id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1009.4300
Eddy Chiu
Eddy Chiu, Vincent K. N. Lau, Huang Huang, Tao Wu and Sheng Liu
Robust Transceiver Design for K-Pairs Quasi-Static MIMO Interference Channels via Semi-Definite Relaxation
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a robust transceiver design for the K-pair quasi-static MIMO interference channel. Each transmitter is equipped with M antennas, each receiver is equipped with N antennas, and the k-th transmitter sends L_k independent data streams to the desired receiver. In the literature, there exist a variety of theoretically promising transceiver designs for the interference channel such as interference alignment-based schemes, which have feasibility and practical limitations. In order to address practical system issues and requirements, we consider a transceiver design that enforces robustness against imperfect channel state information (CSI) as well as fair performance among the users in the interference channel. Specifically, we formulate the transceiver design as an optimization problem to maximize the worst-case signal-to-interference-plus-noise ratio among all users. We devise a low complexity iterative algorithm based on alternative optimization and semi-definite relaxation techniques. Numerical results verify the advantages of incorporating into transceiver design for the interference channel important practical issues such as CSI uncertainty and fairness performance.
[ { "version": "v1", "created": "Wed, 22 Sep 2010 08:56:35 GMT" } ]
2010-09-23T00:00:00
[ [ "Chiu", "Eddy", "" ], [ "Lau", "Vincent K. N.", "" ], [ "Huang", "Huang", "" ], [ "Wu", "Tao", "" ], [ "Liu", "Sheng", "" ] ]
new_dataset
0.965545
1009.4012
Geoffroy Gueguen
Geoffroy Gueguen
Van Wijngaarden grammars, metamorphism and K-ary malwares
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Grammars are used to describe sentences structure, thanks to some sets of rules, which depends on the grammar type. A classification of grammars has been made by Noam Chomsky, which led to four well-known types. Yet, there are other types of grammars, which do not exactly fit in Chomsky's classification, such as the two-level grammars. As their name suggests it, the main idea behind these grammars is that they are composed of two grammars. Van Wijngaarden grammars, particularly, are such grammars. They are interesting by their power (expressiveness), which can be the same, under some hypotheses, as the most powerful grammars of Chomsky's classification, i.e. Type 0 grammars. Another point of interest is their relative conciseness and readability. Van Wijngaarden grammars can describe static and dynamic semantic of a language. So, by using them as a generative engine, it is possible to generate a possibly infinite set of words, while assuring us that they all have the same semantic. Moreover, they can describe K-ary codes, by describing the semantic of each components of a code.
[ { "version": "v1", "created": "Tue, 21 Sep 2010 07:24:20 GMT" } ]
2010-09-22T00:00:00
[ [ "Gueguen", "Geoffroy", "" ] ]
new_dataset
0.998981
1008.1224
Sandor P. Fekete
Erik D. Demaine, Sandor P. Fekete, and Robert J. Lang
Circle Packing for Origami Design Is Hard
17 pages, 13 figures. An abstract was presented at the 5th International Conference on Origami in Science, Mathematics and Education (5OSME). Updated to fix a numerical typo related to Figure 13, and a new result
null
null
null
cs.CG cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that deciding whether a given set of circles can be packed into a rectangle, an equilateral triangle, or a unit square are NP-hard problems, settling the complexity of these natural packing problems. On the positive side, we show that any set of circles of total area 1 can be packed into a square of size 4/\sqrt{pi}=2.2567... These results are motivated by problems arising in the context of origami design.
[ { "version": "v1", "created": "Fri, 6 Aug 2010 16:05:28 GMT" }, { "version": "v2", "created": "Mon, 20 Sep 2010 10:58:47 GMT" } ]
2010-09-21T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Fekete", "Sandor P.", "" ], [ "Lang", "Robert J.", "" ] ]
new_dataset
0.999385
1009.3502
Krishnam Raju Jampani
Krishnam Raju Jampani and Anna Lubiw
Simultaneous Interval Graphs
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a recent paper, we introduced the simultaneous representation problem (defined for any graph class C) and studied the problem for chordal, comparability and permutation graphs. For interval graphs, the problem is defined as follows. Two interval graphs G_1 and G_2, sharing some vertices I (and the corresponding induced edges), are said to be `simultaneous interval graphs' if there exist interval representations R_1 and R_2 of G_1 and G_2, such that any vertex of I is mapped to the same interval in both R_1 and R_2. Equivalently, G_1 and G_2 are simultaneous interval graphs if there exist edges E' between G_1-I and G_2-I such that G_1 \cup G_2 \cup E' is an interval graph. Simultaneous representation problems are related to simultaneous planar embeddings, and have applications in any situation where it is desirable to consistently represent two related graphs, for example: interval graphs capturing overlaps of DNA fragments of two similar organisms; or graphs connected in time, where one is an updated version of the other. In this paper we give an O(n^2*logn) time algorithm for recognizing simultaneous interval graphs,where n = |G_1 \cup G_2|. This result complements the polynomial time algorithms for recognizing probe interval graphs and provides an efficient algorithm for the interval graph sandwich problem for the special case where the set of optional edges induce a complete bipartite graph.
[ { "version": "v1", "created": "Fri, 17 Sep 2010 20:25:56 GMT" } ]
2010-09-21T00:00:00
[ [ "Jampani", "Krishnam Raju", "" ], [ "Lubiw", "Anna", "" ] ]
new_dataset
0.997246
1009.3539
Fangying Xiao
Fangying Xiao and Hanwu Chen
Is A Quantum Stabilizer Code Degenerate or Nondegenerate for Pauli Channel?
7 pages,1 figure
null
null
null
cs.CR quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mapping an error syndrome to the error operator is the core of quantum decoding network and is also the key step of recovery. The definitions of the bit-flip error syndrome matrix and the phase-flip error syndrome matrix were presented, and then the error syndromes of quantum errors were expressed in terms of the columns of the bit-flip error syndrome matrix and the phase-flip error syndrome matrix. It also showed that the error syndrome matrices of a stabilizer code are determined by its check matrix, which is similar to the classical case. So, the error-detection and recovery techniques of classical linear codes can be applied to quantum stabilizer codes after some modifications. Some necessary and/or sufficient conditions for the stabilizer code over GF(2) is degenerate or nondegenerate for Pauli channel based on the relationship between the error syndrome matrices and the check matrix was presented. A new way to find the minimum distance of the quantum stabilizer codes based on their check matrices was presented, and followed from which we proved that the performance of degenerate quantum code outperform (at least have the same performance) nondegenerate quantum code for Pauli channel.
[ { "version": "v1", "created": "Sat, 18 Sep 2010 07:47:16 GMT" } ]
2010-09-21T00:00:00
[ [ "Xiao", "Fangying", "" ], [ "Chen", "Hanwu", "" ] ]
new_dataset
0.995552
1009.3552
Arash Habibi Lashkari
Behrang Parhizkar, Abdulbasit Mohammad Abdulrahman Alazizi, Mohammad Nabil Sadegh Ali, Anand Ramachandran, Sujata Navaratnam
PC 2 Phone Event Announcer
5 pages, 3 figures, IJCSIS Vol. 8 No. 5
International Journal of Computer Science& Information Security(IJCSIS) Vol. 8 No. 5, August 2010, ISSN 1947-5500
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays, mobile phones are indispensable devices; it has become a trend now that college and university students are owners of such devices and this particular factor plays a very important role behind the coming up with the proposed system. "PC 2 Phone event Announcer", is the name of the new proposed system suggested to solve the existing communication problem between the College staff and students. As the name suggests, it can be deduced that the system will involve computers and phones, more specifically mobile phones.
[ { "version": "v1", "created": "Sat, 18 Sep 2010 12:02:33 GMT" } ]
2010-09-21T00:00:00
[ [ "Parhizkar", "Behrang", "" ], [ "Alazizi", "Abdulbasit Mohammad Abdulrahman", "" ], [ "Ali", "Mohammad Nabil Sadegh", "" ], [ "Ramachandran", "Anand", "" ], [ "Navaratnam", "Sujata", "" ] ]
new_dataset
0.999573
1009.3602
Fang Liu
Fang Liu, Daiyuan Peng, Zhengchun Zhou, and Xiaohu Tang
Construction of Frequency Hopping Sequence Set Based upon Generalized Cyclotomy
16 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Frequency hopping (FH) sequences play a key role in frequency hopping spread spectrum communication systems. It is important to find FH sequences which have simultaneously good Hamming correlation, large family size and large period. In this paper, a new set of FH sequences with large period is proposed, and the Hamming correlation distribution of the new set is investigated. The construction of new FH sequences is based upon Whiteman's generalized cyclotomy. It is shown that the proposed FH sequence set is optimal with respect to the average Hamming correlation bound.
[ { "version": "v1", "created": "Sun, 19 Sep 2010 03:28:17 GMT" } ]
2010-09-21T00:00:00
[ [ "Liu", "Fang", "" ], [ "Peng", "Daiyuan", "" ], [ "Zhou", "Zhengchun", "" ], [ "Tang", "Xiaohu", "" ] ]
new_dataset
0.976686
1009.3665
Amitabh Chaudhary
Tanu Malik, Xiaodan Wang, Philip Little, Amitabh Chaudhary, and Ani Thakar
A Dynamic Data Middleware Cache for Rapidly-growing Scientific Repositories
null
null
null
null
cs.DC cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern scientific repositories are growing rapidly in size. Scientists are increasingly interested in viewing the latest data as part of query results. Current scientific middleware cache systems, however, assume repositories are static. Thus, they cannot answer scientific queries with the latest data. The queries, instead, are routed to the repository until data at the cache is refreshed. In data-intensive scientific disciplines, such as astronomy, indiscriminate query routing or data refreshing often results in runaway network costs. This severely affects the performance and scalability of the repositories and makes poor use of the cache system. We present Delta, a dynamic data middleware cache system for rapidly-growing scientific repositories. Delta's key component is a decision framework that adaptively decouples data objects---choosing to keep some data object at the cache, when they are heavily queried, and keeping some data objects at the repository, when they are heavily updated. Our algorithm profiles incoming workload to search for optimal data decoupling that reduces network costs. It leverages formal concepts from the network flow problem, and is robust to evolving scientific workloads. We evaluate the efficacy of Delta, through a prototype implementation, by running query traces collected from a real astronomy survey.
[ { "version": "v1", "created": "Sun, 19 Sep 2010 22:26:23 GMT" } ]
2010-09-21T00:00:00
[ [ "Malik", "Tanu", "" ], [ "Wang", "Xiaodan", "" ], [ "Little", "Philip", "" ], [ "Chaudhary", "Amitabh", "" ], [ "Thakar", "Ani", "" ] ]
new_dataset
0.996375
1009.3779
Mostafa Zaman Chowdhury
Mostafa Zaman Chowdhury and Yeong Min Jang
Handover Control for WCDMA Femtocell Networks
Published in "The Journal of Korea Information and Communication Society" for the volume of May 2010
The Journal of Korea Information and Communication Society, May 2010
null
null
cs.NI cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ability to seamlessly switch between the macro networks and femtocell networks is a key driver for femtocell network deployment. The handover procedures for the integrated femtocell/macrocell networks differ from the existing handovers. Some modifications of existing network and protocol architecture for the integration of femtocell networks with the existing macrocell networks are also essential. These modifications change the signal flow for handover procedures due to different 2-tier cell (macrocell and femtocell) environment. The handover between two networks should be performed with minimum signaling. A frequent and unnecessary handover is another problem for hierarchical femtocell/macrocell network environment that must be minimized. This work studies the details mobility management schemes for small and medium scale femtocell network deployment. To do that, firstly we present two different network architectures for small scale and medium scale WCDMA femtocell deployment. The details handover call flow for these two network architectures and CAC scheme to minimize the unnecessary handovers are proposed for the integrated femtocell/macrocell networks. The numerical analysis for the proposed M/M/N/N queuing scheme and the simulation results of the proposed CAC scheme demonstrate the handover call control performances for femtocell environment.
[ { "version": "v1", "created": "Mon, 20 Sep 2010 11:50:21 GMT" } ]
2010-09-21T00:00:00
[ [ "Chowdhury", "Mostafa Zaman", "" ], [ "Jang", "Yeong Min", "" ] ]
new_dataset
0.995766
1009.3806
Germ\'an Vidal
Paulo Andr\'e and Salvador Abreu
Casting of the WAM as an EAM
Online proceedings of the Joint Workshop on Implementation of Constraint Logic Programming Systems and Logic-based Methods in Programming Environments (CICLOPS-WLPE 2010), Edinburgh, Scotland, U.K., July 15, 2010
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Logic programming provides a very high-level view of programming, which comes at the cost of some execution efficiency. Improving performance of logic programs is thus one of the holy grails of Prolog system implementations and a wide range of approaches have historically been taken towards this goal. Designing computational models that both exploit the available parallelism in a given application and that try hard to reduce the explored search space has been an ongoing line of research for many years. These goals in particular have motivated the design of several computational models, one of which is the Extended Andorra Model (EAM). In this paper, we present a preliminary specification and implementation of the EAM with Implicit Control, the WAM2EAM, which supplies regular WAM instructions with an EAM-centered interpretation.
[ { "version": "v1", "created": "Mon, 20 Sep 2010 13:04:13 GMT" } ]
2010-09-21T00:00:00
[ [ "André", "Paulo", "" ], [ "Abreu", "Salvador", "" ] ]
new_dataset
0.993652
1009.3291
Zhiying Wang
Zhiying Wang and Alexandros G. Dimakis and Jehoshua Bruck
Rebuilding for Array Codes in Distributed Storage Systems
7 pages, 3 figures, accepted by workshop on the Application of Communication Theory to Emerging Memory Technologies (ACTEMT) 2010
null
null
null
cs.IT cs.DC cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In distributed storage systems that use coding, the issue of minimizing the communication required to rebuild a storage node after a failure arises. We consider the problem of repairing an erased node in a distributed storage system that uses an EVENODD code. EVENODD codes are maximum distance separable (MDS) array codes that are used to protect against erasures, and only require XOR operations for encoding and decoding. We show that when there are two redundancy nodes, to rebuild one erased systematic node, only 3/4 of the information needs to be transmitted. Interestingly, in many cases, the required disk I/O is also minimized.
[ { "version": "v1", "created": "Thu, 16 Sep 2010 21:54:20 GMT" } ]
2010-09-20T00:00:00
[ [ "Wang", "Zhiying", "" ], [ "Dimakis", "Alexandros G.", "" ], [ "Bruck", "Jehoshua", "" ] ]
new_dataset
0.9815
1009.3415
Caihong Kai
Cai Hong Kai and Soung Chang Liew
Temporal Starvation in CSMA Wireless Networks
27 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well known that links in CSMA wireless networks are prone to starvation. Prior works focused almost exclusively on equilibrium starvation. In this paper, we show that links in CSMA wireless networks are also susceptible to temporal starvation. Specifically, although some links have good equilibrium throughputs and do not suffer from equilibrium starvation, they can still have no throughput for extended periods from time to time. Given its impact on quality of service, it is important to understand and characterize temporal starvation. To this end, we develop a "trap theory" to analyze temporal throughput fluctuation. The trap theory serves two functions. First, it allows us to derive new mathematical results that shed light on the transient behavior of CSMA networks. For example, we show that the duration of a trap, during which some links receive no throughput, is insensitive to the distributions of the backoff countdown and transmission time (packet duration) in the CSMA protocol. Second, we can develop analytical tools for computing the "degrees of starvation" for CSMA networks to aid network design. For example, given a CSMA network, we can determine whether it suffers from starvation, and if so, which links will starve. Furthermore, the likelihood and durations of temporal starvation can also be computed. We believe that the ability to identify and characterize temporal starvation as established in this paper will serve as an important first step toward the design of effective remedies for it.
[ { "version": "v1", "created": "Fri, 17 Sep 2010 13:21:16 GMT" } ]
2010-09-20T00:00:00
[ [ "Kai", "Cai Hong", "" ], [ "Liew", "Soung Chang", "" ] ]
new_dataset
0.982915
1009.2218
Amol Aggarwal
Amol Aggarwal
On Isosceles Triangles and Related Problems in a Convex Polygon
null
null
null
null
cs.CG cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given any convex $n$-gon, in this article, we: (i) prove that its vertices can form at most $n^2/2 + \Theta(n\log n)$ isosceles trianges with two sides of unit length and show that this bound is optimal in the first order, (ii) conjecture that its vertices can form at most $3n^2/4 + o(n^2)$ isosceles triangles and prove this conjecture for a special group of convex $n$-gons, (iii) prove that its vertices can form at most $\lfloor n/k \rfloor$ regular $k$-gons for any integer $k\ge 4$ and that this bound is optimal, and (iv) provide a short proof that the sum of all the distances between its vertices is at least $(n-1)/2$ and at most $\lfloor n/2 \rfloor \lceil n/2 \rceil(1/2)$ as long as the convex $n$-gon has unit perimeter.
[ { "version": "v1", "created": "Sun, 12 Sep 2010 05:56:03 GMT" }, { "version": "v2", "created": "Wed, 15 Sep 2010 05:06:19 GMT" } ]
2010-09-16T00:00:00
[ [ "Aggarwal", "Amol", "" ] ]
new_dataset
0.998756
1009.2902
Jan Bergstra
Jan A. Bergstra
Informal Control code logic
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.
[ { "version": "v1", "created": "Wed, 15 Sep 2010 12:02:04 GMT" } ]
2010-09-16T00:00:00
[ [ "Bergstra", "Jan A.", "" ] ]
new_dataset
0.996328
1009.2927
Yi Ma
Na Yi, Yi Ma and Rahim Tafazolli
Underlay Cognitive Radio with Full or Partial Channel Quality Information
29 Pages, 8 figures
International Journal of Navigation and Observation 2010
10.1155/2010/105723
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Underlay cognitive radios (UCRs) allow a secondary user to enter a primary user's spectrum through intelligent utilization of multiuser channel quality information (CQI) and sharing of codebook. The aim of this work is to study two-user Gaussian UCR systems by assuming the full or partial knowledge of multiuser CQI. Key contribution of this work is motivated by the fact that the full knowledge of multiuser CQI is not always available. We first establish a location-aided UCR model where the secondary user is assumed to have partial CQI about the secondary-transmitter to primary-receiver link as well as full CQI about the other links. Then, new UCR approaches are proposed and carefully analyzed in terms of the secondary user's achievable rate, denoted by $C_2$, the capacity penalty to primary user, denoted by $\Delta C_1$, and capacity outage probability. Numerical examples are provided to visually compare the performance of UCRs with full knowledge of multiuser CQI and the proposed approaches with partial knowledge of multiuser CQI.
[ { "version": "v1", "created": "Wed, 15 Sep 2010 13:52:15 GMT" } ]
2010-09-16T00:00:00
[ [ "Yi", "Na", "" ], [ "Ma", "Yi", "" ], [ "Tafazolli", "Rahim", "" ] ]
new_dataset
0.98822
1009.2617
Anish Das Sarma
Anish Das Sarma, Sreenivas Gollapudi, Rina Panigrahy, Li Zhang
Understanding Fashion Cycles as a Social Choice
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a formal model for studying fashion trends, in terms of three parameters of fashionable items: (1) their innate utility; (2) individual boredom associated with repeated usage of an item; and (3) social influences associated with the preferences from other people. While there are several works that emphasize the effect of social influence in understanding fashion trends, in this paper we show how boredom plays a strong role in both individual and social choices. We show how boredom can be used to explain the cyclic choices in several scenarios such as an individual who has to pick a restaurant to visit every day, or a society that has to repeatedly `vote' on a single fashion style from a collection. We formally show that a society that votes for a single fashion style can be viewed as a single individual cycling through different choices. In our model, the utility of an item gets discounted by the amount of boredom that has accumulated over the past; this boredom increases with every use of the item and decays exponentially when not used. We address the problem of optimally choosing items for usage, so as to maximize over-all satisfaction, i.e., composite utility, over a period of time. First we show that the simple greedy heuristic of always choosing the item with the maximum current composite utility can be arbitrarily worse than the optimal. Second, we prove that even with just a single individual, determining the optimal strategy for choosing items is NP-hard. Third, we show that a simple modification to the greedy algorithm that simply doubles the boredom of each item is a provably close approximation to the optimal strategy. Finally, we present an experimental study over real-world data collected from query logs to compare our algorithms.
[ { "version": "v1", "created": "Tue, 14 Sep 2010 10:32:44 GMT" } ]
2010-09-15T00:00:00
[ [ "Sarma", "Anish Das", "" ], [ "Gollapudi", "Sreenivas", "" ], [ "Panigrahy", "Rina", "" ], [ "Zhang", "Li", "" ] ]
new_dataset
0.994847
1005.3045
Noah Stein
Noah D. Stein, Pablo A. Parrilo, and Asuman Ozdaglar
A partial proof of Nash's Theorem via exchangeable equilibria
Announcement of an error found in the original proof submitted 17 May 2010
null
null
null
cs.GT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This document consists of two parts: the second part was submitted earlier as a new proof of Nash's theorem, and the first part is a note explaining a problem found in that proof. We are indebted to Sergiu Hart and Eran Shmaya for their careful study which led to their simultaneous discovery of this error. So far the error has not been fixed, but many of the results and techniques of the paper remain valid, so we will continue to make it available online. Abstract for the original paper: We give a novel proof of the existence of Nash equilibria in all finite games without using fixed point theorems or path following arguments. Our approach relies on a new notion intermediate between Nash and correlated equilibria called exchangeable equilibria, which are correlated equilibria with certain symmetry and factorization properties. We prove these exist by a duality argument, using Hart and Schmeidler's proof of correlated equilibrium existence as a first step. In an appropriate limit exchangeable equilibria converge to the convex hull of Nash equilibria, proving that these exist as well. Exchangeable equilibria are defined in terms of symmetries of the game, so this method automatically proves the stronger statement that a symmetric game has a symmetric Nash equilibrium. The case without symmetries follows by a symmetrization argument.
[ { "version": "v1", "created": "Mon, 17 May 2010 20:50:45 GMT" }, { "version": "v2", "created": "Tue, 31 Aug 2010 19:45:54 GMT" }, { "version": "v3", "created": "Mon, 13 Sep 2010 13:40:01 GMT" } ]
2010-09-14T00:00:00
[ [ "Stein", "Noah D.", "" ], [ "Parrilo", "Pablo A.", "" ], [ "Ozdaglar", "Asuman", "" ] ]
new_dataset
0.993012
1009.2206
Justin F Brunelle
Kyle B. Dempsey, Justin F. Brunelle, G. Tanner Jackson, Chutima Boonthum, Irwin B. Levinstein, and Danielle S. McNamara
MiBoard: Multiplayer Interactive Board Game
14th International Conference on Artificial Intelligence in Education (AIED), 2009
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Serious games have recently emerged as an avenue for curriculum delivery. Serious games incorporate motivation and entertainment while providing pointed curriculum for the user. This paper presents a serious game, called MiBoard, currently being developed from the iSTART Intelligent Tutoring System. MiBoard incorporates a multiplayer interaction that iSTART was previously unable to provide. This multiplayer interaction produces a wide variation across game trials, while also increasing the repeat playability for users. This paper presents a demonstration of the MiBoard system and the expectations for its application.
[ { "version": "v1", "created": "Sun, 12 Sep 2010 00:33:16 GMT" } ]
2010-09-14T00:00:00
[ [ "Dempsey", "Kyle B.", "" ], [ "Brunelle", "Justin F.", "" ], [ "Jackson", "G. Tanner", "" ], [ "Boonthum", "Chutima", "" ], [ "Levinstein", "Irwin B.", "" ], [ "McNamara", "Danielle S.", "" ] ]
new_dataset
0.997431
1009.2207
Justin F Brunelle
Kyle B Dempsey, G. Tanner Jackson, Justin F. Brunelle, Michael Rowe, Danielle S. McNamara
MiBoard: A Digital Game from a Physical World
null
FLAIRS-23, May 22-23 2010
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Increasing user engagement is constant challenge for Intelligent Tutoring Systems researchers. A current trend in the ITS field is to increase engagement of proven learning systems by integrating them within games, or adding in game like components. Incorporating proven learning methods within a game based environment is expected to add to the overall experience without detracting from the original goals, however, the current study demonstrates two important issues with regard to ITS design. First, effective designs from the physical world do not always translate into the digital world. Second, games do not necessarily improve engagement, and in some cases, they may have the opposite effect. The current study discusses the development and a brief assessment of MiBoard a multiplayer collaborative online board game designed to closely emulate a previously developed physical board game, iSTART: The Board Game.
[ { "version": "v1", "created": "Sun, 12 Sep 2010 00:35:50 GMT" } ]
2010-09-14T00:00:00
[ [ "Dempsey", "Kyle B", "" ], [ "Jackson", "G. Tanner", "" ], [ "Brunelle", "Justin F.", "" ], [ "Rowe", "Michael", "" ], [ "McNamara", "Danielle S.", "" ] ]
new_dataset
0.998102
1009.2002
Zeeshan Ahmed Mr.
Zeeshan Ahmed
Aero Fighter - 2D Gaming
In the proceedings of 9th National Research Conference on Management and Computer Sciences, SZABIST Institute of Science and Technology, Pakistan
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Designing and developing quality based computer game is always a challenging task for developers. In this paper I briefly discuss aero fighting war game based on simple 2D gaming concepts and developed in C & C++ programming languages, using old bitmapping concepts. Going into the details of the game development, I discuss the designed strategies, flow of game and implemented prototype version of game, especially for beginners of game programming.
[ { "version": "v1", "created": "Fri, 10 Sep 2010 12:56:30 GMT" } ]
2010-09-13T00:00:00
[ [ "Ahmed", "Zeeshan", "" ] ]
new_dataset
0.998329
1009.2003
Zeeshan Ahmed Mr.
Zeeshan Ahmed
AI 3D Cybug Gaming
In the proceedings of 9th National Research Conference on Management and Computer Sciences, SZABIST Institute of Science and Technology, Pakistan
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this short paper I briefly discuss 3D war Game based on artificial intelligence concepts called AI WAR. Going in to the details, I present the importance of CAICL language and how this language is used in AI WAR. Moreover I also present a designed and implemented 3D War Cybug for AI WAR using CAICL and discus the implemented strategy to defeat its enemies during the game life.
[ { "version": "v1", "created": "Fri, 10 Sep 2010 12:58:30 GMT" } ]
2010-09-13T00:00:00
[ [ "Ahmed", "Zeeshan", "" ] ]
new_dataset
0.999129
0810.1268
Sang Joon Kim
Sang Joon Kim, Natasha Devroye, Vahid Tarokh
Bi-directional half-duplex protocols with multiple relays
44 pages, 17 figures, Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a bi-directional relay channel, two nodes wish to exchange independent messages over a shared wireless half-duplex channel with the help of relays. Recent work has considered information theoretic limits of the bi-directional relay channel with a single relay. In this work we consider bi-directional relaying with multiple relays. We derive achievable rate regions and outer bounds for half-duplex protocols with multiple decode and forward relays and compare these to the same protocols with amplify and forward relays in an additive white Gaussian noise channel. We consider three novel classes of half-duplex protocols: the (m,2) 2 phase protocol with m relays, the (m,3) 3 phase protocol with m relays, and general (m, t) Multiple Hops and Multiple Relays (MHMR) protocols, where m is the total number of relays and 3<t< m+3 is the number of temporal phases in the protocol. The (m,2) and (m,3) protocols extend previous bi-directional relaying protocols for a single m=1 relay, while the new (m,t) protocol efficiently combines multi-hop routing with message-level network coding. Finally, we provide a comprehensive treatment of the MHMR protocols with decode and forward relaying and amplify and forward relaying in the Gaussian noise, obtaining their respective achievable rate regions, outer bounds and relative performance under different SNRs and relay geometries, including an analytical comparison on the protocols at low and high SNR.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 18:26:39 GMT" }, { "version": "v2", "created": "Thu, 9 Sep 2010 11:57:46 GMT" } ]
2010-09-10T00:00:00
[ [ "Kim", "Sang Joon", "" ], [ "Devroye", "Natasha", "" ], [ "Tarokh", "Vahid", "" ] ]
new_dataset
0.989127
1005.0830
Jean-Guillaume Dumas
Jean-Guillaume Dumas (LJK), Thierry Gautier (INRIA Rh\^one-Alpes / LIG Laboratoire d'Informatique de Grenoble), Jean-Louis Roch (INRIA Rh\^one-Alpes / LIG Laboratoire d'Informatique de Grenoble)
Generic design of Chinese remaindering schemes
International Symposium on Parallel Symbolic Computation, Grenoble : France (2010)
null
10.1145/1837210.1837218
null
cs.SC cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a generic design for Chinese remainder algorithms. A Chinese remainder computation consists in reconstructing an integer value from its residues modulo non coprime integers. We also propose an efficient linear data structure, a radix ladder, for the intermediate storage and computations. Our design is structured into three main modules: a black box residue computation in charge of computing each residue; a Chinese remaindering controller in charge of launching the computation and of the termination decision; an integer builder in charge of the reconstruction computation. We then show that this design enables many different forms of Chinese remaindering (e.g. deterministic, early terminated, distributed, etc.), easy comparisons between these forms and e.g. user-transparent parallelism at different parallel grains.
[ { "version": "v1", "created": "Wed, 5 May 2010 19:45:22 GMT" } ]
2010-09-09T00:00:00
[ [ "Dumas", "Jean-Guillaume", "", "LJK" ], [ "Gautier", "Thierry", "", "INRIA Rhône-Alpes / LIG\n Laboratoire d'Informatique de Grenoble" ], [ "Roch", "Jean-Louis", "", "INRIA Rhône-Alpes\n / LIG Laboratoire d'Informatique de Grenoble" ] ]
new_dataset
0.971425
1009.1412
Grenville Croll
Patrick O'Beirne
Spreadsheet Refactoring
14 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2010 24-32 ISBN 978-1-905404-50-6
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Refactoring is a change made to the internal structure of software to make it easier to understand and cheaper to modify without changing its observable behaviour. A database refactoring is a small change to the database schema which improves its design without changing its semantics. This paper presents example 'spreadsheet refactorings', derived from the above and taking into account the unique characteristics of spreadsheet formulas and VBA code. The techniques are constrained by the tightly coupled data and code in spreadsheets.
[ { "version": "v1", "created": "Tue, 7 Sep 2010 21:35:50 GMT" } ]
2010-09-09T00:00:00
[ [ "O'Beirne", "Patrick", "" ] ]
new_dataset
0.965113
1009.1194
Sindhuben Kanojia Babulal
Kanojia Sindhuben Babulal and Rajiv Ranjan Tewari
E2XLRADR (Energy Efficient Cross Layer Routing Algorithm with Dynamic Retransmission for Wireless Sensor Networks)
null
http://airccse.org/journal/jwmn/0203ijwmn12.pdf. International Journal of Wireless & Mobile Networks ( IJWMN ), Vol.2, No.3, August 2010
10.5121/ijwmn.2010.2312
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main focus of this article is to achieve prolonged network lifetime with overall energy efficiency in wireless sensor networks through controlled utilization of limited energy. Major percentage of energy in wireless sensor network is consumed during routing from source to destination, retransmission of data on packet loss. For improvement, cross layered algorithm is proposed for routing and retransmission scheme. Simulation and results shows that this approach can save the overall energy consumption
[ { "version": "v1", "created": "Tue, 7 Sep 2010 05:15:54 GMT" } ]
2010-09-08T00:00:00
[ [ "Babulal", "Kanojia Sindhuben", "" ], [ "Tewari", "Rajiv Ranjan", "" ] ]
new_dataset
0.982394
0806.1148
Dominik Scheder
Dominik Scheder and Philipp Zumstein
Unsatisfiable CNF Formulas need many Conflicts
new version; added an upper bound on the number of conflicts
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A pair of clauses in a CNF formula constitutes a conflict if there is a variable that occurs positively in one clause and negatively in the other. A CNF formula without any conflicts is satisfiable. The Lovasz Local Lemma implies that a k-CNF formula is satisfiable if each clause conflicts with at most 2^k/e-1 clauses. It does not, however, give any good bound on how many conflicts an unsatisfiable formula has globally. We show here that every unsatisfiable k-CNF formula requires 2.69^k conflicts and there exist unsatisfiable k-CNF formulas with 3.51^k conflicts.
[ { "version": "v1", "created": "Fri, 6 Jun 2008 12:48:42 GMT" }, { "version": "v2", "created": "Mon, 6 Sep 2010 13:36:12 GMT" } ]
2010-09-07T00:00:00
[ [ "Scheder", "Dominik", "" ], [ "Zumstein", "Philipp", "" ] ]
new_dataset
0.996777
1006.2361
Marko A. Rodriguez
Marko A. Rodriguez and Peter Neubauer
Constructions from Dots and Lines
In press with the Bulletin of the American Society for Information Science and Technology
Bulletin of the American Society for Information Science and Technology, American Society for Information Science and Technology, 36,(6), pp. 35-41, ISSN:1550-8366, August 2010
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph is a data structure composed of dots (i.e. vertices) and lines (i.e. edges). The dots and lines of a graph can be organized into intricate arrangements. The ability for a graph to denote objects and their relationships to one another allow for a surprisingly large number of things to be modeled as a graph. From the dependencies that link software packages to the wood beams that provide the framing to a house, most anything has a corresponding graph representation. However, just because it is possible to represent something as a graph does not necessarily mean that its graph representation will be useful. If a modeler can leverage the plethora of tools and algorithms that store and process graphs, then such a mapping is worthwhile. This article explores the world of graphs in computing and exposes situations in which graphical models are beneficial.
[ { "version": "v1", "created": "Fri, 11 Jun 2010 18:16:10 GMT" } ]
2010-09-07T00:00:00
[ [ "Rodriguez", "Marko A.", "" ], [ "Neubauer", "Peter", "" ] ]
new_dataset
0.995813
1009.0806
Geevarghese Philip
Geevarghese Philip, Venkatesh Raman, Yngve Villanger
A Quartic Kernel for Pathwidth-One Vertex Deletion
Full version of an extended abstract accepted for publication in the proceedings of WG 2010. 18 pages, 1 figure
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The pathwidth of a graph is a measure of how path-like the graph is. Given a graph G and an integer k, the problem of finding whether there exist at most k vertices in G whose deletion results in a graph of pathwidth at most one is NP- complete. We initiate the study of the parameterized complexity of this problem, parameterized by k. We show that the problem has a quartic vertex-kernel: We show that, given an input instance (G = (V, E), k); |V| = n, we can construct, in polynomial time, an instance (G', k') such that (i) (G, k) is a YES instance if and only if (G', k') is a YES instance, (ii) G' has O(k^{4}) vertices, and (iii) k' \leq k. We also give a fixed parameter tractable (FPT) algorithm for the problem that runs in O(7^{k} k \cdot n^{2}) time.
[ { "version": "v1", "created": "Sat, 4 Sep 2010 05:39:41 GMT" } ]
2010-09-07T00:00:00
[ [ "Philip", "Geevarghese", "" ], [ "Raman", "Venkatesh", "" ], [ "Villanger", "Yngve", "" ] ]
new_dataset
0.999632
0812.0956
Florian Hartig
Florian Hartig, Martin Horn, Martin Drechsler
EcoTRADE - a multi player network game of a tradable permit market for biodiversity credits
3 pages, 1 figure
Environmental Modelling & Software, 2010, 25, 1479-1480
10.1016/j.envsoft.2009.01.003
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
EcoTRADE is a multi player network game of a virtual biodiversity credit market. Each player controls the land use of a certain amount of parcels on a virtual landscape. The biodiversity credits of a particular parcel depend on neighboring parcels, which may be owned by other players. The game can be used to study the strategies of players in experiments or classroom games and also as a communication tool for stakeholders participating in credit markets that include spatially interdependent credits.
[ { "version": "v1", "created": "Thu, 4 Dec 2008 15:43:16 GMT" }, { "version": "v2", "created": "Fri, 3 Sep 2010 16:53:24 GMT" } ]
2010-09-06T00:00:00
[ [ "Hartig", "Florian", "" ], [ "Horn", "Martin", "" ], [ "Drechsler", "Martin", "" ] ]
new_dataset
0.99966
1009.0585
Dananjayan Perumal
P. Samundiswary, D.Sathian and P. Dananjayan
Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks
12 pages, 16 figures
International Journal of Ad hoc, Sensor & Ubiquitous Computing( IJASUC ) Vol.1, No.2, June 2010
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured with limited energy, computation and transmission power. Each node in the network coordinates with every other node in forwarding their packets to reach the destination. Since these nodes operate in a physically insecure environment; they are vulnerable to different types of attacks such as selective forwarding and sinkhole. These attacks can inject malicious packets by compromising the node. Geographical routing protocols of wireless sensor networks have been developed without considering the security aspects against these attacks. In this paper, a secure routing protocol named secured greedy perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery ratio of the networks.
[ { "version": "v1", "created": "Fri, 3 Sep 2010 05:06:04 GMT" } ]
2010-09-06T00:00:00
[ [ "Samundiswary", "P.", "" ], [ "Sathian", "D.", "" ], [ "Dananjayan", "P.", "" ] ]
new_dataset
0.991647
1009.0670
Marko A. Rodriguez
Marko A. Rodriguez and Jennifer H. Watkins
Grammar-Based Geodesics in Semantic Networks
First draft written in 2007
Knowledge-Based Systems, 23(8), pp. 844-855, December 2010
10.1016/j.knosys.2010.05.009
LA-UR-07-4042
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A geodesic is the shortest path between two vertices in a connected network. The geodesic is the kernel of various network metrics including radius, diameter, eccentricity, closeness, and betweenness. These metrics are the foundation of much network research and thus, have been studied extensively in the domain of single-relational networks (both in their directed and undirected forms). However, geodesics for single-relational networks do not translate directly to multi-relational, or semantic networks, where vertices are connected to one another by any number of edge labels. Here, a more sophisticated method for calculating a geodesic is necessary. This article presents a technique for calculating geodesics in semantic networks with a focus on semantic networks represented according to the Resource Description Framework (RDF). In this framework, a discrete "walker" utilizes an abstract path description called a grammar to determine which paths to include in its geodesic calculation. The grammar-based model forms a general framework for studying geodesic metrics in semantic networks.
[ { "version": "v1", "created": "Fri, 3 Sep 2010 13:49:47 GMT" } ]
2010-09-06T00:00:00
[ [ "Rodriguez", "Marko A.", "" ], [ "Watkins", "Jennifer H.", "" ] ]
new_dataset
0.995285
1008.3452
Farnood Merrikh-Bayat
Farnood Merrikh-Bayat, Saeed Bagheri Shouraki
Memristor-based Circuits for Performing Basic Arithmetic Operations
5pages, 4 figures, Accepted in World Conference on Information Technology, turkey, 2010
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In almost all of the currently working circuits, especially in analog circuits implementing signal processing applications, basic arithmetic operations such as multiplication, addition, subtraction and division are performed on values which are represented by voltages or currents. However, in this paper, we propose a new and simple method for performing analog arithmetic operations which in this scheme, signals are represented and stored through a memristance of the newly found circuit element, i.e. memristor, instead of voltage or current. Some of these operators such as divider and multiplier are much simpler and faster than their equivalent voltage-based circuits and they require less chip area. In addition, a new circuit is designed for programming the memristance of the memristor with predetermined analog value. Presented simulation results demonstrate the effectiveness and the accuracy of the proposed circuits.
[ { "version": "v1", "created": "Fri, 20 Aug 2010 07:53:24 GMT" }, { "version": "v2", "created": "Thu, 2 Sep 2010 15:59:24 GMT" } ]
2010-09-03T00:00:00
[ [ "Merrikh-Bayat", "Farnood", "" ], [ "Shouraki", "Saeed Bagheri", "" ] ]
new_dataset
0.999754
1009.0397
Wided Oueslati wided
wided oueslati and jalel akaichi
Mobile Information Collectors' Trajectory Data Warehouse Design
20 pages, 9 figures
international journal of managing information technology august 2010
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
To analyze complex phenomena which involve moving objects, Trajectory Data Warehouse (TDW) seems to be an answer for many recent decision problems related to various professions (physicians, commercial representatives, transporters, ecologists ...) concerned with mobility. This work aims to make trajectories as a first class concept in the trajectory data conceptual model and to design a TDW, in which data resulting from mobile information collectors' trajectory are gathered. These data will be analyzed, according to trajectory characteristics, for decision making purposes, such as new products commercialization, new commerce implementation, etc.
[ { "version": "v1", "created": "Thu, 2 Sep 2010 11:41:29 GMT" } ]
2010-09-03T00:00:00
[ [ "oueslati", "wided", "" ], [ "akaichi", "jalel", "" ] ]
new_dataset
0.997763
1008.1673
Alex Berka Mr
Alex V Berka
Space and the Synchronic A-Ram
8 pages
null
null
null
cs.CL cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Space is a circuit oriented, spatial programming language designed to exploit the massive parallelism available in a novel formal model of computation called the Synchronic A-Ram, and physically related FPGA and reconfigurable architectures. Space expresses variable grained MIMD parallelism, is modular, strictly typed, and deterministic. Barring operations associated with memory allocation and compilation, modules cannot access global variables, and are referentially transparent. At a high level of abstraction, modules exhibit a small, sequential state transition system, aiding verification. Space deals with communication, scheduling, and resource contention issues in parallel computing, by resolving them explicitly in an incremental manner, module by module, whilst ascending the ladder of abstraction. Whilst the Synchronic A-Ram model was inspired by linguistic considerations, it is also put forward as a formal model for reconfigurable digital circuits. A programming environment has been developed, that incorporates a simulator and compiler that transform Space programs into Synchronic A-Ram machine code, consisting of only three bit-level instructions, and a marking instruction. Space and the Synchronic A-Ram point to novel routes out of the parallel computing crisis.
[ { "version": "v1", "created": "Tue, 10 Aug 2010 09:46:21 GMT" }, { "version": "v2", "created": "Sat, 28 Aug 2010 10:33:08 GMT" } ]
2010-08-31T00:00:00
[ [ "Berka", "Alex V", "" ] ]
new_dataset
0.979518
1008.4873
Saleh Omari
Saleh Ali K. Al-Omari and Putra Sumari
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
11 pages, 4 Figures, International journal of computer science & information Technology
International journal of computer science & information Technology (IJCSIT) Vol.2, No.4, August 2010
null
null
cs.CR cs.NE
http://creativecommons.org/licenses/by-nc-sa/3.0/
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of block cipher. The aim of undertaken this research is to come up with a block cipher where by the keys are randomly generated by ASNN which can then have any variable block length. This will show the private key is kept and do not have to be exchange to the other side of the communication channel so it present a more secure procedure of key scheduling. The process enables for a faster change in encryption keys and a network level encryption to be implemented at a high speed without the headache of factorization. Approach: The block cipher is converted in public cryptosystem and had a low level of vulnerability to attack from brute, and moreover can able to defend against linear attacks since the Artificial Neural Networks (ANN) architecture convey non-linearity to the encryption/decryption procedures. Result: In this paper is present to use the Spiking Neural Networks (SNNs) with spiking neurons as its basic unit. The timing for the SNNs is considered and the output is encoded in 1's and 0's depending on the occurrence or not occurrence of spikes as well as the spiking neural networks use a sign function as activation function, and present the weights and the filter coefficients to be adjust, having more degrees of freedom than the classical neural networks. Conclusion: In conclusion therefore, encryption algorithm can be deployed in communication and security applications where data transfers are most crucial. So this paper, the neural block cipher proposed where the keys are generated by the SNN and the seed is considered the public key which generates the both keys on both sides In future therefore a new research will be conducted on the Spiking Neural Network (SNN) impacts on communication.
[ { "version": "v1", "created": "Sat, 28 Aug 2010 14:55:38 GMT" } ]
2010-08-31T00:00:00
[ [ "Al-Omari", "Saleh Ali K.", "" ], [ "Sumari", "Putra", "" ] ]
new_dataset
0.961717
1008.4776
Alexander Gutfraind
Alexander Gutfraind
Targeting by Transnational Terrorist Groups
null
null
null
LA-UR 10-05689
cs.GT nlin.AO physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many successful terrorist groups operate across international borders where different countries host different stages of terrorist operations. Often the recruits for the group come from one country or countries, while the targets of the operations are in another. Stopping such attacks is difficult because intervention in any region or route might merely shift the terrorists elsewhere. Here we propose a model of transnational terrorism based on the theory of activity networks. The model represents attacks on different countries as paths in a network. The group is assumed to prefer paths of lowest cost (or risk) and maximal yield from attacks. The parameters of the model are computed for the Islamist-Salafi terrorist movement based on open source data and then used for estimation of risks of future attacks. The central finding is that the USA has an enduring appeal as a target, due to lack of other nations of matching geopolitical weight or openness. It is also shown that countries in Africa and Asia that have been overlooked as terrorist bases may become highly significant threats in the future. The model quantifies the dilemmas facing countries in the effort to cut such networks, and points to a limitation of deterrence against transnational terrorists.
[ { "version": "v1", "created": "Fri, 27 Aug 2010 18:39:41 GMT" } ]
2010-08-30T00:00:00
[ [ "Gutfraind", "Alexander", "" ] ]
new_dataset
0.981772
1008.4264
Salah A. Aly
Salah A. Aly, Ahmed E. Kamal, Anwar I. Walid
Network Protection Design Using Network Coding
ITW2010
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Link and node failures are two common fundamental problems that affect operational networks. Protection of communication networks against such failures is essential for maintaining network reliability and performance. Network protection codes (NPC) are proposed to protect operational networks against link and node failures. Furthermore, encoding and decoding operations of such codes are well developed over binary and finite fields. Finding network topologies, practical scenarios, and limits on graphs applicable for NPC are of interest. In this paper, we establish limits on network protection design. We investigate several network graphs where NPC can be deployed using network coding. Furthermore, we construct graphs with minimum number of edges suitable for network protection codes deployment.
[ { "version": "v1", "created": "Wed, 25 Aug 2010 12:35:58 GMT" } ]
2010-08-26T00:00:00
[ [ "Aly", "Salah A.", "" ], [ "Kamal", "Ahmed E.", "" ], [ "Walid", "Anwar I.", "" ] ]
new_dataset
0.977537
cs/0702079
Otfried Cheong
Otfried Cheong, Mira Lee
The Hadwiger Number of Jordan Regions is Unbounded
null
null
null
null
cs.CG math.MG
null
We show that for every n > 0 there is a planar topological disk A_0 and n translates A_1, A_2, ..., A_n of A_0 such that the interiors of A_0, ... A_n are pairwise disjoint, but with each A_i touching A_0 for 1 <= i <= n.
[ { "version": "v1", "created": "Wed, 14 Feb 2007 15:31:30 GMT" } ]
2010-08-26T00:00:00
[ [ "Cheong", "Otfried", "" ], [ "Lee", "Mira", "" ] ]
new_dataset
0.975302
cs/0702090
Otfried Cheong
Hee-Kap Ahn, Sang Won Bae, Otfried Cheong, Joachim Gudmundsson
Aperture-Angle and Hausdorff-Approximation of Convex Figures
Fixed incorrect affiliation
null
null
null
cs.CG math.MG
null
The aperture angle alpha(x, Q) of a point x not in Q in the plane with respect to a convex polygon Q is the angle of the smallest cone with apex x that contains Q. The aperture angle approximation error of a compact convex set C in the plane with respect to an inscribed convex polygon Q of C is the minimum aperture angle of any x in C Q with respect to Q. We show that for any compact convex set C in the plane and any k > 2, there is an inscribed convex k-gon Q of C with aperture angle approximation error (1 - 2/(k+1)) pi. This bound is optimal, and settles a conjecture by Fekete from the early 1990s. The same proof technique can be used to prove a conjecture by Brass: If a polygon P admits no approximation by a sub-k-gon (the convex hull of k vertices of P) with Hausdorff distance sigma, but all subpolygons of P (the convex hull of some vertices of P) admit such an approximation, then P is a (k+1)-gon. This implies the following result: For any k > 2 and any convex polygon P of perimeter at most 1 there is a sub-k-gon Q of P such that the Hausdorff-distance of P and Q is at most 1/(k+1) * sin(pi/(k+1)).
[ { "version": "v1", "created": "Fri, 16 Feb 2007 06:00:08 GMT" }, { "version": "v2", "created": "Tue, 20 Feb 2007 00:39:36 GMT" } ]
2010-08-26T00:00:00
[ [ "Ahn", "Hee-Kap", "" ], [ "Bae", "Sang Won", "" ], [ "Cheong", "Otfried", "" ], [ "Gudmundsson", "Joachim", "" ] ]
new_dataset
0.996296
1008.3653
Guyslain Naves
Guyslain Naves, Christophe Weibel
Congestion in planar graphs with demands on faces
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give an algorithm to route a multicommodity flow in a planar graph $G$ with congestion $O(\log k)$, where $k$ is the maximum number of terminals on the boundary of a face, when each demand edge lie on a face of $G$. We also show that our specific method cannot achieve a substantially better congestion.
[ { "version": "v1", "created": "Sat, 21 Aug 2010 18:33:43 GMT" } ]
2010-08-24T00:00:00
[ [ "Naves", "Guyslain", "" ], [ "Weibel", "Christophe", "" ] ]
new_dataset
0.998076
1001.1597
Graham Norton
Graham H. Norton
The Berlekamp-Massey Algorithm via Minimal Polynomials
Major revision of earlier versions: Introduction expanded, main theorem is now a recursive construction using a recursively defined index function and is relative to any element of $D$. Includes some simpler proofs, a recursive Berlekamp-Massey 'theorem' and additional references
null
null
null
cs.IT cs.SC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a recursive minimal polynomial theorem for finite sequences over a commutative integral domain $D$. This theorem is relative to any element of $D$. The ingredients are: the arithmetic of Laurent polynomials over $D$, a recursive 'index function' and simple mathematical induction. Taking reciprocals gives a 'Berlekamp-Massey theorem' i.e. a recursive construction of the polynomials arising in the Berlekamp-Massey algorithm, relative to any element of $D$. The recursive theorem readily yields the iterative minimal polynomial algorithm due to the author and a transparent derivation of the iterative Berlekamp-Massey algorithm. We give an upper bound for the sum of the linear complexities of $s$ which is tight if $s$ has a perfect linear complexity profile. This implies that over a field, both iterative algorithms require at most $2\lfloor \frac{n^2}{4}\rfloor$ multiplications.
[ { "version": "v1", "created": "Mon, 11 Jan 2010 11:40:51 GMT" }, { "version": "v2", "created": "Thu, 14 Jan 2010 01:20:33 GMT" }, { "version": "v3", "created": "Thu, 19 Aug 2010 07:35:33 GMT" } ]
2010-08-20T00:00:00
[ [ "Norton", "Graham H.", "" ] ]
new_dataset
0.999095
1008.3208
Pooya Hatami
Babak Behsaz, Pooya Hatami, Ebadollah S. Mahmoodian
On minimum vertex cover of generalized Petersen graphs
11 pages, 1 figure,
Australasian Journal of Combinatorics, Vol. 40 (2007) pp. 253-264
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For natural numbers $n$ and $k$ ($n > 2k$), a generalized Petersen graph $P(n,k)$, is defined by vertex set $\lbrace u_i,v_i\rbrace$ and edge set $\lbrace u_iu_{i+1},u_iv_i,v_iv_{i+k}\rbrace$; where $i = 1,2,\dots,n$ and subscripts are reduced modulo $n$. Here first, we characterize minimum vertex covers in generalized Petersen graphs. Second, we present a lower bound and some upper bounds for $\beta(P(n,k))$, the size of minimum vertex cover of $P(n,k)$. Third, in some cases, we determine the exact values of $\beta(P(n,k))$. Our conjecture is that $\beta(P(n,k)) \le n + \lceil\frac{n}{5}\rceil$, for all $n$ and $k$.
[ { "version": "v1", "created": "Thu, 19 Aug 2010 04:17:46 GMT" } ]
2010-08-20T00:00:00
[ [ "Behsaz", "Babak", "" ], [ "Hatami", "Pooya", "" ], [ "Mahmoodian", "Ebadollah S.", "" ] ]
new_dataset
0.996697
1008.3352
Md. Saiful Islam
Md. Rafiqul Islam, Md. Saiful Islam, Muhammad Rezaul Karim, Abdullah Al Mahmud, Hafiz Md. Hasan Babu
Variable Block Carry Skip Logic using Reversible Gates
4 pages, 7 figures, 3 tables
Proc. of 10th International Symposium on Integrated Circuits, Devices and Systems, Nanyang Technological University, Suntec, Singapore, pp 9-12, 8-10 September, 2004
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reversible circuits have applications in digital signal processing, computer graphics, quantum computation and cryptography. In this paper, a generalized k*k reversible gate family is proposed and a 3*3 gate of the family is discussed. Inverter, AND, OR, NAND, NOR, and EXOR gates can be realized by this gate. Implementation of a full-adder circuit using two such 3*3 gates is given. This full-adder circuit contains only two reversible gates and produces no extra garbage outputs. The proposed full-adder circuit is efficient in terms of gate count, garbage outputs and quantum cost. A 4-bit carry skip adder is designed using this full-adder circuit and a variable block carry skip adder is discussed. Necessary equations required to evaluate these adder are presented.
[ { "version": "v1", "created": "Thu, 19 Aug 2010 17:07:51 GMT" } ]
2010-08-20T00:00:00
[ [ "Islam", "Md. Rafiqul", "" ], [ "Islam", "Md. Saiful", "" ], [ "Karim", "Muhammad Rezaul", "" ], [ "Mahmud", "Abdullah Al", "" ], [ "Babu", "Hafiz Md. Hasan", "" ] ]
new_dataset
0.98495
1008.3357
Md. Saiful Islam
Hafiz Md. Hasaan Babu, Md. Saiful Islam, Md. Rafiqul Islam, Lafifa Jamal, Abu Ahmed Ferdaus, Muhammad Rezaul Karim, Abdullah Al Mahmud
Building Toffoli Network for Reversible Logic Synthesis Based on Swapping Bit Strings
9 pages
Dhaka University Journal of Science, Vol. 55, No. 2, pp. 153-156, 2007
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we have implemented and designed a sorting network for reversible logic circuits synthesis in terms of n*n Toffoli gates. The algorithm presented in this paper constructs a Toffoli Network based on swapping bit strings. Reduction rules are then applied by simple template matching and removing useless gates from the network. Random selection of bit strings and reduction of control inputs are used to minimize both the number of gates and gate width. The method produces near optimal results for up to 3-input 3-output circuits.
[ { "version": "v1", "created": "Thu, 19 Aug 2010 17:21:54 GMT" } ]
2010-08-20T00:00:00
[ [ "Babu", "Hafiz Md. Hasaan", "" ], [ "Islam", "Md. Saiful", "" ], [ "Islam", "Md. Rafiqul", "" ], [ "Jamal", "Lafifa", "" ], [ "Ferdaus", "Abu Ahmed", "" ], [ "Karim", "Muhammad Rezaul", "" ], [ "Mahmud", "Abdullah Al", "" ] ]
new_dataset
0.986143
0912.0180
Bram Reps
Bram Reps, Wim Vanroose and Hisham bin Zubair
On the indefinite Helmholtz equation: complex stretched absorbing boundary layers, iterative analysis, and preconditioning
null
Journal of Computational Physics (2010)
10.1016/j.jcp.2010.07.022
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies and analyzes a preconditioned Krylov solver for Helmholtz problems that are formulated with absorbing boundary layers based on complex coordinate stretching. The preconditioner problem is a Helmholtz problem where not only the coordinates in the absorbing layer have an imaginary part, but also the coordinates in the interior region. This results into a preconditioner problem that is invertible with a multigrid cycle. We give a numerical analysis based on the eigenvalues and evaluate the performance with several numerical experiments. The method is an alternative to the complex shifted Laplacian and it gives a comparable performance for the studied model problems.
[ { "version": "v1", "created": "Tue, 1 Dec 2009 15:15:44 GMT" }, { "version": "v2", "created": "Mon, 14 Jun 2010 09:35:35 GMT" } ]
2010-08-19T00:00:00
[ [ "Reps", "Bram", "" ], [ "Vanroose", "Wim", "" ], [ "Zubair", "Hisham bin", "" ] ]
new_dataset
0.974928
1008.3136
Mao Wang
C. Jiang, M. Wang, C. Yang
MIMO Precoding Using Rotating Codebooks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Next generation wireless communications rely on multiple input multiple output (MIMO) techniques to achieve high data rates. Feedback of channel information can be used in MIMO precoding to fully activate the strongest channel modes and improve MIMO performance. Unfortunately, the bandwidth of the control channel via which the feedback is conveyed is severely limited. An important issue is how to improve the MIMO precoding performance with minimal feedback. In this letter, we present a method that uses a rotating codebook technique to effectively improve the precoding performance without the need of increasing feedback overhead. The basic idea of the rotating codebook precoding is to expend the effective precoding codebook size via rotating multiple codebooks so that the number of feedback bits remains unchanged. Simulation results are presented to show the performance gain of the proposed rotating codebook precoding over the conventional precoding.
[ { "version": "v1", "created": "Wed, 18 Aug 2010 17:10:34 GMT" } ]
2010-08-19T00:00:00
[ [ "Jiang", "C.", "" ], [ "Wang", "M.", "" ], [ "Yang", "C.", "" ] ]
new_dataset
0.986102
1007.1407
Amir Ingber
Amir Ingber and Meir Feder
Parallel Bit Interleaved Coded Modulation
19 pages, 15 figures. A shorter version will be presented at the 48th Allerton Conference on Communication, Control, and Computing (Allerton 2010)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new variant of bit interleaved coded modulation (BICM) is proposed. In the new scheme, called Parallel BICM, L identical binary codes are used in parallel using a mapper, a newly proposed finite-length interleaver and a binary dither signal. As opposed to previous approaches, the scheme does not rely on any assumptions of an ideal, infinite-length interleaver. Over a memoryless channel, the new scheme is proven to be equivalent to a binary memoryless channel. Therefore the scheme enables one to easily design coded modulation schemes using a simple binary code that was designed for that binary channel. The overall performance of the coded modulation scheme is analytically evaluated based on the performance of the binary code over the binary channel. The new scheme is analyzed from an information theoretic viewpoint, where the capacity, error exponent and channel dispersion are considered. The capacity of the scheme is identical to the BICM capacity. The error exponent of the scheme is numerically compared to a recently proposed mismatched-decoding exponent analysis of BICM.
[ { "version": "v1", "created": "Thu, 8 Jul 2010 15:50:08 GMT" }, { "version": "v2", "created": "Tue, 17 Aug 2010 12:29:39 GMT" } ]
2010-08-18T00:00:00
[ [ "Ingber", "Amir", "" ], [ "Feder", "Meir", "" ] ]
new_dataset
0.992493
1008.2767
Derek Groen
Derek Groen (Leiden), Steven Rieder (Leiden), Paola Grosso (Amsterdam), Cees de Laat (Amsterdam), Simon Portegies Zwart (Leiden)
A Light-Weight Communication Library for Distributed Computing
17 pages, 10 figures, published in Computational Science & Discovery
Derek Groen et al 2010 Comput. Sci. Disc. 3 015002
10.1088/1749-4699/3/1/015002
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present MPWide, a platform independent communication library for performing message passing between computers. Our library allows coupling of several local MPI applications through a long distance network and is specifically optimized for such communications. The implementation is deliberately kept light-weight, platform independent and the library can be installed and used without administrative privileges. The only requirements are a C++ compiler and at least one open port to a wide area network on each site. In this paper we present the library, describe the user interface, present performance tests and apply MPWide in a large scale cosmological N-body simulation on a network of two computers, one in Amsterdam and the other in Tokyo.
[ { "version": "v1", "created": "Mon, 16 Aug 2010 20:14:11 GMT" } ]
2010-08-18T00:00:00
[ [ "Groen", "Derek", "", "Leiden" ], [ "Rieder", "Steven", "", "Leiden" ], [ "Grosso", "Paola", "", "Amsterdam" ], [ "de Laat", "Cees", "", "Amsterdam" ], [ "Zwart", "Simon Portegies", "", "Leiden" ] ]
new_dataset
0.975335
1008.2909
Bjoern Andres
Bjoern Andres, Ullrich Koethe, Thorben Kroeger, and Fred A. Hamprecht
Runtime-Flexible Multi-dimensional Arrays and Views for C++98 and C++0x
Free source code available
null
null
null
cs.DS cs.MS cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-dimensional arrays are among the most fundamental and most useful data structures of all. In C++, excellent template libraries exist for arrays whose dimension is fixed at runtime. Arrays whose dimension can change at runtime have been implemented in C. However, a generic object-oriented C++ implementation of runtime-flexible arrays has so far been missing. In this article, we discuss our new implementation called Marray, a package of class templates that fills this gap. Marray is based on views as an underlying concept. This concept brings some of the flexibility known from script languages such as R and MATLAB to C++. Marray is free both for commercial and non-commercial use and is publicly available from www.andres.sc/marray
[ { "version": "v1", "created": "Tue, 17 Aug 2010 14:50:56 GMT" } ]
2010-08-18T00:00:00
[ [ "Andres", "Bjoern", "" ], [ "Koethe", "Ullrich", "" ], [ "Kroeger", "Thorben", "" ], [ "Hamprecht", "Fred A.", "" ] ]
new_dataset
0.98669
1008.2729
Michael Robinson
Michael Robinson
Asynchronous logic circuits and sheaf obstructions
null
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article exhibits a particular encoding of logic circuits into a sheaf formalism. The central result of this article is that there exists strictly more information available to a circuit designer in this setting than exists in static truth tables, but less than exists in event-level simulation. This information is related to the timing behavior of the logic circuits, and thereby provides a ``bridge'' between static logic analysis and detailed simulation.
[ { "version": "v1", "created": "Mon, 16 Aug 2010 18:14:06 GMT" } ]
2010-08-17T00:00:00
[ [ "Robinson", "Michael", "" ] ]
new_dataset
0.999605
1008.2223
Alin Suciu PhD
Alin Suciu and Tudor Carean
Benchmarking the True Random Number Generator of TPM Chips
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A TPM (trusted platform module) is a chip present mostly on newer motherboards, and its primary function is to create, store and work with cryptographic keys. This dedicated chip can serve to authenticate other devices or to protect encryption keys used by various software applications. Among other features, it comes with a True Random Number Generator (TRNG) that can be used for cryptographic purposes. This random number generator consists of a state machine that mixes unpredictable data with the output of a one way hash function. According the specification it can be a good source of unpredictable random numbers even without having to require a genuine source of hardware entropy. However the specification recommends collecting entropy from any internal sources available such as clock jitter or thermal noise in the chip itself, a feature that was implemented by most manufacturers. This paper will benchmark the random number generator of several TPM chips from two perspectives: the quality of the random bit sequences generated, as well as the output bit rate.
[ { "version": "v1", "created": "Thu, 12 Aug 2010 21:51:22 GMT" } ]
2010-08-16T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Carean", "Tudor", "" ] ]
new_dataset
0.970414
0911.4459
Petros Petrosyan
Petros A. Petrosyan
Interval edge colorings of some products of graphs
14 pages, 5 figures, minor changes
null
null
null
cs.DM
http://creativecommons.org/licenses/by/3.0/
An edge coloring of a graph $G$ with colors $1,2,\ldots ,t$ is called an interval $t$-coloring if for each $i\in \{1,2,\ldots,t\}$ there is at least one edge of $G$ colored by $i$, and the colors of edges incident to any vertex of $G$ are distinct and form an interval of integers. A graph $G$ is interval colorable, if there is an integer $t\geq 1$ for which $G$ has an interval $t$-coloring. Let $\mathfrak{N}$ be the set of all interval colorable graphs. In 2004 Kubale and Giaro showed that if $G,H\in \mathfrak{N}$, then the Cartesian product of these graphs belongs to $\mathfrak{N}$. Also, they formulated a similar problem for the lexicographic product as an open problem. In this paper we first show that if $G\in \mathfrak{N}$, then $G[nK_{1}]\in \mathfrak{N}$ for any $n\in \mathbf{N}$. Furthermore, we show that if $G,H\in \mathfrak{N}$ and $H$ is a regular graph, then strong and lexicographic products of graphs $G,H$ belong to $\mathfrak{N}$. We also prove that tensor and strong tensor products of graphs $G,H$ belong to $\mathfrak{N}$ if $G\in \mathfrak{N}$ and $H$ is a regular graph.
[ { "version": "v1", "created": "Mon, 23 Nov 2009 18:26:31 GMT" }, { "version": "v2", "created": "Thu, 12 Aug 2010 07:15:58 GMT" } ]
2010-08-13T00:00:00
[ [ "Petrosyan", "Petros A.", "" ] ]
new_dataset
0.973105
1008.2036
Kamaljit I Lakhtaria
Kamaljit I. Lakhtaria
Providing content based billing architecture over Next Generation Network
null
International Journal on Computer Engineering & Information Technology March - May 2009, pp 118-124
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile Communication marketplace has stressed that "content is king" ever since the initial footsteps for Next Generation Networks like 3G, 3GPP, IP Multimedia subsystem (IMS) services. However, many carriers and content providers have struggled to drive revenue for content services, primarily due to current limitations of certain types of desirable content offerings, simplistic billing models, and the inability to support flexible pricing, charging and settlement. Unlike wire line carriers, wireless carriers have a limit to the volume of traffic they can carry, bounded by the finite wireless spectrum. Event based services like calling, conferencing etc., only perceive charge per event, while the Content based charging system attracts Mobile Network Operators (MNOs) to maximize service delivery to customer and achieve best ARPU. With the Next Generation Networks, the number of data related services that can be offered, is increased significantly. The wireless carrier will be able to move from offering wireless telecommunications services to offering wireless telecommunication services plus a number of personalized Value Added Services like news, games, video broadcasts, or multimedia messaging service (MMS) through the network. The next generation Content Based Billing systems allow the operators to maximize their revenues from such services. These systems will enable operators to offer and bill for application-based and content-based services, rather than for just bytes of data. Therefore, the wireless business focus is no longer on infrastructure build-outs but on customer retention and increased average revenue per customer (ARPU). The mobile operator generates new revenues, strengthens brand value, and differentiates its service to attract and retain customers.
[ { "version": "v1", "created": "Thu, 12 Aug 2010 03:43:08 GMT" } ]
2010-08-13T00:00:00
[ [ "Lakhtaria", "Kamaljit I.", "" ] ]
new_dataset
0.977405
1008.2186
Julien Leblay
Fran\c{c}ois Goasdou\'e (LRI), Konstantinos Karanasos (INRIA Saclay - Ile de France), Julien Leblay (INRIA Saclay - Ile de France), Ioana Manolescu (LRI, INRIA Saclay - Ile de France)
RDFViewS: A Storage Tuning Wizard for RDF Applications
null
ACM International Conference on Information and Knowledge Management, Toronto : Canada (2010)
null
null
cs.DB cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, the significant growth of RDF data used in numerous applications has made its efficient and scalable manipulation an important issue. In this paper, we present RDFViewS, a system capable of choosing the most suitable views to materialize, in order to minimize the query response time for a specific SPARQL query workload, while taking into account the view maintenance cost and storage space constraints. Our system employs practical algorithms and heuristics to navigate through the search space of potential view configurations, and exploits the possibly available semantic information - expressed via an RDF Schema - to ensure the completeness of the query evaluation.
[ { "version": "v1", "created": "Thu, 12 Aug 2010 18:55:15 GMT" } ]
2010-08-13T00:00:00
[ [ "Goasdoué", "François", "", "LRI" ], [ "Karanasos", "Konstantinos", "", "INRIA Saclay -\n Ile de France" ], [ "Leblay", "Julien", "", "INRIA Saclay - Ile de France" ], [ "Manolescu", "Ioana", "", "LRI, INRIA Saclay - Ile de France" ] ]
new_dataset
0.995463
1008.1610
Yeow Meng Chee
Yeow Meng Chee, Chaoping Xing, and Sze Ling Yeo
New Constant-Weight Codes from Propagation Rules
4 pages
IEEE Transactions on Information Theory, vol. 56, no. 4, pp. 1596-1599, 2010
10.1109/TIT.2010.2040964
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes some simple propagation rules which give rise to new binary constant-weight codes.
[ { "version": "v1", "created": "Tue, 10 Aug 2010 00:56:33 GMT" } ]
2010-08-11T00:00:00
[ [ "Chee", "Yeow Meng", "" ], [ "Xing", "Chaoping", "" ], [ "Yeo", "Sze Ling", "" ] ]
new_dataset
0.977718
1008.1611
Yeow Meng Chee
Yeow Meng Chee, Son Hoang Dau, Alan C. H. Ling, and San Ling
Linear Size Optimal q-ary Constant-Weight Codes and Constant-Composition Codes
12 pages
IEEE Transactions on Information Theory, vol. 56, no. 1, pp. 140-151, 2010
10.1109/TIT.2009.2034814
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An optimal constant-composition or constant-weight code of weight $w$ has linear size if and only if its distance $d$ is at least $2w-1$. When $d\geq 2w$, the determination of the exact size of such a constant-composition or constant-weight code is trivial, but the case of $d=2w-1$ has been solved previously only for binary and ternary constant-composition and constant-weight codes, and for some sporadic instances. This paper provides a construction for quasicyclic optimal constant-composition and constant-weight codes of weight $w$ and distance $2w-1$ based on a new generalization of difference triangle sets. As a result, the sizes of optimal constant-composition codes and optimal constant-weight codes of weight $w$ and distance $2w-1$ are determined for all such codes of sufficiently large lengths. This solves an open problem of Etzion. The sizes of optimal constant-composition codes of weight $w$ and distance $2w-1$ are also determined for all $w\leq 6$, except in two cases.
[ { "version": "v1", "created": "Tue, 10 Aug 2010 01:02:07 GMT" } ]
2010-08-11T00:00:00
[ [ "Chee", "Yeow Meng", "" ], [ "Dau", "Son Hoang", "" ], [ "Ling", "Alan C. H.", "" ], [ "Ling", "San", "" ] ]
new_dataset
0.996647
1008.1650
EPTCS
Zoltan \'Esik (University of Szeged)
Representing Small Ordinals by Finite Automata
In Proceedings DCFS 2010, arXiv:1008.1270
EPTCS 31, 2010, pp. 78-87
10.4204/EPTCS.31.10
null
cs.FL cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is known that an ordinal is the order type of the lexicographic ordering of a regular language if and only if it is less than omega^omega. We design a polynomial time algorithm that constructs, for each well-ordered regular language L with respect to the lexicographic ordering, given by a deterministic finite automaton, the Cantor Normal Form of its order type. It follows that there is a polynomial time algorithm to decide whether two deterministic finite automata accepting well-ordered regular languages accept isomorphic languages. We also give estimates on the size of the smallest automaton representing an ordinal less than omega^omega, together with an algorithm that translates each such ordinal to an automaton.
[ { "version": "v1", "created": "Tue, 10 Aug 2010 08:33:10 GMT" } ]
2010-08-11T00:00:00
[ [ "Ésik", "Zoltan", "", "University of Szeged" ] ]
new_dataset
0.995198
1008.1665
EPTCS
Martin Kappes, Andreas Malcher, Detlef Wotschke
Remembering Chandra Kintala
In Proceedings DCFS 2010, arXiv:1008.1270
EPTCS 31, 2010, pp. 15-26
10.4204/EPTCS.31.4
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With this contribution we would like to remember Chandra M. R. Kintala who passed away in November 2009. We will give short overviews of his CV and his contributions to the field of theoretical and applied computer science and, given the opportunity, will attempt to present the current state of limited nondeterminism and limited resources for machines. Finally, we will briefly touch on some research topics which hopefully will be addressed in the not so distant future.
[ { "version": "v1", "created": "Tue, 10 Aug 2010 08:34:51 GMT" } ]
2010-08-11T00:00:00
[ [ "Kappes", "Martin", "" ], [ "Malcher", "Andreas", "" ], [ "Wotschke", "Detlef", "" ] ]
new_dataset
0.988449
1002.0777
Emmanuel Abbe A
Emmanuel Abbe, Emre Telatar
Polar Codes for the m-User MAC
null
null
null
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, polar codes for the $m$-user multiple access channel (MAC) with binary inputs are constructed. It is shown that Ar{\i}kan's polarization technique applied individually to each user transforms independent uses of a $m$-user binary input MAC into successive uses of extremal MACs. This transformation has a number of desirable properties: (i) the `uniform sum rate' of the original MAC is preserved, (ii) the extremal MACs have uniform rate regions that are not only polymatroids but matroids and thus (iii) their uniform sum rate can be reached by each user transmitting either uncoded or fixed bits; in this sense they are easy to communicate over. A polar code can then be constructed with an encoding and decoding complexity of $O(n \log n)$ (where $n$ is the block length), a block error probability of $o(\exp(- n^{1/2 - \e}))$, and capable of achieving the uniform sum rate of any binary input MAC with arbitrary many users. An application of this polar code construction to communicating on the AWGN channel is also discussed.
[ { "version": "v1", "created": "Wed, 3 Feb 2010 16:10:31 GMT" }, { "version": "v2", "created": "Sat, 7 Aug 2010 16:57:16 GMT" } ]
2010-08-10T00:00:00
[ [ "Abbe", "Emmanuel", "" ], [ "Telatar", "Emre", "" ] ]
new_dataset
0.998895
1005.4122
Alexander Prolubnikov
A. Prolubnikov
On a new complete invariant of acyclic graphs
This paper has been withdrawn by the author due to update
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new complete invariant for acyclic graphs is presented
[ { "version": "v1", "created": "Sat, 22 May 2010 12:30:39 GMT" }, { "version": "v2", "created": "Mon, 7 Jun 2010 18:38:06 GMT" }, { "version": "v3", "created": "Tue, 6 Jul 2010 03:31:22 GMT" }, { "version": "v4", "created": "Sun, 8 Aug 2010 04:26:41 GMT" } ]
2010-08-10T00:00:00
[ [ "Prolubnikov", "A.", "" ] ]
new_dataset
0.998225
1008.1321
Zeeshan Ahmed Mr.
Zeeshan Ahmed, Detlef Gerhard
Contributions of PDM Systems in Organizational Technical Data Management
In the proceedings of The First IEEE International Conference On Computer, Control & Communication (IEEE-IC4 2007), 12-13 November 2007
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Product Data Management (PDM) claims of producing desktop and web based systems to maintain the organizational data to increase the quality of products by improving the process of development, business process flows, change management, product structure management, project tracking and resource planning. Moreover PDM helps in reducing the cost and effort required in engineering. This paper discusses PDM desktop and web based system, needed information and important guidelines for PDM system development, functional requirements, basic components in detail and some already implemented PDM Sys-tems. In the end paper investigates and briefly concludes major currently faced challenges to Product Data Management (PDM) community.
[ { "version": "v1", "created": "Sat, 7 Aug 2010 11:14:25 GMT" } ]
2010-08-10T00:00:00
[ [ "Ahmed", "Zeeshan", "" ], [ "Gerhard", "Detlef", "" ] ]
new_dataset
0.998328
1008.1343
Yeow Meng Chee
Yeow Meng Chee, Gennian Ge, Alan C. H. Ling
Spectrum of Sizes for Perfect Deletion-Correcting Codes
23 pages
SIAM Journal on Discrete Mathematics, vol. 24, no. 1, pp. 33-55, 2010
10.1137/090751311
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One peculiarity with deletion-correcting codes is that perfect $t$-deletion-correcting codes of the same length over the same alphabet can have different numbers of codewords, because the balls of radius $t$ with respect to the Levenshte\u{\i}n distance may be of different sizes. There is interest, therefore, in determining all possible sizes of a perfect $t$-deletion-correcting code, given the length $n$ and the alphabet size~$q$. In this paper, we determine completely the spectrum of possible sizes for perfect $q$-ary 1-deletion-correcting codes of length three for all $q$, and perfect $q$-ary 2-deletion-correcting codes of length four for almost all $q$, leaving only a small finite number of cases in doubt.
[ { "version": "v1", "created": "Sat, 7 Aug 2010 13:32:44 GMT" } ]
2010-08-10T00:00:00
[ [ "Chee", "Yeow Meng", "" ], [ "Ge", "Gennian", "" ], [ "Ling", "Alan C. H.", "" ] ]
new_dataset
0.999172
1008.1360
Minghui Jiang
Adrian Dumitrescu and Minghui Jiang
Coloring translates and homothets of a convex body
11 pages, 2 figures
null
null
null
cs.DM cs.CG math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We obtain improved upper bounds and new lower bounds on the chromatic number as a linear function of the clique number, for the intersection graphs (and their complements) of finite families of translates and homothets of a convex body in $\RR^n$.
[ { "version": "v1", "created": "Sat, 7 Aug 2010 18:59:49 GMT" } ]
2010-08-10T00:00:00
[ [ "Dumitrescu", "Adrian", "" ], [ "Jiang", "Minghui", "" ] ]
new_dataset
0.960688
1008.1387
Fr\'ed\'erique Oggier
Frederique Oggier, Patrick Sole, Jean-Claude Belfiore
Codes over Matrix Rings for Space-Time Coded Modulations
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is known that, for transmission over quasi-static MIMO fading channels with n transmit antennas, diversity can be obtained by using an inner fully diverse space-time block code while coding gain, derived from the determinant criterion, comes from an appropriate outer code. When the inner code has a cyclic algebra structure over a number field, as for perfect space-time codes, an outer code can be designed via coset coding. More precisely, we take the quotient of the algebra by a two-sided ideal which leads to a finite alphabet for the outer code, with a cyclic algebra structure over a finite field or a finite ring. We show that the determinant criterion induces various metrics on the outer code, such as the Hamming and Bachoc distances. When n=2, partitioning the 2x2 Golden code by using an ideal above the prime 2 leads to consider codes over either M2(F_2) or M2(F_2[i]), both being non-commutative alphabets. Matrix rings of higher dimension, suitable for 3x3 and 4x4 perfect codes, give rise to more complex examples.
[ { "version": "v1", "created": "Sun, 8 Aug 2010 06:04:10 GMT" } ]
2010-08-10T00:00:00
[ [ "Oggier", "Frederique", "" ], [ "Sole", "Patrick", "" ], [ "Belfiore", "Jean-Claude", "" ] ]
new_dataset
0.999767
1008.1571
Ananth Narayan Sankaranarayanan
Ananth Narayan S and Somsubhra Sharangi and Alexandra Fedorova
Scaling Turbo Boost to a 1000 cores
7 pages, short paper
null
null
null
cs.PF cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Intel Core i7 processor code named Nehalem provides a feature named Turbo Boost which opportunistically varies the frequencies of the processor's cores. The frequency of a core is determined by core temperature, the number of active cores, the estimated power consumption, the estimated current consumption, and operating system frequency scaling requests. For a chip multi-processor(CMP) that has a small number of physical cores and a small set of performance states, deciding the Turbo Boost frequency to use on a given core might not be difficult. However, we do not know the complexity of this decision making process in the context of a large number of cores, scaling to the 100s, as predicted by researchers in the field.
[ { "version": "v1", "created": "Mon, 9 Aug 2010 19:23:10 GMT" } ]
2010-08-10T00:00:00
[ [ "S", "Ananth Narayan", "" ], [ "Sharangi", "Somsubhra", "" ], [ "Fedorova", "Alexandra", "" ] ]
new_dataset
0.99967
1008.1053
Muriel Dulieu
Boris Aronov, Muriel Dulieu and Ferran Hurtado
Witness (Delaunay) Graphs
27 pages. JCCGG 2009
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Proximity graphs are used in several areas in which a neighborliness relationship for input data sets is a useful tool in their analysis, and have also received substantial attention from the graph drawing community, as they are a natural way of implicitly representing graphs. However, as a tool for graph representation, proximity graphs have some limitations that may be overcome with suitable generalizations. We introduce a generalization, witness graphs, that encompasses both the goal of more power and flexibility for graph drawing issues and a wider spectrum for neighborhood analysis. We study in detail two concrete examples, both related to Delaunay graphs, and consider as well some problems on stabbing geometric objects and point set discrimination, that can be naturally described in terms of witness graphs.
[ { "version": "v1", "created": "Thu, 5 Aug 2010 19:55:58 GMT" } ]
2010-08-06T00:00:00
[ [ "Aronov", "Boris", "" ], [ "Dulieu", "Muriel", "" ], [ "Hurtado", "Ferran", "" ] ]
new_dataset
0.997975
0806.3209
Russell O'Connor
Russell O'Connor
A Computer Verified Theory of Compact Sets
This paper is to be part of the proceedings of the Symbolic Computation in Software Science Austrian-Japanese Workshop (SCSS 2008)
null
null
RISC-Linz Report Series 08-08
cs.LO
http://creativecommons.org/licenses/publicdomain/
Compact sets in constructive mathematics capture our intuition of what computable subsets of the plane (or any other complete metric space) ought to be. A good representation of compact sets provides an efficient means of creating and displaying images with a computer. In this paper, I build upon existing work about complete metric spaces to define compact sets as the completion of the space of finite sets under the Hausdorff metric. This definition allowed me to quickly develop a computer verified theory of compact sets. I applied this theory to compute provably correct plots of uniformly continuous functions.
[ { "version": "v1", "created": "Thu, 19 Jun 2008 18:09:01 GMT" } ]
2010-08-04T00:00:00
[ [ "O'Connor", "Russell", "" ] ]
new_dataset
0.996985
1008.0045
Sidharth Jaggi
Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko and Lingxiao Xia
Universal and Robust Distributed Network Codes
12 pages, 7 figures, 1 table, under submission to INFOCOM 2011
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Random linear network codes can be designed and implemented in a distributed manner, with low computational complexity. However, these codes are classically implemented over finite fields whose size depends on some global network parameters (size of the network, the number of sinks) that may not be known prior to code design. Also, if new nodes join the entire network code may have to be redesigned. In this work, we present the first universal and robust distributed linear network coding schemes. Our schemes are universal since they are independent of all network parameters. They are robust since if nodes join or leave, the remaining nodes do not need to change their coding operations and the receivers can still decode. They are distributed since nodes need only have topological information about the part of the network upstream of them, which can be naturally streamed as part of the communication protocol. We present both probabilistic and deterministic schemes that are all asymptotically rate-optimal in the coding block-length, and have guarantees of correctness. Our probabilistic designs are computationally efficient, with order-optimal complexity. Our deterministic designs guarantee zero error decoding, albeit via codes with high computational complexity in general. Our coding schemes are based on network codes over ``scalable fields". Instead of choosing coding coefficients from one field at every node, each node uses linear coding operations over an ``effective field-size" that depends on the node's distance from the source node. The analysis of our schemes requires technical tools that may be of independent interest. In particular, we generalize the Schwartz-Zippel lemma by proving a non-uniform version, wherein variables are chosen from sets of possibly different sizes. We also provide a novel robust distributed algorithm to assign unique IDs to network nodes.
[ { "version": "v1", "created": "Sat, 31 Jul 2010 02:23:50 GMT" }, { "version": "v2", "created": "Tue, 3 Aug 2010 10:35:52 GMT" } ]
2010-08-04T00:00:00
[ [ "Ho", "Tracey", "" ], [ "Jaggi", "Sidharth", "" ], [ "Vyetrenko", "Svitlana", "" ], [ "Xia", "Lingxiao", "" ] ]
new_dataset
0.997713
1008.0208
Gang Xu
Gang Xu and Guozhao Wang
Parametric polynomial minimal surfaces of arbitrary degree
null
null
null
null
cs.GR math.DG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Weierstrass representation is a classical parameterization of minimal surfaces. However, two functions should be specified to construct the parametric form in Weierestrass representation. In this paper, we propose an explicit parametric form for a class of parametric polynomial minimal surfaces of arbitrary degree. It includes the classical Enneper surface for cubic case. The proposed minimal surfaces also have some interesting properties such as symmetry, containing straight lines and self-intersections. According to the shape properties, the proposed minimal surface can be classified into four categories with respect to $n=4k-1$ $n=4k+1$, $n=4k$ and $n=4k+2$. The explicit parametric form of corresponding conjugate minimal surfaces is given and the isometric deformation is also implemented.
[ { "version": "v1", "created": "Sun, 1 Aug 2010 22:58:04 GMT" }, { "version": "v2", "created": "Tue, 3 Aug 2010 08:15:53 GMT" } ]
2010-08-04T00:00:00
[ [ "Xu", "Gang", "" ], [ "Wang", "Guozhao", "" ] ]
new_dataset
0.978127
0906.0531
Jaeok Park
Jaeok Park and Mihaela van der Schaar
Medium Access Control Protocols With Memory
32 pages, 7 figures, 2 tables
IEEE/ACM Transactions on Networking, 2010
10.1109/TNET.2010.2050699
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many existing medium access control (MAC) protocols utilize past information (e.g., the results of transmission attempts) to adjust the transmission parameters of users. This paper provides a general framework to express and evaluate distributed MAC protocols utilizing a finite length of memory for a given form of feedback information. We define protocols with memory in the context of a slotted random access network with saturated arrivals. We introduce two performance metrics, throughput and average delay, and formulate the problem of finding an optimal protocol. We first show that a TDMA outcome, which is the best outcome in the considered scenario, can be obtained after a transient period by a protocol with (N-1)-slot memory, where N is the total number of users. Next, we analyze the performance of protocols with 1-slot memory using a Markov chain and numerical methods. Protocols with 1-slot memory can achieve throughput arbitrarily close to 1 (i.e., 100% channel utilization) at the expense of large average delay, by correlating successful users in two consecutive slots. Finally, we apply our framework to wireless local area networks.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 16:43:16 GMT" }, { "version": "v2", "created": "Fri, 8 Jan 2010 02:57:13 GMT" } ]
2010-08-03T00:00:00
[ [ "Park", "Jaeok", "" ], [ "van der Schaar", "Mihaela", "" ] ]
new_dataset
0.998906
1007.1802
Shlomi Dolev
Noga Alon, Hagit Attiya, Shlomi Dolev, Swan Dubois, Maria Gradinariu, Sebastien Tixeuil
Practically Stabilizing Atomic Memory
null
null
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A self-stabilizing simulation of a single-writer multi-reader atomic register is presented. The simulation works in asynchronous message-passing systems, and allows processes to crash, as long as at least a majority of them remain working. A key element in the simulation is a new combinatorial construction of a bounded labeling scheme that can accommodate arbitrary labels, i.e., including those not generated by the scheme itself.
[ { "version": "v1", "created": "Sun, 11 Jul 2010 21:00:58 GMT" }, { "version": "v2", "created": "Sat, 31 Jul 2010 15:04:40 GMT" } ]
2010-08-03T00:00:00
[ [ "Alon", "Noga", "" ], [ "Attiya", "Hagit", "" ], [ "Dolev", "Shlomi", "" ], [ "Dubois", "Swan", "" ], [ "Gradinariu", "Maria", "" ], [ "Tixeuil", "Sebastien", "" ] ]
new_dataset
0.969495
1008.0170
Michael Moortgat
Michael Moortgat
Symmetric categorial grammar: residuation and Galois connections
Submitted to the Jim Lambek Festschrift of Linguistic Analysis (LA, volume 36, to appear)
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Lambek-Grishin calculus is a symmetric extension of the Lambek calculus: in addition to the residuated family of product, left and right division operations of Lambek's original calculus, one also considers a family of coproduct, right and left difference operations, related to the former by an arrow-reversing duality. Communication between the two families is implemented in terms of linear distributivity principles. The aim of this paper is to complement the symmetry between (dual) residuated type-forming operations with an orthogonal opposition that contrasts residuated and Galois connected operations. Whereas the (dual) residuated operations are monotone, the Galois connected operations (and their duals) are antitone. We discuss the algebraic properties of the (dual) Galois connected operations, and generalize the (co)product distributivity principles to include the negative operations. We give a continuation-passing-style translation for the new type-forming operations, and discuss some linguistic applications.
[ { "version": "v1", "created": "Sun, 1 Aug 2010 12:45:58 GMT" } ]
2010-08-03T00:00:00
[ [ "Moortgat", "Michael", "" ] ]
new_dataset
0.984164
1007.5180
Alessandro Dal Pal\`u
Alessandro Dal Palu', Agostino Dovier, Federico Fogolari, Enrico Pontelli
CLP-based protein fragment assembly
special issue dedicated to ICLP 2010
Theory and Practice of Logic Programming, special issue dedicated to ICLP 2010. 10(4-6): pp 709-724, July 2010
10.1017/S1471068410000372
null
cs.AI cs.CE cs.PL q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper investigates a novel approach, based on Constraint Logic Programming (CLP), to predict the 3D conformation of a protein via fragments assembly. The fragments are extracted by a preprocessor-also developed for this work- from a database of known protein structures that clusters and classifies the fragments according to similarity and frequency. The problem of assembling fragments into a complete conformation is mapped to a constraint solving problem and solved using CLP. The constraint-based model uses a medium discretization degree Ca-side chain centroid protein model that offers efficiency and a good approximation for space filling. The approach adapts existing energy models to the protein representation used and applies a large neighboring search strategy. The results shows the feasibility and efficiency of the method. The declarative nature of the solution allows to include future extensions, e.g., different size fragments for better accuracy.
[ { "version": "v1", "created": "Thu, 29 Jul 2010 10:44:49 GMT" } ]
2010-08-02T00:00:00
[ [ "Palu'", "Alessandro Dal", "" ], [ "Dovier", "Agostino", "" ], [ "Fogolari", "Federico", "" ], [ "Pontelli", "Enrico", "" ] ]
new_dataset
0.998425
1007.5090
EPTCS
Imene Ben-Hafaiedh (Universite Joseph Fourier/VERIMAG), Susanne Graf (Universite Joseph Fourier/VERIMAG), Hammadi Khairallah (Tunisia Polytechnic School)
Implementing Distributed Controllers for Systems with Priorities
In Proceedings FOCLASA 2010, arXiv:1007.4993
EPTCS 30, 2010, pp. 31-46
10.4204/EPTCS.30.3
null
cs.DC cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Implementing a component-based system in a distributed way so that it ensures some global constraints is a challenging problem. We consider here abstract specifications consisting of a composition of components and a controller given in the form of a set of interactions and a priority order amongst them. In the context of distributed systems, such a controller must be executed in a distributed fashion while still respecting the global constraints imposed by interactions and priorities. We present in this paper an implementation of an algorithm that allows a distributed execution of systems with (binary) interactions and priorities. We also present a comprehensive simulation analysis that shows how sensitive to changes our algorithm is, in particular changes related to the degree of conflict in the system.
[ { "version": "v1", "created": "Thu, 29 Jul 2010 00:12:49 GMT" } ]
2010-07-30T00:00:00
[ [ "Ben-Hafaiedh", "Imene", "", "Universite Joseph Fourier/VERIMAG" ], [ "Graf", "Susanne", "", "Universite Joseph Fourier/VERIMAG" ], [ "Khairallah", "Hammadi", "", "Tunisia Polytechnic\n School" ] ]
new_dataset
0.99194
1007.5092
EPTCS
Javier Cubo (University of Malaga), Ernesto Pimentel (University of Malaga), Gwen Sala\"un (Grenoble INP, INRIA-Grenoble, LIG), Carlos Canal (University of Malaga)
Handling Data-Based Concurrency in Context-Aware Service Protocols
In Proceedings FOCLASA 2010, arXiv:1007.4993
EPTCS 30, 2010, pp. 62-77
10.4204/EPTCS.30.5
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dependency analysis is a technique to identify and determine data dependencies between service protocols. Protocols evolving concurrently in the service composition need to impose an order in their execution if there exist data dependencies. In this work, we describe a model to formalise context-aware service protocols. We also present a composition language to handle dynamically the concurrent execution of protocols. This language addresses data dependency issues among several protocols concurrently executed on the same user device, using mechanisms based on data semantic matching. Our approach aims at assisting the user in establishing priorities between these dependencies, avoiding the occurrence of deadlock situations. Nevertheless, this process is error-prone, since it requires human intervention. Therefore, we also propose verification techniques to automatically detect possible inconsistencies specified by the user while building the data dependency set. Our approach is supported by a prototype tool we have implemented.
[ { "version": "v1", "created": "Thu, 29 Jul 2010 00:13:00 GMT" } ]
2010-07-30T00:00:00
[ [ "Cubo", "Javier", "", "University of Malaga" ], [ "Pimentel", "Ernesto", "", "University of\n Malaga" ], [ "Salaün", "Gwen", "", "Grenoble INP, INRIA-Grenoble, LIG" ], [ "Canal", "Carlos", "", "University of Malaga" ] ]
new_dataset
0.970377
1007.5095
EPTCS
Mohammad Mahdi Jaghoori (LIACS and CWI), Tom Chothia (University of Birmingham)
Timed Automata Semantics for Analyzing Creol
In Proceedings FOCLASA 2010, arXiv:1007.4993
EPTCS 30, 2010, pp. 108-122
10.4204/EPTCS.30.8
null
cs.LO cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a real-time semantics for the concurrent, object-oriented modeling language Creol, by mapping Creol processes to a network of timed automata. We can use our semantics to verify real time properties of Creol objects, in particular to see whether processes can be scheduled correctly and meet their end-to-end deadlines. Real-time Creol can be useful for analyzing, for instance, abstract models of multi-core embedded systems. We show how analysis can be done in Uppaal.
[ { "version": "v1", "created": "Thu, 29 Jul 2010 00:13:14 GMT" } ]
2010-07-30T00:00:00
[ [ "Jaghoori", "Mohammad Mahdi", "", "LIACS and CWI" ], [ "Chothia", "Tom", "", "University of\n Birmingham" ] ]
new_dataset
0.981857
1007.5130
Secretary Ijaia
Giuseppe Della Penna (1), Benedetto Intrigila (2), Daniele Magazzeni (3) and Fabio Mercorio (1) ((1) University of L'Aquila, Italy, (2) University of Rome, Italy and (3) University of Chieti, Italy)
Resource-Optimal Planning For An Autonomous Planetary Vehicle
15 pages, 4 figures
International Journal of Artificial Intelligence & Applications 1.3 (2010) 15-29
10.5121/ijaia.2010.1302
null
cs.AI
http://creativecommons.org/licenses/by-nc-sa/3.0/
Autonomous planetary vehicles, also known as rovers, are small autonomous vehicles equipped with a variety of sensors used to perform exploration and experiments on a planet's surface. Rovers work in a partially unknown environment, with narrow energy/time/movement constraints and, typically, small computational resources that limit the complexity of on-line planning and scheduling, thus they represent a great challenge in the field of autonomous vehicles. Indeed, formal models for such vehicles usually involve hybrid systems with nonlinear dynamics, which are difficult to handle by most of the current planning algorithms and tools. Therefore, when offline planning of the vehicle activities is required, for example for rovers that operate without a continuous Earth supervision, such planning is often performed on simplified models that are not completely realistic. In this paper we show how the UPMurphi model checking based planning tool can be used to generate resource-optimal plans to control the engine of an autonomous planetary vehicle, working directly on its hybrid model and taking into account several safety constraints, thus achieving very accurate results.
[ { "version": "v1", "created": "Thu, 29 Jul 2010 07:27:25 GMT" } ]
2010-07-30T00:00:00
[ [ "Della Penna", "Giuseppe", "" ], [ "Intrigila", "Benedetto", "" ], [ "Magazzeni", "Daniele", "" ], [ "Mercorio", "Fabio", "" ] ]
new_dataset
0.993203
1007.5139
Secretary Ijaia
Anuradha Banerjee (1) and Paramartha Dutta (2) ((1) Kalyani Govt. Engg. College, India and (2) Visva-Bharati University, India)
Reputation-Based Attack-Resistant Cooperation Stimulation (RACS) For Mobile Ad hoc Networks
20 pages, 4 figures
International Journal of Artificial Intelligence & Applications 1.3 (2010) 71-90
10.5121/ijaia.2010.1306
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
In mobile ad hoc networks (MANET), nodes usually belong to different authorities and pursue different goals. In order to maximize their own performance, nodes in such networks tend to be selfish and are not willing to forward packets for benefit of others. Meanwhile, some nodes may behave maliciously and try to disrupt the network through wasting other nodes resources in a very large scale. In this article, we present a reputation-based attack resistant cooperation stimulation (RACS) system which ensures that damage caused by malicious nodes can be bounded and cooperation among the selfish nodes can be enforced. Mathematical analyses of the system as well as the simulation results have confirmed effectiveness of our proposed system. RACS is completely self-organizing and distributed. It does not require any tamper-proof hardware or central management policy.
[ { "version": "v1", "created": "Thu, 29 Jul 2010 07:54:51 GMT" } ]
2010-07-30T00:00:00
[ [ "Banerjee", "Anuradha", "" ], [ "Dutta", "Paramartha", "" ] ]
new_dataset
0.993454
0802.0823
Marco Chiani Dr.
Enrico Paolini, Marc Fossorier, Marco Chiani
Doubly-Generalized LDPC Codes: Stability Bound over the BEC
Submitted to IEEE Trans. on Inform. Theory
IEEE Trans. Inform. Theory, vol. 55, no. 3, pp. 1027-1046, March 2009
10.1109/TIT.2008.2011446
null
cs.IT math.IT
null
The iterative decoding threshold of low-density parity-check (LDPC) codes over the binary erasure channel (BEC) fulfills an upper bound depending only on the variable and check nodes with minimum distance 2. This bound is a consequence of the stability condition, and is here referred to as stability bound. In this paper, a stability bound over the BEC is developed for doubly-generalized LDPC codes, where the variable and the check nodes can be generic linear block codes, assuming maximum a posteriori erasure correction at each node. It is proved that in this generalized context as well the bound depends only on the variable and check component codes with minimum distance 2. A condition is also developed, namely the derivative matching condition, under which the bound is achieved with equality.
[ { "version": "v1", "created": "Wed, 6 Feb 2008 16:29:14 GMT" } ]
2010-07-28T00:00:00
[ [ "Paolini", "Enrico", "" ], [ "Fossorier", "Marc", "" ], [ "Chiani", "Marco", "" ] ]
new_dataset
0.996777
1007.4606
Qingchun Zhao
Qingchun Zhao and Hongxi Yin
Gbits/s physical-layer stream ciphers based on chaotic light
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by/3.0/
We propose a novel high-speed stream cipher encryption scheme based on the true random key generated by a chaotic semiconductor laser. A 5-Gbits/s non-return-to-zero plaintext is successfully encrypted and decrypted using this cryptography. The scheme can be applied in the areas of real-time high-speed physical encryption.
[ { "version": "v1", "created": "Tue, 27 Jul 2010 01:58:33 GMT" } ]
2010-07-28T00:00:00
[ [ "Zhao", "Qingchun", "" ], [ "Yin", "Hongxi", "" ] ]
new_dataset
0.983314
1007.4801
Aylin Yener
Xiang He and Aylin Yener
MIMO Wiretap Channels with Arbitrarily Varying Eavesdropper Channel States
Submitted to IEEE Transactions on Information Theory, July 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, a class of information theoretic secrecy problems is addressed where the eavesdropper channel states are completely unknown to the legitimate parties. In particular, MIMO wiretap channel models are considered where the channel of the eavesdropper is arbitrarily varying over time. Assuming that the number of antennas of the eavesdropper is limited, the secrecy rate of the MIMO wiretap channel in the sense of strong secrecy is derived, and shown to match with the converse in secure degrees of freedom. It is proved that there exists a universal coding scheme that secures the confidential message against any sequence of channel states experienced by the eavesdropper. This yields the conclusion that secure communication is possible regardless of the location or channel states of (potentially infinite number of) eavesdroppers. Additionally, it is observed that, the present setting renders the secrecy capacity problems for multi-terminal wiretap-type channels more tractable as compared the case with full or partial knowledge of eavesdropper channel states. To demonstrate this observation, secure degrees of freedom regions are derived for the Gaussian MIMO multiple access wiretap channel (MIMO MAC-WT) and the Gaussian MIMO broadcast wiretap channel (MIMO BC-WT) where the transmitter(s) and the intended receiver(s) have the same number of antennas.
[ { "version": "v1", "created": "Tue, 27 Jul 2010 19:28:29 GMT" } ]
2010-07-28T00:00:00
[ [ "He", "Xiang", "" ], [ "Yener", "Aylin", "" ] ]
new_dataset
0.962095
1007.4066
Mubashir Husain Rehmani
Zeeshan Ali Khan and Mubashir Husain Rehmani
A Tutorial on Broadcasting Packets over Multiple-Channels in a Multi-Inferface Network Setting in NS-2
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the proliferation of cheaper electronic devices, wireless communication over multiple-channels in a multi-interface network is now possible. For instace, wireless sensor nodes can now operate over multiplechannels. Moreover, cognitive radio sensor networks are also evolving, which also operates over multiple-channels. In the market, we can find antennas that can support the operation of multiple channels, for e.g. the cc2420 antenna that is used for communication between wireless sensor nodes consists of 16 programmable channels. The proper utilization of multiple-channels reduces the interference between the nodes and increase the network throughput. Recently, a Cognitive Radio Cognitive Network (CRCN) patch for NS-2 simulator has proposed to support multi-channel multi-interface capability in NS-2. In this tutorial, we consider how to simulate a multi-channel multiinterface wireless network using the NS-2 simulator. This tutorial is trageted to the novice users who wants to understand the implementation of multi-channel multi-interface in NS-2. We take the Cognitive Radio Cognitive Network (CRCN) patch for NS-2 simulator and demonstrate broadcasting over multiple-channels in a multi-interface network setting. In our seeting, node braodcasts the Hello packets to its neighbors. Neighboring nodes receive the Hello packets if and only if they are tuned to the same channel. We demonstrate through example that the tuning of receivers can be done in two fashions.
[ { "version": "v1", "created": "Fri, 23 Jul 2010 08:20:25 GMT" }, { "version": "v2", "created": "Mon, 26 Jul 2010 13:02:50 GMT" } ]
2010-07-27T00:00:00
[ [ "Khan", "Zeeshan Ali", "" ], [ "Rehmani", "Mubashir Husain", "" ] ]
new_dataset
0.994576
1005.3902
Nabil Hathout
Nabil Hathout (CLLE)
Morphonette: a morphological network of French
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes in details the first version of Morphonette, a new French morphological resource and a new radically lexeme-based method of morphological analysis. This research is grounded in a paradigmatic conception of derivational morphology where the morphological structure is a structure of the entire lexicon and not one of the individual words it contains. The discovery of this structure relies on a measure of morphological similarity between words, on formal analogy and on the properties of two morphological paradigms:
[ { "version": "v1", "created": "Fri, 21 May 2010 08:12:12 GMT" } ]
2010-07-26T00:00:00
[ [ "Hathout", "Nabil", "", "CLLE" ] ]
new_dataset
0.997131
1005.5608
Olivier Finkel
Olivier Finkel (ELM)
On Infinitary Rational Relations and Borel Sets
null
Fourth International Conference on Discrete Mathematics and Theoretical Computer Science DMTCS'03, 7 - 12 July 2003, Dijon, France., France (2003)
null
null
cs.LO cs.CC math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove in this paper that there exists some infinitary rational relations which are Sigma^0_3-complete Borel sets and some others which are Pi^0_3-complete. This implies that there exists some infinitary rational relations which are Delta^0_4-sets but not (Sigma^0_3U Pi^0_3)-sets. These results give additional answers to questions of Simonnet and of Lescow and Thomas.
[ { "version": "v1", "created": "Mon, 31 May 2010 07:50:09 GMT" } ]
2010-07-26T00:00:00
[ [ "Finkel", "Olivier", "", "ELM" ] ]
new_dataset
0.991914
1007.4040
Yisong Wang
Yisong Wang and Jia-Huai You and Li Yan Yuan and Yi-Dong Shen
Loop Formulas for Description Logic Programs
29 pages, 1 figures (in pdf), a short version appeared in ICLP'10
yisong Wang, Jia-Huai You, Li-Yan Yuan, Yi-Dong Shen: Loop formulas for description logic programs. TPLP 10(4-6): 531-545 (2010)
10.1017/S1471068410000268
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Description Logic Programs (dl-programs) proposed by Eiter et al. constitute an elegant yet powerful formalism for the integration of answer set programming with description logics, for the Semantic Web. In this paper, we generalize the notions of completion and loop formulas of logic programs to description logic programs and show that the answer sets of a dl-program can be precisely captured by the models of its completion and loop formulas. Furthermore, we propose a new, alternative semantics for dl-programs, called the {\em canonical answer set semantics}, which is defined by the models of completion that satisfy what are called canonical loop formulas. A desirable property of canonical answer sets is that they are free of circular justifications. Some properties of canonical answer sets are also explored.
[ { "version": "v1", "created": "Fri, 23 Jul 2010 04:48:19 GMT" } ]
2010-07-26T00:00:00
[ [ "Wang", "Yisong", "" ], [ "You", "Jia-Huai", "" ], [ "Yuan", "Li Yan", "" ], [ "Shen", "Yi-Dong", "" ] ]
new_dataset
0.998912
1007.2327
Michal Kryczka
Ruben Cuevas, Michal Kryczka, Angel Cuevas, Sebastian Kaune, Carmen Guerrero, Reza Rejaie
Is Content Publishing in BitTorrent Altruistic or Profit-Driven
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity of BitTorrent is primarily due to the availability of valuable content without any cost for the consumers. However, apart from required resources, publishing (sharing) valuable (and often copyrighted) content has serious legal implications for user who publish the material (or publishers). This raises a question that whether (at least major) content publishers behave in an altruistic fashion or have other incentives such as financial. In this study, we identify the content publishers of more than 55k torrents in 2 major BitTorrent portals and examine their behavior. We demonstrate that a small fraction of publishers are responsible for 66% of published content and 75% of the downloads. Our investigations reveal that these major publishers respond to two different profiles. On one hand, antipiracy agencies and malicious publishers publish a large amount of fake files to protect copyrighted content and spread malware respectively. On the other hand, content publishing in BitTorrent is largely driven by companies with financial incentive. Therefore, if these companies lose their interest or are unable to publish content, BitTorrent traffic/portals may disappear or at least their associated traffic will significantly reduce.
[ { "version": "v1", "created": "Wed, 14 Jul 2010 13:40:22 GMT" }, { "version": "v2", "created": "Thu, 22 Jul 2010 10:56:31 GMT" } ]
2010-07-23T00:00:00
[ [ "Cuevas", "Ruben", "" ], [ "Kryczka", "Michal", "" ], [ "Cuevas", "Angel", "" ], [ "Kaune", "Sebastian", "" ], [ "Guerrero", "Carmen", "" ], [ "Rejaie", "Reza", "" ] ]
new_dataset
0.998605
1007.3794
EPTCS
Lucas Dixon (University of Edinburgh), Ross Duncan (University of Oxford), Aleks Kissinger (University of Oxford)
Open Graphs and Computational Reasoning
In Proceedings DCM 2010, arXiv:1006.1937
EPTCS 26, 2010, pp. 169-180
10.4204/EPTCS.26.16
null
cs.LO cs.MS cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a form of algebraic reasoning for computational objects which are expressed as graphs. Edges describe the flow of data between primitive operations which are represented by vertices. These graphs have an interface made of half-edges (edges which are drawn with an unconnected end) and enjoy rich compositional principles by connecting graphs along these half-edges. In particular, this allows equations and rewrite rules to be specified between graphs. Particular computational models can then be encoded as an axiomatic set of such rules. Further rules can be derived graphically and rewriting can be used to simulate the dynamics of a computational system, e.g. evaluating a program on an input. Examples of models which can be formalised in this way include traditional electronic circuits as well as recent categorical accounts of quantum information.
[ { "version": "v1", "created": "Thu, 22 Jul 2010 03:31:39 GMT" } ]
2010-07-23T00:00:00
[ [ "Dixon", "Lucas", "", "University of Edinburgh" ], [ "Duncan", "Ross", "", "University of\n Oxford" ], [ "Kissinger", "Aleks", "", "University of Oxford" ] ]
new_dataset
0.998127
1007.3836
Oleksiy Kurganskyy
Oleksiy Kurgansky
A state of a dynamic computational structure distributed in an environment: a model and its corollaries
11 pages, 5 figures
null
null
null
cs.FL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Currently there is great interest in computational models consisting of underlying regular computational environments, and built on them distributed computational structures. Examples of such models are cellular automata, spatial computation and space-time crystallography. For any computational model it is natural to define a functional equivalence of different but related computational structures. In the finite automata theory an example of such equivalence is automata homomorphism and, in particular, automata isomorphism. If we continue to stick to the finite automata theory, a fundamental question arise, what a state of a distributed computational structure is. This work is devoted to particular solution of the issue.
[ { "version": "v1", "created": "Thu, 22 Jul 2010 09:38:57 GMT" } ]
2010-07-23T00:00:00
[ [ "Kurgansky", "Oleksiy", "" ] ]
new_dataset
0.95555
1007.3896
Amos Lapidoth
Shraga I. Bross and Amos Lapidoth
The State-Dependent Multiple-Access Channel with States Available at a Cribbing Encoder
This is a longer version of a submission to the 2010 IEEE 26-th Convention of Electrical and Electronics Engineers in Israel (IEEEI 2010)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The two-user discrete memoryless state-dependent multiple-access channel (MAC) models a scenario in which two encoders transmit independent messages to a single receiver via a MAC whose channel law is governed by the pair of encoders' inputs and by an i.i.d. state random variable. In the cooperative state-dependent MAC model it is further assumed that Message 1 is shared by both encoders whereas Message 2 is known only to Encoder 2 - the cognitive transmitter. The capacity of the cooperative state-dependent MAC where the realization of the state sequence is known non-causally to the cognitive encoder has been derived by Somekh-Baruch et. al. In this work we dispense of the assumption that Message 1 is shared a-priori by both encoders. Instead, we study the case in which Encoder 2 cribs causally from Encoder 1. We determine the capacity region for both, the case where Encoder 2 cribs strictly causal and the case where Encoder 2 cribs causally from Encoder 1.
[ { "version": "v1", "created": "Thu, 22 Jul 2010 14:41:00 GMT" } ]
2010-07-23T00:00:00
[ [ "Bross", "Shraga I.", "" ], [ "Lapidoth", "Amos", "" ] ]
new_dataset
0.982355
1007.3649
Satish N. Srirama
Satish Narayana Srirama and Anton Naumenko
Secure Communication and Access Control for Mobile Web Service Provisioning
Proceedings of the First International Conference on Security of Information and Networks (SIN 2007), May 8-10, 2007. Trafford Publishing, Canada
null
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welcoming, the ability to provide secure and reliable communication in the vulnerable and volatile mobile ad-hoc topologies is vastly becoming necessary. The paper mainly addresses the details and issues in providing secured communication and access control for the mobile web service provisioning domain. While the basic message-level security can be provided, providing proper access control mechanisms for the Mobile Host still poses a great challenge. This paper discusses details of secure communication and proposes the distributed semantics-based authorization mechanism.
[ { "version": "v1", "created": "Wed, 21 Jul 2010 13:20:33 GMT" } ]
2010-07-22T00:00:00
[ [ "Srirama", "Satish Narayana", "" ], [ "Naumenko", "Anton", "" ] ]
new_dataset
0.996711
1007.3661
Ryuhei Mori
Ryuhei Mori and Toshiyuki Tanaka
Non-Binary Polar Codes using Reed-Solomon Codes and Algebraic Geometry Codes
5 pages, 3 figures, to appear in ITW 2010 Dublin
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes, introduced by Arikan, achieve symmetric capacity of any discrete memoryless channels under low encoding and decoding complexity. Recently, non-binary polar codes have been investigated. In this paper, we calculate error probability of non-binary polar codes constructed on the basis of Reed-Solomon matrices by numerical simulations. It is confirmed that 4-ary polar codes have significantly better performance than binary polar codes on binary-input AWGN channel. We also discuss an interpretation of polar codes in terms of algebraic geometry codes, and further show that polar codes using Hermitian codes have asymptotically good performance.
[ { "version": "v1", "created": "Wed, 21 Jul 2010 13:58:11 GMT" } ]
2010-07-22T00:00:00
[ [ "Mori", "Ryuhei", "" ], [ "Tanaka", "Toshiyuki", "" ] ]
new_dataset
0.999821
0909.1392
Dhananjoy Dey
Dhananjoy Dey, Prasanna Raghaw Mishra and Indranath Sengupta
HF-hash : Hash Functions Using Restricted HFE Challenge-1
44 pages including 32 pages appendix (list of polynomials) 2 figures, corrected Surname
null
null
null
cs.CR math.AC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vulnerability of dedicated hash functions to various attacks has made the task of designing hash function much more challenging. This provides us a strong motivation to design a new cryptographic hash function viz. HF-hash. This is a hash function, whose compression function is designed by using first 32 polynomials of HFE Challenge-1 with 64 variables by forcing remaining 16 variables as zero. HF-hash gives 256 bits message digest and is as efficient as SHA-256. It is secure against the differential attack proposed by Chabaud and Joux as well as by Wang et. al. applied to SHA-0 and SHA-1.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 05:42:54 GMT" }, { "version": "v2", "created": "Mon, 5 Oct 2009 11:25:40 GMT" } ]
2010-07-21T00:00:00
[ [ "Dey", "Dhananjoy", "" ], [ "Mishra", "Prasanna Raghaw", "" ], [ "Sengupta", "Indranath", "" ] ]
new_dataset
0.997691
0906.1346
Jianfeng Zhan
Jianfeng Zhan, Lei Wang, Bibo Tu, Yong Li, Peng Wang, Wei Zhou, Dan Meng
Phoenix Cloud: Consolidating Different Computing Loads on Shared Cluster System for Large Organization
5 page, 8 figures, The First Workshop of Cloud Computing and its Application, The modified version. The original version is on the web site of http://www.cca08.org/, which is dated from August 13, 2008
The first workshop of cloud computing and its application (CCA 08), Chicago, 2008
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Different departments of a large organization often run dedicated cluster systems for different computing loads, like HPC (high performance computing) jobs or Web service applications. In this paper, we have designed and implemented a cloud management system software Phoenix Cloud to consolidate heterogeneous workloads from different departments affiliated to the same organization on the shared cluster system. We have also proposed cooperative resource provisioning and management policies for a large organization and its affiliated departments, running HPC jobs and Web service applications, to share the consolidated cluster system. The experiments show that in comparison with the case that each department operates its dedicated cluster system, Phoenix Cloud significantly decreases the scale of the required cluster system for a large organization, improves the benefit of the scientific computing department, and at the same time provisions enough resources to the other department running Web services with varying loads.
[ { "version": "v1", "created": "Sun, 7 Jun 2009 10:15:28 GMT" }, { "version": "v2", "created": "Tue, 23 Feb 2010 07:59:05 GMT" }, { "version": "v3", "created": "Wed, 24 Mar 2010 06:01:45 GMT" }, { "version": "v4", "created": "Tue, 6 Apr 2010 23:03:03 GMT" }, { "version": "v5", "created": "Thu, 15 Jul 2010 00:13:39 GMT" }, { "version": "v6", "created": "Sat, 17 Jul 2010 00:03:21 GMT" } ]
2010-07-20T00:00:00
[ [ "Zhan", "Jianfeng", "" ], [ "Wang", "Lei", "" ], [ "Tu", "Bibo", "" ], [ "Li", "Yong", "" ], [ "Wang", "Peng", "" ], [ "Zhou", "Wei", "" ], [ "Meng", "Dan", "" ] ]
new_dataset
0.993666
1007.2855
Graeme Smith
Graeme Smith
Quantum Channel Capacities
This review of quantum channel capacities is the basis for my upcoming talk at ITW 2010 in Dublin
null
null
null
cs.IT math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A quantum communication channel can be put to many uses: it can transmit classical information, private classical information, or quantum information. It can be used alone, with shared entanglement, or together with other channels. For each of these settings there is a capacity that quantifies a channel's potential for communication. In this short review, I summarize what is known about the various capacities of a quantum channel, including a discussion of the relevant additivity questions. I also give some indication of potentially interesting directions for future research.
[ { "version": "v1", "created": "Fri, 16 Jul 2010 20:02:13 GMT" } ]
2010-07-20T00:00:00
[ [ "Smith", "Graeme", "" ] ]
new_dataset
0.990937
1007.2981
Satish N. Srirama
Satish Narayana Srirama, Matthias Jarke, Wolfgang Prinz
A Mediation Framework for Mobile Web Service Provisioning
Proceedings of 2006 Middleware for Web Services (MWS 2006) Workshop @ 10th International IEEE EDOC Conference "The Enterprise Computing Conference", October 16, 2006, pp. 14-17. IEEE Computer Society
null
10.1109/EDOCW.2006.9
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web Services and mobile data services are the newest trends in information systems engineering in wired and wireless domains, respectively. Web Services have a broad range of service distributions while mobile phones have large and expanding user base. To address the confluence of Web Services and pervasive mobile devices and communication environments, a basic mobile Web Service provider was developed for smart phones. The performance of this Mobile Host was also analyzed in detail. Further analysis of the Mobile Host to provide proper QoS and to check Mobile Host's feasibility in the P2P networks, identified the necessity of a mediation framework. The paper describes the research conducted with the Mobile Host, identifies the tasks of the mediation framework and then discusses the feasible realization details of such a mobile Web Services mediation framework.
[ { "version": "v1", "created": "Sun, 18 Jul 2010 09:22:31 GMT" } ]
2010-07-20T00:00:00
[ [ "Srirama", "Satish Narayana", "" ], [ "Jarke", "Matthias", "" ], [ "Prinz", "Wolfgang", "" ] ]
new_dataset
0.994091
1007.3058
Ghassan Samara
Ghassan Samara, Sureswaran Ramadas, Wafaa A.H. Al-Salihy
Safety Message Power Transmission Control for Vehicular Ad hoc Networks
null
Journal of Computer Science 6 (10): 1027-1032, 2010 ISSN 1549-3636, 2010 Science Publications
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of Mobile Ad Hoc Networks. In this research we proposed a dynamic power adjustment protocol that will be used for sending the periodical safety message. (Beacon)based on the analysis of the channel status depending on the channel congestion and the power used for transmission. The Beacon Power Control (BPC) protocol first sensed and examined the percentage of the channel congestion, the result obtained was used to adjust the transmission power for the safety message to reach the optimal power. This will lead to decrease the congestion in the channel and achieve good channel performance and beacon dissemination.
[ { "version": "v1", "created": "Mon, 19 Jul 2010 03:05:36 GMT" } ]
2010-07-20T00:00:00
[ [ "Samara", "Ghassan", "" ], [ "Ramadas", "Sureswaran", "" ], [ "Al-Salihy", "Wafaa A. H.", "" ] ]
new_dataset
0.991668
1007.3159
Fabrizio Riguzzi PhD
Marco Gavanelli and Fabrizio Riguzzi and Michela Milano and Paolo Cagnoli
Logic-Based Decision Support for Strategic Environmental Assessment
17 pages, 1 figure, 26th Int'l. Conference on Logic Programming (ICLP'10)
Theory and Practice of Logic Programming, 26th Int'l. Conference on Logic Programming (ICLP'10) Special Issue, 10(4-6), 643-658, 2010
10.1017/S1471068410000335
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Strategic Environmental Assessment is a procedure aimed at introducing systematic assessment of the environmental effects of plans and programs. This procedure is based on the so-called coaxial matrices that define dependencies between plan activities (infrastructures, plants, resource extractions, buildings, etc.) and positive and negative environmental impacts, and dependencies between these impacts and environmental receptors. Up to now, this procedure is manually implemented by environmental experts for checking the environmental effects of a given plan or program, but it is never applied during the plan/program construction. A decision support system, based on a clear logic semantics, would be an invaluable tool not only in assessing a single, already defined plan, but also during the planning process in order to produce an optimized, environmentally assessed plan and to study possible alternative scenarios. We propose two logic-based approaches to the problem, one based on Constraint Logic Programming and one on Probabilistic Logic Programming that could be, in the future, conveniently merged to exploit the advantages of both. We test the proposed approaches on a real energy plan and we discuss their limitations and advantages.
[ { "version": "v1", "created": "Mon, 19 Jul 2010 14:36:54 GMT" } ]
2010-07-20T00:00:00
[ [ "Gavanelli", "Marco", "" ], [ "Riguzzi", "Fabrizio", "" ], [ "Milano", "Michela", "" ], [ "Cagnoli", "Paolo", "" ] ]
new_dataset
0.994278
1007.3181
Joseph O'Rourke
Joseph O'Rourke
On Folding a Polygon to a Polyhedron
6 pages, 1 figure
null
null
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the open problem presented in "Geometric Folding Algorithms: Linkages, Origami, Polyhedra" [DO07] is solved by a theorem of Burago and Zalgaller [BZ96] from more than a decade earlier.
[ { "version": "v1", "created": "Mon, 19 Jul 2010 15:20:24 GMT" } ]
2010-07-20T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
new_dataset
0.999371
0705.0315
Omid Amini
Omid Amini, Frederic Havet, Florian Huc, Stephan Thomasse
WDM and Directed Star Arboricity
18 pages, 2 figures. Final version
Combinatorics, Probability and Computing, Volume 19, Issue 02, March 2010, pp 161-182
null
null
cs.NI math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A digraph is $m$-labelled if every arc is labelled by an integer in $\{1, \dots,m\}$. Motivated by wavelength assignment for multicasts in optical networks, we introduce and study $n$-fibre colourings of labelled digraphs. These are colourings of the arcs of $D$ such that at each vertex $v$, and for each colour $\alpha$, $in(v,\alpha)+out(v,\alpha)\leq n$ with $in(v,\alpha)$ the number of arcs coloured $\alpha$ entering $v$ and $out(v,\alpha)$ the number of labels $l$ such that there is at least one arc of label $l$ leaving $v$ and coloured with $\alpha$. The problem is to find the minimum number of colours $\lambda_n(D)$ such that the $m$-labelled digraph $D$ has an $n$-fibre colouring. In the particular case when $D$ is $1$-labelled, $\lambda_1(D)$ is called the directed star arboricity of $D$, and is denoted by $dst(D)$. We first show that $dst(D)\leq 2\Delta^-(D)+1$, and conjecture that if $\Delta^-(D)\geq 2$, then $dst(D)\leq 2\Delta^-(D)$. We also prove that for a subcubic digraph $D$, then $dst(D)\leq 3$, and that if $\Delta^+(D), \Delta^-(D)\leq 2$, then $dst(D)\leq 4$. Finally, we study $\lambda_n(m,k)=\max\{\lambda_n(D) \tq D \mbox{is $m$-labelled} \et \Delta^-(D)\leq k\}$. We show that if $m\geq n$, then $\ds \left\lceil\frac{m}{n}\left\lceil \frac{k}{n}\right\rceil + \frac{k}{n} \right\rceil\leq \lambda_n(m,k) \leq\left\lceil\frac{m}{n}\left\lceil \frac{k}{n}\right\rceil + \frac{k}{n} \right\rceil + C \frac{m^2\log k}{n}$ for some constant $C$. We conjecture that the lower bound should be the right value of $\lambda_n(m,k)$.
[ { "version": "v1", "created": "Wed, 2 May 2007 15:54:55 GMT" }, { "version": "v2", "created": "Thu, 3 May 2007 08:38:06 GMT" }, { "version": "v3", "created": "Thu, 15 Jul 2010 01:05:23 GMT" } ]
2010-07-16T00:00:00
[ [ "Amini", "Omid", "" ], [ "Havet", "Frederic", "" ], [ "Huc", "Florian", "" ], [ "Thomasse", "Stephan", "" ] ]
new_dataset
0.995816
1003.3307
Secretary Aircc Journal
S. Mehta (1) and K.S. Kwak (1) ((1)Inha University, Korea)
H-MAC: A Hybrid MAC Protocol for Wireless Sensor Networks
10 pages, IJCNC Journal 2010
International Journal of Computer Networks & Communications 2.2 (2010) 108-117
10.5121/ijcnc.2010.2208
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, we propose a hybrid medium access control protocol (H-MAC) for wireless sensor networks. It is based on the IEEE 802.11's power saving mechanism (PSM) and slotted aloha, and utilizes multiple slots dynamically to improve performance. Existing MAC protocols for sensor networks reduce energy consumptions by introducing variation in an active/sleep mechanism. But they may not provide energy efficiency in varying traffic conditions as well as they did not address Quality of Service (QoS) issues. H-MAC, the propose MAC protocol maintains energy efficiency as well as QoS issues like latency, throughput, and channel utilization. Our numerical results show that H-MAC has significant improvements in QoS parameters than the existing MAC protocols for sensor networks while consuming comparable amount of energy.
[ { "version": "v1", "created": "Wed, 17 Mar 2010 06:48:13 GMT" } ]
2010-07-15T00:00:00
[ [ "Mehta", "S.", "", "Inha University, Korea" ], [ "Kwak", "K. S.", "", "Inha University, Korea" ] ]
new_dataset
0.996876