functions can also be computed using monotone circuits, we show that there exist polynomial time complexity propagable functions requiring an exponential amount of clauses to be computed using unit resolution. These results shed new light on studying CNF encodings of NP-complete problems in order to solve them using propositional satisfiability algorithms.
[ { "version": "v1", "created": "Fri, 17 Jun 2011 14:35:28 GMT" } ]
2011-06-20T00:00:00
[ [ "Bailleux", "Olivier", "" ] ]
new_dataset
0.981111
1106.3508
Adriane Chapman
Barbara Blaustein (MITRE), Adriane Chapman (MITRE), Len Seligman (MITRE), M. David Allen (MITRE), Arnon Rosenthal (MITRE)
Surrogate Parenthood: Protected and Informative Graphs
VLDB2011
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many applications, including provenance and some analyses of social networks, require path-based queries over graph-structured data. When these graphs contain sensitive information, paths may be broken, resulting in uninformative query results. This paper presents innovative techniques that give users more informative graph query results; the techniques leverage a common industry practice of providing what we call surrogates: alternate, less sensitive versions of nodes and edges releasable to a broader community. We describe techniques for interposing surrogate nodes and edges to protect sensitive graph components, while maximizing graph connectivity and giving users as much information as possible. In this work, we formalize the problem of creating a protected account G' of a graph G. We provide a utility measure to compare the informativeness of alternate protected accounts and an opacity measure for protected accounts, which indicates the likelihood that an attacker can recreate the topology of the original graph from the protected account. We provide an algorithm to create a maximally useful protected account of a sensitive graph, and show through evaluation with the PLUS prototype that using surrogates and protected accounts adds value for the user, with no significant impact on the time required to generate results for graph queries.
[ { "version": "v1", "created": "Fri, 17 Jun 2011 15:04:31 GMT" } ]
2011-06-20T00:00:00
[ [ "Blaustein", "Barbara", "", "MITRE" ], [ "Chapman", "Adriane", "", "MITRE" ], [ "Seligman", "Len", "", "MITRE" ], [ "Allen", "M. David", "", "MITRE" ], [ "Rosenthal", "Arnon", "", "MITRE" ] ]
new_dataset
0.975388
1106.3517
Shashikumar D R
Shashi Kumar D. R., K. B. Raja, R. K. Chhootaray, Sabyasachi Pattanaik
DWT Based Fingerprint Recognition using Non Minutiae Features
9 pages
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011, 257-265
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Forensic applications like criminal investigations, terrorist identification and National security issues require a strong fingerprint data base and efficient identification system. In this paper we propose DWT based Fingerprint Recognition using Non Minutiae (DWTFR) algorithm. Fingerprint image is decomposed into multi resolution sub bands of LL, LH, HL and HH by applying 3 level DWT. The Dominant local orientation angle {\theta} and Coherence are computed on LL band only. The Centre Area Features and Edge Parameters are determined on each DWT level by considering all four sub bands. The comparison of test fingerprint with database fingerprint is decided based on the Euclidean Distance of all the features. It is observed that the values of FAR, FRR and TSR are improved compared to the existing algorithm.
[ { "version": "v1", "created": "Fri, 17 Jun 2011 15:52:56 GMT" } ]
2011-06-20T00:00:00
[ [ "R.", "Shashi Kumar D.", "" ], [ "Raja", "K. B.", "" ], [ "Chhootaray", "R. K.", "" ], [ "Pattanaik", "Sabyasachi", "" ] ]
new_dataset
0.998109
1106.2877
Chungang Zhu
Frank Sottile, Chungang Zhu
Injectivity of 2D Toric B\'{e}zier Patches
4 pages, extended abstract, to be publised in Proceedings of CAD/Graphis 2011
null
null
Mittag-Leffler-2011spring
cs.GR math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rational B\'{e}zier functions are widely used as mapping functions in surface reparameterization, finite element analysis, image warping and morphing. The injectivity (one-to-one property) of a mapping function is typically necessary for these applications. Toric B\'{e}zier patches are generalizations of classical patches (triangular, tensor product) which are defined on the convex hull of a set of integer lattice points. We give a geometric condition on the control points that we show is equivalent to the injectivity of every 2D toric B\'{e}zier patch with those control points for all possible choices of weights. This condition refines that of Craciun, et al., which only implied injectivity on the interior of a patch.
[ { "version": "v1", "created": "Wed, 15 Jun 2011 05:35:51 GMT" } ]
2011-06-16T00:00:00
[ [ "Sottile", "Frank", "" ], [ "Zhu", "Chungang", "" ] ]
new_dataset
0.992936
1106.2593
Oleg Mazonka
Oleg Mazonka and Alex Kolodin
A Simple Multi-Processor Computer Based on Subleq
24 pages
null
null
null
cs.DC cs.AR cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Subleq (Subtract and Branch on result Less than or Equal to zero) is both an instruction set and a programming language for One Instruction Set Computer (OISC). We describe a hardware implementation of an array of 28 one-instruction Subleq processors on a low-cost FPGA board. Our test results demonstrate that computational power of our Subleq OISC multi-processor is comparable to that of CPU of a modern personal computer. Additionally, we provide implementation details of our complier from a C-style language to Subleq.
[ { "version": "v1", "created": "Tue, 14 Jun 2011 01:26:41 GMT" } ]
2011-06-15T00:00:00
[ [ "Mazonka", "Oleg", "" ], [ "Kolodin", "Alex", "" ] ]
new_dataset
0.994239
1106.2684
Pascal Heus
Pascal Heus, Richard Gomez
QIS-XML: An Extensible Markup Language for Quantum Information Science
83 pages, 58 figures
null
null
null
cs.SE cs.ET cs.PL quant-ph
http://creativecommons.org/licenses/by/3.0/
This Master thesis examines issues of interoperability and integration between the Classic Information Science (CIS) and Quantum Information Science (QIS). It provides a short introduction to the Extensible Markup Language (XML) and proceeds to describe the development steps that have lead to a prototype XML specification for quantum computing (QIS-XML). QIS-XML is a proposed framework, based on the widely used standard (XML) to describe, visualize, exchange and process quantum gates and quantum circuits. It also provides a potential approach to a generic programming language for quantum computers through the concept of XML driven compilers. Examples are provided for the description of commonly used quantum gates and circuits, accompanied with tools to visualize them in standard web browsers. An algorithmic example is also presented, performing a simple addition operation with quantum circuits and running the program on a quantum computer simulator. Overall, this initial effort demonstrates how XML technologies could be at the core of the architecture for describing and programming quantum computers. By leveraging a widely accepted standard, QIS-XML also builds a bridge between classic and quantum IT, which could foster the acceptance of QIS by the ICT community and facilitate the understanding of quantum technology by IT experts. This would support the consolidation of Classic Information Science and Quantum Information Science into a Complete Information Science, a challenge that could be referred to as the "Information Science Grand Unification Challenge".
[ { "version": "v1", "created": "Tue, 14 Jun 2011 12:04:57 GMT" } ]
2011-06-15T00:00:00
[ [ "Heus", "Pascal", "" ], [ "Gomez", "Richard", "" ] ]
new_dataset
0.99886
1106.2694
Antonios Symvonis
Evmorfia N. Argyriou, Michael A. Bekos, Michael Kaufmann, Antonios Symvonis
Geometric Simultaneous RAC Drawings of Graphs
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce and study "geometric simultaneous RAC drawing problems", i.e., a combination of problems on geometric RAC drawings and geometric simultaneous graph drawings. To the best of our knowledge, this is the first time where such a combination is attempted.
[ { "version": "v1", "created": "Tue, 14 Jun 2011 12:42:31 GMT" } ]
2011-06-15T00:00:00
[ [ "Argyriou", "Evmorfia N.", "" ], [ "Bekos", "Michael A.", "" ], [ "Kaufmann", "Michael", "" ], [ "Symvonis", "Antonios", "" ] ]
new_dataset
0.980916
1106.2792
Shizheng Li
Shizheng Li and Aditya Ramamoorthy
Algebraic codes for Slepian-Wolf code design
5 pages, accepted by ISIT 2011
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
Practical constructions of lossless distributed source codes (for the Slepian-Wolf problem) have been the subject of much investigation in the past decade. In particular, near-capacity achieving code designs based on LDPC codes have been presented for the case of two binary sources, with a binary-symmetric correlation. However, constructing practical codes for the case of non-binary sources with arbitrary correlation remains by and large open. From a practical perspective it is also interesting to consider coding schemes whose performance remains robust to uncertainties in the joint distribution of the sources. In this work we propose the usage of Reed-Solomon (RS) codes for the asymmetric version of this problem. We show that algebraic soft-decision decoding of RS codes can be used effectively under certain correlation structures. In addition, RS codes offer natural rate adaptivity and performance that remains constant across a family of correlation structures with the same conditional entropy. The performance of RS codes is compared with dedicated and rate adaptive multistage LDPC codes (Varodayan et al. '06), where each LDPC code is used to compress the individual bit planes. Our simulations show that in classical Slepian-Wolf scenario, RS codes outperform both dedicated and rate-adaptive LDPC codes under $q$-ary symmetric correlation, and are better than rate-adaptive LDPC codes in the case of sparse correlation models, where the conditional distribution of the sources has only a few dominant entries. In a feedback scenario, the performance of RS codes is comparable with both designs of LDPC codes. Our simulations also demonstrate that the performance of RS codes in the presence of inaccuracies in the joint distribution of the sources is much better as compared to multistage LDPC codes.
[ { "version": "v1", "created": "Tue, 14 Jun 2011 19:17:21 GMT" } ]
2011-06-15T00:00:00
[ [ "Li", "Shizheng", "" ], [ "Ramamoorthy", "Aditya", "" ] ]
new_dataset
0.985273
0912.3310
David Kempe
David Kempe, Mahyar Salek, Cristopher Moore
Frugal and Truthful Auctions for Vertex Covers, Flows, and Cuts
null
null
null
null
cs.CC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study truthful mechanisms for hiring a team of agents in three classes of set systems: Vertex Cover auctions, k-flow auctions, and cut auctions. For Vertex Cover auctions, the vertices are owned by selfish and rational agents, and the auctioneer wants to purchase a vertex cover from them. For k-flow auctions, the edges are owned by the agents, and the auctioneer wants to purchase k edge-disjoint s-t paths, for given s and t. In the same setting, for cut auctions, the auctioneer wants to purchase an s-t cut. Only the agents know their costs, and the auctioneer needs to select a feasible set and payments based on bids made by the agents. We present constant-competitive truthful mechanisms for all three set systems. That is, the maximum overpayment of the mechanism is within a constant factor of the maximum overpayment of any truthful mechanism, for every set system in the class. The mechanism for Vertex Cover is based on scaling each bid by a multiplier derived from the dominant eigenvector of a certain matrix. The mechanism for k-flows prunes the graph to be minimally (k+1)-connected, and then applies the Vertex Cover mechanism. Similarly, the mechanism for cuts contracts the graph until all s-t paths have length exactly 2, and then applies the Vertex Cover mechanism.
[ { "version": "v1", "created": "Thu, 17 Dec 2009 02:40:36 GMT" }, { "version": "v2", "created": "Mon, 13 Jun 2011 07:23:15 GMT" } ]
2011-06-14T00:00:00
[ [ "Kempe", "David", "" ], [ "Salek", "Mahyar", "" ], [ "Moore", "Cristopher", "" ] ]
new_dataset
0.99948
1105.5676
Anthony Fanous
Anthony Fanous and Anthony Ephremides
Transmission Control of Two-User Slotted ALOHA Over Gilbert-Elliott Channel: Stability and Delay Analysis
7 pages, 3 figures, to appear in part in IEEE International Symposium on Information Theory (ISIT) 2011. This version has all the proofs omitted in the conference version due to space limitations. Version 2 fixed a minor typo in equation (36), all the results are correct and unchanged
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the problem of calculating the stability region and average delay of two user slotted ALOHA over a Gilbert-Elliott channel, where users have channel state information and adapt their transmission probabilities according to the channel state. Each channel has two states, namely, the 'good' and 'bad' states. In the 'bad' state, the channel is assumed to be in deep fade and the transmission fails with probability one, while in the 'good' state, there is some positive success probability. We calculate the Stability region with and without Multipacket Reception capability as well as the average delay without MPR. Our results show that the stability region of the controlled S-ALOHA is always a superset of the stability region of uncontrolled S-ALOHA. Moreover, if the channel tends to be in the 'bad' state for long proportion of time, then the stability region is a convex Polyhedron strictly containing the TDMA stability region and the optimal transmission strategy is to transmit with probability one whenever the nodes have packets and it is shown that this strategy is delay optimal. On the other hand, if the channel tends to be in the 'good' state more often, then the stability region is bounded by a convex curve and is strict subset of the TDMA stability region. We also show that enhancing the physical layer by allowing MPR capability can significantly enhance the performance while simplifying the MAC Layer design by the lack of the need of scheduling under some conditions. Furthermore, it is shown that transmission control not only allows handling higher stable arrival rates but also leads to lower delay for the same arrival rate compared with ordinary S-ALOHA.
[ { "version": "v1", "created": "Sat, 28 May 2011 00:48:34 GMT" }, { "version": "v2", "created": "Sat, 11 Jun 2011 01:16:16 GMT" } ]
2011-06-14T00:00:00
[ [ "Fanous", "Anthony", "" ], [ "Ephremides", "Anthony", "" ] ]
new_dataset
0.99584
1106.2351
Aleksandar Ilic
Aleksandar Ilic and Andreja Ilic
On vertex covers and matching number of trapezoid graphs
9 pages, 1 figure, 4 algorithms
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The intersection graph of a collection of trapezoids with corner points lying on two parallel lines is called a trapezoid graph. Using binary indexed tree data structure, we improve algorithms for calculating the size and the number of minimum vertex covers (or independent sets), as well as the total number of vertex covers, and reduce the time complexity from $O (n^2)$ to $O (n \log n)$, where $n$ is the number of trapezoids. Furthermore, we present the family of counterexamples for recently proposed algorithm with time complexity $O (n^2)$ for calculating the maximum cardinality matching in trapezoid graphs.
[ { "version": "v1", "created": "Sun, 12 Jun 2011 22:11:56 GMT" } ]
2011-06-14T00:00:00
[ [ "Ilic", "Aleksandar", "" ], [ "Ilic", "Andreja", "" ] ]
new_dataset
0.995293
cs/0304016
Robert Burger PhD
J. R. Burger
Symmetric and anti-symmetric quantum functions
Rewrote for clarity; added references to reversible computing; removed mention of Simon's functions
null
null
null
cs.OH quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces and analyzes symmetric and anti-symmetric quantum binary functions. Generally, such functions uniquely convert a given computational basis state into a different basis state, but with either a plus or a minus sign. Such functions may serve along with a constant function (in a Deutsch-Jozsa type of algorithm) to provide 2**n deterministic qubit combinations (for n qubits) instead of just one.
[ { "version": "v1", "created": "Thu, 10 Apr 2003 17:13:33 GMT" }, { "version": "v2", "created": "Mon, 13 Jun 2011 18:38:25 GMT" } ]
2011-06-14T00:00:00
[ [ "Burger", "J. R.", "" ] ]
new_dataset
0.995377
1106.1811
Arnab Bhattacharya
Arnab Bhattacharya and B. Palvali Teja and Sourav Dutta
Caching Stars in the Sky: A Semantic Caching Approach to Accelerate Skyline Queries
11 pages; will be published in DEXA 2011
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-criteria decision making has been made possible with the advent of skyline queries. However, processing such queries for high dimensional datasets remains a time consuming task. Real-time applications are thus infeasible, especially for non-indexed skyline techniques where the datasets arrive online. In this paper, we propose a caching mechanism that uses the semantics of previous skyline queries to improve the processing time of a new query. In addition to exact queries, utilizing such special semantics allow accelerating related queries. We achieve this by generating partial result sets guaranteed to be in the skyline sets. We also propose an index structure for efficient organization of the cached queries. Experiments on synthetic and real datasets show the effectiveness and scalability of our proposed methods.
[ { "version": "v1", "created": "Thu, 9 Jun 2011 13:47:34 GMT" }, { "version": "v2", "created": "Fri, 10 Jun 2011 07:32:04 GMT" } ]
2011-06-13T00:00:00
[ [ "Bhattacharya", "Arnab", "" ], [ "Teja", "B. Palvali", "" ], [ "Dutta", "Sourav", "" ] ]
new_dataset
0.964627
1106.2104
Martyn Amos
Robin Houston, Joseph White and Martyn Amos
Zen Puzzle Garden is NP-complete
Submitted
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Zen Puzzle Garden (ZPG) is a one-player puzzle game. In this paper, we prove that deciding the solvability of ZPG is NP-complete.
[ { "version": "v1", "created": "Fri, 10 Jun 2011 15:59:30 GMT" } ]
2011-06-13T00:00:00
[ [ "Houston", "Robin", "" ], [ "White", "Joseph", "" ], [ "Amos", "Martyn", "" ] ]
new_dataset
0.999786
1106.1652
Dimitris S. Papailiopoulos
Dimitris S. Papailiopoulos and Alexandros G. Dimakis
Distributed Storage Codes through Hadamard Designs
5 pages, 3 figures, to be presented at ISIT
null
null
null
cs.IT cs.DC cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In distributed storage systems that employ erasure coding, the issue of minimizing the total {\it repair bandwidth} required to exactly regenerate a storage node after a failure arises. This repair bandwidth depends on the structure of the storage code and the repair strategies used to restore the lost data. Minimizing it requires that undesired data during a repair align in the smallest possible spaces, using the concept of interference alignment (IA). Here, a points-on-a-lattice representation of the symbol extension IA of Cadambe {\it et al.} provides cues to perfect IA instances which we combine with fundamental properties of Hadamard matrices to construct a new storage code with favorable repair properties. Specifically, we build an explicit $(k+2,k)$ storage code over $\mathbb{GF}(3)$, whose single systematic node failures can be repaired with bandwidth that matches exactly the theoretical minimum. Moreover, the repair of single parity node failures generates at most the same repair bandwidth as any systematic node failure. Our code can tolerate any single node failure and any pair of failures that involves at most one systematic failure.
[ { "version": "v1", "created": "Wed, 8 Jun 2011 20:02:19 GMT" } ]
2011-06-10T00:00:00
[ [ "Papailiopoulos", "Dimitris S.", "" ], [ "Dimakis", "Alexandros G.", "" ] ]
new_dataset
0.997329
1106.1862
Jacques Carette
Jacques Carette, William M. Farmer, Filip Jeremic, Vincent Maccio, Russell O'Connor, Quang M. Tran
The MathScheme Library: Some Preliminary Experiments
Accepted as a work-in-progress paper at CICM 2011
null
null
null
cs.MS cs.SC cs.SE math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present some of the experiments we have performed to best test our design for a library for MathScheme, the mechanized mathematics software system we are building. We wish for our library design to use and reflect, as much as possible, the mathematical structure present in the objects which populate the library.
[ { "version": "v1", "created": "Thu, 9 Jun 2011 17:16:38 GMT" } ]
2011-06-10T00:00:00
[ [ "Carette", "Jacques", "" ], [ "Farmer", "William M.", "" ], [ "Jeremic", "Filip", "" ], [ "Maccio", "Vincent", "" ], [ "O'Connor", "Russell", "" ], [ "Tran", "Quang M.", "" ] ]
new_dataset
0.999747
1106.1516
Francesco De Pellegrini Dr.
Francesco De Pellegrini, Karina Gomez, Daniele Miorandi and Imrich Chlamtac
Distributed Wake-Up Scheduling for Energy Saving in Wireless Networks
13 pages, 4 figures
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A customary solution to reduce the energy consumption of wireless communication devices is to periodically put the radio into low-power sleep mode. A relevant problem is to schedule the wake-up of nodes in such a way as to ensure proper coordination among devices, respecting delay constraints while still saving energy. In this paper, we introduce a simple algebraic characterization of the problem of periodic wake-up scheduling under both energy consumption and delay constraints. We demonstrate that the general problem of wake-up times coordination is equivalent to integer factorization and discuss the implications on the design of efficient scheduling algorithms. We then propose simple polynomial time heuristic algorithms that can be implemented in a distributed fashion and present a message complexity of the order of the number of links in the network. Numerical results are provided in order to assess the performance of the proposed techniques when applied to wireless sensor networks.
[ { "version": "v1", "created": "Wed, 8 Jun 2011 08:12:19 GMT" } ]
2011-06-09T00:00:00
[ [ "De Pellegrini", "Francesco", "" ], [ "Gomez", "Karina", "" ], [ "Miorandi", "Daniele", "" ], [ "Chlamtac", "Imrich", "" ] ]
new_dataset
0.978748
1106.1287
Arunmozhi Annamalai Ms.
S.A.Arunmozhi, Y.Venkataramani
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
6 pages, 5 figures
Arunmozhi S.A., Venkataramani Y.,DDoS Attack and Defense Scheme in Wireless Ad hoc Networks,International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.3, May 2011
10.5121/ijnsa.2011.3312
null
cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The wireless ad hoc networks are highly vulnerable to distributed denial of service(DDoS) attacks because of its unique characteristics such as open network architecture, shared wireless medium and stringent resource constraints. These attacks throttle the tcp throughput heavily and reduce the quality of service(QoS) to end systems gradually rather than refusing the clients from the services completely. In this paper, we discussed the DDoS attacks and proposed a defense scheme to improve the performance of the ad hoc networks. Our proposed defense mechanism uses the medium access control (MAC) layer information to detect the attackers. The status values from MAC layer that can be used for detection are Frequency of receiving RTS/CTS packets, Frequency of sensing a busy channel and the number of RTS/DATA retransmissions. Once the attackers are identified, all the packets from those nodes will be blocked. The network resources are made available to the legitimate users. We perform the simulation with Network Simulator NS2 and we proved that our proposed system improves the network performance.
[ { "version": "v1", "created": "Tue, 7 Jun 2011 09:09:18 GMT" } ]
2011-06-08T00:00:00
[ [ "Arunmozhi", "S. A.", "" ], [ "Venkataramani", "Y.", "" ] ]
new_dataset
0.997866
1004.3807
Liangbin Li
Liangbin Li, Yindi Jing, Hamid Jafarkhani
Interference Cancellation at the Relay for Multi-User Wireless Cooperative Networks
submitted to IEEE Transaction on Wireless Communication
Wireless Communications, IEEE Transactions on , vol.10, no.3, pp.930-939, March 2011
10.1109/TWC.2010.011111.100640
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study multi-user transmission and detection schemes for a multi-access relay network (MARN) with linear constraints at all nodes. In a $(J, J_a, R_a, M)$ MARN, $J$ sources, each equipped with $J_a$ antennas, communicate to one $M$-antenna destination through one $R_a$-antenna relay. A new protocol called IC-Relay-TDMA is proposed which takes two phases. During the first phase, symbols of different sources are transmitted concurrently to the relay. At the relay, interference cancellation (IC) techniques, previously proposed for systems with direct transmission, are applied to decouple the information of different sources without decoding. During the second phase, symbols of different sources are forwarded to the destination in a time division multi-access (TDMA) fashion. At the destination, the maximum-likelihood (ML) decoding is performed source-by-source. The protocol of IC-Relay-TDMA requires the number of relay antennas no less than the number of sources, i.e., $R_a\ge J$. Through outage analysis, the achievable diversity gain of the proposed scheme is shown to be $\min\{J_a(R_a-J+1),R_aM\}$. When {\small$M\le J_a\left(1-\frac{J-1}{R_a}\right)$}, the proposed scheme achieves the maximum interference-free (int-free) diversity gain $R_aM$. Since concurrent transmission is allowed during the first phase, compared to full TDMA transmission, the proposed scheme achieves the same diversity, but with a higher symbol rate.
[ { "version": "v1", "created": "Wed, 21 Apr 2010 21:12:41 GMT" }, { "version": "v2", "created": "Tue, 9 Nov 2010 01:09:23 GMT" } ]
2011-06-06T00:00:00
[ [ "Li", "Liangbin", "" ], [ "Jing", "Yindi", "" ], [ "Jafarkhani", "Hamid", "" ] ]
new_dataset
0.994222