id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1102.1472
|
Karthekeyan Chandrasekaran
|
Karthekeyan Chandrasekaran, Richard Karp, Erick Moreno-Centeno,
Santosh Vempala
|
Algorithms for Implicit Hitting Set Problems
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A hitting set for a collection of sets is a set that has a non-empty
intersection with each set in the collection; the hitting set problem is to
find a hitting set of minimum cardinality. Motivated by instances of the
hitting set problem where the number of sets to be hit is large, we introduce
the notion of implicit hitting set problems. In an implicit hitting set problem
the collection of sets to be hit is typically too large to list explicitly;
instead, an oracle is provided which, given a set H, either determines that H
is a hitting set or returns a set that H does not hit. We show a number of
examples of classic implicit hitting set problems, and give a generic algorithm
for solving such problems optimally. The main contribution of this paper is to
show that this framework is valuable in developing approximation algorithms. We
illustrate this methodology by presenting a simple on-line algorithm for the
minimum feedback vertex set problem on random graphs. In particular our
algorithm gives a feedback vertex set of size n-(1/p)\log{np}(1-o(1)) with
probability at least 3/4 for the random graph G_{n,p} (the smallest feedback
vertex set is of size n-(2/p)\log{np}(1+o(1))). We also consider a planted
model for the feedback vertex set in directed random graphs. Here we show that
a hitting set for a polynomial-sized subset of cycles is a hitting set for the
planted random graph and this allows us to exactly recover the planted feedback
vertex set.
|
[
{
"version": "v1",
"created": "Mon, 7 Feb 2011 23:40:58 GMT"
}
] | 2011-02-09T00:00:00 |
[
[
"Chandrasekaran",
"Karthekeyan",
""
],
[
"Karp",
"Richard",
""
],
[
"Moreno-Centeno",
"Erick",
""
],
[
"Vempala",
"Santosh",
""
]
] |
new_dataset
| 0.979406 |
1102.1142
|
Vadim E. Levit
|
Vadim E. Levit and Eugen Mandrescu
|
Local Maximum Stable Sets Greedoids Stemmed from Very Well-Covered
Graphs
|
12 pages, 12 figures
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A maximum stable set in a graph G is a stable set of maximum cardinality. S
is called a local maximum stable set of G if S is a maximum stable set of the
subgraph induced by the closed neighborhood of S. A greedoid (V,F) is called a
local maximum stable set greedoid if there exists a graph G=(V,E) such that its
family of local maximum stable sets coinsides with (V,F). It has been shown
that the family local maximum stable sets of a forest T forms a greedoid on its
vertex set. In this paper we demonstrate that if G is a very well-covered
graph, then its family of local maximum stable sets is a greedoid if and only
if G has a unique perfect matching.
|
[
{
"version": "v1",
"created": "Sun, 6 Feb 2011 11:43:56 GMT"
}
] | 2011-02-08T00:00:00 |
[
[
"Levit",
"Vadim E.",
""
],
[
"Mandrescu",
"Eugen",
""
]
] |
new_dataset
| 0.974684 |
1102.1152
|
Hongbo Ni
|
Hongbo Ni, Bessam Abdulrazak, Daqing Zhang, Shu Wu
|
CDTOM: A Context-driven Task-oriented Middleware for Pervasive Homecare
Environment
| null | null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the growing number of the elderly, we see a greater demand for home
care, and the vision of pervasive computing is also floating into the domain of
the household that aims to build a smart home which can assist inhabitants
(users) to live more conveniently and harmoniously. Such health-care pervasive
applications in smart home should focus on the inhabitant's goal or task in
diverse situations, rather than the various complex devices and services. The
core challenge for homecare design is to perceive the environment and assess
occurring situations, thus allowing systems to behave intelligently according
to the user's intent. Due to the dynamic and heterogeneous nature of pervasive
computing environment, it is difficult for an average user to obtain right
information and service and in right place at right time. This paper proposes a
context-driven task-oriented middleware (CDTOM) to meet the challenge. The most
important component is its task model that provides an adequate high-level
description of user-oriented tasks and their related contexts. Leveraging the
model multiple entities can easily exchange, share and reuse their knowledge.
Based on the hierarchy of task ontology, a novel task recognition approach
using CBR (case-based reasoning) is presented and the performance of task
recognition is evaluated by task number, context size and time costing.
Moreover, a dynamic mechanism for mapping the recognized task and services is
also discussed. Finally, we present the design and implementation of our task
supporting system (TSS) to aid an inhabitant's tasks in light of his lifestyle
and environment conditions in pervasive homecare environment, and the results
of the prototype system show that our middleware approach achieves good
efficiency of context management and good accuracy of user's activity
inference, and can improve efficiently quality of user's life.
|
[
{
"version": "v1",
"created": "Sun, 6 Feb 2011 14:00:30 GMT"
}
] | 2011-02-08T00:00:00 |
[
[
"Ni",
"Hongbo",
""
],
[
"Abdulrazak",
"Bessam",
""
],
[
"Zhang",
"Daqing",
""
],
[
"Wu",
"Shu",
""
]
] |
new_dataset
| 0.998876 |
1102.1226
|
Jaydip Sen
|
Jaydip Sen
|
Secure Routing in Wireless Mesh Networks
|
44 pages, 17 figures, 5 tables
|
Book Chapter: Jaydip Sen (2011). Secure Routing in Wireless Mesh
Networks, Wireless Mesh Networks, Nobuo Funabiki (Ed.), InTech. Available
from:
http://www.intechopen.com/articles/show/title/secure-routing-in-wireless-mesh-networks
| null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the
challenges in next-generation networks such as providing flexible, adaptive,
and reconfigurable architecture while offering cost-effective solutions to the
service providers. Unlike traditional Wi-Fi networks, with each access point
(AP) connected to the wired network, in WMNs only a subset of the APs are
required to be connected to the wired network. The APs that are connected to
the wired network are called the Internet gateways (IGWs), while the APs that
do not have wired connections are called the mesh routers (MRs). The MRs are
connected to the IGWs using multi-hop communication. The IGWs provide access to
conventional clients and interconnect ad hoc, sensor, cellular, and other
networks to the Internet. However, most of the existing routing protocols for
WMNs are extensions of protocols originally designed for mobile ad hoc networks
(MANETs) and thus they perform sub-optimally. Moreover, most routing protocols
for WMNs are designed without security issues in mind, where the nodes are all
assumed to be honest. In practical deployment scenarios, this assumption does
not hold. This chapter provides a comprehensive overview of security issues in
WMNs and then particularly focuses on secure routing in these networks. First,
it identifies security vulnerabilities in the medium access control (MAC) and
the network layers. Various possibilities of compromising data confidentiality,
data integrity, replay attacks and offline cryptanalysis are also discussed.
Then various types of attacks in the MAC and the network layers are discussed.
After enumerating the various types of attacks on the MAC and the network
layer, the chapter briefly discusses on some of the preventive mechanisms for
these attacks.
|
[
{
"version": "v1",
"created": "Mon, 7 Feb 2011 03:49:40 GMT"
}
] | 2011-02-08T00:00:00 |
[
[
"Sen",
"Jaydip",
""
]
] |
new_dataset
| 0.993419 |
1102.1237
|
Vadim Zaliva
|
Vadim Zaliva
|
Applying static code analysis to firewall policies for the purpose of
anomaly detection
| null | null | null | null |
cs.PL cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Treating modern firewall policy languages as imperative, special purpose
programming languages, in this article we will try to apply static code
analysis techniques for the purpose of anomaly detection.
We will first abstract a policy in common firewall policy language into an
intermediate language, and then we will try to apply anomaly detection
algorithms to it.
The contributions made by this work are:
1. An analysis of various control flow instructions in popular firewall
policy languages 2. Introduction of an intermediate firewall policy language,
with emphasis on control flow constructs. 3. Application of \textit{Static Code
Analysis} to detect anomalies in firewall policy, expressed in intermediate
firewall policy language. 4. Sample implementation of \textit{Static Code
Analysis} of firewall policies, expressed in our abstract language using
Datalog language.
|
[
{
"version": "v1",
"created": "Mon, 7 Feb 2011 07:26:03 GMT"
}
] | 2011-02-08T00:00:00 |
[
[
"Zaliva",
"Vadim",
""
]
] |
new_dataset
| 0.993145 |
1102.1340
|
Michel Grabisch
|
Ulrich Faigle and Michel Grabisch
|
A Discrete Choquet Integral for Ordered Systems
| null | null |
10.1016/j.fss.2010.10.003
| null |
cs.DM math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A model for a Choquet integral for arbitrary finite set systems is presented.
The model includes in particular the classical model on the system of all
subsets of a finite set. The general model associates canonical non-negative
and positively homogeneous superadditive functionals with generalized belief
functions relative to an ordered system, which are then extended to arbitrary
valuations on the set system. It is shown that the general Choquet integral can
be computed by a simple Monge-type algorithm for so-called intersection
systems, which include as a special case weakly union-closed families.
Generalizing Lov\'asz' classical characterization, we give a characterization
of the superadditivity of the Choquet integral relative to a capacity on a
union-closed system in terms of an appropriate model of supermodularity of such
capacities.
|
[
{
"version": "v1",
"created": "Mon, 7 Feb 2011 15:40:54 GMT"
}
] | 2011-02-08T00:00:00 |
[
[
"Faigle",
"Ulrich",
""
],
[
"Grabisch",
"Michel",
""
]
] |
new_dataset
| 0.99905 |
0802.1312
|
Josef Cibulka
|
Josef Cibulka
|
Untangling polygons and graphs
|
11 pages, 3 figures
|
Discrete and Computational Geometry 43(2): 402-411 (2010)
|
10.1007/s00454-009-9150-x
| null |
cs.CG cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Untangling is a process in which some vertices of a planar graph are moved to
obtain a straight-line plane drawing. The aim is to move as few vertices as
possible. We present an algorithm that untangles the cycle graph C_n while
keeping at least \Omega(n^{2/3}) vertices fixed. For any graph G, we also
present an upper bound on the number of fixed vertices in the worst case. The
bound is a function of the number of vertices, maximum degree and diameter of
G. One of its consequences is the upper bound O((n log n)^{2/3}) for all
3-vertex-connected planar graphs.
|
[
{
"version": "v1",
"created": "Sun, 10 Feb 2008 09:28:15 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Jun 2008 09:45:10 GMT"
}
] | 2011-02-07T00:00:00 |
[
[
"Cibulka",
"Josef",
""
]
] |
new_dataset
| 0.985075 |
0901.3119
|
Josef Cibulka
|
Josef Cibulka
|
Average number of flips in pancake sorting
|
21 pages, new computational results for unburnt pancakes (up to n=19)
|
Theor. Comput. Sci. 412, pp. 822-834 (2011)
|
10.1016/j.tcs.2010.11.028
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We are given a stack of pancakes of different sizes and the only allowed
operation is to take several pancakes from top and flip them. The unburnt
version requires the pancakes to be sorted by their sizes at the end, while in
the burnt version they additionally need to be oriented burnt-side down. We
present an algorithm with the average number of flips, needed to sort a stack
of n burnt pancakes, equal to 7n/4+O(1) and a randomized algorithm for the
unburnt version with at most 17n/12+O(1) flips on average.
In addition, we show that in the burnt version, the average number of flips
of any algorithm is at least n+\Omega(n/log n) and conjecture that some
algorithm can reach n+\Theta(n/log n).
We also slightly increase the lower bound on g(n), the minimum number of
flips needed to sort the worst stack of n burnt pancakes. This bound, together
with the upper bound found by Heydari and Sudborough in 1997, gives the exact
number of flips to sort the previously conjectured worst stack -I_n for n=3 mod
4 and n>=15. Finally we present exact values of f(n) up to n=19 and of g(n) up
to n=17 and disprove a conjecture of Cohen and Blum by showing that the burnt
stack -I_{15} is not the worst one for n=15.
|
[
{
"version": "v1",
"created": "Tue, 20 Jan 2009 20:08:57 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Sep 2009 16:17:16 GMT"
}
] | 2011-02-07T00:00:00 |
[
[
"Cibulka",
"Josef",
""
]
] |
new_dataset
| 0.952872 |
1102.0951
|
Gabriel Kerneis
|
Gabriel Kerneis (PPS), Juliusz Chroboczek (PPS)
|
CPC: programming with a massive number of lightweight threads
|
To appear in PLACES'11
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Threads are a convenient and modular abstraction for writing concurrent
programs, but often fairly expensive. The standard alternative to threads,
event-loop programming, allows much lighter units of concurrency, but leads to
code that is difficult to write and even harder to understand. Continuation
Passing C (CPC) is a translator that converts a program written in threaded
style into a program written with events and native system threads, at the
programmer's choice. Together with two undergraduate students, we taught
ourselves how to program in CPC by writing Hekate, a massively concurrent
network server designed to efficiently handle tens of thousands of
simultaneously connected peers. In this paper, we describe a number of
programming idioms that we learnt while writing Hekate; while some of these
idioms are specific to CPC, many should be applicable to other programming
systems with sufficiently cheap threads.
|
[
{
"version": "v1",
"created": "Fri, 4 Feb 2011 15:57:48 GMT"
}
] | 2011-02-07T00:00:00 |
[
[
"Kerneis",
"Gabriel",
"",
"PPS"
],
[
"Chroboczek",
"Juliusz",
"",
"PPS"
]
] |
new_dataset
| 0.999581 |
0912.5324
|
Jose Ignacio Alvarez-Hamelin
|
Ortega A. Alfredo (ITBA, CORE), Victor A. Bettachini (ITBA), Jos\'e
Ignacio Alvarez-Hamelin (ITBA, CONICET), Diego F. Grosz (CONICET, LabOp)
|
Point-to-point and Point-to-multipoint CDMA Access Network with Enhanced
Security
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a network implementation with enhanced security at the physical
layer by means of time-hopping CDMA, supporting cryptographically secure
point-to-point and point-to-multipoint communication. In particular, we analyze
an active star topology optical network implementation capable of supporting
128 simultaneous users up to 20 km apart. The feasibility of the proposed
scheme is demonstrated through numerical simulation.
|
[
{
"version": "v1",
"created": "Tue, 29 Dec 2009 16:05:46 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Sep 2010 05:06:12 GMT"
},
{
"version": "v3",
"created": "Thu, 3 Feb 2011 19:50:42 GMT"
}
] | 2011-02-04T00:00:00 |
[
[
"Alfredo",
"Ortega A.",
"",
"ITBA, CORE"
],
[
"Bettachini",
"Victor A.",
"",
"ITBA"
],
[
"Alvarez-Hamelin",
"José Ignacio",
"",
"ITBA, CONICET"
],
[
"Grosz",
"Diego F.",
"",
"CONICET, LabOp"
]
] |
new_dataset
| 0.979123 |
1102.0583
|
Bimal Kumar Mr
|
Bimal Aklesh Kumar
|
Thin Client Web-Based Campus Information Systems for Fiji National
University
|
14 pages
|
International Journal of Software Engineering & Applications
(IJSEA), Vol.2, No.1, January 2011
|
10.5121/ijsea.2011.2102
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fiji National University is encountering many difficulties with its current
administrative systems. These difficulties include accessibility, scalability,
performance, flexibility and integration. We propose a new campus information
system, FNU-CIS to addresses these difficulties. FNU-CIS has the potential to
provide wide range of the services for students and staffs at the university.
In order to assist in the design and implementation of proposed FNU-CIS, we
present an overview, software architecture and prototype implementation of our
proposed system. We discuss the key properties of our system, compare it with
other similar systems available and outline our future plans for research in
FNU-CIS implementation.
|
[
{
"version": "v1",
"created": "Wed, 2 Feb 2011 23:04:49 GMT"
}
] | 2011-02-04T00:00:00 |
[
[
"Kumar",
"Bimal Aklesh",
""
]
] |
new_dataset
| 0.996995 |
1102.0634
|
D\v{z}enan Zuki\'c
|
D\v{z}enan Zuki\'c and Jan Egger and Miriam H. A. Bauer and Daniela
Kuhnt and Barbara Carl and Bernd Freisleben and Andreas Kolb and Christopher
Nimsky
|
Glioblastoma Multiforme Segmentation in MRI Data with a Balloon
Inflation Approach
|
4 pages, 4 figures, Proc. of the 6th Russian-Bavarian Conference on
Bio-Medical Engineering
| null | null | null |
cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Gliomas are the most common primary brain tumors, evolving from the cerebral
supportive cells. For clinical follow-up, the evaluation of the preoperative
tumor volume is essential. Volumetric assessment of tumor volume with manual
segmentation of its outlines is a time-consuming process that can be overcome
with the help of computer-assisted segmentation methods. In this paper, a
semi-automatic approach for World Health Organization (WHO) grade IV glioma
segmentation is introduced that uses balloon inflation forces, and relies on
the detection of high-intensity tumor boundaries that are coupled by using
contrast agent gadolinium. The presented method is evaluated on 27 magnetic
resonance imaging (MRI) data sets and the ground truth data of the tumor
boundaries - for evaluation of the results - are manually extracted by
neurosurgeons.
|
[
{
"version": "v1",
"created": "Thu, 3 Feb 2011 10:00:15 GMT"
}
] | 2011-02-04T00:00:00 |
[
[
"Zukić",
"Dženan",
""
],
[
"Egger",
"Jan",
""
],
[
"Bauer",
"Miriam H. A.",
""
],
[
"Kuhnt",
"Daniela",
""
],
[
"Carl",
"Barbara",
""
],
[
"Freisleben",
"Bernd",
""
],
[
"Kolb",
"Andreas",
""
],
[
"Nimsky",
"Christopher",
""
]
] |
new_dataset
| 0.998066 |
1102.0666
|
Abuzer Yakaryilmaz
|
Abuzer Yakaryilmaz and A. C. Cem Say
|
Probabilistic and quantum finite automata with postselection
|
24 pages. A preliminary version of this paper appeared in the
Proceedings of Randomized and Quantum Computation (satellite workshop of MFCS
and CSL 2010), pages 14--24, 2010
| null | null | null |
cs.CC quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that endowing a real-time probabilistic or quantum computer with the
ability of postselection increases its computational power. For this purpose,
we provide a new model of finite automata with postselection, and compare it
with the model of L\={a}ce et al. We examine the related language classes, and
also establish separations between the classical and quantum versions, and
between the zero-error vs. bounded-error modes of recognition in this model.
|
[
{
"version": "v1",
"created": "Thu, 3 Feb 2011 12:48:53 GMT"
}
] | 2011-02-04T00:00:00 |
[
[
"Yakaryilmaz",
"Abuzer",
""
],
[
"Say",
"A. C. Cem",
""
]
] |
new_dataset
| 0.986383 |
1005.3324
|
David Pritchard
|
David Pritchard
|
An LP with Integrality Gap 1+epsilon for Multidimensional Knapsack
| null | null | null | null |
cs.DM
|
http://creativecommons.org/licenses/by/3.0/
|
In this note we study packing or covering integer programs with at most k
constraints, which are also known as k-dimensional knapsack problems. For any
integer k > 0 and real epsilon > 0, we observe there is a polynomial-sized LP
for the k-dimensional knapsack problem with integrality gap at most 1+epsilon.
The variables may be unbounded or have arbitrary upper bounds. In the packing
case, we can also remove the dependence of the LP on the cost-function,
yielding a polyhedral approximation of the integer hull. This generalizes a
recent result of Bienstock on the classical knapsack problem.
|
[
{
"version": "v1",
"created": "Tue, 18 May 2010 20:44:52 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Feb 2011 14:26:56 GMT"
}
] | 2011-02-03T00:00:00 |
[
[
"Pritchard",
"David",
""
]
] |
new_dataset
| 0.996463 |
1005.0291
|
Moritz Wiese
|
Moritz Wiese and Holger Boche and Igor Bjelakovi\'c and Volker
Jungnickel
|
The Compound Multiple Access Channel with Partially Cooperating Encoders
|
accepted for publication in IEEE Transactions on Information Theory,
Special Issue on Interference Networks
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The goal of this paper is to provide a rigorous information-theoretic
analysis of subnetworks of interference networks. We prove two coding theorems
for the compound multiple-access channel with an arbitrary number of channel
states. The channel state information at the transmitters is such that each
transmitter has a finite partition of the set of states and knows which element
of the partition the actual state belongs to. The receiver may have arbitrary
channel state information. The first coding theorem is for the case that both
transmitters have a common message and that each has an additional common
message. The second coding theorem is for the case where rate-constrained, but
noiseless transmitter cooperation is possible. This cooperation may be used to
exchange information about channel state information as well as the messages to
be transmitted. The cooperation protocol used here generalizes Willems'
conferencing. We show how this models base station cooperation in modern
wireless cellular networks used for interference coordination and capacity
enhancement. In particular, the coding theorem for the cooperative case shows
how much cooperation is necessary in order to achieve maximal capacity in the
network considered.
|
[
{
"version": "v1",
"created": "Mon, 3 May 2010 13:45:09 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Nov 2010 13:28:15 GMT"
},
{
"version": "v3",
"created": "Tue, 1 Feb 2011 09:39:23 GMT"
}
] | 2011-02-02T00:00:00 |
[
[
"Wiese",
"Moritz",
""
],
[
"Boche",
"Holger",
""
],
[
"Bjelaković",
"Igor",
""
],
[
"Jungnickel",
"Volker",
""
]
] |
new_dataset
| 0.964196 |
0901.0911
|
Jean-Guillaume Dumas
|
Alexandre Berzati (LETI, PRISM), C\'ecile Canovas (LETI),
Jean-Guillaume Dumas (LJK), Louis Goubin (PRISM)
|
Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also
Vulnerable
| null |
RSA Conference 2009, Cryptographers' Track, San Francisco : United
States (2009)
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
After attacking the RSA by injecting fault and corresponding countermeasures,
works appear now about the need for protecting RSA public elements against
fault attacks. We provide here an extension of a recent attack based on the
public modulus corruption. The difficulty to decompose the "Left-To-Right"
exponentiation into partial multiplications is overcome by modifying the public
modulus to a number with known factorization. This fault model is justified
here by a complete study of faulty prime numbers with a fixed size. The good
success rate of this attack combined with its practicability raises the
question of using faults for changing algebraic properties of finite field
based cryptosystems.
|
[
{
"version": "v1",
"created": "Wed, 7 Jan 2009 20:15:58 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jan 2009 07:33:45 GMT"
},
{
"version": "v3",
"created": "Mon, 31 Jan 2011 17:41:13 GMT"
}
] | 2011-02-01T00:00:00 |
[
[
"Berzati",
"Alexandre",
"",
"LETI, PRISM"
],
[
"Canovas",
"Cécile",
"",
"LETI"
],
[
"Dumas",
"Jean-Guillaume",
"",
"LJK"
],
[
"Goubin",
"Louis",
"",
"PRISM"
]
] |
new_dataset
| 0.996227 |
1101.5490
|
Tom Cuypers
|
Tom Cuypers and Se Baek Oh and Tom Haber and Philippe Bekaert and
Ramesh Raskar
|
Ray-Based Reflectance Model for Diffraction
| null | null | null | null |
cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel method of simulating wave effects in graphics using
ray--based renderers with a new function: the Wave BSDF (Bidirectional
Scattering Distribution Function). Reflections from neighboring surface patches
represented by local BSDFs are mutually independent. However, in many surfaces
with wavelength-scale microstructures, interference and diffraction requires a
joint analysis of reflected wavefronts from neighboring patches. We demonstrate
a simple method to compute the BSDF for the entire microstructure, which can be
used independently for each patch. This allows us to use traditional ray--based
rendering pipelines to synthesize wave effects of light and sound. We exploit
the Wigner Distribution Function (WDF) to create transmissive, reflective, and
emissive BSDFs for various diffraction phenomena in a physically accurate way.
In contrast to previous methods for computing interference, we circumvent the
need to explicitly keep track of the phase of the wave by using BSDFs that
include positive as well as negative coefficients. We describe and compare the
theory in relation to well understood concepts in rendering and demonstrate a
straightforward implementation. In conjunction with standard raytracers, such
as PBRT, we demonstrate wave effects for a range of scenarios such as
multi--bounce diffraction materials, holograms and reflection of high frequency
surfaces.
|
[
{
"version": "v1",
"created": "Fri, 28 Jan 2011 09:41:43 GMT"
}
] | 2011-01-31T00:00:00 |
[
[
"Cuypers",
"Tom",
""
],
[
"Oh",
"Se Baek",
""
],
[
"Haber",
"Tom",
""
],
[
"Bekaert",
"Philippe",
""
],
[
"Raskar",
"Ramesh",
""
]
] |
new_dataset
| 0.996849 |
1101.5313
|
Grenville Croll
|
Grenville J. Croll
|
A Chronology of Torah Cryptography
|
10 Pages, 1 Table, 7 Figures
|
Proc. ANPA 31, 2011, Cambridge, UK
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Regarding some papers and notes submitted to, or presented at, the second
congress of the International Torah Codes Society in Jerusalem, Israel, June
2000.
|
[
{
"version": "v1",
"created": "Mon, 24 Jan 2011 00:53:30 GMT"
}
] | 2011-01-28T00:00:00 |
[
[
"Croll",
"Grenville J.",
""
]
] |
new_dataset
| 0.999916 |
1001.4023
|
Thierry Bouche
|
Thierry Bouche (IF, CCDNM)
|
Digital Mathematics Libraries: The Good, the Bad, the Ugly
| null |
Mathematics in Computer Science 3, 3 (2010) 227-241
|
10.1007/s11786-010-0029-2
| null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The idea of a World digital mathematics library (DML) has been around since
the turn of the 21th century. We feel that it is time to make it a reality,
starting in a modest way from successful bricks that have already been built,
but with an ambitious goal in mind. After a brief historical overview of
publishing mathematics, an estimate of the size and a characterisation of the
bulk of documents to be included in the DML, we turn to proposing a model for a
Reference Digital Mathematics Library--a network of institutions where the
digital documents would be physically archived. This pattern based rather on
the bottom-up strategy seems to be more practicable and consistent with the
digital nature of the DML. After describing the model we summarise what can and
should be done in order to accomplish the vision. The current state of some of
the local libraries that could contribute to the global views are described
with more details.
|
[
{
"version": "v1",
"created": "Fri, 22 Jan 2010 15:26:51 GMT"
}
] | 2011-01-25T00:00:00 |
[
[
"Bouche",
"Thierry",
"",
"IF, CCDNM"
]
] |
new_dataset
| 0.994356 |
1101.4426
|
EPTCS
|
Mariangiola Dezani-Ciancaglini, Paola Giannini, Elena Zucca
|
Intersection types for unbind and rebind
|
In Proceedings ITRS 2010, arXiv:1101.4104
|
EPTCS 45, 2011, pp. 45-58
|
10.4204/EPTCS.45.4
| null |
cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define a type system with intersection types for an extension of
lambda-calculus with unbind and rebind operators. In this calculus, a term with
free variables, representing open code, can be packed into an "unbound" term,
and passed around as a value. In order to execute inside code, an unbound term
should be explicitly rebound at the point where it is used. Unbinding and
rebinding are hierarchical, that is, the term can contain arbitrarily nested
unbound terms, whose inside code can only be executed after a sequence of
rebinds has been applied. Correspondingly, types are decorated with levels, and
a term has type decorated with k if it needs k rebinds in order to reduce to a
value. With intersection types we model the fact that a term can be used
differently in contexts providing different numbers of unbinds. In particular,
top-level terms, that is, terms not requiring unbinds to reduce to values,
should have a value type, that is, an intersection type where at least one
element has level 0. With the proposed intersection type system we get
soundness under the call-by-value strategy, an issue which was not resolved by
previous type systems.
|
[
{
"version": "v1",
"created": "Mon, 24 Jan 2011 01:39:37 GMT"
}
] | 2011-01-25T00:00:00 |
[
[
"Dezani-Ciancaglini",
"Mariangiola",
""
],
[
"Giannini",
"Paola",
""
],
[
"Zucca",
"Elena",
""
]
] |
new_dataset
| 0.995712 |
1101.4554
|
Mario Alviano
|
Francesco Ricca, Giovanni Grasso, Mario Alviano, Marco Manna,
Vincenzino Lio, Salvatore Iiritano, Nicola Leone
|
Team-building with Answer Set Programming in the Gioia-Tauro Seaport
|
21 pages, 2 figures, to appear in Theory and Practice of Logic
Programming (TPLP)
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
(To appear in Theory and Practice of Logic Programming (TPLP).)
The seaport of Gioia Tauro is the largest transshipment terminal of the
Mediterranean coast. A crucial management task for the companies operating in
the seaport is team building: the problem of properly allocating the available
personnel for serving the incoming ships. Teams have to be carefully arranged
in order to meet several constraints, such as allocation of the employees with
the appropriate skills, fair distribution of the working load, and turnover of
the heavy/dangerous roles. This makes team building a hard and expensive task
requiring several hours per day of manual preparation.
In this paper we present a system based on Answer Set Programming (ASP) for
the automatic generation of the teams of employees in the seaport of Gioia
Tauro. The system is currently exploited in the Gioia Tauro seaport by ICO BLG,
a company specialized in automobile logistics.
|
[
{
"version": "v1",
"created": "Mon, 24 Jan 2011 14:50:57 GMT"
}
] | 2011-01-25T00:00:00 |
[
[
"Ricca",
"Francesco",
""
],
[
"Grasso",
"Giovanni",
""
],
[
"Alviano",
"Mario",
""
],
[
"Manna",
"Marco",
""
],
[
"Lio",
"Vincenzino",
""
],
[
"Iiritano",
"Salvatore",
""
],
[
"Leone",
"Nicola",
""
]
] |
new_dataset
| 0.990941 |
1101.4632
|
Serguei Mokhov
|
Serguei A. Mokhov and Marc-Andr\'e Laverdi\`ere and Ali Benssam and
Djamel Benredjem
|
A Secure Web-Based File Exchange Server: Software Requirements
Specification Document
|
13 pages, 3 figures; a December 2005 report
| null | null | null |
cs.CR
|
http://creativecommons.org/licenses/by/3.0/
|
This document presents brief software specification of a secure file exchange
system prototype involving mutual authentication of the users via their browser
and the application server with PKI-based certificates as credentials, the use
of LDAP for credential management, and authentication between the application
and database servers to maintain a high level of trust between all parties.
|
[
{
"version": "v1",
"created": "Mon, 24 Jan 2011 19:49:14 GMT"
}
] | 2011-01-25T00:00:00 |
[
[
"Mokhov",
"Serguei A.",
""
],
[
"Laverdière",
"Marc-André",
""
],
[
"Benssam",
"Ali",
""
],
[
"Benredjem",
"Djamel",
""
]
] |
new_dataset
| 0.979926 |
1101.3953
|
Barry Wittman
|
Greg N. Frederickson and Barry Wittman
|
Two Multivehicle Routing Problems with Unit-Time Windows
|
7 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Two multivehicle routing problems are considered in the framework that a
visit to a location must take place during a specific time window in order to
be counted and all time windows are the same length. In the first problem, the
goal is to visit as many locations as possible using a fixed number of
vehicles. In the second, the goal is to visit all locations using the smallest
number of vehicles possible. For the first problem, we present an approximation
algorithm whose output path collects a reward within a constant factor of
optimal for any fixed number of vehicles. For the second problem, our algorithm
finds a 6-approximation to the problem on a tree metric, whenever a single
vehicle could visit all locations during their time windows.
|
[
{
"version": "v1",
"created": "Thu, 20 Jan 2011 16:39:00 GMT"
}
] | 2011-01-21T00:00:00 |
[
[
"Frederickson",
"Greg N.",
""
],
[
"Wittman",
"Barry",
""
]
] |
new_dataset
| 0.993889 |
1101.3960
|
Barry Wittman
|
Greg N. Frederickson and Barry Wittman
|
Speedup in the Traveling Repairman Problem with Constrained Time Windows
|
28 pages, 3 figures
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A bicriteria approximation algorithm is presented for the unrooted traveling
repairman problem, realizing increased profit in return for increased speedup
of repairman motion. The algorithm generalizes previous results from the case
in which all time windows are the same length to the case in which their
lengths can range between l and 2. This analysis can extend to any range of
time window lengths, following our earlier techniques. This relationship
between repairman profit and speedup is applicable over a range of values that
is dependent on the cost of putting the input in an especially desirable form,
involving what are called "trimmed windows." For time windows with lengths
between 1 and 2, the range of values for speedup $s$ for which our analysis
holds is $1 \leq s \leq 6$. In this range, we establish an approximation ratio
that is constant for any specific value of $s$.
|
[
{
"version": "v1",
"created": "Thu, 20 Jan 2011 16:51:55 GMT"
}
] | 2011-01-21T00:00:00 |
[
[
"Frederickson",
"Greg N.",
""
],
[
"Wittman",
"Barry",
""
]
] |
new_dataset
| 0.975435 |
1005.1395
|
Leonardo Ermann
|
L. Ermann, A. D. Chepelianskii and D. L. Shepelyansky
|
Fractal Weyl law for Linux Kernel Architecture
|
RevTex 6 pages, 7 figs, linked to arXiv:1003.5455[cs.SE]. Research at
http://www.quantware.ups-tlse.fr/, Improved version, changed format
|
Eur. Phys. J. B 79, 115-120 (2011)
|
10.1140/epjb/e2010-10774-7
| null |
cs.CE cond-mat.dis-nn nlin.CD physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the properties of spectrum and eigenstates of the Google matrix of a
directed network formed by the procedure calls in the Linux Kernel. Our results
obtained for various versions of the Linux Kernel show that the spectrum is
characterized by the fractal Weyl law established recently for systems of
quantum chaotic scattering and the Perron-Frobenius operators of dynamical
maps. The fractal Weyl exponent is found to be $\nu \approx 0.63$ that
corresponds to the fractal dimension of the network $d \approx 1.2$. The
eigenmodes of the Google matrix of Linux Kernel are localized on certain
principal nodes. We argue that the fractal Weyl law should be generic for
directed networks with the fractal dimension $d<2$.
|
[
{
"version": "v1",
"created": "Sun, 9 May 2010 13:25:58 GMT"
},
{
"version": "v2",
"created": "Tue, 11 May 2010 08:57:24 GMT"
},
{
"version": "v3",
"created": "Thu, 16 Sep 2010 08:54:42 GMT"
}
] | 2011-01-20T00:00:00 |
[
[
"Ermann",
"L.",
""
],
[
"Chepelianskii",
"A. D.",
""
],
[
"Shepelyansky",
"D. L.",
""
]
] |
new_dataset
| 0.999017 |
1101.3443
|
Olivier Finkel
|
Olivier Finkel (ELM)
|
Borel Hierarchy and Omega Context Free Languages
| null |
Theoretical Computer Science 290 (3) (2003) 1385-1405
| null | null |
cs.LO math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give in this paper additional answers to questions of Lescow and Thomas
[Logical Specifications of Infinite Computations, In:"A Decade of Concurrency",
Springer LNCS 803 (1994), 583-621], proving new topological properties of omega
context free languages : there exist some omega-CFL which are non Borel sets.
And one cannot decide whether an omega-CFL is a Borel set. We give also an
answer to questions of Niwinski and Simonnet about omega powers of finitary
languages, giving an example of a finitary context free language L such that
L^omega is not a Borel set. Then we prove some recursive analogues to preceding
properties: in particular one cannot decide whether an omega-CFL is an
arithmetical set.
|
[
{
"version": "v1",
"created": "Tue, 18 Jan 2011 12:40:06 GMT"
}
] | 2011-01-20T00:00:00 |
[
[
"Finkel",
"Olivier",
"",
"ELM"
]
] |
new_dataset
| 0.996176 |
1003.1738
|
Mai Vu
|
Mai Vu
|
MISO Capacity with Per-Antenna Power Constraint
|
7 pages double-column, 3 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We establish in closed-form the capacity and the optimal signaling scheme for
a MISO channel with per-antenna power constraint. Two cases of channel state
information are considered: constant channel known at both the transmitter and
receiver, and Rayleigh fading channel known only at the receiver. For the first
case, the optimal signaling scheme is beamforming with the phases of the beam
weights matched to the phases of the channel coefficients, but the amplitudes
independent of the channel coefficients and dependent only on the constrained
powers. For the second case, the optimal scheme is to send independent signals
from the antennas with the constrained powers. In both cases, the capacity with
per-antenna power constraint is usually less than that with sum power
constraint.
|
[
{
"version": "v1",
"created": "Mon, 8 Mar 2010 21:53:05 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Jan 2011 16:37:34 GMT"
}
] | 2011-01-19T00:00:00 |
[
[
"Vu",
"Mai",
""
]
] |
new_dataset
| 0.961345 |
1101.3124
|
Xinyu Xing
|
Xinyu Xing, Yu-Li Liang, Hanqiang Cheng, Jianxun Dang, Sui Huang,
Richard Han, Xue Liu, Qin Lv, Shivakant Mishra
|
SafeVchat: Detecting Obscene Content and Misbehaving Users in Online
Video Chat Services
|
The 20th International World Wide Web Conference (WWW 2011)
| null | null | null |
cs.CR cs.CV cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Online video chat services such as Chatroulette, Omegle, and vChatter that
randomly match pairs of users in video chat sessions are fast becoming very
popular, with over a million users per month in the case of Chatroulette. A key
problem encountered in such systems is the presence of flashers and obscene
content. This problem is especially acute given the presence of underage minors
in such systems. This paper presents SafeVchat, a novel solution to the problem
of flasher detection that employs an array of image detection algorithms. A key
contribution of the paper concerns how the results of the individual detectors
are fused together into an overall decision classifying the user as misbehaving
or not, based on Dempster-Shafer Theory. The paper introduces a novel,
motion-based skin detection method that achieves significantly higher recall
and better precision. The proposed methods have been evaluated over real world
data and image traces obtained from Chatroulette.com.
|
[
{
"version": "v1",
"created": "Mon, 17 Jan 2011 05:11:04 GMT"
}
] | 2011-01-19T00:00:00 |
[
[
"Xing",
"Xinyu",
""
],
[
"Liang",
"Yu-Li",
""
],
[
"Cheng",
"Hanqiang",
""
],
[
"Dang",
"Jianxun",
""
],
[
"Huang",
"Sui",
""
],
[
"Han",
"Richard",
""
],
[
"Liu",
"Xue",
""
],
[
"Lv",
"Qin",
""
],
[
"Mishra",
"Shivakant",
""
]
] |
new_dataset
| 0.996017 |
1101.3398
|
Wenping Ma
|
Wenping Ma
|
New Quadriphase Sequences families with Larger Linear Span and Size
| null | null | null | null |
cs.IT math.IT
|
http://creativecommons.org/licenses/by/3.0/
|
In this paper, new families of quadriphase sequences with larger linear span
and size have been proposed and studied. In particular, a new family of
quadriphase sequences of period $2^n-1$ for a positive integer $n=em$ with an
even positive factor $m$ is presented, the cross-correlation function among
these sequences has been explicitly calculated. Another new family of
quadriphase sequences of period $2(2^n-1)$ for a positive integer $n=em$ with
an even positive factor $m$ is also presented, a detailed analysis of the
cross-correlation function of proposed sequences has also been presented.
|
[
{
"version": "v1",
"created": "Tue, 18 Jan 2011 08:35:50 GMT"
}
] | 2011-01-19T00:00:00 |
[
[
"Ma",
"Wenping",
""
]
] |
new_dataset
| 0.999823 |
1101.2577
|
Prabhu D
|
D.Prabhu (1) and M.Adimoolam (2) ((1) Dept of Information Technology,
Mailam Engineering College, Mailam (Affiliated to Anna University of
Technology, Chennai) (2) Lecturer, Dept of Information Technology, Christ
College of Engineering and Technology, (Affiliated to Pondicherry University,
Puducherry))
|
Bi-serial DNA Encryption Algorithm(BDEA)
| null | null | null | null |
cs.CR math.NT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The vast parallelism, exceptional energy efficiency and extraordinary
information inherent in DNA molecules are being explored for computing, data
storage and cryptography. DNA cryptography is a emerging field of cryptography.
In this paper a novel encryption algorithm is devised based on number
conversion, DNA digital coding, PCR amplification, which can effectively
prevent attack. Data treatment is used to transform the plain text into cipher
text which provides excellent security
|
[
{
"version": "v1",
"created": "Thu, 13 Jan 2011 15:08:32 GMT"
}
] | 2011-01-14T00:00:00 |
[
[
"Prabhu",
"D.",
""
],
[
"Adimoolam",
"M.",
""
]
] |
new_dataset
| 0.996513 |
1101.2219
|
Serguei Mokhov
|
Elizaveta Eidelman and Serguei A. Mokhov
|
Alchymical Mirror: Real-time Interactive Sound- and Simple
Motion-Tracking Set of Jitter/Max/MSP Patches
|
13 pages; a December 2005 report; video is not included into the
arXiv submission; Jitter language patches are not replicated in this version
| null | null | null |
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This document supplements an experimental Jitter / Max/MSP collection of
implementation patches that set its goal to simulate an alchemical process for
a person standing in front of a mirror-like screen while interacting with it.
The work involved takes some patience and has three stages to go through. At
the final stage the "alchemist" in the mirror wearing sharp-colored gloves (for
motion tracking) is to extract the final ultimate shining sparkle (FFT-based
visualization) in the nexus of the hands. The more the hands are apart, the
large the sparkle should be. Moving hands around should make the sparkle
follow. To achieve the desired visual effect and the feedback mechanism, the
Jitter lattice-based intensional programming model is used to work on
4-dimensional (A+R+G+B) video matrices and sound signals in order to apply some
well-known alchemical techniques to the video at real-time to get a mirror
effect and accompanying transmutation and transformation stages of the video
based on the stability of the sound produced for some duration of time in
real-time. There is an accompanying video of the result with the interaction
with the tool and the corresponding programming patches.
|
[
{
"version": "v1",
"created": "Wed, 5 Jan 2011 18:43:30 GMT"
}
] | 2011-01-13T00:00:00 |
[
[
"Eidelman",
"Elizaveta",
""
],
[
"Mokhov",
"Serguei A.",
""
]
] |
new_dataset
| 0.991601 |
1101.1602
|
Jasni Mohamad Zain
|
Nor Amizam Jusoh, Jasni Mohamad Zain
|
Application of Freeman Chain Codes: An Alternative Recognition Technique
for Malaysian Car Plates
|
6 pages, 8 figures
|
International Journal of Computer Science and Network Security,
Vol. 9 No. 11 pp. 222-227, November 2009, ISSN 1738-7906
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Various applications of car plate recognition systems have been developed
using various kinds of methods and techniques by researchers all over the
world. The applications developed were only suitable for specific country due
to its standard specification endorsed by the transport department of
particular countries. The Road Transport Department of Malaysia also has
endorsed a specification for car plates that includes the font and size of
characters that must be followed by car owners. However, there are cases where
this specification is not followed. Several applications have been developed in
Malaysia to overcome this problem. However, there is still problem in achieving
100% recognition accuracy. This paper is mainly focused on conducting an
experiment using chain codes technique to perform recognition for different
types of fonts used in Malaysian car plates.
|
[
{
"version": "v1",
"created": "Sat, 8 Jan 2011 16:22:20 GMT"
}
] | 2011-01-11T00:00:00 |
[
[
"Jusoh",
"Nor Amizam",
""
],
[
"Zain",
"Jasni Mohamad",
""
]
] |
new_dataset
| 0.975447 |
1101.1680
|
Ted Herman
|
Ted Herman
|
Safe Register Token Transfer in a Ring
|
22 pages
| null | null |
TR-11-01
|
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A token ring is an arrangement of N processors that take turns engaging in an
activity which must be controlled. A token confers the right to engage in the
controlled activity. Processors communicate with neighbors in the ring to
obtain and release a token. The communication mechanism investigated in this
paper is the safe register abstraction, which may arbitrarily corrupt a value
that a processor reads when the operation reading a register is concurrent with
an write operation on that register by a neighboring processor. The main
results are simple protocols for quasi-atomic communication, constructed from
safe registers. A quasi-atomic register behaves atomically except that a
special undefined value may be returned in the case of concurrent read and
write operations. Under certain conditions that constrain the number of writes
and registers, quasi-atomic protocols are adequate substitutes for atomic
protocols. The paper demonstrates how quasi-atomic protocols can be used to
implement a self-stabilizing token ring, either by using two safe registers
between neighboring processors or by using O(lg N) safe registers between
neighbors, which lowers read complexity.
|
[
{
"version": "v1",
"created": "Sun, 9 Jan 2011 22:24:44 GMT"
}
] | 2011-01-11T00:00:00 |
[
[
"Herman",
"Ted",
""
]
] |
new_dataset
| 0.99839 |
1101.1240
|
Lin Zhong
|
Mian Dong and Lin Zhong
|
Chameleon: A Color-Adaptive Web Browser for Mobile OLED Displays
| null | null | null | null |
cs.GR cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Displays based on organic light-emitting diode (OLED) technology are
appearing on many mobile devices. Unlike liquid crystal displays (LCD), OLED
displays consume dramatically different power for showing different colors. In
particular, OLED displays are inefficient for showing bright colors. This has
made them undesirable for mobile devices because much of the web content is of
bright colors.
To tackle this problem, we present the motivational studies, design, and
realization of Chameleon, a color adaptive web browser that renders web pages
with power-optimized color schemes under user-supplied constraints. Driven by
the findings from our motivational studies, Chameleon provides end users with
important options, offloads tasks that are not absolutely needed in real-time,
and accomplishes real-time tasks by carefully enhancing the codebase of a
browser engine. According to measure-ments with OLED smartphones, Chameleon is
able to re-duce average system power consumption for web browsing by 41% and
reduce display power consumption by 64% without introducing any noticeable
delay.
|
[
{
"version": "v1",
"created": "Mon, 13 Dec 2010 18:45:13 GMT"
}
] | 2011-01-07T00:00:00 |
[
[
"Dong",
"Mian",
""
],
[
"Zhong",
"Lin",
""
]
] |
new_dataset
| 0.999428 |
1101.1256
|
Christoph Durr
|
Johanne Cohen, Christoph Durr and Nguyen Kim Thang
|
Non-clairvoyant Scheduling Games
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a scheduling game, each player owns a job and chooses a machine to execute
it. While the social cost is the maximal load over all machines (makespan), the
cost (disutility) of each player is the completion time of its own job. In the
game, players may follow selfish strategies to optimize their cost and
therefore their behaviors do not necessarily lead the game to an equilibrium.
Even in the case there is an equilibrium, its makespan might be much larger
than the social optimum, and this inefficiency is measured by the price of
anarchy -- the worst ratio between the makespan of an equilibrium and the
optimum. Coordination mechanisms aim to reduce the price of anarchy by
designing scheduling policies that specify how jobs assigned to a same machine
are to be scheduled. Typically these policies define the schedule according to
the processing times as announced by the jobs. One could wonder if there are
policies that do not require this knowledge, and still provide a good price of
anarchy. This would make the processing times be private information and avoid
the problem of truthfulness. In this paper we study these so-called
non-clairvoyant policies. In particular, we study the RANDOM policy that
schedules the jobs in a random order without preemption, and the EQUI policy
that schedules the jobs in parallel using time-multiplexing, assigning each job
an equal fraction of CPU time.
|
[
{
"version": "v1",
"created": "Thu, 6 Jan 2011 17:05:50 GMT"
}
] | 2011-01-07T00:00:00 |
[
[
"Cohen",
"Johanne",
""
],
[
"Durr",
"Christoph",
""
],
[
"Thang",
"Nguyen Kim",
""
]
] |
new_dataset
| 0.986821 |
1004.4727
|
Krzysztof R. Apt
|
Krzysztof R. Apt
|
Direct Proofs of Order Independence
|
9 pages
|
Economics Bulletin, Vol. 31 no. 1 pp. 106-115 (2011)
| null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We establish a generic result concerning order independence of a dominance
relation on finite games. It allows us to draw conclusions about order
independence of various dominance relations in a direct and simple way.
|
[
{
"version": "v1",
"created": "Tue, 27 Apr 2010 07:17:50 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Jan 2011 07:14:10 GMT"
}
] | 2011-01-06T00:00:00 |
[
[
"Apt",
"Krzysztof R.",
""
]
] |
new_dataset
| 0.960932 |
1101.0964
|
Yota Otachi
|
Yota Otachi and Ryohei Suda
|
Bandwidth and pathwidth of three-dimensional grids
|
11 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the bandwidth and the pathwidth of multi-dimensional grids. It can
be shown for grids, that these two parameters are equal to a more basic graph
parameter, the vertex boundary width. Using this fact, we determine the
bandwidth and the pathwidth of three-dimensional grids, which were known only
for the cubic case. As a by-product, we also determine the two parameters of
multi-dimensional grids with relatively large maximum factors.
|
[
{
"version": "v1",
"created": "Wed, 5 Jan 2011 13:29:38 GMT"
}
] | 2011-01-06T00:00:00 |
[
[
"Otachi",
"Yota",
""
],
[
"Suda",
"Ryohei",
""
]
] |
new_dataset
| 0.993216 |
1101.0640
|
Chandra Nair
|
Chandra Nair
|
A note on outer bounds for broadcast channel
|
This was presented in the International Zurich Seminar 2010. This is
just for a documented proof of the result
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this note we establish two facts concerning the so-called {\em New-Jersey}
outer bound. We show that this outer bound is equivalent to a much simpler {\em
computable} region; and secondly we show that in the absence of private
information this bound is exactly same as the $UV$-outerbound.
|
[
{
"version": "v1",
"created": "Tue, 4 Jan 2011 02:28:37 GMT"
}
] | 2011-01-05T00:00:00 |
[
[
"Nair",
"Chandra",
""
]
] |
new_dataset
| 0.980472 |
1101.0664
|
Evgenii Vorozhtsov
|
G.A. Tarnavsky and E.V. Vorozhtsov
|
Computer Simulation Center in Internet
|
12 pages, 8 figures
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The general description of infrastructure and content of SciShop.ru computer
simulation center is given. This resource is a new form of knowledge generation
and remote education using modern Cloud Computing technologies.
|
[
{
"version": "v1",
"created": "Tue, 4 Jan 2011 06:58:07 GMT"
}
] | 2011-01-05T00:00:00 |
[
[
"Tarnavsky",
"G. A.",
""
],
[
"Vorozhtsov",
"E. V.",
""
]
] |
new_dataset
| 0.983366 |
0705.2106
|
Finn {\AA}rup Nielsen
|
Finn Aarup Nielsen
|
Scientific citations in Wikipedia
|
5 pages, 2 figures
|
First Monday, 12(8), 2007 August
| null | null |
cs.DL cs.IR
| null |
The Internet-based encyclopaedia Wikipedia has grown to become one of the
most visited web-sites on the Internet. However, critics have questioned the
quality of entries, and an empirical study has shown Wikipedia to contain
errors in a 2005 sample of science entries. Biased coverage and lack of sources
are among the "Wikipedia risks". The present work describes a simple assessment
of these aspects by examining the outbound links from Wikipedia articles to
articles in scientific journals with a comparison against journal statistics
from Journal Citation Reports such as impact factors. The results show an
increasing use of structured citation markup and good agreement with the
citation pattern seen in the scientific literature though with a slight
tendency to cite articles in high-impact journals such as Nature and Science.
These results increase confidence in Wikipedia as an good information organizer
for science in general.
|
[
{
"version": "v1",
"created": "Tue, 15 May 2007 09:42:30 GMT"
}
] | 2011-01-04T00:00:00 |
[
[
"Nielsen",
"Finn Aarup",
""
]
] |
new_dataset
| 0.997115 |
1006.4903
|
Frank Sottile
|
Luis David Garcia-Puente, Frank Sottile, Chungang Zhu
|
Toric degenerations of Bezier patches
|
21 pages, many .eps figures
| null | null | null |
cs.GR math.AG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The control polygon of a Bezier curve is well-defined and has geometric
significance---there is a sequence of weights under which the limiting position
of the curve is the control polygon. For a Bezier surface patch, there are many
possible polyhedral control structures, and none are canonical. We propose a
not necessarily polyhedral control structure for surface patches, regular
control surfaces, which are certain C^0 spline surfaces. While not unique,
regular control surfaces are exactly the possible limiting positions of a
Bezier patch when the weights are allowed to vary.
|
[
{
"version": "v1",
"created": "Fri, 25 Jun 2010 03:11:37 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Dec 2010 05:17:12 GMT"
}
] | 2011-01-04T00:00:00 |
[
[
"Garcia-Puente",
"Luis David",
""
],
[
"Sottile",
"Frank",
""
],
[
"Zhu",
"Chungang",
""
]
] |
new_dataset
| 0.998245 |
1012.5962
|
Jose Hernandez-Orallo
|
Jose Hernandez-Orallo
|
Annotated English
|
Keywords: English spelling, English pronunciation, Phonetic rules,
Diacritics, Pronunciation without Respelling, Spelling Reform. 68 pages
| null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
This document presents Annotated English, a system of diacritical symbols
which turns English pronunciation into a precise and unambiguous process. The
annotations are defined and located in such a way that the original English
text is not altered (not even a letter), thus allowing for a consistent reading
and learning of the English language with and without annotations. The
annotations are based on a set of general rules that make the frequency of
annotations not dramatically high. This makes the reader easily associate
annotations with exceptions, and makes it possible to shape, internalise and
consolidate some rules for the English language which otherwise are weakened by
the enormous amount of exceptions in English pronunciation. The advantages of
this annotation system are manifold. Any existing text can be annotated without
a significant increase in size. This means that we can get an annotated version
of any document or book with the same number of pages and fontsize. Since no
letter is affected, the text can be perfectly read by a person who does not
know the annotation rules, since annotations can be simply ignored. The
annotations are based on a set of rules which can be progressively learned and
recognised, even in cases where the reader has no access or time to read the
rules. This means that a reader can understand most of the annotations after
reading a few pages of Annotated English, and can take advantage from that
knowledge for any other annotated document she may read in the future.
|
[
{
"version": "v1",
"created": "Wed, 29 Dec 2010 15:40:09 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Dec 2010 10:21:09 GMT"
}
] | 2011-01-04T00:00:00 |
[
[
"Hernandez-Orallo",
"Jose",
""
]
] |
new_dataset
| 0.982082 |
1101.0093
|
Georg Hager
|
Markus Wittmann and Georg Hager
|
Optimizing ccNUMA locality for task-parallel execution under OpenMP and
TBB on multicore-based systems
|
9 pages, 4 figures
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Task parallelism as employed by the OpenMP task construct or some Intel
Threading Building Blocks (TBB) components, although ideal for tackling
irregular problems or typical producer/consumer schemes, bears some potential
for performance bottlenecks if locality of data access is important, which is
typically the case for memory-bound code on ccNUMA systems. We present a thin
software layer ameliorates adverse effects of dynamic task distribution by
sorting tasks into locality queues, each of which is preferably processed by
threads that belong to the same locality domain. Dynamic scheduling is fully
preserved inside each domain, and is preferred over possible load imbalance
even if nonlocal access is required, making this strategy well-suited for
typical multicore-mutisocket systems. The effectiveness of the approach is
demonstrated by using a blocked six-point stencil solver as a toy model.
|
[
{
"version": "v1",
"created": "Thu, 30 Dec 2010 14:55:02 GMT"
}
] | 2011-01-04T00:00:00 |
[
[
"Wittmann",
"Markus",
""
],
[
"Hager",
"Georg",
""
]
] |
new_dataset
| 0.993938 |
1101.0234
|
Michael Lew
|
Ruoyun Gao, Michael S. Lew, Ling Shao
|
Dynamic Feature Description in Human Action Recognition
| null | null | null |
LML20090701
|
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work aims to present novel description methods for human action
recognition. Generally, a video sequence can be represented as a collection of
spatial temporal words by detecting space-time interest points and describing
the unique features around the detected points (Bag of Words representation).
Interest points as well as the cuboids around them are considered informative
for feature description in terms of both the structural distribution of
interest points and the information content inside the cuboids. Our proposed
description approaches are based on this idea and making the feature
descriptors more discriminative.
|
[
{
"version": "v1",
"created": "Fri, 31 Dec 2010 12:06:11 GMT"
}
] | 2011-01-04T00:00:00 |
[
[
"Gao",
"Ruoyun",
""
],
[
"Lew",
"Michael S.",
""
],
[
"Shao",
"Ling",
""
]
] |
new_dataset
| 0.974441 |
1101.0262
|
Sugreev Kaur
|
Sugreev Kaur, Rajesh Mehra
|
High Speed and Area Efficient 2D DWT Processor based Image Compression"
Signal & Image Processing
|
10 Pages, 9 figures
| null | null | null |
cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a high speed and area efficient DWT processor based
design for Image Compression applications. In this proposed design, pipelined
partially serial architecture has been used to enhance the speed along with
optimal utilization and resources available on target FPGA. The proposed model
has been designed and simulated using Simulink and System Generator blocks,
synthesized with Xilinx Synthesis tool (XST) and implemented on Spartan 2 and 3
based XC2S100-5tq144 and XC3S500E-4fg320 target device. The results show that
proposed design can operate at maximum frequency 231 MHz in case of Spartan 3
by consuming power of 117mW at 28 degree/c junction temperature. The result
comparison has shown an improvement of 15% in speed.
|
[
{
"version": "v1",
"created": "Fri, 31 Dec 2010 14:34:06 GMT"
}
] | 2011-01-04T00:00:00 |
[
[
"Kaur",
"Sugreev",
""
],
[
"Mehra",
"Rajesh",
""
]
] |
new_dataset
| 0.975392 |
1101.0530
|
Maurice Margenstern
|
Maurice Margenstern
|
Coordinates for a new triangular tiling of the hyperbolic plane
|
15 pages, 8 figures, 3 tables
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we define an infinite family of triangular tilings of the
hyperbolic plane defined by two parameters ranging in the natural nummbers and
we give a uniform way to define coordinates for locating the triangles of the
tiling.
|
[
{
"version": "v1",
"created": "Mon, 3 Jan 2011 14:39:40 GMT"
}
] | 2011-01-04T00:00:00 |
[
[
"Margenstern",
"Maurice",
""
]
] |
new_dataset
| 0.997525 |
1012.1334
|
Pierre Guillon
|
Pablo Arrighi (LIG), Vincent Fabrice Nesme
|
The Block Neighborhood
|
Journ\'ees Automates Cellulaires 2010, Turku : Finland (2010)
| null | null | null |
cs.DM cs.FL nlin.CG quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define the block neighborhood of a reversible CA, which is related both to
its decomposition into a product of block permutations and to quantum
computing. We give a purely combinatorial characterization of the block
neighborhood, which helps in two ways. First, it makes the computation of the
block neighborhood of a given CA relatively easy. Second, it allows us to
derive upper bounds on the block neighborhood: for a single CA as function of
the classical and inverse neighborhoods, and for the composition of several
CAs. One consequence of that is a characterization of a class of "elementary"
CAs that cannot be written as the composition of two simpler parts whose
neighborhoods and inverse neighborhoods would be reduced by one half.
|
[
{
"version": "v1",
"created": "Fri, 3 Dec 2010 10:07:13 GMT"
}
] | 2010-12-30T00:00:00 |
[
[
"Arrighi",
"Pablo",
"",
"LIG"
],
[
"Nesme",
"Vincent Fabrice",
""
]
] |
new_dataset
| 0.992774 |
1012.5498
|
Somphong Jitman
|
Somphong Jitman, San Ling, Hongwei Liu, and Xiaoli Xie
|
Checkable Codes from Group Rings
|
9 pages, 4 tables, Submitted to IEEE Transactions on Information
Theory, December 2010
| null | null | null |
cs.IT math.AC math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study codes with a single check element derived from group rings, namely,
checkable codes. The notion of a code-checkable group ring is introduced.
Necessary and sufficient conditions for a group ring to be code-checkable are
given in the case where the group is a finite abelian group and the ring is a
finite field. This characterization leads to many good examples, among which
two checkable codes and two shortened codes have minimum distance better than
the lower bound given in Grassl's online table. Furthermore, when a group ring
is code-checkable, it is shown that every code in such a group ring admits a
generator, and that its dual is also generated by an element which may be
deduced directly from a check element of the original code. These are analogous
to the generator and parity-check polynomials of cyclic codes. In addition, the
structures of reversible and complementary dual checkable codes are established
as generalizations of reversible and complementary dual cyclic codes.
|
[
{
"version": "v1",
"created": "Sun, 26 Dec 2010 08:34:06 GMT"
}
] | 2010-12-30T00:00:00 |
[
[
"Jitman",
"Somphong",
""
],
[
"Ling",
"San",
""
],
[
"Liu",
"Hongwei",
""
],
[
"Xie",
"Xiaoli",
""
]
] |
new_dataset
| 0.999659 |
1012.5594
|
Kush Agrawal
|
Kush Agrawal
|
The Ethics of Robotics
|
8 pages, 1 figure
| null | null | null |
cs.AI cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The three laws of Robotics first appeared together in Isaac Asimov's story
'Runaround' after being mentioned in some form or the other in previous works
by Asimov. These three laws commonly known as the three laws of robotics are
the earliest forms of depiction for the needs of ethics in Robotics. In
simplistic language Isaac Asimov is able to explain what rules a robot must
confine itself to in order to maintain societal sanctity. However, even though
they are outdated they still represent some of our innate fears which are
beginning to resurface in present day 21st Century. Our society is on the
advent of a new revolution; a revolution led by advances in Computer Science,
Artificial Intelligence & Nanotechnology. Some of our advances have been so
phenomenal that we surpassed what was predicted by the Moore's law. With these
advancements comes the fear that our future may be at the mercy of these
androids. Humans today are scared that we, ourselves, might create something
which we cannot control. We may end up creating something which can not only
learn much faster than anyone of us can, but also evolve faster than what the
theory of evolution has allowed us to. The greatest fear is not only that we
might lose our jobs to these intelligent beings, but that these beings might
end up replacing us at the top of the cycle. The public hysteria has been
heightened more so by a number of cultural works which depict annihilation of
the human race by robots. Right from Frankenstein to I, Robot mass media has
also depicted such issues. This paper is an effort to understand the need for
ethics in Robotics or simply termed as Roboethics. This is achieved by the
study of artificial beings and the thought being put behind them. By the end of
the paper, however, it is concluded that there isn't a need for ethical robots
but more so ever a need for ethical roboticists.
|
[
{
"version": "v1",
"created": "Mon, 27 Dec 2010 11:14:56 GMT"
}
] | 2010-12-30T00:00:00 |
[
[
"Agrawal",
"Kush",
""
]
] |
new_dataset
| 0.996453 |
1008.2857
|
Aydin Sezgin
|
Aydin Sezgin, Holger Boche, and Amir Salman Avestimehr
|
Bidirectional multi-pair network with a MIMO relay: Beamforming
strategies and lack of duality
|
Allerton 2010, updated the references
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We address the problem of a multi-user relay network, where multiple
single-antenna node pairs want to exchange information by using a multiple
antenna relay node. Due to the half-duplex constraint of the relay, the
exchange of information takes place in two steps. In the first step, the nodes
transmit their data to the relay, while in the second step, the relay is
broadcasting the data by using linear and non-linear precoding strategies. We
focus on the second step in this paper. We first consider the problem of
maximizing the overall rate achievable using linear and dirty-paper type
precoding strategies at the relay. Then, we consider minimizing the total power
at the relay subject to individual SINR constraints using the same strategies
at the relay. We show that the downlink-uplink duality does not hold for the
setup considered here, which is a somewhat surprising result. We also show that
the beamforming strategy which is optimal in the single-pair case performs very
well in the multi-pair case for practically relevant SNR. The results are
illustrated by numerical simulations.
|
[
{
"version": "v1",
"created": "Tue, 17 Aug 2010 10:02:03 GMT"
},
{
"version": "v2",
"created": "Sat, 4 Dec 2010 21:06:26 GMT"
},
{
"version": "v3",
"created": "Wed, 22 Dec 2010 10:15:57 GMT"
}
] | 2010-12-23T00:00:00 |
[
[
"Sezgin",
"Aydin",
""
],
[
"Boche",
"Holger",
""
],
[
"Avestimehr",
"Amir Salman",
""
]
] |
new_dataset
| 0.957167 |
1012.4881
|
Deniz Sarioz
|
Deniz Sarioz
|
Generalized Delaunay Graphs with respect to any Convex Set are Plane
Graphs
|
3 pages, 0 figures. Keywords: geometric graphs, Delaunay graphs,
scaled translates, convex sets, planarity
| null | null | null |
cs.CG cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider two types of geometric graphs on point sets on the plane based on
a plane set C: one obtained by translates of C, another by positively scaled
translates (homothets) of C. For compact and convex C, graphs defined by scaled
translates of C, i.e., Delaunay graphs based on C, are known to be plane
graphs. We show that as long as C is convex, both types of graphs are plane
graphs.
|
[
{
"version": "v1",
"created": "Wed, 22 Dec 2010 06:06:55 GMT"
}
] | 2010-12-23T00:00:00 |
[
[
"Sarioz",
"Deniz",
""
]
] |
new_dataset
| 0.999598 |
0911.2567
|
Christoph Durr
|
Marek Chrobak, Christoph Durr, Flavio Guinez, Antoni Lozano, Nguyen
Kim Thang
|
Tile Packing Tomography is NP-hard
| null | null | null | null |
cs.CC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Discrete tomography deals with reconstructing finite spatial objects from
lower dimensional projections and has applications for example in timetable
design. In this paper we consider the problem of reconstructing a tile packing
from its row and column projections. It consists of disjoint copies of a fixed
tile, all contained in some rectangular grid. The projections tell how many
cells are covered by a tile in each row and column. How difficult is it to
construct a tile packing satisfying given projections? It was known to be
solvable by a greedy algorithm for bars (tiles of width or height 1), and
NP-hardness results were known for some specific tiles. This paper shows that
the problem is NP-hard whenever the tile is not a bar.
|
[
{
"version": "v1",
"created": "Fri, 13 Nov 2009 08:54:27 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Dec 2010 09:43:49 GMT"
}
] | 2010-12-22T00:00:00 |
[
[
"Chrobak",
"Marek",
""
],
[
"Durr",
"Christoph",
""
],
[
"Guinez",
"Flavio",
""
],
[
"Lozano",
"Antoni",
""
],
[
"Thang",
"Nguyen Kim",
""
]
] |
new_dataset
| 0.989837 |
1012.4487
|
Damianos Gavalas
|
Konstantina Zafeiri, Damianos Gavalas, Aikaterini Balla
|
Selling Culture: Implementation of e-Commerce and WAP-based Prototypes
|
9 pages, 8 figures
|
International Review on Computers and Software (ISSN: 1828-6003),
1(1), pp 68-76, Praise Worthy Prize, July 2006
| null | null |
cs.NI cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Museum stores represent integral parts of the museums that have also a lot to
benefit from a successful presence on the web arena. In addition to traditional
web sites, carefully designed electronic commerce (e-commerce) sites may
increase the potential of museum stores offering possibilities for on-line
shopping and other commercial functions. In parallel, the recent convergence of
the traditionally separate technologies of the Internet and mobile telephony
has brought the concept of 'wireless Internet' into the spotlight. Within this
context, 'mobile commerce' (m-commerce) is a relatively new trend that
represents a natural extension of e-commerce into the wireless world.
M-commerce refers to electronic business transactions and differentiates from
e-commerce since it involves the use of mobile devices and wireless medium
rather than wired. The unique characteristics of mobile computing bring forward
new challenges and opportunities for museum stores. This article presents the
design and implementation of an e-commerce and an m-commerce museum shop
application. The aim is to evaluate and compare the two applications in terms
of several parameters, such as available technologies, strengths and
limitations, design requirements, usability, interaction speed, usage cost, etc
and also to identify ways for enhancing the potential of such applications and
designing successful and profitable business models.
|
[
{
"version": "v1",
"created": "Mon, 20 Dec 2010 21:58:37 GMT"
}
] | 2010-12-22T00:00:00 |
[
[
"Zafeiri",
"Konstantina",
""
],
[
"Gavalas",
"Damianos",
""
],
[
"Balla",
"Aikaterini",
""
]
] |
new_dataset
| 0.966583 |
1012.4691
|
Thomas Sejr Jensen
|
Steffen Godskesen, Thomas Sejr Jensen, Niels Kjeldsen, Rune Larsen
|
Solving a real-life large-scale energy management problem
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a three-phase heuristic approach for a large-scale
energy management and maintenance scheduling problem. The problem is concerned
with scheduling maintenance and refueling for nuclear power plants up to five
years into the future, while handling a number of scenarios for future demand
and prices. The goal is to minimize the expected total production costs. The
first phase of the heuristic solves a simplified constraint programming model
of the problem, the second performs a local search, and the third handles
overproduction in a greedy fashion.
This work was initiated in the context of the ROADEF/EURO Challenge 2010, a
competition organized jointly by the French Operational Research and Decision
Support Society, the European Operational Research Society, and the European
utility company Electricite de France. In the concluding phase of the
competition our team ranked second in the junior category and sixth overall.
After correcting an implementation bug in the program that was submitted for
evaluation, our heuristic solves all ten real-life instances, and the solutions
obtained are all within 2.45% of the currently best known solutions. The
results given here would have ranked first in the original competition.
|
[
{
"version": "v1",
"created": "Tue, 21 Dec 2010 15:21:26 GMT"
}
] | 2010-12-22T00:00:00 |
[
[
"Godskesen",
"Steffen",
""
],
[
"Jensen",
"Thomas Sejr",
""
],
[
"Kjeldsen",
"Niels",
""
],
[
"Larsen",
"Rune",
""
]
] |
new_dataset
| 0.957486 |
1012.4755
|
Emmanuel Abbe A
|
Emmanuel Abbe
|
Mutual information, matroids and extremal dependencies
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, it is shown that the rank function of a matroid can be
represented by a "mutual information function" if and only if the matroid is
binary. The mutual information function considered is the one measuring the
amount of information between the inputs (binary uniform) and the output of a
multiple access channel (MAC). Moreover, it is shown that a MAC whose mutual
information function is integer valued is "equivalent" to a linear
deterministic MAC, in the sense that it essentially contains at the output no
more information than some linear forms of the inputs. These notes put emphasis
on the connection between mutual information functionals and rank functions in
matroid theory, without assuming prior knowledge on these two subjects. The
first section introduces mutual information functionals, the second section
introduces basic notions of matroid theory, and the third section connects
these two subjects. It is also shown that entropic matroids studied in the
literature correspond to specific cases of MAC matroids.
|
[
{
"version": "v1",
"created": "Tue, 21 Dec 2010 18:18:13 GMT"
}
] | 2010-12-22T00:00:00 |
[
[
"Abbe",
"Emmanuel",
""
]
] |
new_dataset
| 0.979126 |
1012.4759
|
Ying Ding
|
Bin Chen (1), David J Wild (1), Qian Zhu (1), Ying Ding (2), Xiao Dong
(1), Madhuvanthi Sankaranarayanan (1), Huijun Wang (1), Yuyin Sun (2) ((1)
School of Informatics and Computing, Indiana University, Bloomington, IN,
USA, (2) School of Library and Information Science, Indiana University,
Bloomington, IN, USA)
|
Chem2Bio2RDF: A Linked Open Data Portal for Chemical Biology
|
8 pages, 10 figures
| null | null | null |
cs.IR q-bio.OT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Chem2Bio2RDF portal is a Linked Open Data (LOD) portal for systems
chemical biology aiming for facilitating drug discovery. It converts around 25
different datasets on genes, compounds, drugs, pathways, side effects,
diseases, and MEDLINE/PubMed documents into RDF triples and links them to other
LOD bubbles, such as Bio2RDF, LODD and DBPedia. The portal is based on D2R
server and provides a SPARQL endpoint, but adds on few unique features like RDF
faceted browser, user-friendly SPARQL query generator, MEDLINE/PubMed cross
validation service, and Cytoscape visualization plugin. Three use cases
demonstrate the functionality and usability of this portal.
|
[
{
"version": "v1",
"created": "Tue, 21 Dec 2010 18:29:54 GMT"
}
] | 2010-12-22T00:00:00 |
[
[
"Chen",
"Bin",
""
],
[
"Wild",
"David J",
""
],
[
"Zhu",
"Qian",
""
],
[
"Ding",
"Ying",
""
],
[
"Dong",
"Xiao",
""
],
[
"Sankaranarayanan",
"Madhuvanthi",
""
],
[
"Wang",
"Huijun",
""
],
[
"Sun",
"Yuyin",
""
]
] |
new_dataset
| 0.999534 |
1012.4240
|
Joachim Schimpf
|
Joachim Schimpf and Kish Shen
|
ECLiPSe - from LP to CLP
|
To appear in Theory and Practice of Logic Programming (TPLP)
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
ECLiPSe is a Prolog-based programming system, aimed at the development and
deployment of constraint programming applications. It is also used for teaching
most aspects of combinatorial problem solving, e.g. problem modelling,
constraint programming, mathematical programming, and search techniques. It
uses an extended Prolog as its high-level modelling and control language,
complemented by several constraint solver libraries, interfaces to third-party
solvers, an integrated development environment and interfaces for embedding
into host environments. This paper discusses language extensions,
implementation aspects, components and tools that we consider relevant on the
way from Logic Programming to Constraint Logic Programming.
|
[
{
"version": "v1",
"created": "Mon, 20 Dec 2010 05:11:57 GMT"
}
] | 2010-12-21T00:00:00 |
[
[
"Schimpf",
"Joachim",
""
],
[
"Shen",
"Kish",
""
]
] |
new_dataset
| 0.998938 |
1012.4263
|
Simon Gog
|
Simon Gog and Enno Ohlebusch
|
Lightweight LCP-Array Construction in Linear Time
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The suffix tree is a very important data structure in string processing, but
it suffers from a huge space consumption. In large-scale applications,
compressed suffix trees (CSTs) are therefore used instead. A CST consists of
three (compressed) components: the suffix array, the LCP-array, and data
structures for simulating navigational operations on the suffix tree. The
LCP-array stores the lengths of the longest common prefixes of
lexicographically adjacent suffixes, and it can be computed in linear time. In
this paper, we present new LCP-array construction algorithms that are fast and
very space efficient. In practice, our algorithms outperform the currently best
algorithms.
|
[
{
"version": "v1",
"created": "Mon, 20 Dec 2010 09:08:05 GMT"
}
] | 2010-12-21T00:00:00 |
[
[
"Gog",
"Simon",
""
],
[
"Ohlebusch",
"Enno",
""
]
] |
new_dataset
| 0.999352 |
1011.6508
|
Binod Kumar Pattanayak
|
Binod Kumar Pattanayak, Manoj Kumar Mishra, Alok Kumar Jagadev,
Manojranjan Nayak
|
Multi-Hop Bandwidth Management Protocol for Mobile Ad Hoc Networks
|
20 pages,30 figures
|
International Journal of Managing Information technology, November
2010
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An admission control scheme should play the role of a coordinator for flows
in a data communication network, to provide the guarantees as the medium is
shared. The nodes of a wired network can monitor the medium to know the
available bandwidth at any point of time. But, in wireless ad hoc networks, a
node must consume the bandwidth of neighboring nodes, during a communication.
Hence, the consumption of bandwidth by a flow and the availability of resources
to any wireless node strictly depend upon the neighboring nodes within its
transmission range. We present a scalable and efficient admission control
scheme, Multi-hop Bandwidth Management Protocol (MBMP), to support the QoS
requirements in multi-hop ad hoc networks. We simulate several options to
design MBMP and compare the performances of these options through mathematical
analysis and simulation results, and compare its effectiveness with the
existing admission control schemes through extensive simulations.
|
[
{
"version": "v1",
"created": "Tue, 30 Nov 2010 10:03:53 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Dec 2010 08:55:15 GMT"
}
] | 2010-12-20T00:00:00 |
[
[
"Pattanayak",
"Binod Kumar",
""
],
[
"Mishra",
"Manoj Kumar",
""
],
[
"Jagadev",
"Alok Kumar",
""
],
[
"Nayak",
"Manojranjan",
""
]
] |
new_dataset
| 0.983253 |
1012.3805
|
Yang Wang
|
Yang Wang, Zhikui Chen, Xiaodi Huang
|
Element Retrieval using Namespace Based on keyword search over XML
Documents
|
9 pages
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Querying over XML elements using keyword search is steadily gaining
popularity. The traditional similarity measure is widely employed in order to
effectively retrieve various XML documents. A number of authors have already
proposed different similarity-measure methods that take advantage of the
structure and content of XML documents. They do not, however, consider the
similarity between latent semantic information of element texts and that of
keywords in a query. Although many algorithms on XML element search are
available, some of them have the high computational complexity due to searching
a huge number of elements. In this paper, we propose a new algorithm that makes
use of the semantic similarity between elements instead of between entire XML
documents, considering not only the structure and content of an XML document,
but also semantic information of namespaces in elements. We compare our
algorithm with the three other algorithms by testing on the real datasets. The
experiments have demonstrated that our proposed method is able to improve the
query accuracy, as well as to reduce the running time.
|
[
{
"version": "v1",
"created": "Fri, 17 Dec 2010 04:00:10 GMT"
}
] | 2010-12-20T00:00:00 |
[
[
"Wang",
"Yang",
""
],
[
"Chen",
"Zhikui",
""
],
[
"Huang",
"Xiaodi",
""
]
] |
new_dataset
| 0.976958 |
1011.4438
|
Yun Bao Huang
|
Yun Bao Huang
|
Smooth infinite words over $n$-letter alphabets having same remainder
when divided by $n$
|
25 pages
| null | null | null |
cs.FL cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Brlek et al. (2008) studied smooth infinite words and established some
results on letter frequency, recurrence, reversal and complementation for
2-letter alphabets having same parity. In this paper, we explore smooth
infinite words over $n$-letter alphabet $\{a_1,a_2,...,a_n\}$, where
$a_1<a_2<...<a_n$ are positive integers and have same remainder when divided by
$n$. And let $a_i=n\cdot q_i+r,\;q_i\in N$ for $i=1,2,...,n$, where
$r=0,1,2,...,n-1$. We use distinct methods to prove that (1) if $r=0$, the
letters frequency of two times differentiable well-proportioned infinite words
is $1/n$, which suggests that the letter frequency of the generalized Kolakoski
sequences is $1/2$ for 2-letter even alphabets; (2) the smooth infinite words
are recurrent; (3) if $r=0$ or $r>0 \text{ and }n$ is an even number, the
generalized Kolakoski words are uniformly recurrent for the alphabet $\Sigma_n$
with the cyclic order; (4) the factor set of three times differentiable
infinite words is not closed under any nonidentical permutation. Brlek et al.'s
results are only the special cases of our corresponding results.
|
[
{
"version": "v1",
"created": "Fri, 19 Nov 2010 14:32:49 GMT"
}
] | 2010-12-16T00:00:00 |
[
[
"Huang",
"Yun Bao",
""
]
] |
new_dataset
| 0.997559 |
1012.3201
|
Qin Huang
|
Qin Huang, Qiuju Diao, Shu Lin and Khaled Abdel-Ghaffar
|
Cyclic and Quasi-Cyclic LDPC Codes on Row and Column Constrained
Parity-Check Matrices and Their Trapping Sets
|
70 pages, submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is concerned with construction and structural analysis of both
cyclic and quasi-cyclic codes, particularly LDPC codes. It consists of three
parts. The first part shows that a cyclic code given by a parity-check matrix
in circulant form can be decomposed into descendant cyclic and quasi-cyclic
codes of various lengths and rates. Some fundamental structural properties of
these descendant codes are developed, including the characterizations of the
roots of the generator polynomial of a cyclic descendant code. The second part
of the paper shows that cyclic and quasi-cyclic descendant LDPC codes can be
derived from cyclic finite geometry LDPC codes using the results developed in
first part of the paper. This enlarges the repertoire of cyclic LDPC codes. The
third part of the paper analyzes the trapping sets of regular LDPC codes whose
parity-check matrices satisfy a certain constraint on their rows and columns.
Several classes of finite geometry and finite field cyclic and quasi-cyclic
LDPC codes with large minimum weights are shown to have no harmful trapping
sets with size smaller than their minimum weights. Consequently, their
performance error-floors are dominated by their minimum weights.
|
[
{
"version": "v1",
"created": "Wed, 15 Dec 2010 00:39:43 GMT"
}
] | 2010-12-16T00:00:00 |
[
[
"Huang",
"Qin",
""
],
[
"Diao",
"Qiuju",
""
],
[
"Lin",
"Shu",
""
],
[
"Abdel-Ghaffar",
"Khaled",
""
]
] |
new_dataset
| 0.999177 |
1012.3452
|
Mohammad Nikseresht
|
Mohammad R Nikseresht, Anil Somayaji, Anil Maheshwari
|
Customer Appeasement Scheduling
| null | null | null |
TR-10-18
|
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Almost all of the current process scheduling algorithms which are used in
modern operating systems (OS) have their roots in the classical scheduling
paradigms which were developed during the 1970's. But modern computers have
different types of software loads and user demands. We think it is important to
run what the user wants at the current moment. A user can be a human, sitting
in front of a desktop machine, or it can be another machine sending a request
to a server through a network connection. We think that OS should become
intelligent to distinguish between different processes and allocate resources,
including CPU, to those processes which need them most. In this work, as a
first step to make the OS aware of the current state of the system, we consider
process dependencies and interprocess communications. We are developing a
model, which considers the need to satisfy interactive users and other possible
remote users or customers, by making scheduling decisions based on process
dependencies and interprocess communications. Our simple proof of concept
implementation and experiments show the effectiveness of this approach in the
real world applications. Our implementation does not require any change in the
software applications nor any special kind of configuration in the system,
Moreover, it does not require any additional information about CPU needs of
applications nor other resource requirements. Our experiments show significant
performance improvement for real world applications. For example, almost
constant average response time for Mysql data base server and constant frame
rate for mplayer under different simulated load values.
|
[
{
"version": "v1",
"created": "Wed, 15 Dec 2010 20:38:40 GMT"
}
] | 2010-12-16T00:00:00 |
[
[
"Nikseresht",
"Mohammad R",
""
],
[
"Somayaji",
"Anil",
""
],
[
"Maheshwari",
"Anil",
""
]
] |
new_dataset
| 0.953257 |
1012.2648
|
Georg Gottlob
|
S. Abiteboul, G. Gottlob, M. Manna
|
Distributed XML Design
|
"56 pages, 4 figures"
|
Proceedings of PODS '09 (2009) 247-258
|
10.1145/1559795.1559833
| null |
cs.DB cs.CC cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A distributed XML document is an XML document that spans several machines. We
assume that a distribution design of the document tree is given, consisting of
an XML kernel-document T[f1,...,fn] where some leaves are "docking points" for
external resources providing XML subtrees (f1,...,fn, standing, e.g., for Web
services or peers at remote locations). The top-down design problem consists
in, given a type (a schema document that may vary from a DTD to a tree
automaton) for the distributed document, "propagating" locally this type into a
collection of types, that we call typing, while preserving desirable
properties. We also consider the bottom-up design which consists in, given a
type for each external resource, exhibiting a global type that is enforced by
the local types, again with natural desirable properties. In the article, we
lay out the fundamentals of a theory of distributed XML design, analyze
problems concerning typing issues in this setting, and study their complexity.
|
[
{
"version": "v1",
"created": "Mon, 13 Dec 2010 07:45:30 GMT"
}
] | 2010-12-15T00:00:00 |
[
[
"Abiteboul",
"S.",
""
],
[
"Gottlob",
"G.",
""
],
[
"Manna",
"M.",
""
]
] |
new_dataset
| 0.999534 |
1012.2661
|
Christian Retore
|
Maxime Amblard (INRIA Lorraine - LORIA), Alain Lecomte (INRIA Bordeaux
- Sud-Ouest, SFLTAMP), Christian Retor\'e (INRIA Bordeaux - Sud-Ouest, LaBRI)
|
Categorial Minimalist Grammar
| null |
Linguistic Analysis 36, 1--4 (2010) 273--308
| null | null |
cs.CL math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We first recall some basic notions on minimalist grammars and on categorial
grammars. Next we shortly introduce partially commutative linear logic, and our
representation of minimalist grammars within this categorial system, the
so-called categorial minimalist grammars. Thereafter we briefly present
\lambda\mu-DRT (Discourse Representation Theory) an extension of \lambda-DRT
(compositional DRT) in the framework of \lambda\mu calculus: it avoids type
raising and derives different readings from a single semantic representation,
in a setting which follows discourse structure. We run a complete example which
illustrates the various structures and rules that are needed to derive a
semantic representation from the categorial view of a transformational
syntactic analysis.
|
[
{
"version": "v1",
"created": "Mon, 13 Dec 2010 08:55:43 GMT"
}
] | 2010-12-15T00:00:00 |
[
[
"Amblard",
"Maxime",
"",
"INRIA Lorraine - LORIA"
],
[
"Lecomte",
"Alain",
"",
"INRIA Bordeaux\n - Sud-Ouest, SFLTAMP"
],
[
"Retoré",
"Christian",
"",
"INRIA Bordeaux - Sud-Ouest, LaBRI"
]
] |
new_dataset
| 0.981729 |
1012.2995
|
Andreas Lundblad
|
Mads Dam, Andreas Lundblad
|
A Proof Carrying Code Framework for Inlined Reference Monitors in Java
Bytecode
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a light-weight approach for certification of monitor inlining for
sequential Java bytecode using proof-carrying code. The goal is to enable the
use of monitoring for quality assurance at development time, while minimizing
the need for post-shipping code rewrites as well as changes to the end-host
TCB. Standard automaton-based security policies express constraints on allowed
API call/return sequences. Proofs are represented as JML-style program
annotations. This is adequate in our case as all proofs generated in our
framework are recognized in time polynomial in the size of the program. Policy
adherence is proved by comparing the transitions of an inlined monitor with
those of a trusted "ghost" monitor represented using JML-style annotations. At
time of receiving a program with proof annotations, it is sufficient for the
receiver to plug in its own trusted ghost monitor and check the resulting
verification conditions, to verify that inlining has been performed correctly,
of the correct policy. We have proved correctness of the approach at the Java
bytecode level and formalized the proof of soundness in Coq. An implementation,
including an application loader running on a mobile device, is available, and
we conclude by giving benchmarks for two sample applications.
|
[
{
"version": "v1",
"created": "Tue, 14 Dec 2010 11:12:36 GMT"
}
] | 2010-12-15T00:00:00 |
[
[
"Dam",
"Mads",
""
],
[
"Lundblad",
"Andreas",
""
]
] |
new_dataset
| 0.990621 |
1012.2553
|
Jianhua Zhao
|
Jianhua Zhao, Xuandong Li
|
Scope Logic with Local Reasoning and Pre/Post-State Properties
|
30 pages, with two non-trival examples in the appendix
| null | null | null |
cs.LO
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
This paper presents an extension to Hoare logic for pointer program
verification. Logic formulas with user-defined recursive functions are used to
specify properties on the program states before/after program executions.
Three basic functions are introduced to represents memory access,
record-field access and array-element access. Some axioms are introduced to
specify these basic functions in our logic.
The concept Memory Scope Function (MSF) is introduced in our logic. Given a
recursive function $f$, the MSF of $f$ computes the set of memory units
accessed during the evaluation of $f$. A set of rules are given to derive the
definition of this MSF syntactically from the definition of $f$. As MSFs are
also recursive functions, they also have their MSFs. An axiom is given to
specify that an MSF contains its MSF. Based on this axiom, local reasoning is
supported with predicate variables.
Pre-state terms are used to specify the relations between pre-states and
post-states. People can use pre-state terms in post-conditions to represents
the values on the pre-state.
The axiom of assignment statements in Hoare's logic is modified to deal with
pointers. The basic idea is that during the program execution, a recursive
function is evaluated to the same value as long as no memory unit in its memory
scope is modified. Another proof rule is added for memory allocation
statements.
We use a simple example to show that our logic can deal with pointer programs
in this paper. In the appendix, the Shorre-Waite algorithm is proved using our
logic. We also use the selection-sort program to show that our logic can be
used to prove program with indirectly-specified components.
|
[
{
"version": "v1",
"created": "Sun, 12 Dec 2010 16:12:57 GMT"
}
] | 2010-12-14T00:00:00 |
[
[
"Zhao",
"Jianhua",
""
],
[
"Li",
"Xuandong",
""
]
] |
new_dataset
| 0.999706 |
0809.5145
|
Youssef, Joseph Nasser
|
Youssef Nasser (IETR), Jean-Fran\c{c}ois H\'elard (IETR), Matthieu
Crussi\`ere (IETR)
|
3D MIMO Scheme for Broadcasting Future Digital TV in Single Frequency
Networks
| null |
Electronics Letters / IEE Electronics Letters 44, 13 (2008)
829-830
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This letter introduces a 3D space-time-space block code for future digital TV
systems. The code is based on a double layer structure for inter-cell and
intra-cell transmission mode in single frequency networks. Without increasing
the complexity of the receiver, the proposed code is very efficient for
different transmission scenarios.
|
[
{
"version": "v1",
"created": "Tue, 30 Sep 2008 09:23:19 GMT"
}
] | 2010-12-13T00:00:00 |
[
[
"Nasser",
"Youssef",
"",
"IETR"
],
[
"Hélard",
"Jean-François",
"",
"IETR"
],
[
"Crussière",
"Matthieu",
"",
"IETR"
]
] |
new_dataset
| 0.998646 |
1012.2256
|
Laurent Lefevre
|
Anne-C\'ecile Orgerie (INRIA Rh\^one-Alpes / LIP Laboratoire de
l'Informatique du Parall\'elisme), Laurent Lef\`evre (INRIA Rh\^one-Alpes /
LIP Laboratoire de l'Informatique du Parall\'elisme)
|
A year in the life of a large scale experimental distributed system: the
Grid'5000 platform in 2008
| null | null | null | null |
cs.NI cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This report presents the usage results of Grid'5000 over year 2008. Usage of
the main operationnal Grid'5000 sites (Bordeaux, Lille, Lyon, Nancy, Orsay,
Rennes, Sophia-Antipolis, Toulouse) is presented and analyzed.
|
[
{
"version": "v1",
"created": "Fri, 10 Dec 2010 13:07:28 GMT"
}
] | 2010-12-13T00:00:00 |
[
[
"Orgerie",
"Anne-Cécile",
"",
"INRIA Rhône-Alpes / LIP Laboratoire de\n l'Informatique du Parallélisme"
],
[
"Lefèvre",
"Laurent",
"",
"INRIA Rhône-Alpes /\n LIP Laboratoire de l'Informatique du Parallélisme"
]
] |
new_dataset
| 0.991764 |
0908.4094
|
Arya Mazumdar
|
Alexander Barg and Arya Mazumdar
|
Codes in Permutations and Error Correction for Rank Modulation
|
Some typos corrected from the published journal version
|
IEEE Transactions on Information Theory, Vol. 56, Issue 7, July
2010, pp. 3158 - 3165
|
10.1109/TIT.2010.2048455
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Codes for rank modulation have been recently proposed as a means of
protecting flash memory devices from errors. We study basic coding theoretic
problems for such codes, representing them as subsets of the set of
permutations of $n$ elements equipped with the Kendall tau distance. We derive
several lower and upper bounds on the size of codes. These bounds enable us to
establish the exact scaling of the size of optimal codes for large values of
$n$. We also show the existence of codes whose size is within a constant factor
of the sphere packing bound for any fixed number of errors.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 20:28:16 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Oct 2009 03:16:28 GMT"
},
{
"version": "v3",
"created": "Fri, 22 Oct 2010 22:33:52 GMT"
}
] | 2010-12-10T00:00:00 |
[
[
"Barg",
"Alexander",
""
],
[
"Mazumdar",
"Arya",
""
]
] |
new_dataset
| 0.986658 |
1012.1912
|
Giacomo Como
|
Giacomo Como and Serdar Y\"uksel
|
On the Capacity of Memoryless Finite-State Multiple-Access Channels with
Asymmetric State Information at the Encoders
|
8 pages, 1 figure, accepted for publication, in press
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A single-letter characterization is provided for the capacity region of
finite-state multiple-access channels, when the channel state process is an
independent and identically distributed sequence, the transmitters have access
to partial (quantized) state information, and complete channel state
information is available at the receiver. The partial channel state information
is assumed to be asymmetric at the encoders. As a main contribution, a tight
converse coding theorem is presented. The difficulties associated with the case
when the channel state has memory are discussed and connections to
decentralized stochastic control theory are presented.
|
[
{
"version": "v1",
"created": "Thu, 9 Dec 2010 02:55:46 GMT"
}
] | 2010-12-10T00:00:00 |
[
[
"Como",
"Giacomo",
""
],
[
"Yüksel",
"Serdar",
""
]
] |
new_dataset
| 0.993678 |
1012.2042
|
George Giannakopoulos
|
George Giannakopoulos (1) and George Vouros (2) and Vangelis
Karkaletsis (1) ((1) NCSR Demokritos, Greece, (2) University of the Aegean,
Greece)
|
MUDOS-NG: Multi-document Summaries Using N-gram Graphs (Tech Report)
|
Technical Report
| null | null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This report describes the MUDOS-NG summarization system, which applies a set
of language-independent and generic methods for generating extractive
summaries. The proposed methods are mostly combinations of simple operators on
a generic character n-gram graph representation of texts. This work defines the
set of used operators upon n-gram graphs and proposes using these operators
within the multi-document summarization process in such subtasks as document
analysis, salient sentence selection, query expansion and redundancy control.
Furthermore, a novel chunking methodology is used, together with a novel way to
assign concepts to sentences for query expansion. The experimental results of
the summarization system, performed upon widely used corpora from the Document
Understanding and the Text Analysis Conferences, are promising and provide
evidence for the potential of the generic methods introduced. This work aims to
designate core methods exploiting the n-gram graph representation, providing
the basis for more advanced summarization systems.
|
[
{
"version": "v1",
"created": "Thu, 9 Dec 2010 16:15:34 GMT"
}
] | 2010-12-10T00:00:00 |
[
[
"Giannakopoulos",
"George",
""
],
[
"Vouros",
"George",
""
],
[
"Karkaletsis",
"Vangelis",
""
]
] |
new_dataset
| 0.952212 |
1012.1621
|
Adrian Paschke
|
Abdelaali Briache, Kamar Marrakchi, Amine Kerzazi, Ismael
Navas-Delgado, Jose F Aldana Montes, Badr D. Rossi Hassani, Khalid Lairini
|
YeastMed: an XML-Based System for Biological Data Integration of Yeast
|
in Adrian Paschke, Albert Burger, Andrea Splendiani, M. Scott
Marshall, Paolo Romano: Proceedings of the 3rd International Workshop on
Semantic Web Applications and Tools for the Life Sciences, Berlin,Germany,
December 8-10, 2010
| null | null |
SWAT4LS 2010
|
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A key goal of bioinformatics is to create database systems and software
platforms capable of storing and analysing large sets of biological data.
Hundreds of biological databases are now available and provide access to huge
amount of biological data. SGD, Yeastract, CYGD-MIPS, BioGrid and PhosphoGrid
are five of the most visited databases by the yeast community. These sources
provide complementary data on biological entities. Biologists are brought
systematically to query these data sources in order to analyse the results of
their experiments. Because of the heterogeneity of these sources, querying them
separately and then manually combining the returned result is a complex and
laborious task. To provide transparent and simultaneous access to these
sources, we have developed a mediator-based system called YeastMed. In this
paper, we present YeastMed focusing on its architecture.
|
[
{
"version": "v1",
"created": "Tue, 7 Dec 2010 21:53:31 GMT"
}
] | 2010-12-09T00:00:00 |
[
[
"Briache",
"Abdelaali",
""
],
[
"Marrakchi",
"Kamar",
""
],
[
"Kerzazi",
"Amine",
""
],
[
"Navas-Delgado",
"Ismael",
""
],
[
"Montes",
"Jose F Aldana",
""
],
[
"Hassani",
"Badr D. Rossi",
""
],
[
"Lairini",
"Khalid",
""
]
] |
new_dataset
| 0.981437 |
1012.1645
|
Adrian Paschke
|
Alexandru Todor, Adrian Paschke, Stephan Heineke
|
ChemCloud: Chemical e-Science Information Cloud
|
in Adrian Paschke, Albert Burger, Andrea Splendiani, M. Scott
Marshall, Paolo Romano: Proceedings of the 3rd International Workshop on
Semantic Web Applications and Tools for the Life Sciences, Berlin,Germany,
December 8-10, 2010
| null | null |
SWAT4LS 2010
|
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Our Chemical e-Science Information Cloud (ChemCloud) - a Semantic Web based
eScience infrastructure - integrates and automates a multitude of databases,
tools and services in the domain of chemistry, pharmacy and bio-chemistry
available at the Fachinformationszentrum Chemie (FIZ Chemie), at the Freie
Universitaet Berlin (FUB), and on the public Web. Based on the approach of the
W3C Linked Open Data initiative and the W3C Semantic Web technologies for
ontologies and rules it semantically links and integrates knowledge from our
W3C HCLS knowledge base hosted at the FUB, our multi-domain knowledge base
DBpedia (Deutschland) implemented at FUB, which is extracted from Wikipedia
(De) providing a public semantic resource for chemistry, and our
well-established databases at FIZ Chemie such as ChemInform for organic
reaction data, InfoTherm the leading source for thermophysical data, Chemisches
Zentralblatt, the complete chemistry knowledge from 1830 to 1969, and
ChemgaPedia the largest and most frequented e-Learning platform for Chemistry
and related sciences in German language.
|
[
{
"version": "v1",
"created": "Tue, 7 Dec 2010 23:52:54 GMT"
}
] | 2010-12-09T00:00:00 |
[
[
"Todor",
"Alexandru",
""
],
[
"Paschke",
"Adrian",
""
],
[
"Heineke",
"Stephan",
""
]
] |
new_dataset
| 0.999418 |
1012.1666
|
Adrian Paschke
|
Luke McCarthy, Ben Vandervalk, Mark Wilkinson
|
SPARQL Assist Language-Neutral Query Composer
|
in Adrian Paschke, Albert Burger, Andrea Splendiani, M. Scott
Marshall, Paolo Romano: Proceedings of the 3rd International Workshop on
Semantic Web Applications and Tools for the Life Sciences, Berlin,Germany,
December 8-10, 2010
| null | null |
SWAT4LS 2010
|
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
SPARQL query composition is difficult for the lay-person or even the
experienced bioinformatician in cases where the data model is unfamiliar.
Established best-practices and internationalization concerns dictate that
semantic web ontologies should use terms with opaque identifiers, further
complicating the task. We present SPARQL Assist: a web application that
addresses these issues by providing context-sensitive type-ahead completion to
existing web forms. Ontological terms are suggested using their labels and
descriptions, leveraging existing XML support for internationalization and
language-neutrality.
|
[
{
"version": "v1",
"created": "Wed, 8 Dec 2010 01:10:59 GMT"
}
] | 2010-12-09T00:00:00 |
[
[
"McCarthy",
"Luke",
""
],
[
"Vandervalk",
"Ben",
""
],
[
"Wilkinson",
"Mark",
""
]
] |
new_dataset
| 0.989435 |
1012.1332
|
Pierre Guillon
|
Andr\'es Moreira, Anahi Gajardo
|
Time-Symmetric Cellular Automata
|
Journ\'ees Automates Cellulaires 2010, Turku : Finland (2010)
| null | null | null |
cs.DM cs.FL nlin.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Together with the concept of reversibility, another relevant physical notion
is time-symmetry, which expresses that there is no way of distinguishing
between backward and forward time directions. This notion, found in physical
theories, has been neglected in the area of discrete dynamical systems. Here we
formalize it in the context of cellular automata and establish some basic facts
and relations. We also state some open problems that may encourage further
research on the topic.
|
[
{
"version": "v1",
"created": "Fri, 3 Dec 2010 09:41:17 GMT"
}
] | 2010-12-08T00:00:00 |
[
[
"Moreira",
"Andrés",
""
],
[
"Gajardo",
"Anahi",
""
]
] |
new_dataset
| 0.994668 |
1012.0375
|
Chengling Jiang
|
Yan Liang, Chengling Jiang, Chunliang Yang
|
Dynamic Resource Coordination and Interference Management for Femtocell
Networks
| null | null | null | null |
cs.IT math.IT
|
http://creativecommons.org/licenses/by/3.0/
|
Femtocell is emerging as a key technology to secure the coverage and capacity
in indoor environments. However the deployment of a new femtocell layer may
originate undesired interference to the whole system. This paper investigates
spectrum resource coordination and interference management for the femtocell
networks. A resource coordination scheme based on broadcasting resource
coordination request messages by the femto mobile is proposed to reduce the
system interference.
|
[
{
"version": "v1",
"created": "Thu, 2 Dec 2010 03:00:20 GMT"
}
] | 2010-12-03T00:00:00 |
[
[
"Liang",
"Yan",
""
],
[
"Jiang",
"Chengling",
""
],
[
"Yang",
"Chunliang",
""
]
] |
new_dataset
| 0.975317 |
1012.0557
|
Andrey Rumyantsev
|
Andrey Rumyantsev
|
Infinite computable version of Lovasz Local Lemma
| null | null | null | null |
cs.DS cs.DM math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Lov\'asz Local Lemma (LLL) is a probabilistic tool that allows us to prove
the existence of combinatorial objects in the cases when standard probabilistic
argument does not work (there are many partly independent conditions).
LLL can be also used to prove the consistency of an infinite set of
conditions, using standard compactness argument (if an infinite set of
conditions is inconsistent, then some finite part of it is inconsistent, too,
which contradicts LLL). In this way we show that objects satisfying all the
conditions do exist (though the probability of this event equals~$0$). However,
if we are interested in finding a computable solution that satisfies all the
constraints, compactness arguments do not work anymore.
Moser and Tardos recently gave a nice constructive proof of LLL. Lance
Fortnow asked whether one can apply Moser--Tardos technique to prove the
existence of a computable solution. We show that this is indeed possible (under
almost the same conditions as used in the non-constructive version).
|
[
{
"version": "v1",
"created": "Thu, 2 Dec 2010 20:11:02 GMT"
}
] | 2010-12-03T00:00:00 |
[
[
"Rumyantsev",
"Andrey",
""
]
] |
new_dataset
| 0.986437 |
1001.3593
|
Samuel Hornus
|
Otfried Cheong (KAIST CS), Hazel Everett (INRIA Lorraine - LORIA),
Marc Glisse (INRIA Sophia Antipolis / INRIA Saclay - Ile de France), Joachim
Gudmundsson (NICTA), Samuel Hornus (INRIA Lorraine - LORIA), Sylvain Lazard
(INRIA Lorraine - LORIA), Mira Lee (KAIST CS), Hyeon-Suk Na
|
Farthest-Polygon Voronoi Diagrams
| null |
Computational Geometry (2010)
| null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a family of k disjoint connected polygonal sites in general position
and of total complexity n, we consider the farthest-site Voronoi diagram of
these sites, where the distance to a site is the distance to a closest point on
it. We show that the complexity of this diagram is O(n), and give an O(n log^3
n) time algorithm to compute it. We also prove a number of structural
properties of this diagram. In particular, a Voronoi region may consist of k-1
connected components, but if one component is bounded, then it is equal to the
entire region.
|
[
{
"version": "v1",
"created": "Wed, 20 Jan 2010 14:09:41 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Nov 2010 21:08:02 GMT"
}
] | 2010-12-02T00:00:00 |
[
[
"Cheong",
"Otfried",
"",
"KAIST CS"
],
[
"Everett",
"Hazel",
"",
"INRIA Lorraine - LORIA"
],
[
"Glisse",
"Marc",
"",
"INRIA Sophia Antipolis / INRIA Saclay - Ile de France"
],
[
"Gudmundsson",
"Joachim",
"",
"NICTA"
],
[
"Hornus",
"Samuel",
"",
"INRIA Lorraine - LORIA"
],
[
"Lazard",
"Sylvain",
"",
"INRIA Lorraine - LORIA"
],
[
"Lee",
"Mira",
"",
"KAIST CS"
],
[
"Na",
"Hyeon-Suk",
""
]
] |
new_dataset
| 0.994151 |
1008.3845
|
Kalyana Babu Nakshatrala
|
S. Srinivasan and K. B. Nakshatrala
|
A stabilized mixed formulation for unsteady Brinkman equation based on
the method of horizontal lines
| null | null | null | null |
cs.NA math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present a stabilized mixed formulation for unsteady
Brinkman equation. The formulation is systematically derived based on the
variational multiscale formalism and the method of horizontal lines. The
derivation does not need the assumption that the fine-scale variables do not
depend on the time, which is the case with the conventional derivation of
multiscale stabilized formulations for transient mixed problems. An expression
for the stabilization parameter is obtained in terms of a bubble function, and
appropriate bubble functions for various finite elements are also presented.
Under the proposed formulation, equal-order interpolation for the velocity and
pressure (which is computationally the most convenient) is stable.
Representative numerical results are presented to illustrate the performance of
the proposed formulation. Spatial and temporal convergence studies are also
performed, and the proposed formulation performed well.
|
[
{
"version": "v1",
"created": "Thu, 15 Jul 2010 21:47:04 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Nov 2010 06:18:59 GMT"
}
] | 2010-12-01T00:00:00 |
[
[
"Srinivasan",
"S.",
""
],
[
"Nakshatrala",
"K. B.",
""
]
] |
new_dataset
| 0.971256 |
1011.6021
|
Prabhanjan Ananth
|
Prabhanjan V. Ananth, Ambedkar Dukkipati
|
Border basis detection is NP-complete
|
18 pages
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Border basis detection (BBD) is described as follows: given a set of
generators of an ideal, decide whether that set of generators is a border basis
of the ideal with respect to some order ideal. The motivation for this problem
comes from a similar problem related to Gr\"obner bases termed as Gr\"obner
basis detection (GBD) which was proposed by Gritzmann and Sturmfels (1993). GBD
was shown to be NP-hard by Sturmfels and Wiegelmann (1996). In this paper, we
investigate the computational complexity of BBD and show that it is
NP-complete.
|
[
{
"version": "v1",
"created": "Sun, 28 Nov 2010 08:22:42 GMT"
}
] | 2010-11-30T00:00:00 |
[
[
"Ananth",
"Prabhanjan V.",
""
],
[
"Dukkipati",
"Ambedkar",
""
]
] |
new_dataset
| 0.992822 |
1011.6044
|
Lahatra Rakotondrainibe
|
Lahatra Rakotondrainibe (IETR), Yvan Kokar (IETR), Gheorghe Zaharia
(IETR), Guy Grunfelder (IETR), Gha\"is El Zein (IETR)
|
Single Carrier Architecture for High Data Rate Wireless PAN
Communications System
|
Design, Experimentation, Measurement, Performance; IWCMC '10, Caen :
France (2010)
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A 60 GHz wireless Gigabit Ethernet (G.E.) communication system is developed
at IETR. As the 60 GHz radio link operates only in a single-room configuration,
an additional Radio over Fibre (RoF) link is used to ensure the communications
in all the rooms of a residential environment. The realized system covers 2 GHz
bandwidth. Due to the hardware constraints, a symbol rate at 875 Mbps is
attained using simple single carrier architecture. In the baseband (BB)
processing block, an original byte/frame synchronization process is designed to
provide a smaller value of the preamble missing detection and false alarm
probabilities. Bit error rate (BER) measurements have been realized in a large
gym for line-of-sight (LOS) conditions. A Tx-Rx distance greater than 30 meters
was attained with low BER using high gain antennas and forward error correction
RS (255, 239) coding.
|
[
{
"version": "v1",
"created": "Sun, 28 Nov 2010 13:11:52 GMT"
}
] | 2010-11-30T00:00:00 |
[
[
"Rakotondrainibe",
"Lahatra",
"",
"IETR"
],
[
"Kokar",
"Yvan",
"",
"IETR"
],
[
"Zaharia",
"Gheorghe",
"",
"IETR"
],
[
"Grunfelder",
"Guy",
"",
"IETR"
],
[
"Zein",
"Ghaïs El",
"",
"IETR"
]
] |
new_dataset
| 0.958948 |
1011.6100
|
Grigory Yaroslavtsev
|
Piotr Berman, Arnab Bhattacharyya, Elena Grigorescu, Sofya
Raskhodnikova, David Woodruff, Grigory Yaroslavtsev
|
Steiner Transitive-Closure Spanners of d-Dimensional Posets
| null | null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a directed graph G and an integer k >= 1, a
k-transitive-closure-spanner (k-TCspanner) of G is a directed graph H that has
(1) the same transitive-closure as G and (2) diameter at most k. In some
applications, the shortcut paths added to the graph in order to obtain small
diameter can use Steiner vertices, that is, vertices not in the original graph
G. The resulting spanner is called a Steiner transitive-closure spanner
(Steiner TC-spanner).
Motivated by applications to property reconstruction and access control
hierarchies, we concentrate on Steiner TC-spanners of directed acyclic graphs
or, equivalently, partially ordered sets. In these applications, the goal is to
find a sparsest Steiner k-TC-spanner of a poset G for a given k and G. The
focus of this paper is the relationship between the dimension of a poset and
the size of its sparsest Steiner TCspanner. The dimension of a poset G is the
smallest d such that G can be embedded into a d-dimensional directed hypergrid
via an order-preserving embedding.
We present a nearly tight lower bound on the size of Steiner 2-TC-spanners of
d-dimensional directed hypergrids. It implies better lower bounds on the
complexity of local reconstructors of monotone functions and functions with low
Lipschitz constant. The proof of the lower bound constructs a dual solution to
a linear programming relaxation of the Steiner 2-TC-spanner problem. We also
show that one can efficiently construct a Steiner 2-TC-spanner, of size
matching the lower bound, for any low-dimensional poset. Finally, we present a
lower bound on the size of Steiner k-TC-spanners of d-dimensional posets that
shows that the best-known construction, due to De Santis et al., cannot be
improved significantly.
|
[
{
"version": "v1",
"created": "Sun, 28 Nov 2010 22:40:46 GMT"
}
] | 2010-11-30T00:00:00 |
[
[
"Berman",
"Piotr",
""
],
[
"Bhattacharyya",
"Arnab",
""
],
[
"Grigorescu",
"Elena",
""
],
[
"Raskhodnikova",
"Sofya",
""
],
[
"Woodruff",
"David",
""
],
[
"Yaroslavtsev",
"Grigory",
""
]
] |
new_dataset
| 0.974347 |
1011.6218
|
Chan Thai
|
Chan Dai Truyen Thai, Petar Popovski, Megumi Kaneko and Elisabeth de
Carvalho
|
Coordinated Transmissions to Direct and Relayed Users in Wireless
Cellular Systems
|
5 pages, 5 figures
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The ideas of wireless network coding at the physical layer promise high
throughput gains in wireless systems with relays and multi-way traffic flows.
This gain can be ascribed to two principles: (1) joint transmission of multiple
communication flows and (2) usage of \emph{a priori} information to cancel the
interference. In this paper we use these principles to devise new transmission
schemes in wireless cellular systems that feature both users served directly by
the base stations (direct users) and users served through relays (relayed
users). We present four different schemes for \emph{coordinated transmission}
of uplink and downlink traffic in which one direct and one relayed user are
served. These schemes are then used as building blocks in multi-user scenarios,
where we present several schemes for scheduling pairs of users for coordinated
transmissions. The optimal scheme involves exhaustive search of the best user
pair in terms of overall rate. We propose several suboptimal scheduling
schemes, which perform closely to the optimal scheme. The numerical results
show a substantial increase in the system--level rate with respect to the
systems with non--coordinated transmissions.
|
[
{
"version": "v1",
"created": "Mon, 29 Nov 2010 12:51:07 GMT"
}
] | 2010-11-30T00:00:00 |
[
[
"Thai",
"Chan Dai Truyen",
""
],
[
"Popovski",
"Petar",
""
],
[
"Kaneko",
"Megumi",
""
],
[
"de Carvalho",
"Elisabeth",
""
]
] |
new_dataset
| 0.980206 |
1011.5778
|
Tobias Marschall
|
Tobias Marschall and Inke Herms and Hans-Michael Kaltenbach and Sven
Rahmann
|
Probabilistic Arithmetic Automata and their Applications
| null | null | null | null |
cs.FL q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present probabilistic arithmetic automata (PAAs), a general model to
describe chains of operations whose operands depend on chance, along with two
different algorithms to exactly calculate the distribution of the results
obtained by such probabilistic calculations. PAAs provide a unifying framework
to approach many problems arising in computational biology and elsewhere. Here,
we present five different applications, namely (1) pattern matching statistics
on random texts, including the computation of the distribution of occurrence
counts, waiting time and clump size under HMM background models; (2) exact
analysis of window-based pattern matching algorithms; (3) sensitivity of
filtration seeds used to detect candidate sequence alignments; (4) length and
mass statistics of peptide fragments resulting from enzymatic cleavage
reactions; and (5) read length statistics of 454 sequencing reads. The
diversity of these applications indicates the flexibility and unifying
character of the presented framework.
While the construction of a PAA depends on the particular application, we
single out a frequently applicable construction method for pattern statistics:
We introduce deterministic arithmetic automata (DAAs) to model deterministic
calculations on sequences, and demonstrate how to construct a PAA from a given
DAA and a finite-memory random text model. We show how to transform a finite
automaton into a DAA and then into the corresponding PAA.
|
[
{
"version": "v1",
"created": "Fri, 26 Nov 2010 13:13:08 GMT"
}
] | 2010-11-29T00:00:00 |
[
[
"Marschall",
"Tobias",
""
],
[
"Herms",
"Inke",
""
],
[
"Kaltenbach",
"Hans-Michael",
""
],
[
"Rahmann",
"Sven",
""
]
] |
new_dataset
| 0.996473 |
1011.5332
|
Jan Wielemaker
|
Jan Wielemaker and Tom Schrijvers and Markus Triska and Torbj\"orn
Lager
|
SWI-Prolog
|
30 pages, 6 figures, 1 table. To appear in Theory and Practice of
Logic Programming (TPLP)
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
SWI-Prolog is neither a commercial Prolog system nor a purely academic
enterprise, but increasingly a community project. The core system has been
shaped to its current form while being used as a tool for building research
prototypes, primarily for \textit{knowledge-intensive} and \textit{interactive}
systems. Community contributions have added several interfaces and the
constraint (CLP) libraries. Commercial involvement has created the initial
garbage collector, added several interfaces and two development tools: PlDoc (a
literate programming documentation system) and PlUnit (a unit testing
environment).
In this article we present SWI-Prolog as an integrating tool, supporting a
wide range of ideas developed in the Prolog community and acting as glue
between \textit{foreign} resources. This article itself is the glue between
technical articles on SWI-Prolog, providing context and experience in applying
them over a longer period.
|
[
{
"version": "v1",
"created": "Wed, 24 Nov 2010 10:28:56 GMT"
}
] | 2010-11-26T00:00:00 |
[
[
"Wielemaker",
"Jan",
""
],
[
"Schrijvers",
"Tom",
""
],
[
"Triska",
"Markus",
""
],
[
"Lager",
"Torbjörn",
""
]
] |
new_dataset
| 0.99957 |
1011.5264
|
Piero Giacomelli Dr.
|
Piero Giacomelli
|
Wheel Random Apollonian Graphs
| null | null | null | null |
cs.DM cond-mat.dis-nn math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper a subset of High-Dimensional Random Apollonian networks, that
we called Wheel Random Apollonian Graphs (WRAG), is considered. We show how to
generate a Wheel Random Apollonian Graph from a wheel graph. We analyse some
basic graph properties like vertices and edges cardinality, some question
concerning cycles and the chromaticity in such type of graphs, we suggest
further work on this type of graphs.
|
[
{
"version": "v1",
"created": "Sat, 20 Nov 2010 07:46:17 GMT"
}
] | 2010-11-25T00:00:00 |
[
[
"Giacomelli",
"Piero",
""
]
] |
new_dataset
| 0.999199 |
1011.5295
|
Karim Eldefrawy
|
Karim El Defrawy, Srdjan Capkun and Gene Tsudik
|
GDB: Group Distance Bounding Protocols
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Secure distance bounding (DB) protocols allow one entity, the verifier, to
securely obtain an upper-bound on the distance to another entity, the prover.
Thus far, DB was considered mostly in the context of a single prover and a
single verifier. There has been no substantial prior work on secure DB in group
settings, where a set of provers interact with a set of verifiers. The need for
group distance bounding (GDB) is motivated by many practical scenarios,
including: group device pairing, location-based access control and secure
distributed localization. GDB is also useful in mission-critical networks and
automotive computer systems. This paper addresses, for the first time, GDB
protocols by utilizing the new passive DB primitive and the novel mutual
multi-party GDB protocol. We show how they can be used to construct secure and
efficient GDB protocols for various settings. We analyze security and
performance of our protocols and compare them with existing DB techniques when
applied to group settings.
|
[
{
"version": "v1",
"created": "Wed, 24 Nov 2010 05:05:14 GMT"
}
] | 2010-11-25T00:00:00 |
[
[
"Defrawy",
"Karim El",
""
],
[
"Capkun",
"Srdjan",
""
],
[
"Tsudik",
"Gene",
""
]
] |
new_dataset
| 0.982981 |
1011.5374
|
Maddu Kamaraju
|
M. Kamaraju, A.V.N. Tilak, K.Lal Kishore, K.Baburao
|
VHDL Implementation and Verification of ARINC-429 Core
|
7 pages,15 figures
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modern Avionics are controlled by sophisticated mission components in the
Aircraft. The control function is implemented via a standard ARINC-429 bus
interface. It is a two-wire point-topoint serial data bus for control
communications in Avionics. The bus operates 12.5 or 100kb/sec, the
implementation is envisaged for one transmits and receive channel respectively.
Further the code can be modified for more no of independent Tx and Rx channels.
An on chip memory allotment on the FPGA will provide a buffer bank for storing
the incoming or outgoing data. For this purpose SRAM based FPGAs are utilized.
This flexible ARINC429 solution gives exactly what is needed for real time
applications. The IP can be programmed to send an interrupt to the host and
also prepare it to process the data. Majority of the hardware function of
digital natures are embedded into a single FPGA by saving in terms of PCB board
space, power consumption and volume results. This paper deals with the
development, implementation, simulation, and verification of ARINC_429 formats.
The IP core development is described in VHDL.
|
[
{
"version": "v1",
"created": "Wed, 24 Nov 2010 14:02:30 GMT"
}
] | 2010-11-25T00:00:00 |
[
[
"Kamaraju",
"M.",
""
],
[
"Tilak",
"A. V. N.",
""
],
[
"Kishore",
"K. Lal",
""
],
[
"Baburao",
"K.",
""
]
] |
new_dataset
| 0.971962 |
0801.2838
|
Avraham Trahtman N
|
A.N. Trahtman
|
An Algorithm for Road Coloring
|
10 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A coloring of edges of a finite directed graph turns the graph into
finite-state automaton. The synchronizing word of a deterministic automaton is
a word in the alphabet of colors (considered as letters) of its edges that maps
the automaton to a single state. A coloring of edges of a directed graph of
uniform outdegree (constant outdegree of any vertex) is synchronizing if the
coloring turns the graph into a deterministic finite automaton possessing a
synchronizing word. The road coloring problem is the problem of synchronizing
coloring of a directed finite strongly connected graph of uniform outdegree if
the greatest common divisor of the lengths of all its cycles is one. The
problem posed in 1970 had evoked a noticeable interest among the specialists in
the theory of graphs, automata, codes, symbolic dynamics as well as among the
wide mathematical community. A polynomial time algorithm of $O(n^3)$ complexity
in the most worst case and quadratic in majority of studied cases for the road
coloring of the considered graph is presented below. The work is based on
recent positive solution of the road coloring problem. The algorithm was
implemented in the package TESTAS
|
[
{
"version": "v1",
"created": "Fri, 18 Jan 2008 09:22:46 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Nov 2009 06:11:35 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Nov 2010 11:06:54 GMT"
}
] | 2010-11-24T00:00:00 |
[
[
"Trahtman",
"A. N.",
""
]
] |
new_dataset
| 0.970681 |
1011.5065
|
Woohyuk Chang
|
Woohyuk Chang, Sae-Young Chung, Yong H. Lee
|
Gaussian Relay Channel Capacity to Within a Fixed Number of Bits
|
6 pages, 7 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we show that the capacity of the three-node Gaussian relay
channel can be achieved to within 1 and 2 bit/sec/Hz using compress-and-forward
and amplify-and-forward relaying, respectively.
|
[
{
"version": "v1",
"created": "Tue, 23 Nov 2010 11:27:46 GMT"
}
] | 2010-11-24T00:00:00 |
[
[
"Chang",
"Woohyuk",
""
],
[
"Chung",
"Sae-Young",
""
],
[
"Lee",
"Yong H.",
""
]
] |
new_dataset
| 0.971836 |
1011.5072
|
Muhammad Asim
|
Muhammad Asim, Hala Mokhtar, Madjid Merabti
|
A self-managing fault management mechanism for wireless sensor networks
|
14 pages, 5 figures, Journal
|
International Journal of Wireless & Mobile Networks (IJWMN) Vol.2,
No.4, November 2010
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A sensor network can be described as a collection of sensor nodes which
co-ordinate with each other to perform some specific function. These sensor
nodes are mainly in large numbers and are densely deployed either inside the
phenomenon or very close to it. They can be used for various application areas
(e.g. health, military, home). Failures are inevitable in wireless sensor
networks due to inhospitable environment and unattended deployment. Therefore,
it is necessary that network failures are detected in advance and appropriate
measures are taken to sustain network operation. We previously proposed a
cellular approach for fault detection and recovery. In this paper we extend the
cellular approach and propose a new fault management mechanism to deal with
fault detection and recovery. We propose a hierarchical structure to properly
distribute fault management tasks among sensor nodes by introducing more
'self-managing' functions. The proposed failure detection and recovery
algorithm has been compared with some existing related work and proven to be
more energy efficient.
|
[
{
"version": "v1",
"created": "Tue, 23 Nov 2010 12:05:57 GMT"
}
] | 2010-11-24T00:00:00 |
[
[
"Asim",
"Muhammad",
""
],
[
"Mokhtar",
"Hala",
""
],
[
"Merabti",
"Madjid",
""
]
] |
new_dataset
| 0.951839 |
1011.5164
|
Emilio Ferrara
|
Emilio Ferrara, Giacomo Fiumara, Francesco Pagano
|
Living City, a Collaborative Browser-based Massively Multiplayer Online
Game
|
8 pages, 6 figures; SIMUTools '10: Proceedings of the 3rd
International ICST Conference on Simulation Tools and Techniques
|
Proceedings of the 3rd International ICST Conference on Simulation
Tools and Techniques (SIMUTools '10), 2010
|
10.4108/ICST.SIMUTOOLS2010.8730
| null |
cs.CY cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work presents the design and implementation of our Browser-based
Massively Multiplayer Online Game, Living City, a simulation game fully
developed at the University of Messina. Living City is a persistent and
real-time digital world, running in the Web browser environment and accessible
from users without any client-side installation. Today Massively Multiplayer
Online Games attract the attention of Computer Scientists both for their
architectural peculiarity and the close interconnection with the social network
phenomenon. We will cover these two aspects paying particular attention to some
aspects of the project: game balancing (e.g. algorithms behind time and money
balancing); business logic (e.g., handling concurrency, cheating avoidance and
availability) and, finally, social and psychological aspects involved in the
collaboration of players, analyzing their activities and interconnections.
|
[
{
"version": "v1",
"created": "Tue, 23 Nov 2010 16:59:55 GMT"
}
] | 2010-11-24T00:00:00 |
[
[
"Ferrara",
"Emilio",
""
],
[
"Fiumara",
"Giacomo",
""
],
[
"Pagano",
"Francesco",
""
]
] |
new_dataset
| 0.999064 |
0901.4466
|
Andrew Adamatzky
|
Andrew Adamatzky
|
Physarum boats: If plasmodium sailed it would never leave a port
| null |
Applied Bionics and Biomechanics, Volume 7, Issue 1 March 2010 ,
pages 31 - 39
|
10.1080/11762320902863890
| null |
cs.RO q-bio.CB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Plasmodium of \emph{Physarum polycephalum} is a single huge (visible by naked
eye) cell with myriad of nuclei. The plasmodium is a promising substrate for
non-classical, nature-inspired, computing devices. It is capable for
approximation of shortest path, computation of planar proximity graphs and
plane tessellations, primitive memory and decision-making. The unique
properties of the plasmodium make it an ideal candidate for a role of amorphous
biological robots with massive parallel information processing and distributed
inputs and outputs. We show that when adhered to light-weight object resting on
a water surface the plasmodium can propel the object by oscillating its
protoplasmic pseudopodia. In experimental laboratory conditions and
computational experiments we study phenomenology of the plasmodium-floater
system, and possible mechanisms of controlling motion of objects propelled by
on board plasmodium.
|
[
{
"version": "v1",
"created": "Wed, 28 Jan 2009 14:12:32 GMT"
}
] | 2010-11-23T00:00:00 |
[
[
"Adamatzky",
"Andrew",
""
]
] |
new_dataset
| 0.999716 |
0911.5508
|
G David Forney Jr.
|
G. David Forney Jr
|
Codes on graphs: Duality and MacWilliams identities
|
30 pages, 20 figures. Accepted for IEEE Transactions on Information
Theory. Preliminary versions presented at IEEE Information Theory Workshop,
Taormina, Italy, October 2009 and 2010 IEEE International Symposium on
Information Theory, Austin, TX, June 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A conceptual framework involving partition functions of normal factor graphs
is introduced, paralleling a similar recent development by Al-Bashabsheh and
Mao. The partition functions of dual normal factor graphs are shown to be a
Fourier transform pair, whether or not the graphs have cycles. The original
normal graph duality theorem follows as a corollary. Within this framework,
MacWilliams identities are found for various local and global weight generating
functions of general group or linear codes on graphs; this generalizes and
provides a concise proof of the MacWilliams identity for linear time-invariant
convolutional codes that was recently found by Gluesing-Luerssen and Schneider.
Further MacWilliams identities are developed for terminated convolutional
codes, particularly for tail-biting codes, similar to those studied recently by
Bocharova, Hug, Johannesson and Kudryashov.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2009 19:03:01 GMT"
},
{
"version": "v2",
"created": "Mon, 10 May 2010 18:10:58 GMT"
},
{
"version": "v3",
"created": "Sun, 1 Aug 2010 20:47:56 GMT"
},
{
"version": "v4",
"created": "Sat, 20 Nov 2010 16:53:47 GMT"
}
] | 2010-11-23T00:00:00 |
[
[
"Forney",
"G. David",
"Jr"
]
] |
new_dataset
| 0.9998 |
1011.4580
|
AbdelRahman Karawia Dr.
|
A.A. Karawia
|
A New Algorithm for General Cyclic Heptadiagonal Linear Systems Using
Sherman-Morrison-Woodbury formula
|
8 pages
| null | null | null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a new efficient computational algorithm is presented for
solving cyclic heptadiagonal linear systems based on using of heptadiagonal
linear solver and Sherman-Morrison-Woodbury formula. The implementation of the
algorithm using computer algebra systems (CAS) such as MAPLE and MATLAB is
straightforward. Numerical example is presented for the sake of illustration.
|
[
{
"version": "v1",
"created": "Sat, 20 Nov 2010 12:37:45 GMT"
}
] | 2010-11-23T00:00:00 |
[
[
"Karawia",
"A. A.",
""
]
] |
new_dataset
| 0.975338 |
1011.4602
|
Elena Veronica Belmega
|
E. V. Belmega, B. Djeumou, and S. Lasaulce
|
Gaussian Broadcast Channels with an Orthogonal and Bidirectional
Cooperation Link
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers a system where one transmitter broadcasts a single
common message to two receivers linked by a bidirectional cooperation channel,
which is assumed to be orthogonal to the downlink channel. Assuming a
simplified setup where, in particular, scalar relaying protocols are used and
channel coding is not exploited, we want to provide elements of response to
several questions of practical interest. Here are the main underlying issues:
1. The way of recombining the signals at the receivers; 2. The optimal number
of cooperation rounds; 3. The way of cooperating (symmetrically or
asymmetrically; which receiver should start cooperating in the latter case); 4.
The influence of spectral resources. These issues are considered by studying
the performance of the assumed system through analytical results when they are
derivable and through simulation results. For the particular choices we made,
the results sometimes do not coincide with those available for the discrete
counterpart of the studied channel.
|
[
{
"version": "v1",
"created": "Sat, 20 Nov 2010 19:31:37 GMT"
}
] | 2010-11-23T00:00:00 |
[
[
"Belmega",
"E. V.",
""
],
[
"Djeumou",
"B.",
""
],
[
"Lasaulce",
"S.",
""
]
] |
new_dataset
| 0.988293 |
1010.4207
|
Francis Bach
|
Francis Bach (INRIA Rocquencourt, LIENS)
|
Convex Analysis and Optimization with Submodular Functions: a Tutorial
| null | null | null | null |
cs.LG math.OC stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Set-functions appear in many areas of computer science and applied
mathematics, such as machine learning, computer vision, operations research or
electrical networks. Among these set-functions, submodular functions play an
important role, similar to convex functions on vector spaces. In this tutorial,
the theory of submodular functions is presented, in a self-contained way, with
all results shown from first principles. A good knowledge of convex analysis is
assumed.
|
[
{
"version": "v1",
"created": "Wed, 20 Oct 2010 14:02:21 GMT"
},
{
"version": "v2",
"created": "Sun, 14 Nov 2010 17:19:42 GMT"
}
] | 2010-11-17T00:00:00 |
[
[
"Bach",
"Francis",
"",
"INRIA Rocquencourt, LIENS"
]
] |
new_dataset
| 0.973884 |
1011.2834
|
Morgan Barbier
|
Morgan Barbier (LIX)
|
New Set of Codes for the Maximum-Likelihood Decoding Problem
|
in Yet Another Conference on Cryptography, Porquerolle : France
(2010)
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The maximum-likelihood decoding problem is known to be NP-hard for general
linear and Reed-Solomon codes. In this paper, we introduce the notion of
A-covered codes, that is, codes that can be decoded through a polynomial time
algorithm A whose decoding bound is beyond the covering radius. For these
codes, we show that the maximum-likelihood decoding problem is reachable in
polynomial time in the code parameters. Focusing on bi- nary BCH codes, we were
able to find several examples of A-covered codes, including two codes for which
the maximum-likelihood decoding problem can be solved in quasi-quadratic time.
|
[
{
"version": "v1",
"created": "Fri, 12 Nov 2010 05:55:00 GMT"
}
] | 2010-11-17T00:00:00 |
[
[
"Barbier",
"Morgan",
"",
"LIX"
]
] |
new_dataset
| 0.992014 |
1011.3708
|
Stefano Bilotta
|
Stefano Bilotta, Filippo Disanto, Renzo Pinzani, Simone Rinaldi
|
Catalan structures and Catalan pairs
|
14 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A Catalan pair is a pair of binary relations (S,R) satisfying certain axioms.
These objects are enumerated by the well-known Catalan numbers, and have been
introduced with the aim of giving a common language to most of the structures
counted by Catalan numbers. Here, we give a simple method to pass from the
recursive definition of a generic Catalan structure to the recursive definition
of the Catalan pair on the same structure, thus giving an automatic way to
interpret Catalan structures in terms of Catalan pairs. We apply our method to
many well-known Catalan structures, focusing on the meaning of the relations S
and R in each considered case.
|
[
{
"version": "v1",
"created": "Tue, 16 Nov 2010 14:42:05 GMT"
}
] | 2010-11-17T00:00:00 |
[
[
"Bilotta",
"Stefano",
""
],
[
"Disanto",
"Filippo",
""
],
[
"Pinzani",
"Renzo",
""
],
[
"Rinaldi",
"Simone",
""
]
] |
new_dataset
| 0.99966 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.