id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1103.5580
|
Saheeb Kayani Engr.
|
Saheeb Ahmed Kayani
|
Designing a Miniature Wheel Arrangement for Mobile Robot Platforms
|
Final published version, hardcopy available from technical library of
NUST College of E&ME, Rawalpindi, Pakistan on request
| null | null |
DME-RR-02
|
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this research report details of design of a miniature wheel arrangement
are presented. This miniature wheel arrangement is essentially a direction
control mechanism intended for use on a mobile robot platform or base. The
design is a specific one employing a stepper motor as actuator and as described
can only be used on a certain type of wheeled robots. However, as a basic
steering control element, more than one of these miniature wheel arrangements
can be grouped together to implement more elaborate and intelligent direction
control schemes on varying configurations of wheeled mobile robot platforms.
|
[
{
"version": "v1",
"created": "Tue, 29 Mar 2011 09:35:49 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Mar 2011 09:32:01 GMT"
},
{
"version": "v3",
"created": "Sat, 2 Apr 2011 10:20:28 GMT"
}
] | 2011-04-05T00:00:00 |
[
[
"Kayani",
"Saheeb Ahmed",
""
]
] |
new_dataset
| 0.997999 |
1104.0388
|
Vladimir Gusev
|
Vladimir V. Gusev, Elena V. Pribavkina
|
On Non-Complete Sets and Restivo's Conjecture
|
11 pages
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A finite set S of words over the alphabet A is called non-complete if
Fact(S*) is different from A*. A word w in A* - Fact(S*) is said to be
uncompletable. We present a series of non-complete sets S_k whose minimal
uncompletable words have length 5k^2 - 17k + 13, where k > 3 is the maximal
length of words in S_k. This is an infinite series of counterexamples to
Restivo's conjecture, which states that any non-complete set possesses an
uncompletable word of length at most 2k^2.
|
[
{
"version": "v1",
"created": "Sun, 3 Apr 2011 15:13:50 GMT"
}
] | 2011-04-05T00:00:00 |
[
[
"Gusev",
"Vladimir V.",
""
],
[
"Pribavkina",
"Elena V.",
""
]
] |
new_dataset
| 0.979042 |
1104.0422
|
Wojciech Mazurczyk
|
Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski
|
PadSteg: Introducing Inter-Protocol Steganography
|
9 pages, 12 figures, 5 tables
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hiding information in network traffic may lead to leakage of confidential
information. In this paper we introduce a new steganographic system: the
PadSteg (Padding Steganography). To authors' best knowledge it is the first
information hiding solution which represents inter-protocol steganography i.e.
usage of relation between two or more protocols from the TCP/IP stack to enable
secret communication. PadSteg utilizes ARP and TCP protocols together with an
Etherleak vulnerability (improper Ethernet frame padding) to facilitate secret
communication for hidden groups in LANs (Local Area Networks). Basing on real
network traces we confirm that PadSteg is feasible in today's networks and we
estimate what steganographic bandwidth is achievable while limiting the chance
of disclosure. We also point at possible countermeasures against PadSteg.
|
[
{
"version": "v1",
"created": "Sun, 3 Apr 2011 19:52:12 GMT"
}
] | 2011-04-05T00:00:00 |
[
[
"Jankowski",
"Bartosz",
""
],
[
"Mazurczyk",
"Wojciech",
""
],
[
"Szczypiorski",
"Krzysztof",
""
]
] |
new_dataset
| 0.996406 |
1104.0579
|
Michael Lew
|
Ye Ji
|
Image Retrieval Method Using Top-surf Descriptor
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This report presents the results and details of a content-based image
retrieval project using the Top-surf descriptor. The experimental results are
preliminary, however, it shows the capability of deducing objects from parts of
the objects or from the objects that are similar. This paper uses a dataset
consisting of 1200 images of which 800 images are equally divided into 8
categories, namely airplane, beach, motorbike, forest, elephants, horses, bus
and building, while the other 400 images are randomly picked from the Internet.
The best results achieved are from building category.
|
[
{
"version": "v1",
"created": "Mon, 4 Apr 2011 14:14:47 GMT"
}
] | 2011-04-05T00:00:00 |
[
[
"Ji",
"Ye",
""
]
] |
new_dataset
| 0.986731 |
1104.0644
|
Mohamed El-Zawawy
|
Mohamed A. El-Zawawy
|
Program Optimization Based Pointer Analysis and Live Stack-Heap Analysis
|
10 pages, 7 figures
|
International Journal of Computer Science Issues, Volume 8, Issue
2, pages 98-107, March 2011
| null | null |
cs.SE cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present type systems for flow-sensitive pointer analysis,
live stack-heap (variables) analysis, and program optimization. The type system
for live stack-heap analysis is an enrichment of that for pointer analysis; the
enrichment has the form of a second component being added to types of the
latter system. Results of pointer analysis are proved useful via their use in
the type system for live stack-heap analysis. The type system for program
optimization is also an augmentation of that for live stack-heap analysis, but
the augmentation takes the form of a transformation component being added to
inference rules of the latter system. The form of program optimization being
achieved is that of dead-code elimination. A form of program correction may
result indirectly from eliminating faulty code (causing the program to abort)
that is dead. Therefore program optimization can result in program correction.
Our type systems have the advantage of being compositional and
relatively-simply structured.
The novelty of our work comes from the fact that our type system for program
optimization associates the optimized version of a program with a justification
(in the form of a type derivation) for the optimization. This justification is
pretty much appreciated in many research areas like certified code
(proof-carrying code) which is the motivation of this work
|
[
{
"version": "v1",
"created": "Mon, 4 Apr 2011 18:14:52 GMT"
}
] | 2011-04-05T00:00:00 |
[
[
"El-Zawawy",
"Mohamed A.",
""
]
] |
new_dataset
| 0.973003 |
0908.1669
|
Martianus Frederic Ezerman
|
Martianus Frederic Ezerman, Markus Grassl, and Patrick Sole
|
The Weights in MDS Codes
|
5 pages, submitted to IEEE Trans. IT. This version 2 is the revised
version after the refereeing process. Accepted for publication
|
IEEE Transactions on Information Theory, vol. 57, no. 1, January
2011, pp. 392-396
|
10.1109/TIT.2010.2090246
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The weights in MDS codes of length n and dimension k over the finite field
GF(q) are studied. Up to some explicit exceptional cases, the MDS codes with
parameters given by the MDS conjecture are shown to contain all k weights in
the range n-k+1 to n. The proof uses the covering radius of the dual code
|
[
{
"version": "v1",
"created": "Wed, 12 Aug 2009 10:38:56 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jul 2010 10:10:11 GMT"
}
] | 2011-03-31T00:00:00 |
[
[
"Ezerman",
"Martianus Frederic",
""
],
[
"Grassl",
"Markus",
""
],
[
"Sole",
"Patrick",
""
]
] |
new_dataset
| 0.99212 |
1103.5760
|
M. Shahriar Hossain
|
M. Shahriar Hossain, Kazi Muhammad Najmul Hasan Khan, M. Muztaba Fuad,
Debzani Deb
|
Triangular Dynamic Architecture for Distributed Computing in a LAN
Environment
|
Published
|
6th International Conference on Computer and Information
Technology, Dhaka, Bangladesh, 2003, Pages 481-486
| null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A computationally intensive large job, granulized to concurrent pieces and
operating in a dynamic environment should reduce the total processing time.
However, distributing jobs across a networked environment is a tedious and
difficult task. Job distribution in a Local Area Network based on Triangular
Dynamic Architecture (TDA) is a mechanism that establishes a dynamic
environment for job distribution, load balancing and distributed processing
with minimum interaction from the user. This paper introduces TDA and discusses
its architecture and shows the benefits gained by utilizing such architecture
in a distributed computing environment.
|
[
{
"version": "v1",
"created": "Tue, 29 Mar 2011 20:05:50 GMT"
}
] | 2011-03-31T00:00:00 |
[
[
"Hossain",
"M. Shahriar",
""
],
[
"Khan",
"Kazi Muhammad Najmul Hasan",
""
],
[
"Fuad",
"M. Muztaba",
""
],
[
"Deb",
"Debzani",
""
]
] |
new_dataset
| 0.999295 |
1103.5410
|
Alberto Pepe
|
Alberto Pepe and Corinna di Gennaro
|
Political protest Italian-style: The dissonance between the blogosphere
and mainstream media in the promotion and coverage of Beppe Grillo's V-day
|
30 pages; First Monday. Volume 14, Number 12. 2009
|
First Monday. Volume 14, Number 12. 2009
| null | null |
cs.SI cs.CY physics.soc-ph
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
We analyze the organization, promotion and public perception of V-day, a
political rally that took place on September 8, 2007, to protest against
corruption in the Italian Parliament. Launched by blogger Beppe Grillo, and
promoted via a word of mouth mobilization on the Italian blogosphere, V-day
brought close to one million Italians in the streets on a single day, but was
mostly ignored by mainstream media. This article is divided into two parts. In
the first part, we analyze the volume and content of online articles published
by both bloggers and mainstream news sources from June 14 (the day V-day was
announced) until September 15, 2007 (one week after it took place) . We find
that the success of V-day can be attributed to the coverage of bloggers and
small-scale local news outlets only, suggesting a strong grassroots component
in the organization of the rally. We also find a dissonant thematic
relationship between content published by blogs and mainstream media: while the
majority of blogs analyzed promote V-day, major mainstream media sources
critique the methods of information production and dissemination employed by
Grillo. Based on this finding, in the second part of the study, we explore the
role of Grillo in the organization of the rally from a network analysis
perspective. We study the interlinking structure of the V-day blogosphere
network, to determine its structure, its levels of heterogeneity, and
resilience. Our analysis contradicts the hypothesis that Grillo served as a
top-down, broadcast-like source of information. Rather, we find that
information about V-day was transferred across heterogeneous nodes in a
moderately robust and resilient core network of blogs. We speculate that the
organization of V-day represents the very first case, in Italian history, of a
political demonstration developed and promoted primarily via the use of social
media on the web.
|
[
{
"version": "v1",
"created": "Mon, 28 Mar 2011 16:37:46 GMT"
}
] | 2011-03-30T00:00:00 |
[
[
"Pepe",
"Alberto",
""
],
[
"di Gennaro",
"Corinna",
""
]
] |
new_dataset
| 0.999471 |
1103.5531
|
Andrew Lyons
|
Andrew Lyons
|
Acyclic and Star Colorings of Cographs
|
11 pages, 4 figures
| null | null | null |
cs.DS cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An \emph{acyclic coloring} of a graph is a proper vertex coloring such that
the union of any two color classes induces a disjoint collection of trees. The
more restricted notion of \emph{star coloring} requires that the union of any
two color classes induces a disjoint collection of stars. We prove that every
acyclic coloring of a cograph is also a star coloring and give a linear-time
algorithm for finding an optimal acyclic and star coloring of a cograph. If the
graph is given in the form of a cotree, the algorithm runs in O(n) time. We
also show that the acyclic chromatic number, the star chromatic number, the
treewidth plus one, and the pathwidth plus one are all equal for cographs.
|
[
{
"version": "v1",
"created": "Tue, 29 Mar 2011 02:25:49 GMT"
}
] | 2011-03-30T00:00:00 |
[
[
"Lyons",
"Andrew",
""
]
] |
new_dataset
| 0.998538 |
1103.5676
|
Tobias Kuhn
|
Tobias Kuhn
|
Codeco: A Grammar Notation for Controlled Natural Language in Predictive
Editors
| null |
In Pre-Proceedings of the Second Workshop on Controlled Natural
Languages (CNL 2010), CEUR Workshop Proceedings, Volume 622, 2010
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Existing grammar frameworks do not work out particularly well for controlled
natural languages (CNL), especially if they are to be used in predictive
editors. I introduce in this paper a new grammar notation, called Codeco, which
is designed specifically for CNLs and predictive editors. Two different parsers
have been implemented and a large subset of Attempto Controlled English (ACE)
has been represented in Codeco. The results show that Codeco is practical,
adequate and efficient.
|
[
{
"version": "v1",
"created": "Tue, 29 Mar 2011 15:05:11 GMT"
}
] | 2011-03-30T00:00:00 |
[
[
"Kuhn",
"Tobias",
""
]
] |
new_dataset
| 0.998658 |
1103.5115
|
Pars Mutaf
|
Pars Mutaf
|
Defeating Internet attacks and Spam using "disposable" Mobile IPv6 home
addresses
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a model of operation for next generation wireless Internet, in
which a mobile host has hundreds of "disposable" Mobile IPv6 home addresses.
Each correspondent is distributed a different disposable home address. If
attacked on a given home address, the mobile user can block packets to that
address and become unreachable to the attacker. Blocking one address does not
affect other addresses. Other correspondents can still reach the mobile host. A
new home address can also be requested via e-mail, instant messaging, or
directly from the target host using a protocol that we develop. This model is
especially useful against battery exhausting Denial-of-Service (DoS) attacks
and CPU exhausting distributed DoS attacks, since it seems to be the only
viable solution, currently. We show however that this model can also be used to
defeat other attacks and also to stop spam.
|
[
{
"version": "v1",
"created": "Sat, 26 Mar 2011 08:25:02 GMT"
}
] | 2011-03-29T00:00:00 |
[
[
"Mutaf",
"Pars",
""
]
] |
new_dataset
| 0.999204 |
1103.5128
|
Chia-han Lee
|
Chia-han Lee and Wayne Wolf
|
Power Consumption of LDPC Decoders in Software Radio
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
LDPC code is a powerful error correcting code and has been applied to many
advanced communication systems. The prosperity of software radio has motivated
us to investigate the implementation of LDPC decoders on processors. In this
paper, we estimate and compare complexity and power consumption of LDPC
decoding algorithms running on general purpose processors. Using the estimation
results, we show two power control schemes for software radio: SNR-based
algorithm diversity and joint transmit power and receiver energy management.
Overall, this paper discusses general concerns about using processors as the
software radio platform for the implementation of LDPC decoders.
|
[
{
"version": "v1",
"created": "Sat, 26 Mar 2011 13:10:35 GMT"
}
] | 2011-03-29T00:00:00 |
[
[
"Lee",
"Chia-han",
""
],
[
"Wolf",
"Wayne",
""
]
] |
new_dataset
| 0.996133 |
1103.5197
|
Parisa Babaheidarian
|
Parisa Babaheidarian and Somayeh Salimi and Mohammad Reza Aref
|
A New Secret key Agreement Scheme in a Four-Terminal Network
|
6 pages, 3 figures
| null | null | null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new scenario for generating a secret key and two private keys among three
Terminals in the presence of an external eavesdropper is considered. Terminals
1, 2 and 3 intend to share a common secret key concealed from the external
eavesdropper (Terminal 4) and simultaneously, each of Terminals 1 and 2 intends
to share a private key with Terminal 3 while keeping it concealed from each
other and from Terminal 4. All four Terminals observe i.i.d. outputs of
correlated sources and there is a public channel from Terminal 3 to Terminals 1
and 2. An inner bound of the "secret key-private keys capacity region" is
derived and the single letter capacity regions are obtained for some special
cases.
|
[
{
"version": "v1",
"created": "Sun, 27 Mar 2011 11:08:07 GMT"
}
] | 2011-03-29T00:00:00 |
[
[
"Babaheidarian",
"Parisa",
""
],
[
"Salimi",
"Somayeh",
""
],
[
"Aref",
"Mohammad Reza",
""
]
] |
new_dataset
| 0.999047 |
1011.5814
|
Sagarmoy Dutta
|
Sagarmoy Dutta and Piyush P Kurur
|
Quantum Cyclic Code of length dividing $p^{t}+1$
|
Improvement on the previous papaer titled "Quantum Cyclic Codes"
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we study cyclic stabiliser codes over $\mathbb{F}_p$ of length
dividing $p^t+1$ for some positive integer $t$. We call these $t$-Frobenius
codes or just Frobenius codes for short. We give methods to construct them and
show that they have efficient decoding algorithms. An important subclass of
stabiliser codes are the linear stabiliser codes. For linear Frobenius codes we
have stronger results: We completely characterise all linear Frobenius codes.
As a consequence, we show that for every integer $n$ that divides $p^t+1$ for
an odd $t$, there are no linear cyclic codes of length $n$. On the other hand
for even $t$, we give an explicit method to construct all of them. This gives
us a many explicit example of Frobenius codes which include the well studied
Laflamme code. We show that the classical notion of BCH distance can be
generalised to all the Frobenius codes that we construct, including the
non-linear ones, and show that the algorithm of Berlekamp can be generalised to
correct quantum errors within the BCH limit. This gives, for the first time, a
family of codes that are neither CSS nor linear for which efficient decoding
algorithm exits. The explicit examples that we construct are summarised in
Table \ref{tab:explicit-examples-short} and explained in detail in Tables
\ref{tab:explicit-examples-2} (linear case) and \ref{tab:explicit-examples-3}
(non-linear case).
|
[
{
"version": "v1",
"created": "Fri, 26 Nov 2010 15:03:47 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Mar 2011 11:30:45 GMT"
}
] | 2011-03-28T00:00:00 |
[
[
"Dutta",
"Sagarmoy",
""
],
[
"Kurur",
"Piyush P",
""
]
] |
new_dataset
| 0.970943 |
1102.2734
|
Navin Kashyap
|
Navin Kashyap and Andrew Thangaraj
|
The Treewidth of MDS and Reed-Muller Codes
|
This constitutes a major upgrade of previous versions; submitted to
IEEE Transactions on Information Theory
| null | null | null |
cs.IT cs.DM math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The constraint complexity of a graphical realization of a linear code is the
maximum dimension of the local constraint codes in the realization. The
treewidth of a linear code is the least constraint complexity of any of its
cycle-free graphical realizations. This notion provides a useful
parametrization of the maximum-likelihood decoding complexity for linear codes.
In this paper, we prove the surprising fact that for maximum distance separable
codes and Reed-Muller codes, treewidth equals trelliswidth, which, for a code,
is defined to be the least constraint complexity (or branch complexity) of any
of its trellis realizations. From this, we obtain exact expressions for the
treewidth of these codes, which constitute the only known explicit expressions
for the treewidth of algebraic codes.
|
[
{
"version": "v1",
"created": "Mon, 14 Feb 2011 11:25:39 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Feb 2011 10:49:42 GMT"
},
{
"version": "v3",
"created": "Fri, 25 Mar 2011 06:32:24 GMT"
}
] | 2011-03-28T00:00:00 |
[
[
"Kashyap",
"Navin",
""
],
[
"Thangaraj",
"Andrew",
""
]
] |
new_dataset
| 0.999515 |
1103.1824
|
Sumanta Chaudhuri Dr.
|
Sumanta Chaudhuri and Sylvain Guilley
|
Side-Channel Oscilloscope
|
2 pages, 1 figure. a brief outline paper
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Side-Channel Analysis used for codebreaking could be used constructively as a
probing tool for internal gates in integrated circuits. This paper outlines
basic methods and mathematics for that purpose
|
[
{
"version": "v1",
"created": "Tue, 8 Mar 2011 12:25:20 GMT"
}
] | 2011-03-28T00:00:00 |
[
[
"Chaudhuri",
"Sumanta",
""
],
[
"Guilley",
"Sylvain",
""
]
] |
new_dataset
| 0.991675 |
1103.1482
|
Christoph Lange
|
Christoph Lange, Michael Kohlhase, Catalin David, Deyan Ginev, Andrea
Kohlhase, Bogdan Matican, Stefan Mirea and Vyacheslav Zholudev
|
The Planetary System: Executable Science, Technology, Engineering and
Math Papers
|
Extended Semantic Web Conference (ESWC 2011), Demo Track. To be
published in the Springer LNCS series
| null | null | null |
cs.DL cs.MS
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Executable scientific papers contain not just layouted text for reading. They
contain, or link to, machine-comprehensible representations of the scientific
findings or experiments they describe. Client-side players can thus enable
readers to "check, manipulate and explore the result space". We have realized
executable papers in the STEM domain with the Planetary system. Semantic
annotations associate the papers with a content commons holding the background
ontology, the annotations are exposed as Linked Data, and a frontend player
application hooks modular interactive services into the semantic annotations.
|
[
{
"version": "v1",
"created": "Tue, 8 Mar 2011 10:12:40 GMT"
}
] | 2011-03-27T00:00:00 |
[
[
"Lange",
"Christoph",
""
],
[
"Kohlhase",
"Michael",
""
],
[
"David",
"Catalin",
""
],
[
"Ginev",
"Deyan",
""
],
[
"Kohlhase",
"Andrea",
""
],
[
"Matican",
"Bogdan",
""
],
[
"Mirea",
"Stefan",
""
],
[
"Zholudev",
"Vyacheslav",
""
]
] |
new_dataset
| 0.998776 |
1103.4676
|
Ashok Kumar Das
|
Ashok Kumar Das and Debasis Giri
|
An Identity Based Key Management Scheme in Wireless Sensor Networks
|
7 pages, Published in Proceedings of 4th Asian International Mobile
Computing Conference (AMOC 2006), Kolkata, India, pp. 70-76, January 4-7,
2006
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Pairwise key establishment is one of the fundamental security services in
sensor networks which enables sensor nodes in a sensor network to communicate
securely with each other using cryptographic techniques. It is not feasible to
apply traditional public key management techniques in resource-constrained
sensor nodes, and also because the sensor nodes are vulnerable to physical
capture. In this paper, we introduce a new scheme called the identity based key
pre-distribution using a pseudo random function (IBPRF), which has better
trade-off between communication overhead, network connectivity and resilience
against node capture compared to the other key pre-distribution schemes. Our
scheme can be easily adapted in mobile sensor networks. This scheme supports
the addition of new sensor nodes after the initial deployment and also works
for any deployment topology. In addition, we propose an improved version of our
scheme to support large sensor networks.
|
[
{
"version": "v1",
"created": "Thu, 24 Mar 2011 04:22:19 GMT"
}
] | 2011-03-25T00:00:00 |
[
[
"Das",
"Ashok Kumar",
""
],
[
"Giri",
"Debasis",
""
]
] |
new_dataset
| 0.98203 |
1103.4686
|
Suresh Badarla
|
Suresh Badarla, R Rama
|
Note on minimally k-connected graphs
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A k-tree is either a complete graph on (k+1) vertices or given a k-tree G'
with n vertices, a k-tree G with (n+1) vertices can be constructed by
introducing a new vertex v and picking a k-clique Q in G' and then joining each
vertex u in Q. A graph G is k-edge-connected if the graph remains connected
even after deleting fewer edges than k from the graph. A k-edge-connected graph
G is said to be minimally k-connected if G \ {e} is no longer k-edge-connected
for any edge e belongs to E(G) where E(G) denotes the set of edges of G. In
this paper we find two separate O (n2) algorithms so that a minimally
2-connected graph can be obtained from a 2-tree and a minimally k-connected
graph can be obtained from a k-tree. In a k-tree (k \geq 2) we find the edges
which are insensitive to the k-connectivity have both their end vertices of
degrees greater than or equal to k+1.This property is fully exploited to find
an algorithm which reduces any k-tree to a minimally k-connected graph.
|
[
{
"version": "v1",
"created": "Thu, 24 Mar 2011 06:35:29 GMT"
}
] | 2011-03-25T00:00:00 |
[
[
"Badarla",
"Suresh",
""
],
[
"Rama",
"R",
""
]
] |
new_dataset
| 0.957747 |
1103.4694
|
Mengran Li
|
Razvan Voicu, Mengran Li
|
Cyclic and Inductive Calculi are equivalent
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Brotherston and Simpson [citation] have formalized and investigated cyclic
reasoning, reaching the important conclusion that it is at least as powerful as
inductive reasoning (specifically, they showed that each inductive proof can be
translated into a cyclic proof). We add to their investigation by proving the
converse of this result, namely that each inductive proof can be translated
into an inductive one. This, in effect, establishes the equivalence between
first order cyclic and inductive calculi.
|
[
{
"version": "v1",
"created": "Thu, 24 Mar 2011 08:07:01 GMT"
}
] | 2011-03-25T00:00:00 |
[
[
"Voicu",
"Razvan",
""
],
[
"Li",
"Mengran",
""
]
] |
new_dataset
| 0.983095 |
1103.4712
|
Vijay Kumar K Mr
|
Vijay Kumar Kodavalla and Dr. P.G. Krishna Mohan
|
Distributed Video Coding: Codec Architecture and Implementation
|
Signal & Image Processing : An International Journal(SIPIJ) Vol.2,
No.1, March 2011
| null |
10.5121/sipij.2011.2111
| null |
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distributed Video Coding (DVC) is a new coding paradigm for video
compression, based on Slepian- Wolf (lossless coding) and Wyner-Ziv (lossy
coding) information theoretic results. DVC is useful for emerging applications
such as wireless video cameras, wireless low-power surveillance networks and
disposable video cameras for medical applications etc. The primary objective of
DVC is low-complexity video encoding, where bulk of computation is shifted to
the decoder, as opposed to low-complexity decoder in conventional video
compression standards such as H.264 and MPEG etc. There are couple of early
architectures and implementations of DVC from Stanford University[2][3] in
2002, Berkeley University PRISM (Power-efficient, Robust, hIgh-compression,
Syndrome-based Multimedia coding)[4][5] in 2002 and European project DISCOVER
(DIStributed COding for Video SERvices)[6] in 2007. Primarily there are two
types of DVC techniques namely pixel domain and transform domain based.
Transform domain design will have better rate-distortion (RD) performance as it
exploits spatial correlation between neighbouring samples and compacts the
block energy into as few transform coefficients as possible (aka energy
compaction). In this paper, architecture, implementation details and "C" model
results of our transform domain DVC are presented.
|
[
{
"version": "v1",
"created": "Thu, 24 Mar 2011 09:50:26 GMT"
}
] | 2011-03-25T00:00:00 |
[
[
"Kodavalla",
"Vijay Kumar",
""
],
[
"Mohan",
"Dr. P. G. Krishna",
""
]
] |
new_dataset
| 0.995251 |
1103.4769
|
Manju
|
Manju, Arun K. Pujari
|
High-Energy-First (HEF) Heuristic for Energy-Efficient Target Coverage
Problem
|
14 pages, 6 figures, IJASUC
|
International Journal of Ad hoc, Sensor & Ubiquitous Computing
(IJASUC) Vol.2, No.1, March 2011
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Target coverage problem in wireless sensor networks is concerned with
maximizing the lifetime of the network while continuously monitoring a set of
targets. A sensor covers targets which are within the sensing range. For a set
of sensors and a set of targets, the sensor-target coverage relationship is
assumed to be known. A sensor cover is a set of sensors that covers all the
targets. The target coverage problem is to determine a set of sensor covers
with maximum aggregated lifetime while constraining the life of each sensor by
its initial battery life. The problem is proved to be NP-complete and heuristic
algorithms to solve this problem are proposed. In the present study, we give a
unified interpretation of earlier algorithms and propose a new and efficient
algorithm. We show that all known algorithms are based on a common reasoning
though they seem to be derived from different algorithmic paradigms. We also
show that though some algorithms guarantee bound on the quality of the
solution, this bound is not meaningful and not practical too. Our
interpretation provides a better insight to the solution techniques. We propose
a new greedy heuristic which prioritizes sensors on residual battery life. We
show empirically that the proposed algorithm outperforms all other heuristics
in terms of quality of solution. Our experimental study over a large set of
randomly generated problem instances also reveals that a very na\"ive greedy
approach yields solutions which is reasonably (appx. 10%) close to the actual
optimal solutions.
|
[
{
"version": "v1",
"created": "Thu, 24 Mar 2011 14:07:38 GMT"
}
] | 2011-03-25T00:00:00 |
[
[
"Manju",
"",
""
],
[
"Pujari",
"Arun K.",
""
]
] |
new_dataset
| 0.995132 |
1103.4438
|
Ravi Teja Sukhavasi
|
Ravi Teja Sukhavasi, Babak Hassibi
|
Anytime Reliable Codes for Stabilizing Plants over Erasure Channels
|
Submitted to CDC 2011
| null | null | null |
cs.SY cs.IT math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of stabilizing an unstable plant over a noisy communication link
is an increasingly important one that arises in problems of distributed control
and networked control systems. Although the work of Schulman and Sahai over the
past two decades, and their development of the notions of "tree codes" and
"anytime capacity", provides the theoretical framework for studying such
problems, there has been scant practical progress in this area because explicit
constructions of tree codes with efficient encoding and decoding did not exist.
To stabilize an unstable plant driven by bounded noise over a noisy channel one
needs real-time encoding and real-time decoding and a reliability which
increases exponentially with delay, which is what tree codes guarantee. We
prove the existence of linear tree codes with high probability and, for erasure
channels, give an explicit construction with an expected encoding and decoding
complexity that is constant per time instant. We give sufficient conditions on
the rate and reliability required of the tree codes to stabilize vector plants
and argue that they are asymptotically tight. This work takes a major step
towards controlling plants over noisy channels, and we demonstrate the efficacy
of the method through several examples.
|
[
{
"version": "v1",
"created": "Wed, 23 Mar 2011 05:27:42 GMT"
}
] | 2011-03-24T00:00:00 |
[
[
"Sukhavasi",
"Ravi Teja",
""
],
[
"Hassibi",
"Babak",
""
]
] |
new_dataset
| 0.99947 |
1103.3742
|
Harry Yosh
|
Harry Yosh
|
The key exchange cryptosystem used with higher order Diophantine
equations
|
8 pages, 0 figure
|
International Journal of Network Security & Its Applications
(IJNSA), Vol.3, No.2, March 2011
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One-way functions are widely used for encrypting the secret in public key
cryptography, although they are regarded as plausibly one-way but have not been
proven so. Here we discuss the public key cryptosystem based on the system of
higher order Diophantine equations. In this system those Diophantine equations
are used as public keys for sender and recipient, and sender can recover the
secret from the Diophantine equation returned from recipient with a trapdoor.
In general the system of Diophantine equations is hard to solve when it is
positive-dimensional and it implies the Diophantine equations in this
cryptosystem works as a possible one-way function. We also discuss some
problems on implementation, which are caused from additional complexity
necessary for constructing Diophantine equations in order to prevent from
attacking by tamperers.
|
[
{
"version": "v1",
"created": "Sat, 19 Mar 2011 02:52:19 GMT"
}
] | 2011-03-22T00:00:00 |
[
[
"Yosh",
"Harry",
""
]
] |
new_dataset
| 0.992758 |
1103.3766
|
Meng Shen
|
Jie Li, Jian-ping Wu, Ke Xu
|
SafeZone: A Hierarchical Inter-Domain Authenticated Source Address
Validation Solution
| null | null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by/3.0/
|
Next generation Internet is highly concerned about the issue of reliability.
Principally, the foundation of reliability is authentication of the source IP
address. With the signature-and-verification based defense mechanisms available
today, unfortunately, there is a lack of hierarchical architecture, which makes
the structure of the trust alliance excessively flat and single. Moreover, with
the increasing scale of the trust alliance, costs of validation grow so quickly
that they do not adapt to incremental deployment. Via comparison with
traditional solutions, this article proposes a hierarchical, inter-domain
authenticated source address validation solution named SafeZone. SafeZone
employs two intelligent designs, lightweight tag replacement and a hierarchical
partitioning scheme, each of which helps to ensure that SafeZone can construct
trustworthy and hierarchical trust alliances without the negative influences
and complex operations on de facto networks. Extensive experiments also
indicate that SafeZone can effectively obtain the design goals of a
hierarchical architecture, along with lightweight, loose coupling and
"multi-fence support" and as well as an incremental deployment scheme.
|
[
{
"version": "v1",
"created": "Sat, 19 Mar 2011 09:04:31 GMT"
}
] | 2011-03-22T00:00:00 |
[
[
"Li",
"Jie",
""
],
[
"Wu",
"Jian-ping",
""
],
[
"Xu",
"Ke",
""
]
] |
new_dataset
| 0.995192 |
1103.3831
|
Himansu Sekhar Behera
|
H. S. Behera, Rakesh Mohanty, Debashree Nayak
|
A New Proposed Dynamic Quantum with Re-Adjusted Round Robin Scheduling
Algorithm and Its Performance Analysis
|
06 pages; International Journal of Computer Applications, Vol. 5, No.
5, August 2010
| null | null | null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Scheduling is the central concept used frequently in Operating System. It
helps in choosing the processes for execution. Round Robin (RR) is one of the
most widely used CPU scheduling algorithm. But, its performance degrades with
respect to context switching, which is an overhead and it occurs during each
scheduling. Overall performance of the system depends on choice of an optimal
time quantum, so that context switching can be reduced. In this paper, we have
proposed a new variant of RR scheduling algorithm, known as Dynamic Quantum
with Readjusted Round Robin (DQRRR) algorithm. We have experimentally shown
that performance of DQRRR is better than RR by reducing number of context
switching, average waiting time and average turn around time.
|
[
{
"version": "v1",
"created": "Sun, 20 Mar 2011 06:45:16 GMT"
}
] | 2011-03-22T00:00:00 |
[
[
"Behera",
"H. S.",
""
],
[
"Mohanty",
"Rakesh",
""
],
[
"Nayak",
"Debashree",
""
]
] |
new_dataset
| 0.973754 |
1103.3832
|
Himansu Sekhar Behera
|
H.S. Behera, Simpi Patel, Bijayalakshmi Panda
|
A New Dynamic Round Robin and SRTN Algorithm with Variable Original Time
Slice and Intelligent Time Slice for Soft Real Time Systems
|
07 pages; International Journal of Computer Applications, Vol 16, No.
1(9) February 2011
| null |
10.5120/2037-2648
| null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The main objective of the paper is to improve the Round Robin (RR) algorithm
using dynamic ITS by coalescing it with Shortest Remaining Time Next (SRTN)
algorithm thus reducing the average waiting time, average turnaround time and
the number of context switches. The original time slice has been calculated for
each process based on its burst time.This is mostly suited for soft real time
systems where meeting of deadlines is desirable to increase its performance.
The advantage is that processes that are closer to their remaining completion
time will get more chances to execute and leave the ready queue. This will
reduce the number of processes in the ready queue by knocking out short jobs
relatively faster in a hope to reduce the average waiting time, turn around
time and number of context switches. This paper improves the algorithm [8] and
the experimental analysis shows that the proposed algorithm performs better
than algorithm [6] and [8] when the processes are having an increasing order,
decreasing order and random order of burst time.
|
[
{
"version": "v1",
"created": "Sun, 20 Mar 2011 06:56:27 GMT"
}
] | 2011-03-22T00:00:00 |
[
[
"Behera",
"H. S.",
""
],
[
"Patel",
"Simpi",
""
],
[
"Panda",
"Bijayalakshmi",
""
]
] |
new_dataset
| 0.996919 |
1103.3569
|
Deqing Wang
|
Deqing Wang, Mengxiang Lin, Hui Zhang, Hongping Hu
|
Detect Related Bugs from Source Code Using Bug Information
|
10 pages, 5 figures, 4 tables conference; 2010 IEEE 34th Annual
Computer Software and Applications Conference
| null |
10.1109/COMPSAC.2010.27
| null |
cs.SE
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Open source projects often maintain open bug repositories during development
and maintenance, and the reporters often point out straightly or implicitly the
reasons why bugs occur when they submit them. The comments about a bug are very
valuable for developers to locate and fix the bug. Meanwhile, it is very common
in large software for programmers to override or overload some methods
according to the same logic. If one method causes a bug, it is obvious that
other overridden or overloaded methods maybe cause related or similar bugs. In
this paper, we propose and implement a tool Rebug- Detector, which detects
related bugs using bug information and code features. Firstly, it extracts bug
features from bug information in bug repositories; secondly, it locates bug
methods from source code, and then extracts code features of bug methods;
thirdly, it calculates similarities between each overridden or overloaded
method and bug methods; lastly, it determines which method maybe causes
potential related or similar bugs. We evaluate Rebug-Detector on an open source
project: Apache Lucene-Java. Our tool totally detects 61 related bugs,
including 21 real bugs and 10 suspected bugs, and it costs us about 15.5
minutes. The results show that bug features and code features extracted by our
tool are useful to find real bugs in existing projects.
|
[
{
"version": "v1",
"created": "Fri, 18 Mar 2011 07:50:51 GMT"
}
] | 2011-03-21T00:00:00 |
[
[
"Wang",
"Deqing",
""
],
[
"Lin",
"Mengxiang",
""
],
[
"Zhang",
"Hui",
""
],
[
"Hu",
"Hongping",
""
]
] |
new_dataset
| 0.999171 |
1103.3308
|
Mana Mohammed
|
Mohammed Mana, Mohammed Feham, and Boucif Amar Bensaber
|
A Light Weight Protocol to Provide Location Privacy in Wireless Body
Area networks
|
11 pages
|
International Journal of Network Security & Its Applications
(IJNSA), Vol.3, No.2, March 2011
|
10.5121/ijnsa.2011.3201
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Location privacy is one of the major security problems in a Wireless Body
Area Networks (WBANs). An eavesdropper can keep track of the place and time
devices are communicating. To make things even worse, the attacker does not
have to be physically close to the communicating devices, he can use a device
with a stronger antenna. The unique hardware address of a mobile device can
often be linked to the identity of the user operating the device. This
represents a violation of the user's privacy. The user should decide when
his/her location is revealed and when not. In this paper, we first categorize
the type of eavesdroppers for WBANs, and then we propose a new scheme to
provide the location privacy in Wireless Body Area Networks (WBANs).
|
[
{
"version": "v1",
"created": "Wed, 16 Mar 2011 22:10:18 GMT"
}
] | 2011-03-18T00:00:00 |
[
[
"Mana",
"Mohammed",
""
],
[
"Feham",
"Mohammed",
""
],
[
"Bensaber",
"Boucif Amar",
""
]
] |
new_dataset
| 0.997179 |
1103.3322
|
EPTCS
|
Freek Wiedijk (Radboud University Nijmegen)
|
Stateless HOL
|
In Proceedings TYPES 2009, arXiv:1103.3111
|
EPTCS 53, 2011, pp. 47-61
|
10.4204/EPTCS.53.4
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a version of the HOL Light system that supports undoing
definitions in such a way that this does not compromise the soundness of the
logic. In our system the code that keeps track of the constants that have been
defined thus far has been moved out of the kernel. This means that the kernel
now is purely functional.
The changes to the system are small. All existing HOL Light developments can
be run by the stateless system with only minor changes.
The basic principle behind the system is not to name constants by strings,
but by pairs consisting of a string and a definition. This means that the data
structures for the terms are all merged into one big graph. OCaml - the
implementation language of the system - can use pointer equality to establish
equality of data structures fast. This allows the system to run at acceptable
speeds. Our system runs at about 85% of the speed of the stateful version of
HOL Light.
|
[
{
"version": "v1",
"created": "Thu, 17 Mar 2011 00:19:48 GMT"
}
] | 2011-03-18T00:00:00 |
[
[
"Wiedijk",
"Freek",
"",
"Radboud University Nijmegen"
]
] |
new_dataset
| 0.985181 |
1103.3340
|
Ahmed Riadh Rebai
|
Ahmed Riadh Rebai and Said Hanafi
|
A Dynamic Multimedia User-Weight Classification Scheme for IEEE_802.11
WLANs
|
15 pages, 8 figures, 3 tables, International Journal of Computer
Networks & Communications (IJCNC)
|
International Journal of Computer Networks & Communications
(IJCNC) Vol.3, No.2, March 2011
|
10.5121/ijcnc.2011.3214
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we expose a dynamic traffic-classification scheme to support
multimedia applications such as voice and broadband video transmissions over
IEEE 802.11 Wireless Local Area Networks (WLANs). Obviously, over a Wi-Fi link
and to better serve these applications - which normally have strict bounded
transmission delay or minimum link rate requirement - a service differentiation
technique can be applied to the media traffic transmitted by the same mobile
node using the well-known 802.11e Enhanced Distributed Channel Access (EDCA)
protocol. However, the given EDCA mode does not offer user differentiation,
which can be viewed as a deficiency in multi-access wireless networks.
Accordingly, we propose a new inter-node priority access scheme for IEEE
802.11e networks which is compatible with the EDCA scheme. The proposed scheme
joins a dynamic user-weight to each mobile station depending on its outgoing
data, and therefore deploys inter-node priority for the channel access to
complement the existing EDCA inter-frame priority. This provides efficient
quality of service control across multiple users within the same coverage area
of an access point. We provide performance evaluations to compare the proposed
access model with the basic EDCA 802.11 MAC protocol mode to elucidate the
quality improvement achieved for multimedia communication over 802.11 WLANs.
|
[
{
"version": "v1",
"created": "Thu, 17 Mar 2011 05:58:35 GMT"
}
] | 2011-03-18T00:00:00 |
[
[
"Rebai",
"Ahmed Riadh",
""
],
[
"Hanafi",
"Said",
""
]
] |
new_dataset
| 0.998946 |
1103.2811
|
EPTCS
|
Bob Coecke (Oxford University Computing Laboratory), Bill Edwards
(Oxford University Computing Laboratory)
|
Three qubit entanglement within graphical Z/X-calculus
|
In Proceedings HPC 2010, arXiv:1103.2268
|
EPTCS 52, 2011, pp. 22-33
|
10.4204/EPTCS.52.3
| null |
cs.LO quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The compositional techniques of categorical quantum mechanics are applied to
analyse 3-qubit quantum entanglement. In particular the graphical calculus of
complementary observables and corresponding phases due to Duncan and one of the
authors is used to construct representative members of the two genuinely
tripartite SLOCC classes of 3-qubit entangled states, GHZ and W. This nicely
illustrates the respectively pairwise and global tripartite entanglement found
in the W- and GHZ-class states. A new concept of supplementarity allows us to
characterise inhabitants of the W class within the abstract diagrammatic
calculus; these method extends to more general multipartite qubit states.
|
[
{
"version": "v1",
"created": "Mon, 14 Mar 2011 23:15:40 GMT"
}
] | 2011-03-17T00:00:00 |
[
[
"Coecke",
"Bob",
"",
"Oxford University Computing Laboratory"
],
[
"Edwards",
"Bill",
"",
"Oxford University Computing Laboratory"
]
] |
new_dataset
| 0.996836 |
1103.2812
|
EPTCS
|
Bob Coecke, Aleks Kissinger, Alex Merry, Shibdas Roy
|
The GHZ/W-calculus contains rational arithmetic
|
In Proceedings HPC 2010, arXiv:1103.2268
|
EPTCS 52, 2011, pp. 34-48
|
10.4204/EPTCS.52.4
| null |
cs.LO quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Graphical calculi for representing interacting quantum systems serve a number
of purposes: compositionally, intuitive graphical reasoning, and a logical
underpinning for automation. The power of these calculi stems from the fact
that they embody generalized symmetries of the structure of quantum operations,
which, for example, stretch well beyond the Choi-Jamiolkowski isomorphism. One
such calculus takes the GHZ and W states as its basic generators. Here we show
that this language allows one to encode standard rational calculus, with the
GHZ state as multiplication, the W state as addition, the Pauli X gate as
multiplicative inversion, and the Pauli Z gate as additive inversion.
|
[
{
"version": "v1",
"created": "Mon, 14 Mar 2011 23:15:53 GMT"
}
] | 2011-03-17T00:00:00 |
[
[
"Coecke",
"Bob",
""
],
[
"Kissinger",
"Aleks",
""
],
[
"Merry",
"Alex",
""
],
[
"Roy",
"Shibdas",
""
]
] |
new_dataset
| 0.999462 |
1005.4997
|
Sitabhra Sinha
|
Sitabhra Sinha, Md Izhar Ashraf, Raj Kumar Pan and Bryan Kenneth Wells
|
Network analysis of a corpus of undeciphered Indus civilization
inscriptions indicates syntactic organization
|
17 pages (includes 4 page appendix containing Indus sign list), 14
figures
|
Computer Speech and Language, 25 (2011) 639-654
|
10.1016/j.csl.2010.05.007
| null |
cs.CL physics.data-an physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Archaeological excavations in the sites of the Indus Valley civilization
(2500-1900 BCE) in Pakistan and northwestern India have unearthed a large
number of artifacts with inscriptions made up of hundreds of distinct signs. To
date there is no generally accepted decipherment of these sign sequences and
there have been suggestions that the signs could be non-linguistic. Here we
apply complex network analysis techniques to a database of available Indus
inscriptions, with the aim of detecting patterns indicative of syntactic
organization. Our results show the presence of patterns, e.g., recursive
structures in the segmentation trees of the sequences, that suggest the
existence of a grammar underlying these inscriptions.
|
[
{
"version": "v1",
"created": "Thu, 27 May 2010 07:24:29 GMT"
}
] | 2011-03-15T00:00:00 |
[
[
"Sinha",
"Sitabhra",
""
],
[
"Ashraf",
"Md Izhar",
""
],
[
"Pan",
"Raj Kumar",
""
],
[
"Wells",
"Bryan Kenneth",
""
]
] |
new_dataset
| 0.987916 |
1103.2376
|
Leonid Perlovsky
|
Leonid Perlovsky (Harvard University and the AFRL)
|
Language, Emotions, and Cultures: Emotional Sapir-Whorf Hypothesis
|
16p, 2 figs
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An emotional version of Sapir-Whorf hypothesis suggests that differences in
language emotionalities influence differences among cultures no less than
conceptual differences. Conceptual contents of languages and cultures to
significant extent are determined by words and their semantic differences;
these could be borrowed among languages and exchanged among cultures. Emotional
differences, as suggested in the paper, are related to grammar and mostly
cannot be borrowed. Conceptual and emotional mechanisms of languages are
considered here along with their functions in the mind and cultural evolution.
A fundamental contradiction in human mind is considered: language evolution
requires reduced emotionality, but "too low" emotionality makes language
"irrelevant to life," disconnected from sensory-motor experience. Neural
mechanisms of these processes are suggested as well as their mathematical
models: the knowledge instinct, the language instinct, the dual model
connecting language and cognition, dynamic logic, neural modeling fields.
Mathematical results are related to cognitive science, linguistics, and
psychology. Experimental evidence and theoretical arguments are discussed.
Approximate equations for evolution of human minds and cultures are obtained.
Their solutions identify three types of cultures: "conceptual"-pragmatic
cultures, in which emotionality of language is reduced and differentiation
overtakes synthesis resulting in fast evolution at the price of uncertainty of
values, self doubts, and internal crises; "traditional-emotional" cultures
where differentiation lags behind synthesis, resulting in cultural stability at
the price of stagnation; and "multi-cultural" societies combining fast cultural
evolution and stability. Unsolved problems and future theoretical and
experimental directions are discussed.
|
[
{
"version": "v1",
"created": "Fri, 11 Mar 2011 21:13:38 GMT"
}
] | 2011-03-15T00:00:00 |
[
[
"Perlovsky",
"Leonid",
"",
"Harvard University and the AFRL"
]
] |
new_dataset
| 0.998998 |
1103.2408
|
Sandeep Tata
|
Jun Rao (LinkedIn), Eugene J. Shekita (IBM Research), Sandeep Tata
(IBM Research)
|
Using Paxos to Build a Scalable, Consistent, and Highly Available
Datastore
|
VLDB2011
|
Proceedings of the VLDB Endowment (PVLDB), Vol. 4, No. 4, pp.
243-254 (2011)
| null | null |
cs.DB cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spinnaker is an experimental datastore that is designed to run on a large
cluster of commodity servers in a single datacenter. It features key-based
range partitioning, 3-way replication, and a transactional get-put API with the
option to choose either strong or timeline consistency on reads. This paper
describes Spinnaker's Paxos-based replication protocol. The use of Paxos
ensures that a data partition in Spinnaker will be available for reads and
writes as long a majority of its replicas are alive. Unlike traditional
master-slave replication, this is true regardless of the failure sequence that
occurs. We show that Paxos replication can be competitive with alternatives
that provide weaker consistency guarantees. Compared to an eventually
consistent datastore, we show that Spinnaker can be as fast or even faster on
reads and only 5% to 10% slower on writes.
|
[
{
"version": "v1",
"created": "Sat, 12 Mar 2011 01:06:32 GMT"
}
] | 2011-03-15T00:00:00 |
[
[
"Rao",
"Jun",
"",
"LinkedIn"
],
[
"Shekita",
"Eugene J.",
"",
"IBM Research"
],
[
"Tata",
"Sandeep",
"",
"IBM Research"
]
] |
new_dataset
| 0.992521 |
1103.2409
|
Bolin Ding
|
Bolin Ding (UIUC), Arnd Christian K\"onig (Microsoft Research)
|
Fast Set Intersection in Memory
|
VLDB2011
|
Proceedings of the VLDB Endowment (PVLDB), Vol. 4, No. 4, pp.
255-266 (2011)
| null | null |
cs.DB cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Set intersection is a fundamental operation in information retrieval and
database systems. This paper introduces linear space data structures to
represent sets such that their intersection can be computed in a worst-case
efficient way. In general, given k (preprocessed) sets, with totally n
elements, we will show how to compute their intersection in expected time
O(n/sqrt(w)+kr), where r is the intersection size and w is the number of bits
in a machine-word. In addition,we introduce a very simple version of this
algorithm that has weaker asymptotic guarantees but performs even better in
practice; both algorithms outperform the state of the art techniques in terms
of execution time for both synthetic and real data sets and workloads.
|
[
{
"version": "v1",
"created": "Sat, 12 Mar 2011 01:08:36 GMT"
}
] | 2011-03-15T00:00:00 |
[
[
"Ding",
"Bolin",
"",
"UIUC"
],
[
"König",
"Arnd Christian",
"",
"Microsoft Research"
]
] |
new_dataset
| 0.998383 |
1103.2590
|
Rajkumar Buyya
|
Yi Wei, Karthik Sukumar, Christian Vecchiola, Dileban Karunamoorthy
and Rajkumar Buyya
|
Aneka Cloud Application Platform and Its Integration with Windows Azure
|
30 pages, 24 figures
|
Cloud Computing: Methodology, Systems, and Applications, L. Wang,
Rajiv Ranjan, Jinjun Chen, and Boualem Benatallah (eds), ISBN: 9781439856413,
CRC Press, Boca Raton, FL, USA, 2011
| null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Aneka is an Application Platform-as-a-Service (Aneka PaaS) for Cloud
Computing. It acts as a framework for building customized applications and
deploying them on either public or private Clouds. One of the key features of
Aneka is its support for provisioning resources on different public Cloud
providers such as Amazon EC2, Windows Azure and GoGrid. In this chapter, we
will present Aneka platform and its integration with one of the public Cloud
infrastructures, Windows Azure, which enables the usage of Windows Azure
Compute Service as a resource provider of Aneka PaaS. The integration of the
two platforms will allow users to leverage the power of Windows Azure Platform
for Aneka Cloud Computing, employing a large number of compute instances to run
their applications in parallel. Furthermore, customers of the Windows Azure
platform can benefit from the integration with Aneka PaaS by embracing the
advanced features of Aneka in terms of multiple programming models, scheduling
and management services, application execution services, accounting and pricing
services and dynamic provisioning services. Finally, in addition to the Windows
Azure Platform we will illustrate in this chapter the integration of Aneka PaaS
with other public Cloud platforms such as Amazon EC2 and GoGrid, and virtual
machine management platforms such as Xen Server. The new support of
provisioning resources on Windows Azure once again proves the adaptability,
extensibility and flexibility of Aneka.
|
[
{
"version": "v1",
"created": "Mon, 14 Mar 2011 06:38:11 GMT"
}
] | 2011-03-15T00:00:00 |
[
[
"Wei",
"Yi",
""
],
[
"Sukumar",
"Karthik",
""
],
[
"Vecchiola",
"Christian",
""
],
[
"Karunamoorthy",
"Dileban",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
new_dataset
| 0.999707 |
1103.2690
|
Valentin Savin
|
Lam Pham Sy, Valentin Savin, David Declercq, Nghia Pham
|
Scheduled-PEG construction of LDPC codes for Upper-Layer FEC
|
WCC 2011
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Progressive Edge Growth (PEG) algorithm is one of the most widely-used
method for constructing finite length LDPC codes. In this paper we consider the
PEG algorithm together with a scheduling distribution, which specifies the
order in which edges are established in the graph. The goal is to find a
scheduling distribution that yields "the best" performance in terms of decoding
overhead, performance metric specific to erasure codes and widely used for
upper-layer forward error correction (UL-FEC). We rigorously formulate this
optimization problem, and we show that it can be addressed by using genetic
optimization algorithms. We also exhibit PEG codes with optimized scheduling
distribution, whose decoding overhead is less than half of the decoding
overhead of their classical-PEG counterparts.
|
[
{
"version": "v1",
"created": "Mon, 14 Mar 2011 15:29:02 GMT"
}
] | 2011-03-15T00:00:00 |
[
[
"Sy",
"Lam Pham",
""
],
[
"Savin",
"Valentin",
""
],
[
"Declercq",
"David",
""
],
[
"Pham",
"Nghia",
""
]
] |
new_dataset
| 0.990592 |
1010.4891
|
Gael Varoquaux
|
Prabhu Ramachandran, Ga\"el Varoquaux (LNAO, INRIA Saclay - Ile de
France)
|
Mayavi: a package for 3D visualization of scientific data
| null |
Computing and Science and Engineering 13, 2 (2011) 40-51
|
10.1109/MCSE.2011.35
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mayavi is an open-source, general-purpose, 3D scientific visualization
package. It seeks to provide easy and interactive tools for data visualization
that fit with the scientific user's workflow. For this purpose, Mayavi provides
several entry points: a full-blown interactive application; a Python library
with both a MATLAB-like interface focused on easy scripting and a feature-rich
object hierarchy; widgets associated with these objects for assembling in a
domain-specific application, and plugins that work with a general purpose
application-building framework. In this article, we present an overview of the
various features of Mayavi, we then provide insight on the design and
engineering decisions made in implementing Mayavi, and finally discuss a few
novel applications.
|
[
{
"version": "v1",
"created": "Sat, 23 Oct 2010 16:34:51 GMT"
}
] | 2011-03-14T00:00:00 |
[
[
"Ramachandran",
"Prabhu",
"",
"LNAO, INRIA Saclay - Ile de\n France"
],
[
"Varoquaux",
"Gaël",
"",
"LNAO, INRIA Saclay - Ile de\n France"
]
] |
new_dataset
| 0.998652 |
1102.1523
|
Gael Varoquaux
|
Stefan Van Der Walt, S. Chris Colbert, Ga\"el Varoquaux (Parietal)
|
The NumPy array: a structure for efficient numerical computation
| null |
Computing in Science and Engineering 13, 2 (2011) 22-30
|
10.1109/MCSE.2011.37
| null |
cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the Python world, NumPy arrays are the standard representation for
numerical data. Here, we show how these arrays enable efficient implementation
of numerical computations in a high-level language. Overall, three techniques
are applied to improve performance: vectorizing calculations, avoiding copying
data in memory, and minimizing operation counts. We first present the NumPy
array structure, then show how to use it for efficient computation, and finally
how to share array data with other libraries.
|
[
{
"version": "v1",
"created": "Tue, 8 Feb 2011 07:25:56 GMT"
}
] | 2011-03-14T00:00:00 |
[
[
"Van Der Walt",
"Stefan",
"",
"Parietal"
],
[
"Colbert",
"S. Chris",
"",
"Parietal"
],
[
"Varoquaux",
"Gaël",
"",
"Parietal"
]
] |
new_dataset
| 0.99913 |
1103.2336
|
Raul
|
Nabil Litayem, Ahmed Ben Achballah, Slim Ben Saoud
|
Building XenoBuntu Linux Distribution for Teaching and Prototyping
Real-Time Operating Systems
| null | null | null | null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes the realization of a new Linux distribution based on
Ubuntu Linux and Xenomai Real-Time framework. This realization is motivated by
the eminent need of real-time systems in modern computer science courses. The
majority of the technical choices are made after qualitative comparison. The
main goal of this distribution is to offer standard Operating Systems (OS) that
include Xenomai infrastructure and the essential tools to begin hard real-time
application development inside a convivial desktop environment. The released
live/installable DVD can be adopted to emulate several classic RTOS Application
Program Interfaces (APIs), directly use and understand real-time Linux in
convivial desktop environment and prototyping real-time embedded applications.
|
[
{
"version": "v1",
"created": "Fri, 11 Mar 2011 18:36:38 GMT"
}
] | 2011-03-14T00:00:00 |
[
[
"Litayem",
"Nabil",
""
],
[
"Achballah",
"Ahmed Ben",
""
],
[
"Saoud",
"Slim Ben",
""
]
] |
new_dataset
| 0.985874 |
1103.1778
|
Jan Egger
|
Jan Egger, Miriam H. A. Bauer, Daniela Kuhnt, Bernd Freisleben,
Christopher Nimsky
|
Pituitary Adenoma Segmentation
|
4 pages, 5 figures, BIOSIGNAL, Berlin, 2010
| null | null | null |
cs.CE physics.med-ph q-bio.TO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sellar tumors are approximately 10-15% among all intracranial neoplasms. The
most common sellar lesion is the pituitary adenoma. Manual segmentation is a
time-consuming process that can be shortened by using adequate algorithms. In
this contribution, we present a segmentation method for pituitary adenoma. The
method is based on an algorithm we developed recently in previous work where
the novel segmentation scheme was successfully used for segmentation of
glioblastoma multiforme and provided an average Dice Similarity Coefficient
(DSC) of 77%. This scheme is used for automatic adenoma segmentation. In our
experimental evaluation, neurosurgeons with strong experiences in the treatment
of pituitary adenoma performed manual slice-by-slice segmentation of 10
magnetic resonance imaging (MRI) cases. Afterwards, the segmentations were
compared with the segmentation results of the proposed method via the DSC. The
average DSC for all data sets was 77.49% +/- 4.52%. Compared with a manual
segmentation that took, on the average, 3.91 +/- 0.54 minutes, the overall
segmentation in our implementation required less than 4 seconds.
|
[
{
"version": "v1",
"created": "Wed, 9 Mar 2011 13:33:23 GMT"
}
] | 2011-03-10T00:00:00 |
[
[
"Egger",
"Jan",
""
],
[
"Bauer",
"Miriam H. A.",
""
],
[
"Kuhnt",
"Daniela",
""
],
[
"Freisleben",
"Bernd",
""
],
[
"Nimsky",
"Christopher",
""
]
] |
new_dataset
| 0.982867 |
1103.1360
|
Sumanta Chaudhuri Dr.
|
Sumanta Chaudhuri, Sylvain Guilley, Philippe Hoogvorst, Jean-Luc
Danger, Taha Beyrouthy, Alin Razafindraibe, Laurent Fesquet, Marc Renaudin
|
A Secure Asynchronous FPGA Architecture, Experimental Results and Some
Debug Feedback
|
18 Pages, 23 figures. In detail description of a 3X3 Aysnchronous
FPGA Tape-Out
| null | null | null |
cs.AR cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article presents an asynchronous FPGA architecture for implementing
cryptographic algorithms secured against physical cryptanalysis. We discuss the
suitability of asynchronous reconfigurable architectures for such applications
before proceeding to model the side channel and defining our objectives. The
logic block architecture is presented in detail. We discuss several solutions
for the interconnect architecture, and how these solutions can be ported to
other flavours of interconnect (i.e. single driver). Next We discuss in detail
a high speed asynchronous configuration chain architecture used to configure
our asynchronous FPGA with simulation results, and we present a 3 X 3 prototype
FPGA fabricated in 65 nm CMOS. Lastly we present experiments to test the high
speed asynchronous configuration chain and evaluate how far our objectives have
been achieved with proposed solutions, and we conclude with emphasis on
complementary FPGA CAD algorithms, and the effect of CMOS variation on
Side-Channel Vulnerability.
|
[
{
"version": "v1",
"created": "Mon, 7 Mar 2011 20:04:05 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Mar 2011 12:13:20 GMT"
}
] | 2011-03-09T00:00:00 |
[
[
"Chaudhuri",
"Sumanta",
""
],
[
"Guilley",
"Sylvain",
""
],
[
"Hoogvorst",
"Philippe",
""
],
[
"Danger",
"Jean-Luc",
""
],
[
"Beyrouthy",
"Taha",
""
],
[
"Razafindraibe",
"Alin",
""
],
[
"Fesquet",
"Laurent",
""
],
[
"Renaudin",
"Marc",
""
]
] |
new_dataset
| 0.995331 |
1103.1544
|
Ranjan Pal
|
Ranjan Pal, Aravind Kailas
|
Cost Sharing in Social Community Networks
| null | null | null | null |
cs.NI cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless social community networks (WSCNs) is an emerging technology that
operate in the unlicensed spectrum and have been created as an alternative to
cellular wireless networks for providing low-cost, high speed wireless data
access in urban areas. WSCNs is an upcoming idea that is starting to gain
attention amongst the civilian Internet users. By using \emph{special} WiFi
routers that are provided by a social community network provider (SCNP), users
can effectively share their connection with the neighborhood in return for some
monthly monetary benefits. However, deployment maps of existing WSCNs reflect
their slow progress in capturing the WiFi router market. In this paper, we look
at a router design and cost sharing problem in WSCNs to improve deployment. We
devise asimple to implement, successful a mechanism is successful if it
achieves its intended purpose. For example in this work, a successful mechanism
would help install routers in a locality}, \emph{budget-balanced},
\emph{ex-post efficient}, and \emph{individually rational} {a mechanism is
individually rational if the benefit each agent obtains is greater than its
cost.} auction-based mechanism that generates the \emph{optimal} number of
features a router should have and allocates costs to residential users in
\emph{proportion} to the feature benefits they receive. Our problem is
important to a new-entrant SCNP when it wants to design its multi-feature
routers with the goal to popularize them and increase their deployment in a
residential locality. Our proposed mechanism accounts for heterogeneous user
preferences towards different router features and comes up with the optimal
\emph{(feature-set, user costs)} router blueprint that satisfies each user in a
locality, in turn motivating them to buy routers and thereby improve
deployment.
|
[
{
"version": "v1",
"created": "Tue, 8 Mar 2011 14:47:38 GMT"
}
] | 2011-03-09T00:00:00 |
[
[
"Pal",
"Ranjan",
""
],
[
"Kailas",
"Aravind",
""
]
] |
new_dataset
| 0.997633 |
cs/0703019
|
Jean Cardinal
|
Jean Cardinal, Erik D. Demaine, Samuel Fiorini, Gwena\"el Joret,
Stefan Langerman, Ilan Newman, Oren Weimann
|
The Stackelberg Minimum Spanning Tree Game
|
v3: Referees' comments incorporated. A preliminary version appeared
in the proceedings of the 10th Workshop on Algorithms and Data Structures
(WADS 2007)
|
Algorithmica, vol. 59, no. 2, pp. 129--144, 2011
|
10.1007/s00453-009-9299-y
| null |
cs.GT cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a one-round two-player network pricing game, the Stackelberg
Minimum Spanning Tree game or StackMST.
The game is played on a graph (representing a network), whose edges are
colored either red or blue, and where the red edges have a given fixed cost
(representing the competitor's prices). The first player chooses an assignment
of prices to the blue edges, and the second player then buys the cheapest
possible minimum spanning tree, using any combination of red and blue edges.
The goal of the first player is to maximize the total price of purchased blue
edges. This game is the minimum spanning tree analog of the well-studied
Stackelberg shortest-path game.
We analyze the complexity and approximability of the first player's best
strategy in StackMST. In particular, we prove that the problem is APX-hard even
if there are only two different red costs, and give an approximation algorithm
whose approximation ratio is at most $\min \{k,1+\ln b,1+\ln W\}$, where $k$ is
the number of distinct red costs, $b$ is the number of blue edges, and $W$ is
the maximum ratio between red costs. We also give a natural integer linear
programming formulation of the problem, and show that the integrality gap of
the fractional relaxation asymptotically matches the approximation guarantee of
our algorithm.
|
[
{
"version": "v1",
"created": "Mon, 5 Mar 2007 09:46:26 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Sep 2008 15:44:40 GMT"
},
{
"version": "v3",
"created": "Thu, 17 Sep 2009 15:20:43 GMT"
}
] | 2011-03-07T00:00:00 |
[
[
"Cardinal",
"Jean",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Fiorini",
"Samuel",
""
],
[
"Joret",
"Gwenaël",
""
],
[
"Langerman",
"Stefan",
""
],
[
"Newman",
"Ilan",
""
],
[
"Weimann",
"Oren",
""
]
] |
new_dataset
| 0.981436 |
1103.0633
|
Yashwant Dongre prof
|
Y. V. Dongare, P. S. Dhabe and S. V. Deshmukh
|
RDBNorma: - A semi-automated tool for relational database schema
normalization up to third normal form
|
22 pages and international journal
|
International Journal of Database Management Systems ( IJDMS ),
Vol.3, No.1, February 2011
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper a tool called RDBNorma is proposed, that uses a novel approach
to represent a relational database schema and its functional dependencies in
computer memory using only one linked list and used for semi-automating the
process of relational database schema normalization up to third normal form.
This paper addresses all the issues of representing a relational schema along
with its functional dependencies using one linked list along with the
algorithms to convert a relation into second and third normal form by using
above representation. We have compared performance of RDBNorma with existing
tool called Micro using standard relational schemas collected from various
resources. It is observed that proposed tool is at least 2.89 times faster than
the Micro and requires around half of the space than Micro to represent a
relation. Comparison is done by entering all the attributes and functional
dependencies holds on a relation in the same order and implementing both the
tools in same language and on same machine.
|
[
{
"version": "v1",
"created": "Thu, 3 Mar 2011 09:44:14 GMT"
}
] | 2011-03-04T00:00:00 |
[
[
"Dongare",
"Y. V.",
""
],
[
"Dhabe",
"P. S.",
""
],
[
"Deshmukh",
"S. V.",
""
]
] |
new_dataset
| 0.980244 |
1103.0697
|
Adrian Walker
|
Adrian Walker
|
A Wiki for Business Rules in Open Vocabulary, Executable English
|
9 pages
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of business-IT alignment is of widespread economic concern.
As one way of addressing the problem, this paper describes an online system
that functions as a kind of Wiki -- one that supports the collaborative writing
and running of business and scientific applications, as rules in open
vocabulary, executable English, using a browser.
Since the rules are in English, they are indexed by Google and other search
engines. This is useful when looking for rules for a task that one has in mind.
The design of the system integrates the semantics of data, with a semantics
of an inference method, and also with the meanings of English sentences. As
such, the system has functionality that may be useful for the Rules, Logic,
Proof and Trust requirements of the Semantic Web.
The system accepts rules, and small numbers of facts, typed or copy-pasted
directly into a browser. One can then run the rules, again using a browser. For
larger amounts of data, the system uses information in the rules to
automatically generate and run SQL over networked databases. From a few highly
declarative rules, the system typically generates SQL that would be too
complicated to write reliably by hand. However, the system can explain its
results in step-by-step hypertexted English, at the business or scientific
level
As befits a Wiki, shared use of the system is free.
|
[
{
"version": "v1",
"created": "Thu, 3 Mar 2011 14:31:32 GMT"
}
] | 2011-03-04T00:00:00 |
[
[
"Walker",
"Adrian",
""
]
] |
new_dataset
| 0.982439 |
1103.0759
|
Fangfei Zhou
|
Fangfei Zhou, Manish Goel, Peter Desnoyers, Ravi Sundaram
|
Scheduler Vulnerabilities and Attacks in Cloud Computing
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In hardware virtualization a hypervisor provides multiple Virtual Machines
(VMs) on a single physical system, each executing a separate operating system
instance. The hypervisor schedules execution of these VMs much as the scheduler
in an operating system does, balancing factors such as fairness and I/O
performance. As in an operating system, the scheduler may be vulnerable to
malicious behavior on the part of users seeking to deny service to others or
maximize their own resource usage.
Recently, publically available cloud computing services such as Amazon EC2
have used virtualization to provide customers with virtual machines running on
the provider's hardware, typically charging by wall clock time rather than
resources consumed. Under this business model, manipulation of the scheduler
may allow theft of service at the expense of other customers, rather than
merely reallocating resources within the same administrative domain.
We describe a flaw in the Xen scheduler allowing virtual machines to consume
almost all CPU time, in preference to other users, and demonstrate kernel-based
and user-space versions of the attack. We show results demonstrating the
vulnerability in the lab, consuming as much as 98% of CPU time regardless of
fair share, as well as on Amazon EC2, where Xen modifications protect other
users but still allow theft of service. In case of EC2, following the
responsible disclosure model, we have reported this vulnerability to Amazon;
they have since implemented a fix that we have tested and verified (See
Appendix B). We provide a novel analysis of the necessary conditions for such
attacks, and describe scheduler modifications to eliminate the vulnerability.
We present experimental results demonstrating the effectiveness of these
defenses while imposing negligible overhead.
|
[
{
"version": "v1",
"created": "Thu, 3 Mar 2011 19:09:47 GMT"
}
] | 2011-03-04T00:00:00 |
[
[
"Zhou",
"Fangfei",
""
],
[
"Goel",
"Manish",
""
],
[
"Desnoyers",
"Peter",
""
],
[
"Sundaram",
"Ravi",
""
]
] |
new_dataset
| 0.954265 |
1103.0358
|
Anthony Kim
|
Anthony Kim
|
On Network Coding Capacity - Matroidal Networks and Network Capacity
Regions
|
Master of Engineering Thesis, MIT, September 2010, 70 pages, 10
figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One fundamental problem in the field of network coding is to determine the
network coding capacity of networks under various network coding schemes. In
this thesis, we address the problem with two approaches: matroidal networks and
capacity regions.
In our matroidal approach, we prove the converse of the theorem which states
that, if a network is scalar-linearly solvable then it is a matroidal network
associated with a representable matroid over a finite field. As a consequence,
we obtain a correspondence between scalar-linearly solvable networks and
representable matroids over finite fields in the framework of matroidal
networks. We prove a theorem about the scalar-linear solvability of networks
and field characteristics. We provide a method for generating scalar-linearly
solvable networks that are potentially different from the networks that we
already know are scalar-linearly solvable.
In our capacity region approach, we define a multi-dimensional object, called
the network capacity region, associated with networks that is analogous to the
rate regions in information theory. For the network routing capacity region, we
show that the region is a computable rational polytope and provide exact
algorithms and approximation heuristics for computing the region. For the
network linear coding capacity region, we construct a computable rational
polytope, with respect to a given finite field, that inner bounds the linear
coding capacity region and provide exact algorithms and approximation
heuristics for computing the polytope. The exact algorithms and approximation
heuristics we present are not polynomial time schemes and may depend on the
output size.
|
[
{
"version": "v1",
"created": "Wed, 2 Mar 2011 07:33:17 GMT"
}
] | 2011-03-03T00:00:00 |
[
[
"Kim",
"Anthony",
""
]
] |
new_dataset
| 0.968303 |
1012.2248
|
Marek Jawurek
|
Marek Jawurek, Martin Johns, Florian Kerschbaum
|
Plug-in privacy for Smart Metering billing
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Traditional electricity meters are replaced by Smart Meters in customers'
households. Smart Meters collects fine-grained utility consumption profiles
from customers, which in turn enables the introduction of dynamic, time-of-use
tariffs. However, the fine-grained usage data that is compiled in this process
also allows to infer the inhabitant's personal schedules and habits. We propose
a privacy-preserving protocol that enables billing with time-of-use tariffs
without disclosing the actual consumption profile to the supplier. Our approach
relies on a zero-knowledge proof based on Pedersen Commitments performed by a
plug-in privacy component that is put into the communication link between Smart
Meter and supplier's back-end system. We require no changes to the Smart Meter
hardware and only small changes to the software of Smart Meter and back-end
system. In this paper we describe the functional and privacy requirements, the
specification and security proof of our solution and give a performance
evaluation of a prototypical implementation.
|
[
{
"version": "v1",
"created": "Fri, 10 Dec 2010 12:29:20 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Mar 2011 11:42:22 GMT"
}
] | 2011-03-02T00:00:00 |
[
[
"Jawurek",
"Marek",
""
],
[
"Johns",
"Martin",
""
],
[
"Kerschbaum",
"Florian",
""
]
] |
new_dataset
| 0.973248 |
1103.0116
|
Remous-Aris Koutsiamanis
|
Remous-Aris Koutsiamanis, Pavlos S. Efraimidis
|
An exact and O(1) time heaviest and lightest hitters algorithm for
sliding-window data streams
| null | null | null | null |
cs.DS cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work we focus on the problem of finding the heaviest-k and lightest-k
hitters in a sliding window data stream. The most recent research endeavours
have yielded an epsilon-approximate algorithm with update operations in
constant time with high probability and O(1/epsilon) query time for the
heaviest hitters case. We propose a novel algorithm which for the first time,
to our knowledge, provides exact, not approximate, results while at the same
time achieves O(1) time with high probability complexity on both update and
query operations. Furthermore, our algorithm is able to provide both the
heaviest-k and the lightest-k hitters at the same time without any overhead. In
this work, we describe the algorithm and the accompanying data structure that
supports it and perform quantitative experiments with synthetic data to verify
our theoretical predictions.
|
[
{
"version": "v1",
"created": "Tue, 1 Mar 2011 09:42:01 GMT"
}
] | 2011-03-02T00:00:00 |
[
[
"Koutsiamanis",
"Remous-Aris",
""
],
[
"Efraimidis",
"Pavlos S.",
""
]
] |
new_dataset
| 0.980946 |
0802.1361
|
Menelaos Karavelas
|
Menelaos I. Karavelas
|
Guarding curvilinear art galleries with edge or mobile guards via
2-dominance of triangulation graphs
|
45 pages, 33 figures, short version has appeared in [M. I. Karavelas.
Guarding curvilinear art galleries with edge or mobile guards. 2008 ACM
Symposium on Solid and Physical Modeling (SPM08), 339-345, 2008.]; v2: new
lower bound for the edge 2-dominance problem which now matches the upper
bound
|
Comput. Geom. Theory Appl. 44(1):20-51, 2011
|
10.1016/j.comgeo.2010.07.002
| null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of monitoring an art gallery modeled as a polygon,
the edges of which are arcs of curves, with edge or mobile guards. Our focus is
on piecewise-convex polygons, i.e., polygons that are locally convex, except
possibly at the vertices, and their edges are convex arcs. We transform the
problem of monitoring a piecewise-convex polygon to the problem of 2-dominating
a properly defined triangulation graph with edges or diagonals, where
2-dominance requires that every triangle in the triangulation graph has at
least two of its vertices in its 2-dominating set. We show that
$\lfloor\frac{n+1}{3}\rfloor$ diagonal guards or $\lfloor\frac{2n+1}{5}\rfloor$
edge guards are always sufficient and sometimes necessary, in order to
2-dominate a triangulation graph. Furthermore, we show how to compute: a
diagonal 2-dominating set of size $\lfloor\frac{n+1}{3}\rfloor$ in linear time,
an edge 2-dominating set of size $\lfloor\frac{2n+1}{5}\rfloor$ in $O(n^2)$
time, and an edge 2-dominating set of size $\lfloor\frac{3n}{7}\rfloor$ in O(n)
time. Based on the above-mentioned results, we prove that, for piecewise-convex
polygons, we can compute: a mobile guard set of size
$\lfloor\frac{n+1}{3}\rfloor$ in $O(n\log{}n)$ time, an edge guard set of size
$\lfloor\frac{2n+1}{5}\rfloor$ in $O(n^2)$ time, and an edge guard set of size
$\lfloor\frac{3n}{7}\rfloor$ in $O(n\log{}n)$ time. Finally, we show that
$\lfloor\frac{n}{3}\rfloor$ mobile or $\lceil\frac{n}{3}\rceil$ edge guards are
sometimes necessary. When restricting our attention to monotone
piecewise-convex polygons, the bounds mentioned above drop:
$\lceil\frac{n+1}{4}\rceil$ edge or mobile guards are always sufficient and
sometimes necessary; such an edge or mobile guard set, of size at most
$\lceil\frac{n+1}{4}\rceil$, can be computed in O(n) time.
|
[
{
"version": "v1",
"created": "Mon, 11 Feb 2008 00:40:37 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Apr 2010 19:52:11 GMT"
}
] | 2011-03-01T00:00:00 |
[
[
"Karavelas",
"Menelaos I.",
""
]
] |
new_dataset
| 0.995324 |
0909.2526
|
Olli Pottonen
|
Patric R. J. \"Osterg{\aa}rd and Olli Pottonen
|
Two Optimal One-Error-Correcting Codes of Length 13 That Are Not Doubly
Shortened Perfect Codes
|
v2: a correction concerning shortened codes of length 12
| null |
10.1007/s10623-010-9450-4
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The doubly shortened perfect codes of length 13 are classified utilizing the
classification of perfect codes in [P.R.J. \"Osterg{\aa}rd and O. Pottonen, The
perfect binary one-error-correcting codes of length 15: Part I -
Classification, IEEE Trans. Inform. Theory, to appear]; there are 117821 such
(13,512,3) codes. By applying a switching operation to those codes, two more
(13,512,3) codes are obtained, which are then not doubly shortened perfect
codes.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 12:04:50 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Feb 2011 13:57:11 GMT"
}
] | 2011-03-01T00:00:00 |
[
[
"Östergård",
"Patric R. J.",
""
],
[
"Pottonen",
"Olli",
""
]
] |
new_dataset
| 0.98282 |
1102.2216
|
Tolga Duman
|
Tolga M Duman
|
On the Capacity of Memoryless Channels with Synchronization Errors
|
The paper is withdrawn from Arxiv due to a gap in the proof of Lemma
2. If a fix can be found, the paper will be resubmitted
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Memoryless channels with synchronization errors as defined by a stochastic
channel matrix allowing for symbol insertions and deletions in addition to
random errors are considered. Such channels are information stable, hence their
Shannon capacity exists. However, computation of the channel capacity is
formidable, and only some upper and lower bounds on the capacity (for some
special cases) exist. In this short paper, using a simple methodology, we prove
that the channel capacity is a convex function of the stochastic channel
matrix. Since the more widely studied model of an independent identically
distributed (i.i.d.) deletion channel is a particular case, as an immediate
corollary to this result we also argue that the i.i.d. deletion channel
capacity is a convex function of the deletion probability. We further use this
result to improve the existing capacity upper bounds on the deletion channel by
a proper "convexification" argument. In particular, we prove that the capacity
of the deletion channel, as the deletion probability d --> 1, is upper bounded
by $0.4143(1-d)$ (which was also observed by a different (weaker) recent
result).
|
[
{
"version": "v1",
"created": "Thu, 10 Feb 2011 20:14:05 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Feb 2011 04:02:47 GMT"
}
] | 2011-03-01T00:00:00 |
[
[
"Duman",
"Tolga M",
""
]
] |
new_dataset
| 0.961953 |
1102.5357
|
Aanatoly Khina
|
A. Khina, Y. Kochman, U. Erez
|
Physical-Layer MIMO Relaying
|
5 pages, 3 figures, submitted to ISIT 2011
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The physical-layer network coding (PNC) approach provides improved
performance in many scenarios over "traditional" relaying techniques or network
coding. This work addresses the generalization of PNC to wireless scenarios
where network nodes have multiple antennas. We use a recent matrix
decomposition, which allows, by linear pre- and post-processing, to
simultaneously transform both channel matrices to triangular forms, where the
diagonal entries, corresponding to both channels, are equal. This
decomposition, in conjunction with precoding, allows to convert any two-input
multiple-access channel (MAC) into parallel MACs, over which single-antenna PNC
may be used. The technique is demonstrated using the two-way relay channel with
multiple antennas. For this case it is shown that, in the high signal-to-noise
regime, the scheme approaches the cut-set bound, thus establishing the
asymptotic network capacity.
|
[
{
"version": "v1",
"created": "Fri, 25 Feb 2011 21:48:18 GMT"
}
] | 2011-03-01T00:00:00 |
[
[
"Khina",
"A.",
""
],
[
"Kochman",
"Y.",
""
],
[
"Erez",
"U.",
""
]
] |
new_dataset
| 0.998749 |
1102.5450
|
Viswanath Nagarajan
|
Inge Li Goertz and Viswanath Nagarajan and R. Ravi
|
Minimum Makespan Multi-vehicle Dial-a-Ride
|
22 pages, 1 figure. Preliminary version appeared in ESA 2009
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dial a ride problems consist of a metric space (denoting travel time between
vertices) and a set of m objects represented as source-destination pairs, where
each object requires to be moved from its source to destination vertex. We
consider the multi-vehicle Dial a ride problem, with each vehicle having
capacity k and its own depot-vertex, where the objective is to minimize the
maximum completion time (makespan) of the vehicles. We study the "preemptive"
version of the problem, where an object may be left at intermediate vertices
and transported by more than one vehicle, while being moved from source to
destination. Our main results are an O(log^3 n)-approximation algorithm for
preemptive multi-vehicle Dial a ride, and an improved O(log t)-approximation
for its special case when there is no capacity constraint. We also show that
the approximation ratios improve by a log-factor when the underlying metric is
induced by a fixed-minor-free graph.
|
[
{
"version": "v1",
"created": "Sat, 26 Feb 2011 21:37:08 GMT"
}
] | 2011-03-01T00:00:00 |
[
[
"Goertz",
"Inge Li",
""
],
[
"Nagarajan",
"Viswanath",
""
],
[
"Ravi",
"R.",
""
]
] |
new_dataset
| 0.998819 |
1102.5478
|
Arindam Pal
|
Arindam Pal
|
Minimum multicuts and Steiner forests for Okamura-Seymour graphs
|
6 pages, 1 figure
| null | null | null |
cs.DS cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the problem of finding minimum multicuts for an undirected planar
graph, where all the terminal vertices are on the boundary of the outer face.
This is known as an Okamura-Seymour instance. We show that for such an
instance, the minimum multicut problem can be reduced to the minimum-cost
Steiner forest problem on a suitably defined dual graph. The minimum-cost
Steiner forest problem has a 2-approximation algorithm. Hence, the minimum
multicut problem has a 2-approximation algorithm for an Okamura-Seymour
instance.
|
[
{
"version": "v1",
"created": "Sun, 27 Feb 2011 06:55:32 GMT"
}
] | 2011-03-01T00:00:00 |
[
[
"Pal",
"Arindam",
""
]
] |
new_dataset
| 0.981706 |
1102.5584
|
EPTCS
|
Bernardo Toninho (Faculdade de Ci\^encias e Tecnologia, Universidade
Nova de Lisboa and Computer Science Department, Carnegie Mellon University),
Lu\'is Caires (Departamento de Informatica / Universidade Nova de Lisboa)
|
A Spatial-Epistemic Logic for Reasoning about Security Protocols
|
In Proceedings SecCo 2010, arXiv:1102.5161
|
EPTCS 51, 2011, pp. 1-15
|
10.4204/EPTCS.51.1
| null |
cs.LO cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reasoning about security properties involves reasoning about where the
information of a system is located, and how it evolves over time. While most
security analysis techniques need to cope with some notions of information
locality and knowledge propagation, usually they do not provide a general
language for expressing arbitrary properties involving local knowledge and
knowledge transfer. Building on this observation, we introduce a framework for
security protocol analysis based on dynamic spatial logic specifications. Our
computational model is a variant of existing pi-calculi, while specifications
are expressed in a dynamic spatial logic extended with an epistemic operator.
We present the syntax and semantics of the model and logic, and discuss the
expressiveness of the approach, showing it complete for passive attackers. We
also prove that generic Dolev-Yao attackers may be mechanically determined for
any deterministic finite protocol, and discuss how this result may be used to
reason about security properties of open systems. We also present a
model-checking algorithm for our logic, which has been implemented as an
extension to the SLMC system.
|
[
{
"version": "v1",
"created": "Mon, 28 Feb 2011 03:38:21 GMT"
}
] | 2011-03-01T00:00:00 |
[
[
"Toninho",
"Bernardo",
"",
"Faculdade de Ciências e Tecnologia, Universidade\n Nova de Lisboa and Computer Science Department, Carnegie Mellon University"
],
[
"Caires",
"Luís",
"",
"Departamento de Informatica / Universidade Nova de Lisboa"
]
] |
new_dataset
| 0.993039 |
1102.5670
|
Emanuele Lindo Secco
|
Matteo Lanati, Davide Curone, Emanuele Lindo Secco, Giovanni Magenes
and Paolo Gamba
|
An Autonomous Long Range Monitoring System For Emergency Operators
|
13 pages, 7 figures, 1 table
|
International Journal of Wireless & Mobile Networks, vol. 3, no.
1, pp. 10-23, 2011
| null | null |
cs.OH
|
http://creativecommons.org/licenses/by/3.0/
|
Miniaturization and portability of new electronics lead up to wearable
devices embedded within garments: a European program called ProeTEX developed
multi-purpose sensors integrated within emergency operators' garments in order
to monitor their health state and the surrounding environment. This work deals
with the development of an autonomous Long Range communication System (LRS),
suitable to transmit data between operators' equipment and the local command
post, where remote monitoring software is set up. The LRS infrastructure is
based on Wi-Fi protocol and modular architecture. Field tests carried out on
the developed prototype showed a high reliability in terms of correctly
exchanged data and recovering capabilities in case of temporary disconnection,
due to the operator's movements.
|
[
{
"version": "v1",
"created": "Mon, 28 Feb 2011 14:19:28 GMT"
}
] | 2011-03-01T00:00:00 |
[
[
"Lanati",
"Matteo",
""
],
[
"Curone",
"Davide",
""
],
[
"Secco",
"Emanuele Lindo",
""
],
[
"Magenes",
"Giovanni",
""
],
[
"Gamba",
"Paolo",
""
]
] |
new_dataset
| 0.995584 |
1102.5688
|
Liyakath Unisa
|
Liyakathunisa and C.N .Ravi Kumar
|
A novel super resolution reconstruction of low reoslution images
progressively using dct and zonal filter based denoising
|
20 pages, 11 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to the factors like processing power limitations and channel capabilities
images are often down sampled and transmitted at low bit rates resulting in a
low resolution compressed image. High resolution images can be reconstructed
from several blurred, noisy and down sampled low resolution images using a
computational process know as super resolution reconstruction. Super-resolution
is the process of combining multiple aliased low-quality images to produce a
high resolution, high-quality image. The problem of recovering a high
resolution image progressively from a sequence of low resolution compressed
images is considered. In this paper we propose a novel DCT based progressive
image display algorithm by stressing on the encoding and decoding process. At
the encoder we consider a set of low resolution images which are corrupted by
additive white Gaussian noise and motion blur. The low resolution images are
compressed using 8 by 8 blocks DCT and noise is filtered using our proposed
novel zonal filter. Multiframe fusion is performed in order to obtain a single
noise free image. At the decoder the image is reconstructed progressively by
transmitting the coarser image first followed by the detail image. And finally
a super resolution image is reconstructed by applying our proposed novel
adaptive interpolation technique. We have performed both objective and
subjective analysis of the reconstructed image, and the resultant image has
better super resolution factor, and a higher ISNR and PSNR. A comparative study
done with Iterative Back Projection (IBP) and Projection on to Convex Sets
(POCS),Papoulis Grechberg, FFT based Super resolution Reconstruction shows that
our method has out performed the previous contributions.
|
[
{
"version": "v1",
"created": "Mon, 28 Feb 2011 15:24:06 GMT"
}
] | 2011-03-01T00:00:00 |
[
[
"Liyakathunisa",
"",
""
],
[
"Kumar",
"C. N . Ravi",
""
]
] |
new_dataset
| 0.998306 |
1102.5711
|
St\'ephane Mottelet
|
St\'ephane Mottelet and Andr\'e Pauss
|
XMLlab : multimedia publication of simulations applets using XML and
Scilab
| null | null | null | null |
cs.MS
|
http://creativecommons.org/licenses/by/3.0/
|
We present an XML-based simulation authoring environment. The proposed
description language allows to describe mathematical objects such as systems of
ordinary differential equations, partial differential equations in two
dimensions, or simple curves and surfaces. It also allows to describe the
parameters on which these objects depend. This language is independent of the
target software and allows to ensure the perennity of author's work, as well as
collaborative work and content reuse. The actual implementation of XMLlab
allows to run the generated simulations within the open source mathematical
software Scilab, either locally when Scilab is installed on the client
machines, or on thin clients running a simple web browser, when XMLlab and
Scilab are installed on a distant server running a standard HTTP server.
|
[
{
"version": "v1",
"created": "Mon, 28 Feb 2011 17:16:06 GMT"
}
] | 2011-03-01T00:00:00 |
[
[
"Mottelet",
"Stéphane",
""
],
[
"Pauss",
"André",
""
]
] |
new_dataset
| 0.987714 |
1102.5728
|
Wahiba Ben abdessalem Karaa
|
Wahiba Ben Abdessalem Karaa
|
Named Entity Recognition Using Web Document Corpus
|
11 pages 4 figures, 2 tables
|
International Journal of Managing Information Technology (IJMIT)
Vol.3, No.1, February 2011
|
10.5121/ijmit.2011.3104
| null |
cs.IR cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a named entity recognition approach in textual corpus.
This Named Entity (NE) can be a named: location, person, organization, date,
time, etc., characterized by instances. A NE is found in texts accompanied by
contexts: words that are left or right of the NE. The work mainly aims at
identifying contexts inducing the NE's nature. As such, The occurrence of the
word "President" in a text, means that this word or context may be followed by
the name of a president as President "Obama". Likewise, a word preceded by the
string "footballer" induces that this is the name of a footballer. NE
recognition may be viewed as a classification method, where every word is
assigned to a NE class, regarding the context. The aim of this study is then to
identify and classify the contexts that are most relevant to recognize a NE,
those which are frequently found with the NE. A learning approach using
training corpus: web documents, constructed from learning examples is then
suggested. Frequency representations and modified tf-idf representations are
used to calculate the context weights associated to context frequency, learning
example frequency, and document frequency in the corpus.
|
[
{
"version": "v1",
"created": "Mon, 28 Feb 2011 18:33:09 GMT"
}
] | 2011-03-01T00:00:00 |
[
[
"Karaa",
"Wahiba Ben Abdessalem",
""
]
] |
new_dataset
| 0.992776 |
1102.5197
|
Moez Hizem
|
Moez Hizem and Ridha Bouallegue
|
Fine Synchronization through UWB TH-PPM Impulse Radios
|
11 pages, 7 figures
|
International Journal of Wireless & Mobile Networks (IJWMN) Vol.
3, No. 1, February 2011
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a novel fine timing algorithm has been tested and developed to
synchronize Ultra-Wideband (UWB) signals with pulse position modulation (PPM).
By applying this algorithm, we evaluate timing algorithms in both data-aided
(DA) and non-data-aided (NDA) modes. Based on correlation operations, our
algorithm remains operational in practical UWB settings. The proposed timing
scheme consists of two complementary floors or steps. The first floor consists
on a coarse synchronization which is founded on the recently proposed
acquisition scheme based on dirty templates (TDT). In the second floor, we
investigate a new fine synchronization algorithm which gives an improved
estimate of timing offset. Simulations confirm performance improvement of our
timing synchronization compared to the original TDT algorithm in terms of mean
square error.
|
[
{
"version": "v1",
"created": "Fri, 25 Feb 2011 09:31:28 GMT"
}
] | 2011-02-28T00:00:00 |
[
[
"Hizem",
"Moez",
""
],
[
"Bouallegue",
"Ridha",
""
]
] |
new_dataset
| 0.992856 |
1102.5204
|
Zhongwei Si
|
Zhongwei Si, Ragnar Thobaben, Mikael Skoglund
|
Bilayer LDPC Convolutional Codes for Half-Duplex Relay Channels
|
5 pages, 5 figures, submitted to ISIT 2011
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present regular bilayer LDPC convolutional codes for
half-duplex relay channels. For the binary erasure relay channel, we prove that
the proposed code construction achieves the capacities for the source-relay
link and the source-destination link provided that the channel conditions are
known when designing the code. Meanwhile, this code enables the highest
transmission rate with decode-and-forward relaying. In addition, its regular
degree distributions can easily be computed from the channel parameters, which
significantly simplifies the code optimization. Numerical results are provided
for both binary erasure channels (BEC) and AWGN channels. In BECs, we can
observe that the gaps between the decoding thresholds and the Shannon limits
are impressively small. In AWGN channels, the bilayer LDPC convolutional code
clearly outperforms its block code counterpart in terms of bit error rate.
|
[
{
"version": "v1",
"created": "Fri, 25 Feb 2011 10:29:20 GMT"
}
] | 2011-02-28T00:00:00 |
[
[
"Si",
"Zhongwei",
""
],
[
"Thobaben",
"Ragnar",
""
],
[
"Skoglund",
"Mikael",
""
]
] |
new_dataset
| 0.999631 |
0912.3730
|
Jean-Camille Birget
|
Jean-Camille Birget
|
On the circuit-size of inverses
|
8 pages
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We reprove a result of Boppana and Lagarias: If Pi_2^P is different from
Sigma_2^P then there exists a partial function f that is computable by a
polynomial-size family of circuits, but no inverse of f is computable by a
polynomial-size family of circuits. We strengthen this result by showing that
there exist length-preserving total functions that are one-way by circuit size
and that are computable in uniform polynomial time. We also prove, if Pi_2^P is
different from Sigma_2^P, that there exist polynomially balanced total
surjective functions that are one-way by circuit size; here non-uniformity is
used.
|
[
{
"version": "v1",
"created": "Fri, 18 Dec 2009 16:34:15 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Feb 2011 19:13:53 GMT"
}
] | 2011-02-25T00:00:00 |
[
[
"Birget",
"Jean-Camille",
""
]
] |
new_dataset
| 0.993925 |
1004.5230
|
Florent Foucaud
|
Florent Foucaud (LaBRI), Eleonora Guerrini (IF), Matjaz Kovse (LaBRI),
Reza Naserasr (LaBRI), Aline Parreau (IF), Petru Valicov (LaBRI)
|
Extremal graphs for the identifying code problem
| null |
European Journal of Combinatorics 32, 4 (2011) 628-638
|
10.1016/j.ejc.2011.01.002
| null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An identifying code of a graph G is a dominating set C such that every vertex
x of G is distinguished from all other vertices by the set of vertices in C
that are at distance at most 1 from x. The problem of finding an identifying
code of minimum possible size turned out to be a challenging problem. It was
proved by N. Bertrand that if a graph on n vertices with at least one edge
admits an identifying code, then a minimum identifying code has size at most
n-1. Some classes of graphs whose smallest identifying code is of size n-1 were
already known, and few conjectures were formulated to classify all these
graphs. In this paper, disproving these conjectures, we classify all finite
graphs for which all but one of the vertices are needed to form an identifying
code. We also classify all infinite graphs needing the whole set of vertices in
any identifying code. New upper bounds in terms of the number of vertices and
the maximum degree of a graph are also provided.
|
[
{
"version": "v1",
"created": "Thu, 29 Apr 2010 09:32:28 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Oct 2010 14:08:37 GMT"
},
{
"version": "v3",
"created": "Tue, 25 Jan 2011 15:25:51 GMT"
},
{
"version": "v4",
"created": "Thu, 24 Feb 2011 09:05:36 GMT"
}
] | 2011-02-25T00:00:00 |
[
[
"Foucaud",
"Florent",
"",
"LaBRI"
],
[
"Guerrini",
"Eleonora",
"",
"IF"
],
[
"Kovse",
"Matjaz",
"",
"LaBRI"
],
[
"Naserasr",
"Reza",
"",
"LaBRI"
],
[
"Parreau",
"Aline",
"",
"IF"
],
[
"Valicov",
"Petru",
"",
"LaBRI"
]
] |
new_dataset
| 0.998877 |
1102.4951
|
Srimanta Bhattacharya
|
Srimanta Bhattacharya, Sushmita Ruj, and Bimal Roy
|
Combinatorial Batch Codes: A Lower Bound and Optimal Constructions
| null | null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Batch codes, introduced by Ishai, Kushilevitz, Ostrovsky and Sahai in [1],
are methods for solving the following data storage problem: n data items are to
be stored in m servers in such a way that any k of the n items can be retrieved
by reading at most t items from each server, and that the total number of items
stored in m servers is N . A Combinatorial batch code (CBC) is a batch code
where each data item is stored without change, i.e., each stored data item is a
copy of one of the n data items. One of the basic yet challenging problems is
to find optimal CBCs, i.e., CBCs for which total storage (N) is minimal for
given values of n, m, k, and t. In [2], Paterson, Stinson and Wei exclusively
studied CBCs and gave constructions of some optimal CBCs. In this article, we
give a lower bound on the total storage (N) for CBCs. We give explicit
construction of optimal CBCs for a range of values of n. For a different range
of values of n, we give explicit construction of optimal and almost optimal
CBCs. Our results partly settle an open problem of [2].
|
[
{
"version": "v1",
"created": "Thu, 24 Feb 2011 10:39:46 GMT"
}
] | 2011-02-25T00:00:00 |
[
[
"Bhattacharya",
"Srimanta",
""
],
[
"Ruj",
"Sushmita",
""
],
[
"Roy",
"Bimal",
""
]
] |
new_dataset
| 0.991454 |
1102.4972
|
Quentin Merigot
|
Leonidas J. Guibas, Quentin M\'erigot (LJK), Dmitriy Morozov (LBNL)
|
Witnessed k-Distance
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distance function to a compact set plays a central role in several areas of
computational geometry. Methods that rely on it are robust to the perturbations
of the data by the Hausdorff noise, but fail in the presence of outliers. The
recently introduced distance to a measure offers a solution by extending the
distance function framework to reasoning about the geometry of probability
measures, while maintaining theoretical guarantees about the quality of the
inferred information. A combinatorial explosion hinders working with distance
to a measure as an ordinary (power) distance function. In this paper, we
analyze an approximation scheme that keeps the representation linear in the
size of the input, while maintaining the guarantees on the inference quality
close to those for the exact (but costly) representation.
|
[
{
"version": "v1",
"created": "Thu, 24 Feb 2011 12:29:50 GMT"
}
] | 2011-02-25T00:00:00 |
[
[
"Guibas",
"Leonidas J.",
"",
"LJK"
],
[
"Mérigot",
"Quentin",
"",
"LJK"
],
[
"Morozov",
"Dmitriy",
"",
"LBNL"
]
] |
new_dataset
| 0.966878 |
1102.5043
|
Ash Mohammad Abbas
|
Ash Mohammad Abbas
|
uRbAn: A Multipath Routing based Architecture with Energy and Mobility
Management for Quality of Service Support in Mobile Ad hoc Networks
|
6 pages, 6 figures, 1 table
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Designing a wireless node that supports quality of service (QoS) in a mobile
ad hoc network is a challenging task. In this paper, we propose an architecture
of a wireless node that may be used to form a mobile ad hoc network that
supports QoS. We discuss the core functionalities required for such a node and
how those functionalities can be incorporated. A feature of our architecture is
that the node has the ability to utilize multiple paths, if available, for the
provision of QoS. However, in the absence of multiple paths it can utilize the
resources provided by a single path between the source and the destination. We
follow a modular approach where each module is expanded iteratively. We compare
the features of our architecture with the existing architectures proposed in
the literature. Our architecture has provisions of energy and mobility
management and it can be customized to design a system-on-chip (SoC).
|
[
{
"version": "v1",
"created": "Thu, 24 Feb 2011 17:25:50 GMT"
}
] | 2011-02-25T00:00:00 |
[
[
"Abbas",
"Ash Mohammad",
""
]
] |
new_dataset
| 0.98267 |
1102.4684
|
Vincent Mahe
|
Vincent Mahe (INRIA - EMN), Salvador Martinez Perez (INRIA - EMN),
Guillaume Doux (INRIA - EMN), Hugo Bruneli\`ere (INRIA - EMN), Jordi Cabot
(INRIA - EMN)
|
P ORTOLAN: a Model-Driven Cartography Framework
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Processing large amounts of data to extract useful information is an
essential task within companies. To help in this task, visualization techniques
have been commonly used due to their capacity to present data in synthesized
views, easier to understand and manage. However, achieving the right
visualization display for a data set is a complex cartography process that
involves several transformation steps to adapt the (domain) data to the
(visualization) data format expected by visualization tools. To maximize the
benefits of visualization we propose Portolan, a generic model-driven
cartography framework that facilitates the discovery of the data to visualize,
the specification of view definitions for that data and the transformations to
bridge the gap with the visualization tools. Our approach has been implemented
on top of the Eclipse EMF modeling framework and validated on three different
use cases.
|
[
{
"version": "v1",
"created": "Wed, 23 Feb 2011 08:21:43 GMT"
}
] | 2011-02-24T00:00:00 |
[
[
"Mahe",
"Vincent",
"",
"INRIA - EMN"
],
[
"Perez",
"Salvador Martinez",
"",
"INRIA - EMN"
],
[
"Doux",
"Guillaume",
"",
"INRIA - EMN"
],
[
"Brunelière",
"Hugo",
"",
"INRIA - EMN"
],
[
"Cabot",
"Jordi",
"",
"INRIA - EMN"
]
] |
new_dataset
| 0.995051 |
1102.4727
|
Vadim E. Levit
|
Vadim E. Levit and Eugen Mandrescu
|
On the Core of a Unicyclic Graph
|
8 pages, 5 figures
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A set S is independent in a graph G if no two vertices from S are adjacent.
By core(G) we mean the intersection of all maximum independent sets. The
independence number alpha(G) is the cardinality of a maximum independent set,
while mu(G) is the size of a maximum matching in G. A connected graph having
only one cycle, say C, is a unicyclic graph. In this paper we prove that if G
is a unicyclic graph of order n and n-1 = alpha(G) + mu(G), then core(G)
coincides with the union of cores of all trees in G-C.
|
[
{
"version": "v1",
"created": "Wed, 23 Feb 2011 12:55:44 GMT"
}
] | 2011-02-24T00:00:00 |
[
[
"Levit",
"Vadim E.",
""
],
[
"Mandrescu",
"Eugen",
""
]
] |
new_dataset
| 0.998692 |
0911.4522
|
Arya Mazumdar
|
Alexander Barg, Arya Mazumdar
|
On the Number of Errors Correctable with Codes on Graphs
|
Published in the Ralf Koetter Memorial Issue of IEEE Transactions on
Information Theory
|
IEEE Transactions on Information Theory, Vol. 57, No. 2, February
2011
|
10.1109/TIT.2010.2094812
| null |
cs.IT cs.DM math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study ensembles of codes on graphs (generalized low-density parity-check,
or LDPC codes) constructed from random graphs and fixed local constrained
codes, and their extension to codes on hypergraphs. It is known that the
average minimum distance of codes in these ensembles grows linearly with the
code length. We show that these codes can correct a linearly growing number of
errors under simple iterative decoding algorithms. In particular, we show that
this property extends to codes constructed by parallel concatenation of Hamming
codes and other codes with small minimum distance. Previously known results
that proved this property for graph codes relied on graph expansion and
required the choice of local codes with large distance relative to their
length.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2009 23:49:13 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Feb 2011 19:56:18 GMT"
}
] | 2011-02-22T00:00:00 |
[
[
"Barg",
"Alexander",
""
],
[
"Mazumdar",
"Arya",
""
]
] |
new_dataset
| 0.995505 |
1007.0522
|
Ahmed Badr
|
Ahmed Badr, Ashish Khisti, Emin Martinian
|
Diversity Embedded Streaming Erasure Codes (DE-SCo): Constructions and
Optimality
|
JSAC, May 2011, Special Issue on Trading Rate for Delay at the
Transport and Application Layers, Shorter version will appear in Globecom
2010
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Streaming erasure codes guarantee that each source packet is recovered within
a fixed delay at the receiver over a burst-erasure channel. This paper
introduces a new class of streaming codes: Diversity Embedded Streaming Erasure
Codes (DE-SCo), that provide a flexible tradeoff between the channel quality
and receiver delay. When the channel conditions are good, the source stream is
recovered with a low delay, whereas when the channel conditions are poor the
source stream is still recovered, albeit with a larger delay. Information
theoretic analysis of the underlying burst-erasure broadcast channel reveals
that DE-SCo achieve the minimum possible delay for the weaker user, without
sacrificing the single-user optimal performance of the stronger user. Our
constructions are explicit, incur polynomial time encoding and decoding
complexity and outperform random linear codes over burst-erasure channels.
|
[
{
"version": "v1",
"created": "Sun, 4 Jul 2010 02:14:49 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Feb 2011 15:26:09 GMT"
}
] | 2011-02-22T00:00:00 |
[
[
"Badr",
"Ahmed",
""
],
[
"Khisti",
"Ashish",
""
],
[
"Martinian",
"Emin",
""
]
] |
new_dataset
| 0.997778 |
1102.4119
|
EPTCS
|
Andreas Morgenstern (University Kaiserslautern), Klaus Schneider
(University Kaiserslautern)
|
A LTL Fragment for GR(1)-Synthesis
|
In Proceedings iWIGP 2011, arXiv:1102.3741
|
EPTCS 50, 2011, pp. 33-45
|
10.4204/EPTCS.50.3
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The idea of automatic synthesis of reactive programs starting from temporal
logic (LTL) specifications is quite old, but was commonly thought to be
infeasible due to the known double exponential complexity of the problem.
However, new ideas have recently renewed the interest in LTL synthesis: One
major new contribution in this area is the recent work of Piterman et al. who
showed how polynomial time synthesis can be achieved for a large class of LTL
specifications that is expressive enough to cover many practical examples.
These LTL specifications are equivalent to omega-automata having a so-called
GR(1) acceptance condition. This approach has been used to automatically
synthesize implementations of real-world applications. To this end, manually
written deterministic omega-automata having GR(1) conditions were used instead
of the original LTL specifications. However, manually generating deterministic
monitors is, of course, a hard and error-prone task. In this paper, we
therefore present algorithms to automatically translate specifications of a
remarkable large fragment of LTL to deterministic monitors having a GR(1)
acceptance condition so that the synthesis algorithms can start with more
readable LTL specifications.
|
[
{
"version": "v1",
"created": "Mon, 21 Feb 2011 02:30:38 GMT"
}
] | 2011-02-22T00:00:00 |
[
[
"Morgenstern",
"Andreas",
"",
"University Kaiserslautern"
],
[
"Schneider",
"Klaus",
"",
"University Kaiserslautern"
]
] |
new_dataset
| 0.998493 |
1102.4135
|
Wenbo He
|
Wenbo He, Xue Liu, Mai Ren
|
Location Cheating: A Security Challenge to Location-based Social Network
Services
|
10 pages, 8 figures, accepted by the 31st International Conference on
Distributed Computing Systems (ICDCS 2011)
| null | null | null |
cs.SI cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Location-based mobile social network services such as foursquare and Gowalla
have grown exponentially over the past several years. These location-based
services utilize the geographical position to enrich user experiences in a
variety of contexts, including location-based searching and location-based
mobile advertising. To attract more users, the location-based mobile social
network services provide real-world rewards to the user, when a user checks in
at a certain venue or location. This gives incentives for users to cheat on
their locations. In this report, we investigate the threat of location cheating
attacks, find the root cause of the vulnerability, and outline the possible
defending mechanisms. We use foursquare as an example to introduce a novel
location cheating attack, which can easily pass the current location
verification mechanism (e.g., cheater code of foursquare). We also crawl the
foursquare website. By analyzing the crawled data, we show that automated large
scale cheating is possible. Through this work, we aim to call attention to
location cheating in mobile social network services and provide insights into
the defending mechanisms.
|
[
{
"version": "v1",
"created": "Mon, 21 Feb 2011 05:17:11 GMT"
}
] | 2011-02-22T00:00:00 |
[
[
"He",
"Wenbo",
""
],
[
"Liu",
"Xue",
""
],
[
"Ren",
"Mai",
""
]
] |
new_dataset
| 0.998282 |
1102.4258
|
Michael Bronstein
|
E. Boyer, A. M. Bronstein, M. M. Bronstein, B. Bustos, T. Darom, R.
Horaud, I. Hotz, Y. Keller, J. Keustermans, A. Kovnatsky, R. Litman, J.
Reininghaus, I. Sipiran, D. Smeets, P. Suetens, D. Vandermeulen, A.
Zaharescu, V. Zobel
|
SHREC 2011: robust feature detection and description benchmark
|
This is a full version of the SHREC'11 report published in 3DOR
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Feature-based approaches have recently become very popular in computer vision
and image analysis applications, and are becoming a promising direction in
shape retrieval. SHREC'11 robust feature detection and description benchmark
simulates the feature detection and description stages of feature-based shape
retrieval algorithms. The benchmark tests the performance of shape feature
detectors and descriptors under a wide variety of transformations. The
benchmark allows evaluating how algorithms cope with certain classes of
transformations and strength of the transformations that can be dealt with. The
present paper is a report of the SHREC'11 robust feature detection and
description benchmark results.
|
[
{
"version": "v1",
"created": "Mon, 21 Feb 2011 15:43:19 GMT"
}
] | 2011-02-22T00:00:00 |
[
[
"Boyer",
"E.",
""
],
[
"Bronstein",
"A. M.",
""
],
[
"Bronstein",
"M. M.",
""
],
[
"Bustos",
"B.",
""
],
[
"Darom",
"T.",
""
],
[
"Horaud",
"R.",
""
],
[
"Hotz",
"I.",
""
],
[
"Keller",
"Y.",
""
],
[
"Keustermans",
"J.",
""
],
[
"Kovnatsky",
"A.",
""
],
[
"Litman",
"R.",
""
],
[
"Reininghaus",
"J.",
""
],
[
"Sipiran",
"I.",
""
],
[
"Smeets",
"D.",
""
],
[
"Suetens",
"P.",
""
],
[
"Vandermeulen",
"D.",
""
],
[
"Zaharescu",
"A.",
""
],
[
"Zobel",
"V.",
""
]
] |
new_dataset
| 0.999563 |
1102.3763
|
Hsuan-Jung Su
|
Hsuan-Yi Chu and Hsuan-Jung Su
|
On the Capacity Region of the Cognitive Interference Channel with
Unidirectional Destination Cooperation
|
submitted to ISIT 2011
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The cognitive interference channel with unidirectional destination
cooperation (CIFC-UDC) is a variant of the cognitive interference channel
(CIFC) where the cognitive (secondary) destination not only decodes the
information sent from its sending dual but also helps enhance the communication
of the primary user. This channel is an extension of the original CIFC to
achieve a win-win solution under the coexistence condition. The CIFC-UDC
comprises a broadcast channel (BC), a relay channel (RC), as well as a
partially cooperative relay broadcast channel (PCRBC), and can be degraded to
any one of them. In this paper, we propose a new achievable rate region for the
dis-crete memoryless CIFC-UDC which improves the previous re-sults and includes
the largest known rate regions of the BC, the RC, the PCRBC and the CIFC. A new
outer bound is presented and proved to be tight for two classes of the
CIFC-UDCs, result-ing in the characterization of the capacity region.
|
[
{
"version": "v1",
"created": "Fri, 18 Feb 2011 06:45:15 GMT"
}
] | 2011-02-21T00:00:00 |
[
[
"Chu",
"Hsuan-Yi",
""
],
[
"Su",
"Hsuan-Jung",
""
]
] |
new_dataset
| 0.993594 |
1102.3896
|
V\'itor Santos Costa
|
V\'itor Santos Costa, Lu\'is Damas, Ricardo Rocha
|
The YAP Prolog System
|
30 pages, 2 figures. To appear in Theory and Practice of Logic
Programming (TPLP)
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Yet Another Prolog (YAP) is a Prolog system originally developed in the
mid-eighties and that has been under almost constant development since then.
This paper presents the general structure and design of the YAP system,
focusing on three important contributions to the Logic Programming community.
First, it describes the main techniques used in YAP to achieve an efficient
Prolog engine. Second, most Logic Programming systems have a rather limited
indexing algorithm. YAP contributes to this area by providing a dynamic
indexing mechanism, or just-in-time indexer (JITI). Third, a important
contribution of the YAP system has been the integration of both or-parallelism
and tabling in a single Logic Programming system.
|
[
{
"version": "v1",
"created": "Fri, 18 Feb 2011 19:57:18 GMT"
}
] | 2011-02-21T00:00:00 |
[
[
"Costa",
"Vítor Santos",
""
],
[
"Damas",
"Luís",
""
],
[
"Rocha",
"Ricardo",
""
]
] |
new_dataset
| 0.994535 |
cs/0412051
|
Vedran Kordic
|
Oliver Adria, Hermann Streich, Joachim Hertzberg
|
Dynamic replanning in uncertain environments for a sewer inspection
robot
| null |
International Journal of Advanced Robotic Systems, Volume 1,
Number 1, March 2004, pp.33-38
| null | null |
cs.RO
| null |
The sewer inspection robot MAKRO is an autonomous multi-segment robot with
worm-like shape driven by wheels. It is currently under development in the
project MAKRO-PLUS. The robot has to navigate autonomously within sewer
systems. Its first tasks will be to take water probes, analyze it onboard, and
measure positions of manholes and pipes to detect polluted-loaded sewage and to
improve current maps of sewer systems. One of the challenging problems is the
controller software, which should enable the robot to navigate in the sewer
system and perform the inspection tasks autonomously, not inflicting any
self-damage. This paper focuses on the route planning and replanning aspect of
the robot. The robots software has four different levels, of which the planning
system is the highest level, and the remaining three are controller levels each
with a different degree of abstraction. The planner coordinates the sequence of
actions that are to be successively executed by the robot.
|
[
{
"version": "v1",
"created": "Sat, 11 Dec 2004 12:42:10 GMT"
}
] | 2011-02-19T00:00:00 |
[
[
"Adria",
"Oliver",
""
],
[
"Streich",
"Hermann",
""
],
[
"Hertzberg",
"Joachim",
""
]
] |
new_dataset
| 0.999348 |
cs/0701168
|
Jim Gray
|
Russell Sears, Catharine Van Ingen, Jim Gray
|
To BLOB or Not To BLOB: Large Object Storage in a Database or a
Filesystem?
| null |
CIDR 2007
| null |
MSR-TR-2006-45
|
cs.DB
| null |
Application designers often face the question of whether to store large
objects in a filesystem or in a database. Often this decision is made for
application design simplicity. Sometimes, performance measurements are also
used. This paper looks at the question of fragmentation - one of the
operational issues that can affect the performance and/or manageability of the
system as deployed long term. As expected from the common wisdom, objects
smaller than 256KB are best stored in a database while objects larger than 1M
are best stored in the filesystem. Between 256KB and 1MB, the read:write ratio
and rate of object overwrite or replacement are important factors. We used the
notion of "storage age" or number of object overwrites as way of normalizing
wall clock time. Storage age allows our results or similar such results to be
applied across a number of read:write ratios and object replacement rates.
|
[
{
"version": "v1",
"created": "Fri, 26 Jan 2007 00:54:04 GMT"
}
] | 2011-02-19T00:00:00 |
[
[
"Sears",
"Russell",
""
],
[
"Van Ingen",
"Catharine",
""
],
[
"Gray",
"Jim",
""
]
] |
new_dataset
| 0.999122 |
1102.3491
|
Jos\'e Soto
|
Jos\'e A. Soto
|
A simple PTAS for Weighted Matroid Matching on Strongly Base Orderable
Matroids
|
8 pages, 3 figures. To appear in LAGOS 2011
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give a simple polynomial time approximation scheme for the weighted
matroid matching problem on strongly base orderable matroids. We also show that
even the unweighted version of this problem is NP-complete and not in
oracle-coNP.
|
[
{
"version": "v1",
"created": "Thu, 17 Feb 2011 04:22:13 GMT"
}
] | 2011-02-18T00:00:00 |
[
[
"Soto",
"José A.",
""
]
] |
new_dataset
| 0.997813 |
1102.3605
|
Radoslav Kirov M
|
Martianu Frederic Ezerman and Radoslav Kirov
|
Nonbinary Quantum Codes from Two-Point Divisors on Hermitian Curves
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sarvepalli and Klappenecker showed how classical one-point codes on the
Hermitian curve can be used to construct quantum codes. Homma and Kim
determined the parameters of a larger family of codes, the two-point codes. In
quantum error-correction, the observed presence of asymmetry in some quantum
channels led to the study of asymmetric quantum codes (AQECCs) where we no
longer assume that the different types of errors are equiprobable. This paper
considers quantum codes constructed from the two-point codes. In the asymmetric
case, we show strict improvements over all possible finite fields for a range
of designed distances. We produce large dimension pure AQECC and small
dimension impure AQECC that have better parameters than AQECC from one-point
codes. Numerical results for the Hermitian curves over F16 and F64 are used to
illustrate the gain.
|
[
{
"version": "v1",
"created": "Thu, 17 Feb 2011 15:22:15 GMT"
}
] | 2011-02-18T00:00:00 |
[
[
"Ezerman",
"Martianu Frederic",
""
],
[
"Kirov",
"Radoslav",
""
]
] |
new_dataset
| 0.998391 |
1102.3670
|
Guillermo Diez-Canas
|
Guillermo D. Canas and Steven J. Gortler
|
Orphan-Free Anisotropic Voronoi Diagrams
|
17 pages, 6 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe conditions under which an appropriately-defined anisotropic
Voronoi diagram of a set of sites in Euclidean space is guaranteed to be
composed of connected cells in any number of dimensions. These conditions are
natural for problems in optimization and approximation, and algorithms already
exist to produce sets of sites that satisfy them.
|
[
{
"version": "v1",
"created": "Thu, 17 Feb 2011 19:44:23 GMT"
}
] | 2011-02-18T00:00:00 |
[
[
"Canas",
"Guillermo D.",
""
],
[
"Gortler",
"Steven J.",
""
]
] |
new_dataset
| 0.997129 |
1102.3082
|
Erhan Yilmaz
|
Erhan Yilmaz and Raymond Knopp
|
Hash-and-Forward Relaying for Two-Way Relay Channel
|
5 pages, 2 figures, submitted to the IEEE ISIT'11 conference
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers a communication network comprised of two nodes, which
have no mutual direct communication links, communicating two-way with the aid
of a common relay node (RN), also known as separated two-way relay (TWR)
channel.
We first recall a cut-set outer bound for the set of rates in the context of
this network topology assuming full-duplex transmission capabilities. Then, we
derive a new achievable rate region based on hash-and-forward (HF) relaying
where the RN does not attempt to decode but instead hashes its received signal,
and show that under certain channel conditions it coincides with Shannon's
inner-bound for the two-way channel [1]. Moreover, for binary adder TWR channel
with additive noise at the nodes and the RN we provide a detailed capacity
achieving coding scheme based on structure codes.
|
[
{
"version": "v1",
"created": "Tue, 15 Feb 2011 14:32:38 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Feb 2011 11:05:37 GMT"
}
] | 2011-02-17T00:00:00 |
[
[
"Yilmaz",
"Erhan",
""
],
[
"Knopp",
"Raymond",
""
]
] |
new_dataset
| 0.984716 |
1102.3216
|
Amin Jafarian
|
Amin Jafarian and Sriram Vishwanath
|
The Two-User Gaussian Fading Broadcast Channel
|
Also submitted to ISIT 2011
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents outerbounds for the two-user Gaussian fading broadcast
channel. These outerbounds are based on Costa's entropy power inequality
(Costa-EPI) and are formulated mathematically as a feasibility problem. For
classes of the two-user Gaussian fading broadcast channel where the outerbound
is found to have a feasible solution, we find conditions under which a suitable
inner and outer bound meet. For all such cases, this paper provides a partial
characterization of the capacity region of the Gaussian two-user fading
broadcast channel.
|
[
{
"version": "v1",
"created": "Wed, 16 Feb 2011 01:24:25 GMT"
}
] | 2011-02-17T00:00:00 |
[
[
"Jafarian",
"Amin",
""
],
[
"Vishwanath",
"Sriram",
""
]
] |
new_dataset
| 0.990389 |
1102.3243
|
Aria Ghasemian Sahebi
|
Aria Ghasemian Sahebi, S. Sandeep Pradhan
|
On the Capacity of Abelian Group Codes Over Discrete Memoryless Channels
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For most discrete memoryless channels, there does not exist a linear code for
the channel which uses all of the channel's input symbols. Therefore, linearity
of the code for such channels is a very restrictive condition and there should
be a loosening of the algebraic structure of the code to a degree that the code
can admit any channel input alphabet. For any channel input alphabet size,
there always exists an Abelian group structure defined on the alphabet. We
investigate the capacity of Abelian group codes over discrete memoryless
channels and provide lower and upper bounds on the capacity.
|
[
{
"version": "v1",
"created": "Wed, 16 Feb 2011 05:26:11 GMT"
}
] | 2011-02-17T00:00:00 |
[
[
"Sahebi",
"Aria Ghasemian",
""
],
[
"Pradhan",
"S. Sandeep",
""
]
] |
new_dataset
| 0.997524 |
1102.3392
|
Junghoon Lee
|
Junghoon Lee and Cihan Tepedelenlioglu
|
Space-Time Coding over Fading Channels with Stable Noise
|
22 pages, 6 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses the performance of space-time coding over fading
channels with impulsive noise which is known to accurately capture network
interference. We use the symmetric alpha stable noise distribution and adopt
two models which assume dependent and independent noise components across
receive antennas. We derive pairwise error probability (PEP) of orthogonal
space-time block codes (STBC) with a benchmark genie-aided receiver (GAR), or
the minimum distance receiver (MDR) which is optimal in the Gaussian case. For
general space-time codes we propose a maximum-likelihood (ML) receiver, and its
approximation at high signal-to-noise ratio (SNR). The resulting asymptotically
optimal receiver (AOR) does not depend on noise parameters and is
computationally simple. Monte-Carlo simulations are used to supplement our
analytical results and compare the performance of the receivers.
|
[
{
"version": "v1",
"created": "Wed, 16 Feb 2011 18:30:00 GMT"
}
] | 2011-02-17T00:00:00 |
[
[
"Lee",
"Junghoon",
""
],
[
"Tepedelenlioglu",
"Cihan",
""
]
] |
new_dataset
| 0.973704 |
1102.2700
|
Antonia Wachter
|
Antonia Wachter, Vladimir Sidorenko, Martin Bossert, Victor Zyablov
|
On (Partial) Unit Memory Codes Based on Gabidulin Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
(Partial) Unit Memory ((P)UM) codes provide a powerful possibility to
construct convolutional codes based on block codes in order to achieve a high
decoding performance. In this contribution, a construction based on Gabidulin
codes is considered. This construction requires a modified rank metric, the
so-called sum rank metric. For the sum rank metric, the free rank distance, the
extended row rank distance and its slope are defined analogous to the extended
row distance in Hamming metric. Upper bounds for the free rank distance and the
slope of (P)UM codes in the sum rank metric are derived and an explicit
construction of (P)UM codes based on Gabidulin codes is given, achieving the
upper bound for the free rank distance.
|
[
{
"version": "v1",
"created": "Mon, 14 Feb 2011 08:53:34 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Feb 2011 12:29:32 GMT"
}
] | 2011-02-16T00:00:00 |
[
[
"Wachter",
"Antonia",
""
],
[
"Sidorenko",
"Vladimir",
""
],
[
"Bossert",
"Martin",
""
],
[
"Zyablov",
"Victor",
""
]
] |
new_dataset
| 0.971169 |
1102.2986
|
Tuvi Etzion
|
Tuvi Etzion
|
Sidon Sequences and Doubly Periodic Two-Dimensional Synchronization
Patterns
|
submitted to International Symposium on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sidon sequences and their generalizations have found during the years and
especially recently various applications in coding theory. One of the most
important applications of these sequences is in the connection of
synchronization patterns. A few constructions of two-dimensional
synchronization patterns are based on these sequences. In this paper we present
sufficient conditions that a two-dimensional synchronization pattern can be
transformed into a Sidon sequence. We also present a new construction for Sidon
sequences over an alphabet of size q(q-1), where q is a power of a prime.
|
[
{
"version": "v1",
"created": "Tue, 15 Feb 2011 07:54:28 GMT"
}
] | 2011-02-16T00:00:00 |
[
[
"Etzion",
"Tuvi",
""
]
] |
new_dataset
| 0.99978 |
1102.3127
|
Hsuan-Jung Su
|
Hsuan-Yi Chu and Hsuan-Jung Su
|
On the Cognitive Interference Channel with Unidirectional Destination
Cooperation
|
18 pages, 3 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The cognitive interference channel with unidirectional destination
cooperation (CIFC-UDC) is a cognitive interference channel (CIFC) where the
cognitive (secondary) destination not only decodes the information sent from
its sending dual but also helps enhance the communication of the primary user.
This channel model is an extension of the original CIFC to achieve a win-win
solution under the coexistence condition. From an information-theoretic
perspective, the CIFC-UDC comprises a broadcast channel (BC), a relay channel
(RC) and a partially cooperative relay broadcast channel (PCRBC), and can be
degraded to any one of them. Our main result is the establishment of a new
unified achieva-ble rate region for the CIFC-UDC which is the largest known to
date and can be explicitly shown to include the previous result proposed by Chu
and the largest known rate regions for the BC, the RC and the PCRBC. In
addition, an interesting viewpoint on the unidirectional destination
cooperation in the CIFC-UDC is discussed: to enable the decoder of the primary
user to perform interference mitigation can be considered as a complementary
idea to the interference mitigation via Gel'fand-Pinsker precod-ing in the CIFC
proposed by Devroye et al. Henceforth, by com-bing these two ideas, the
interferences caused at both the desti-nations can be alleviated. Lastly, an
outer bound is presented and proved to be tight for a class of the CIFC-UDC,
resulting in the characterization of the capacity region for this class.
|
[
{
"version": "v1",
"created": "Tue, 15 Feb 2011 17:05:24 GMT"
}
] | 2011-02-16T00:00:00 |
[
[
"Chu",
"Hsuan-Yi",
""
],
[
"Su",
"Hsuan-Jung",
""
]
] |
new_dataset
| 0.997001 |
1001.0251
|
Pierre Guillon
|
Julien Cervelle and Enrico Formenti and Pierre Guillon
|
Ultimate Traces of Cellular Automata
|
12 pages + 5 of appendix conference STACS'10
| null | null | null |
cs.FL cs.DM nlin.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A cellular automaton (CA) is a parallel synchronous computing model, which
consists in a juxtaposition of finite automata (cells) whose state evolves
according to that of their neighbors. Its trace is the set of infinite words
representing the sequence of states taken by some particular cell. In this
paper we study the ultimate trace of CA and partial CA (a CA restricted to a
particular subshift). The ultimate trace is the trace observed after a long
time run of the CA. We give sufficient conditions for a set of infinite words
to be the trace of some CA and prove the undecidability of all properties over
traces that are stable by ultimate coincidence.
|
[
{
"version": "v1",
"created": "Fri, 1 Jan 2010 19:15:02 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Feb 2011 10:30:48 GMT"
}
] | 2011-02-15T00:00:00 |
[
[
"Cervelle",
"Julien",
""
],
[
"Formenti",
"Enrico",
""
],
[
"Guillon",
"Pierre",
""
]
] |
new_dataset
| 0.997695 |
1102.2180
|
Filippo Petroni
|
M. Serva, F. Petroni, D. Volchenkov and S. Wichmann
|
Malagasy Dialects and the Peopling of Madagascar
| null | null | null | null |
cs.CL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The origin of Malagasy DNA is half African and half Indonesian, nevertheless
the Malagasy language, spoken by the entire population, belongs to the
Austronesian family. The language most closely related to Malagasy is Maanyan
(Greater Barito East group of the Austronesian family), but related languages
are also in Sulawesi, Malaysia and Sumatra. For this reason, and because
Maanyan is spoken by a population which lives along the Barito river in
Kalimantan and which does not possess the necessary skill for long maritime
navigation, the ethnic composition of the Indonesian colonizers is still
unclear.
There is a general consensus that Indonesian sailors reached Madagascar by a
maritime trek, but the time, the path and the landing area of the first
colonization are all disputed. In this research we try to answer these problems
together with other ones, such as the historical configuration of Malagasy
dialects, by types of analysis related to lexicostatistics and glottochronology
which draw upon the automated method recently proposed by the authors
\cite{Serva:2008, Holman:2008, Petroni:2008, Bakker:2009}. The data were
collected by the first author at the beginning of 2010 with the invaluable help
of Joselin\`a Soafara N\'er\'e and consist of Swadesh lists of 200 items for 23
dialects covering all areas of the Island.
|
[
{
"version": "v1",
"created": "Thu, 10 Feb 2011 17:16:50 GMT"
},
{
"version": "v2",
"created": "Sun, 13 Feb 2011 16:12:21 GMT"
}
] | 2011-02-15T00:00:00 |
[
[
"Serva",
"M.",
""
],
[
"Petroni",
"F.",
""
],
[
"Volchenkov",
"D.",
""
],
[
"Wichmann",
"S.",
""
]
] |
new_dataset
| 0.999857 |
1102.2445
|
Michael Dietz
|
Michael Dietz and Shashi Shekhar and Yuliy Pisetsky and Anhei Shu and
Dan S. Wallach
|
Quire: Lightweight Provenance for Smart Phone Operating Systems
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Smartphone apps often run with full privileges to access the network and
sensitive local resources, making it difficult for remote systems to have any
trust in the provenance of network connections they receive. Even within the
phone, different apps with different privileges can communicate with one
another, allowing one app to trick another into improperly exercising its
privileges (a Confused Deputy attack). In Quire, we engineered two new security
mechanisms into Android to address these issues. First, we track the call chain
of IPCs, allowing an app the choice of operating with the diminished privileges
of its callers or to act explicitly on its own behalf. Second, a lightweight
signature scheme allows any app to create a signed statement that can be
verified anywhere inside the phone. Both of these mechanisms are reflected in
network RPCs, allowing remote systems visibility into the state of the phone
when an RPC is made. We demonstrate the usefulness of Quire with two example
applications. We built an advertising service, running distinctly from the app
which wants to display ads, which can validate clicks passed to it from its
host. We also built a payment service, allowing an app to issue a request which
the payment service validates with the user. An app cannot not forge a payment
request by directly connecting to the remote server, nor can the local payment
service tamper with the request.
|
[
{
"version": "v1",
"created": "Fri, 11 Feb 2011 21:24:57 GMT"
}
] | 2011-02-15T00:00:00 |
[
[
"Dietz",
"Michael",
""
],
[
"Shekhar",
"Shashi",
""
],
[
"Pisetsky",
"Yuliy",
""
],
[
"Shu",
"Anhei",
""
],
[
"Wallach",
"Dan S.",
""
]
] |
new_dataset
| 0.986717 |
1102.2506
|
Behrouz Maham
|
Behrouz Maham and Are Hj{\o}rungnes
|
Opportunistic Relaying for Space-Time Coded Cooperation with Multiple
Antenna Terminals
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a wireless relay network with multiple antenna terminals over
Rayleigh fading channels, and apply distributed space-time coding (DSTC) in
amplify-and-forward (A&F) mode. The A&F scheme is used in a way that each relay
transmits a scaled version of the linear combination of the received symbols.
It turns out that, combined with power allocation in the relays, A&F DSTC
results in an opportunistic relaying scheme, in which only the best relay is
selected to retransmit the source's space-time coded signal. Furthermore,
assuming the knowledge of source-relay CSI at the source node, we design an
efficient power allocation which outperforms uniform power allocation across
the source antennas. Next, assuming M-PSK or M-QAM modulations, we analyze the
performance of the proposed cooperative diversity transmission schemes in a
wireless relay networks with the multiple-antenna source and destination. We
derive the probability density function (PDF) of the received SNR at the
destination. Then, the PDF is used to determine the symbol error rate (SER) in
Rayleigh fading channels. We derived closed-form approximations of the average
SER in the high SNR scenario, from which we find the diversity order of system
RminfNs;Ndg, where R, Ns, and Nd are the number of the relays, source antennas,
and destination antennas, respectively. Simulation results show that the
proposed system obtain more than 6 dB gain in SNR over A&F MIMO DSTC for BER
10^{-4}, when R = 2, Ns = 2, and Nd = 1.
|
[
{
"version": "v1",
"created": "Sat, 12 Feb 2011 12:28:41 GMT"
}
] | 2011-02-15T00:00:00 |
[
[
"Maham",
"Behrouz",
""
],
[
"Hjørungnes",
"Are",
""
]
] |
new_dataset
| 0.989633 |
1102.2673
|
Eric Feron
|
Pierrick Burgain and Eric Feron
|
Environmental benefits of enhanced surveillance technology on airport
departure operations
|
25 pages, submitted to US/EUrope 2011 ATM seminar
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Airport departure operations constitute an important source of airline delays
and passenger frustration. Excessive surface traffic is the cause of increased
controller and pilot workload; It is also the source of increased emissions; It
worsens traffic safety and often does not yield improved runway throughput.
Acknowledging this fact, this paper explores some of the feedback mechanisms by
which airport traffic can be optimized in real time according to its current
degree of congestion. In particular, it examines the environmnetal benefits
that improved surveillance technologies can bring in the context of gate- or
spot-release aircraft strategies. It is shown that improvements can lead yield
4% to 6% emission reductions for busy airports like New-York La Guardia or
Seattle Tacoma. These benefits come on top of the benefits already obtained by
adopting threshold strategies currently under evaluation.
|
[
{
"version": "v1",
"created": "Mon, 14 Feb 2011 04:27:41 GMT"
}
] | 2011-02-15T00:00:00 |
[
[
"Burgain",
"Pierrick",
""
],
[
"Feron",
"Eric",
""
]
] |
new_dataset
| 0.974617 |
1102.2787
|
Anas Chaaban
|
Anas Chaaban, Aydin Sezgin, and Salman Avestimehr
|
On the Sum Capacity of the Y-Channel
|
12 pages, 8 figures, submitted to ISIT 2011
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A network where three users communicate with each other via a relay is
considered. Users do not receive other users' signals via a direct link, and
thus the relay is essential for their communication. Each user is assumed to
have an individual message to be delivered to each other user. Thus, each user
wants to send two messages and to decode two messages. In general, the transmit
signals of different nodes can be dependent since they can depend on previously
received symbols. We call this case the general case. The sum-capacity is
studied, and upper bounds and lower bounds are given. If all nodes have the
same power, the sum-capacity is characterized to within a gap of 5/2 bits or a
factor of 3 for all values of channel coefficients. This gap is also shown to
approach 3/2 bits as the transmit power increases. Moreover, for the symmetric
case with equal channel coefficients, the gap is shown to be less than 1 bit.
The restricted case is also considered where the transmit signal does not
depend on previously received symbols. In this case, the sum-capacity is
characterized to within a gap of 2 bits or a factor of 3 for all values of
channel coefficients, and approaches 1 bit as the transmit power increases.
|
[
{
"version": "v1",
"created": "Mon, 14 Feb 2011 14:57:18 GMT"
}
] | 2011-02-15T00:00:00 |
[
[
"Chaaban",
"Anas",
""
],
[
"Sezgin",
"Aydin",
""
],
[
"Avestimehr",
"Salman",
""
]
] |
new_dataset
| 0.990377 |
1102.2280
|
Constantinos Daskalakis
|
Constantinos Daskalakis and Christos H. Papadimitriou
|
On Oblivious PTAS's for Nash Equilibrium
|
extended version of paper of the same title that appeared in STOC
2009
|
STOC 2009
| null | null |
cs.GT stat.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
If a game has a Nash equilibrium with probability values that are either zero
or Omega(1) then this equilibrium can be found exhaustively in polynomial time.
Somewhat surprisingly, we show that there is a PTAS for the games whose
equilibria are guaranteed to have small-O(1/n)-values, and therefore
large-Omega(n)-supports. We also point out that there is a PTAS for games with
sparse payoff matrices, which are known to be PPAD-complete to solve exactly.
Both algorithms are of a special kind that we call oblivious: The algorithm
just samples a fixed distribution on pairs of mixed strategies, and the game is
only used to determine whether the sampled strategies comprise an eps-Nash
equilibrium; the answer is yes with inverse polynomial probability. These
results bring about the question: Is there an oblivious PTAS for Nash
equilibrium in general games? We answer this question in the negative; our
lower bound comes close to the quasi-polynomial upper bound of [Lipton,
Markakis, Mehta 2003].
Another recent PTAS for anonymous games is also oblivious in a weaker sense
appropriate for this class of games (it samples from a fixed distribution on
unordered collections of mixed strategies), but its runtime is exponential in
1/eps. We prove that any oblivious PTAS for anonymous games with two strategies
and three player types must have 1/eps^c in the exponent of the running time
for some c>1/3, rendering the algorithm in [Daskalakis 2008] essentially
optimal within oblivious algorithms. In contrast, we devise a poly(n)
(1/eps)^O(log^2(1/eps)) non-oblivious PTAS for anonymous games with 2
strategies and any bounded number of player types.
Our algorithm is based on the construction of a sparse (and efficiently
computable) eps-cover of the set of all possible sums of n independent
indicators, under the total variation distance. The size of the cover is
poly(n) (1/ eps^{O(log^2 (1/eps))}.
|
[
{
"version": "v1",
"created": "Fri, 11 Feb 2011 04:42:36 GMT"
}
] | 2011-02-14T00:00:00 |
[
[
"Daskalakis",
"Constantinos",
""
],
[
"Papadimitriou",
"Christos H.",
""
]
] |
new_dataset
| 0.99248 |
1102.2332
|
Ashish Mani Mr.
|
Ashish Mani and C Patvardhan
|
A Fast Measurement based fixed-point Quantum Search Algorithm
| null | null | null | null |
cs.DB quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Generic quantum search algorithm searches for target entity in an unsorted
database by repeatedly applying canonical Grover's quantum rotation transform
to reach near the vicinity of the target entity represented by a basis state in
the Hilbert space associated with the qubits. Thus, when qubits are measured,
there is a high probability of finding the target entity. However, the number
of times quantum rotation transform is to be applied for reaching near the
vicinity of the target is a function of the number of target entities present
in the unsorted database, which is generally unknown. A wrong estimate of the
number of target entities can lead to overshooting or undershooting the
targets, thus reducing the success probability. Some proposals have been made
to overcome this limitation. These proposals either employ quantum counting to
estimate the number of solutions or fixed point schemes. This paper proposes a
new scheme for stopping the application of quantum rotation transformation on
reaching near the targets by measurement and subsequent processing to estimate
the distance of the state vector from the target states. It ensures a success
probability, which is at least greater than half for all the ratios of the
number of target entities to the total number of entities in a database, which
are less than half. The search problem is trivial for remaining possible
ratios. The proposed scheme is simpler than quantum counting and more efficient
than the known fixed-point schemes. It has same order of computational
complexity as canonical Grover's search algorithm but is slow by a factor of
two and requires an additional ancilla qubit.
|
[
{
"version": "v1",
"created": "Fri, 11 Feb 2011 11:53:01 GMT"
}
] | 2011-02-14T00:00:00 |
[
[
"Mani",
"Ashish",
""
],
[
"Patvardhan",
"C",
""
]
] |
new_dataset
| 0.98725 |
1102.2079
|
David N. Jansen
|
David N. Jansen (Radboud Universiteit Nijmegen, The Netherlands)
|
Erratum to: Model-checking continuous-time Markov chains by Aziz et al
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This note corrects a discrepancy between the semantics and the algorithm of
the multiple until operator of CSL, like in Pr_{> 0.0025} (a until[1,2] b
until[3,4] c), of the article: Model-checking continuous-time Markov chains by
Aziz, Sanwal, Singhal and Brayton, TOCL 1(1), July 2000, pp. 162-170.
|
[
{
"version": "v1",
"created": "Thu, 10 Feb 2011 11:05:29 GMT"
}
] | 2011-02-11T00:00:00 |
[
[
"Jansen",
"David N.",
"",
"Radboud Universiteit Nijmegen, The Netherlands"
]
] |
new_dataset
| 0.995579 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.