id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1006.1703
|
Harco Leslie Hendric Spits Warnars
|
Spits Warnars
|
Indonesian Earthquake Decision Support System
|
8 pages, 7 figures
|
The 5th International Conference on Information & Communication
Technology and Systems (ICTS) 2009, Informatics Department, Institute of
Technology Sepuluh Nopember (ITS), Surabaya, Indonesia, 3-4 August 2009
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Earthquake DSS is an information technology environment which can be used by
government to sharpen, make faster and better the earthquake mitigation
decision. Earthquake DSS can be delivered as E-government which is not only for
government itself but in order to guarantee each citizen's rights for
education, training and information about earthquake and how to overcome the
earthquake. Knowledge can be managed for future use and would become mining by
saving and maintain all the data and information about earthquake and
earthquake mitigation in Indonesia. Using Web technology will enhance global
access and easy to use. Datawarehouse as unNormalized database for
multidimensional analysis will speed the query process and increase reports
variation. Link with other Disaster DSS in one national disaster DSS, link with
other government information system and international will enhance the
knowledge and sharpen the reports.
|
[
{
"version": "v1",
"created": "Wed, 9 Jun 2010 04:36:14 GMT"
}
] | 2010-06-10T00:00:00 |
[
[
"Warnars",
"Spits",
""
]
] |
new_dataset
| 0.995567 |
1006.1711
|
EPTCS
|
Angelo Montanari (Universit\`a di Udine), Margherita Napoli
(Universit\`a di Salerno), Mimmo Parente (Universit\`a di Salerno)
|
Proceedings First Symposium on Games, Automata, Logic, and Formal
Verification
| null |
EPTCS 25, 2010
|
10.4204/EPTCS.25
| null |
cs.GT cs.FL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This volume contains the Proceedings of the first Symposium on "Games,
Automata, Logic, and Formal Verification (GandALF)", held in Minori (Amalfi
coast), Italy, 17-18 June 2010. The symposium has been promoted by a number of
Italian computer scientists interested in game theory, mathematical logic,
automata theory, and their applications to the specification, design, and
verification of complex systems. It covers a large spectrum of research topics,
ranging from theoretical aspects to concrete applications. Its aim is to
provide a forum where people from different areas, and possibly with a
different background, can successfully interact. The high-level international
profile of the event is witnessed by the composition of the program committee
and by the final program.
|
[
{
"version": "v1",
"created": "Wed, 9 Jun 2010 06:30:25 GMT"
}
] | 2010-06-10T00:00:00 |
[
[
"Montanari",
"Angelo",
"",
"Università di Udine"
],
[
"Napoli",
"Margherita",
"",
"Università di Salerno"
],
[
"Parente",
"Mimmo",
"",
"Università di Salerno"
]
] |
new_dataset
| 0.992278 |
1006.1406
|
EPTCS
|
Giovanna D'Agostino (University of Udine, Italy), Giacomo Lenzi
(University of Salerno, Italy)
|
On Modal {\mu}-Calculus over Finite Graphs with Bounded Strongly
Connected Components
| null |
EPTCS 25, 2010, pp. 55-71
|
10.4204/EPTCS.25.9
| null |
cs.LO cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For every positive integer k we consider the class SCCk of all finite graphs
whose strongly connected components have size at most k. We show that for every
k, the Modal mu-Calculus fixpoint hierarchy on SCCk collapses to the level
Delta2, but not to Comp(Sigma1,Pi1) (compositions of formulas of level Sigma1
and Pi1). This contrasts with the class of all graphs, where
Delta2=Comp(Sigma1,Pi1).
|
[
{
"version": "v1",
"created": "Tue, 8 Jun 2010 00:42:43 GMT"
}
] | 2010-06-09T00:00:00 |
[
[
"D'Agostino",
"Giovanna",
"",
"University of Udine, Italy"
],
[
"Lenzi",
"Giacomo",
"",
"University of Salerno, Italy"
]
] |
new_dataset
| 0.967642 |
1006.1428
|
EPTCS
|
Mikl\'os Bartha (Memorial University of Newfoundland)
|
Turing Automata and Graph Machines
| null |
EPTCS 26, 2010, pp. 19-31
|
10.4204/EPTCS.26.3
| null |
cs.FL cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Indexed monoidal algebras are introduced as an equivalent structure for
self-dual compact closed categories, and a coherence theorem is proved for the
category of such algebras. Turing automata and Turing graph machines are
defined by generalizing the classical Turing machine concept, so that the
collection of such machines becomes an indexed monoidal algebra. On the analogy
of the von Neumann data-flow computer architecture, Turing graph machines are
proposed as potentially reversible low-level universal computational devices,
and a truly reversible molecular size hardware model is presented as an
example.
|
[
{
"version": "v1",
"created": "Tue, 8 Jun 2010 01:16:19 GMT"
}
] | 2010-06-09T00:00:00 |
[
[
"Bartha",
"Miklós",
"",
"Memorial University of Newfoundland"
]
] |
new_dataset
| 0.994672 |
1006.1074
|
Mathias Monnerville
|
M. Monnerville and G. S\'emah
|
Youpi, a Web-based Astronomical Image Processing Pipeline
|
4 pages, 2 figures, to appear in the proceedings of ADASS XIX, Oct
4-8 2009, Sapporo, Japan (ASP Conf. Series)
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Youpi stands for "YOUpi is your processing PIpeline". It is a portable, easy
to use web application providing high level functionalities to perform data
reduction on scientific FITS images. It is built on top of open source
processing tools that are released to the community by Terapix, in order to
organize your data on a computer cluster, to manage your processing jobs in
real time and to facilitate teamwork by allowing fine-grain sharing of results
and data. On the server side, Youpi is written in the Python programming
language and uses the Django web framework. On the client side, Ajax techniques
are used along with the Prototype and script.aculo.us Javascript librairies.
|
[
{
"version": "v1",
"created": "Sat, 5 Jun 2010 22:27:14 GMT"
}
] | 2010-06-08T00:00:00 |
[
[
"Monnerville",
"M.",
""
],
[
"Sémah",
"G.",
""
]
] |
new_dataset
| 0.998401 |
1006.1172
|
Ali Talari
|
Ali Talari and Nazanin Rahnavard
|
Distributed Rateless Codes with UEP Property
|
Accepted, 2010 IEEE International Symposium on Information Theory
(ISIT 2010)
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When multiple sources of data need to transmit their rateless coded symbols
through a single relay to a common destination, a distributed rateless code
instead of several separate conventional rateless codes can be employed to
encode the input symbols to increase the transmission efficiency and
flexibility.
In this paper, we propose distributed rateless codes DU-rateless that can
provide unequal error protection (UEP) for distributed sources with different
data block lengths and different importance levels. We analyze our proposed
DU-rateless code employing And-Or tree analysis technique. Next, we design
several sets of optimum DU-rateless codes for various setups employing
multi-objective genetic algorithms and evaluate their performances.
|
[
{
"version": "v1",
"created": "Mon, 7 Jun 2010 05:19:43 GMT"
}
] | 2010-06-08T00:00:00 |
[
[
"Talari",
"Ali",
""
],
[
"Rahnavard",
"Nazanin",
""
]
] |
new_dataset
| 0.995974 |
1006.0836
|
Ashley Smith
|
Harsh kumar and Shweta Srivastava
|
Rectangular and Circular Antenna Design on Thick Substrate
|
Submitted to Journal of Telecommunications, see
http://sites.google.com/site/journaloftelecommunications/volume-2-issue-2-may-2010
|
Journal of Telecommunications,Volume 2, Issue 2, pp58-63, May 2010
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Millimeter wave technology being an emerging area is still very undeveloped.
A substantial research needs to be done in this area as its applications are
numerous. In the present endeavor, a rectangular patch antenna is designed on
thick substrate and simulated using SONNET software, also a novel analysis
technique is developed for circular patch antenna for millimeter wave
frequency. The antenna is designed at 39 GHz on thick substrate and has been
analyzed and simulated.The results of the theoretical analysis are in good
agreement with the simulated results.
|
[
{
"version": "v1",
"created": "Fri, 4 Jun 2010 10:07:00 GMT"
}
] | 2010-06-07T00:00:00 |
[
[
"kumar",
"Harsh",
""
],
[
"Srivastava",
"Shweta",
""
]
] |
new_dataset
| 0.999758 |
1006.0850
|
Ashley Smith
|
Hardeep Singh, Jasvir Singh and M. Mian
|
Simulink based VoIP Analysis
|
Submitted to Journal of Telecommunications, see
http://sites.google.com/site/journaloftelecommunications/volume-2-issue-2-may-2010
|
Journal of Telecommunications,Volume 2, Issue 2, p126-130, May
2010
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Voice communication over internet not be possible without a reliable data
network, this was first available when distributed network topologies were used
in conjunction with data packets. Early network used single centre node network
in which a single workstation (Server) is responsible for the communication.
This posed problems as if there was a fault with the centre node, (workstation)
nothing would work. This problem was solved by the distributed system in which
reliability increases by spreading the load between many nodes. The idea of
packet switching & distributed network were combined, this combination were
increased reliability, speed & responsible for voice communication over
internet, Voice-over-IP (VoIP)These data packets travel through a
packet-switched network such as the Internet and arrive at their destination
where they are decompressed using a compatible Codec (audio coder/decoder) and
converted back to analogue audio. This paper deals with the Simulink
architecture for VoIP network.
|
[
{
"version": "v1",
"created": "Fri, 4 Jun 2010 10:36:13 GMT"
}
] | 2010-06-07T00:00:00 |
[
[
"Singh",
"Hardeep",
""
],
[
"Singh",
"Jasvir",
""
],
[
"Mian",
"M.",
""
]
] |
new_dataset
| 0.999029 |
1006.0902
|
Alexandru I. Tomescu
|
Alexandru I. Tomescu
|
On cycles through two arcs in strong multipartite tournaments
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A multipartite tournament is an orientation of a complete $c$-partite graph.
In [L. Volkmann, A remark on cycles through an arc in strongly connected
multipartite tournaments, Appl. Math. Lett. 20 (2007) 1148--1150], Volkmann
proved that a strongly connected $c$-partite tournament with $c \ge 3$ contains
an arc that belongs to a directed cycle of length $m$ for every $m \in \{3, 4,
\ldots, c\}$. He also conjectured the existence of three arcs with this
property. In this note, we prove the existence of two such arcs.
|
[
{
"version": "v1",
"created": "Fri, 4 Jun 2010 14:20:04 GMT"
}
] | 2010-06-07T00:00:00 |
[
[
"Tomescu",
"Alexandru I.",
""
]
] |
new_dataset
| 0.999521 |
1006.0576
|
Benjamin Nguyen
|
Georges Gardarin (PRISM), Benjamin Nguyen (PRISM), Laurent Yeh
(PRISM), Karine Zeitouni (PRISM), Bogdan Butnaru (PRISM), Iulian Sandu-Popa
(PRISM)
|
Gestion efficace de s\'eries temporelles en P2P: Application \`a
l'analyse technique et l'\'etude des objets mobiles
| null |
Bases de Donn\'ees Avanc\'ees, Namur : Belgium (2009)
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a simple generic model to manage time series. A
time series is composed of a calendar with a typed value for each calendar
entry. Although the model could support any kind of XML typed values, in this
paper we focus on real numbers, which are the usual application. We define
basic vector space operations (plus, minus, scale), and also relational-like
and application oriented operators to manage time series. We show the interest
of this generic model on two applications: (i) a stock investment helper; (ii)
an ecological transport management system. Stock investment requires
window-based operations while trip management requires complex queries. The
model has been implemented and tested in PHP, Java, and XQuery. We show
benchmark results illustrating that the computing of 5000 series of over
100.000 entries in length - common requirements for both applications - is
difficult on classical centralized PCs. In order to serve a community of users
sharing time series, we propose a P2P implementation of time series by dividing
them in segments and providing optimized algorithms for operator expression
computation.
|
[
{
"version": "v1",
"created": "Thu, 3 Jun 2010 07:59:40 GMT"
}
] | 2010-06-04T00:00:00 |
[
[
"Gardarin",
"Georges",
"",
"PRISM"
],
[
"Nguyen",
"Benjamin",
"",
"PRISM"
],
[
"Yeh",
"Laurent",
"",
"PRISM"
],
[
"Zeitouni",
"Karine",
"",
"PRISM"
],
[
"Butnaru",
"Bogdan",
"",
"PRISM"
],
[
"Sandu-Popa",
"Iulian",
"",
"PRISM"
]
] |
new_dataset
| 0.979235 |
1001.2327
|
Yeow-Khiang Chia
|
Yeow-Khiang Chia and Abbas El Gamal
|
Wiretap Channel with Causal State Information
|
V2: Minor edits. 19 pages, 3 figures V3: Minor edits. Typos corrected
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A lower bound on the secrecy capacity of the wiretap channel with state
information available causally at both the encoder and decoder is established.
The lower bound is shown to be strictly larger than that for the noncausal case
by Liu and Chen. Achievability is proved using block Markov coding, Shannon
strategy, and key generation from common state information. The state sequence
available at the end of each block is used to generate a key, which is used to
enhance the transmission rate of the confidential message in the following
block. An upper bound on the secrecy capacity when the state is available
noncausally at the encoder and decoder is established and is shown to coincide
with the lower bound for several classes of wiretap channels with state.
|
[
{
"version": "v1",
"created": "Wed, 13 Jan 2010 22:40:28 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Jan 2010 01:24:28 GMT"
},
{
"version": "v3",
"created": "Wed, 2 Jun 2010 05:29:01 GMT"
}
] | 2010-06-03T00:00:00 |
[
[
"Chia",
"Yeow-Khiang",
""
],
[
"Gamal",
"Abbas El",
""
]
] |
new_dataset
| 0.957009 |
1006.0247
|
Wojciech Mazurczyk
|
Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski
|
Stream Control Transmission Protocol Steganography
|
6 pages, 6 figures, 2 tables
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Stream Control Transmission Protocol (SCTP) is a new transport layer protocol
that is due to replace TCP (Transmission Control Protocol) and UDP (User
Datagram Protocol) protocols in future IP networks. Currently, it is
implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It
is also supported in Cisco network devices operating system (Cisco IOS) and may
be used in Windows. This paper describes potential steganographic methods that
may be applied to SCTP and may pose a threat to network security. Proposed
methods utilize new, characteristic SCTP features like multi-homing and
multistreaming. Identified new threats and suggested countermeasures may be
used as a supplement to RFC 5062, which describes security attacks in SCTP
protocol and can induce further standard modifications.
|
[
{
"version": "v1",
"created": "Tue, 1 Jun 2010 20:26:27 GMT"
}
] | 2010-06-03T00:00:00 |
[
[
"Fraczek",
"Wojciech",
""
],
[
"Mazurczyk",
"Wojciech",
""
],
[
"Szczypiorski",
"Krzysztof",
""
]
] |
new_dataset
| 0.998826 |
1006.0334
|
Rui Costa
|
Rui A. Costa and Michael Langberg and Jo\~ao Barros
|
One-Shot Capacity of Discrete Channels
|
ISIT 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Shannon defined channel capacity as the highest rate at which there exists a
sequence of codes of block length $n$ such that the error probability goes to
zero as $n$ goes to infinity. In this definition, it is implicit that the block
length, which can be viewed as the number of available channel uses, is
unlimited. This is not the case when the transmission power must be
concentrated on a single transmission, most notably in military scenarios with
adversarial conditions or delay-tolerant networks with random short encounters.
A natural question arises: how much information can we transmit in a single use
of the channel? We give a precise characterization of the one-shot capacity of
discrete channels, defined as the maximum number of bits that can be
transmitted in a single use of a channel with an error probability that does
not exceed a prescribed value. This capacity definition is shown to be useful
and significantly different from the zero-error problem statement.
|
[
{
"version": "v1",
"created": "Wed, 2 Jun 2010 09:31:35 GMT"
}
] | 2010-06-03T00:00:00 |
[
[
"Costa",
"Rui A.",
""
],
[
"Langberg",
"Michael",
""
],
[
"Barros",
"João",
""
]
] |
new_dataset
| 0.990484 |
1006.0385
|
Dr. Paul J. Werbos
|
Paul J. Werbos
|
Brain-Like Stochastic Search: A Research Challenge and Funding
Opportunity
|
Plenary talk at IEEE Conference on Evolutionary Computing 1999,
extended in 2010 with new appendix
| null | null | null |
cs.AI
|
http://creativecommons.org/licenses/publicdomain/
|
Brain-Like Stochastic Search (BLiSS) refers to this task: given a family of
utility functions U(u,A), where u is a vector of parameters or task
descriptors, maximize or minimize U with respect to u, using networks (Option
Nets) which input A and learn to generate good options u stochastically. This
paper discusses why this is crucial to brain-like intelligence (an area funded
by NSF) and to many applications, and discusses various possibilities for
network design and training. The appendix discusses recent research, relations
to work on stochastic optimization in operations research, and relations to
engineering-based approaches to understanding neocortex.
|
[
{
"version": "v1",
"created": "Tue, 1 Jun 2010 18:16:10 GMT"
}
] | 2010-06-03T00:00:00 |
[
[
"Werbos",
"Paul J.",
""
]
] |
new_dataset
| 0.953759 |
1003.3713
|
Joseph O'Rourke
|
Joseph O'Rourke
|
The Yao Graph Y_6 is a Spanner
|
12 pages, 11 figures, 2 references, unpublished. A subcase of Case(2)
of Theorem 1 was overlooked, and I withdraw the paper until that gap is
filled.
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that Y_6 is a spanner. Y_6 is the Yao graph on a set of planar
points, which has an edge from each point x to a closest point y within each of
the six angular cones of 60 deg surrounding x.
|
[
{
"version": "v1",
"created": "Fri, 19 Mar 2010 04:36:52 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Jun 2010 18:25:13 GMT"
}
] | 2010-06-02T00:00:00 |
[
[
"O'Rourke",
"Joseph",
""
]
] |
new_dataset
| 0.997949 |
1005.3968
|
Gilson Oliveira Santos
|
G. O. Santos, F. M. Assis and A. F. Lima
|
A Scheme of Concatenated Quantum Code to Protect against both
Computational Error and an Erasure
|
21 pages, 2 figures
| null | null | null |
cs.IT math.IT quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a description of encoding/decoding for a concatenated quantum code
that enables both protection against quantum computational errors and the
occurrence of one quantum erasure. For this, it is presented how encoding and
decoding for quantum graph codes are done, which will provide the protection
against the occurrence of computational errors (external code). As internal
code is used encoding and decoding via scheme of GHZ states for protection
against the occurrence of one quantum erasure.
|
[
{
"version": "v1",
"created": "Fri, 21 May 2010 14:07:08 GMT"
},
{
"version": "v2",
"created": "Mon, 31 May 2010 20:37:11 GMT"
}
] | 2010-06-02T00:00:00 |
[
[
"Santos",
"G. O.",
""
],
[
"Assis",
"F. M.",
""
],
[
"Lima",
"A. F.",
""
]
] |
new_dataset
| 0.999456 |
1005.5633
|
Olivier Finkel
|
Olivier Finkel (ELM)
|
On Omega Context Free Languages which are Borel Sets of Infinite Rank
|
The supremum of the set of Borel ranks of omega-context-free
languages is actually greater than the first non-recursive ordinal. This has
been proved later in a paper "Borel Ranks and Wadge Degrees of Omega Context
Free Languages" published in the journal Mathematical Structures in Computer
Science (2006)
|
Theoretical Computer Science 299 (1-3) (2003) 327-346
| null | null |
cs.LO math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is a continuation of the study of topological properties of omega
context free languages (omega-CFL). We proved before that the class of
omega-CFL exhausts the hierarchy of Borel sets of finite rank, and that there
exist some omega-CFL which are analytic but non Borel sets. We prove here that
there exist some omega context free languages which are Borel sets of infinite
(but not finite) rank, giving additional answer to questions of Lescow and
Thomas [Logical Specifications of Infinite Computations, In:"A Decade of
Concurrency", Springer LNCS 803 (1994), 583-621].
|
[
{
"version": "v1",
"created": "Mon, 31 May 2010 09:16:55 GMT"
}
] | 2010-06-02T00:00:00 |
[
[
"Finkel",
"Olivier",
"",
"ELM"
]
] |
new_dataset
| 0.996185 |
1006.0153
|
Solomija Buk N
|
Solomiya Buk
|
Ivan Franko's novel Dlja domashnjoho ohnyshcha (For the Hearth) in the
light of the frequency dictionary
|
11 pages, in Ukrainian
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the article, the methodology and the principles of the compilation of the
Frequency dictionary for Ivan Franko's novel Dlja domashnjoho ohnyshcha (For
the Hearth) are described. The following statistical parameters of the novel
vocabulary are obtained: variety, exclusiveness, concentration indexes,
correlation between word rank and text coverage, etc. The main quantitative
characteristics of Franko's novels Perekhresni stezhky (The Cross-Paths) and
Dlja domashnjoho ohnyshcha are compared on the basis of their frequency
dictionaries.
|
[
{
"version": "v1",
"created": "Tue, 1 Jun 2010 15:20:59 GMT"
}
] | 2010-06-02T00:00:00 |
[
[
"Buk",
"Solomiya",
""
]
] |
new_dataset
| 0.988172 |
0909.2309
|
Jun Tanaka
|
Jun Tanaka
|
Logic with Verbs
| null | null | null | null |
cs.AI cs.LO
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
The aim of this paper is to introduce a logic in which nouns and verbs are
handled together as a deductive reasoning, and also to observe the relationship
between nouns and verbs as well as between logics and conversations.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 07:49:36 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Oct 2009 00:49:38 GMT"
},
{
"version": "v3",
"created": "Mon, 14 Dec 2009 10:54:13 GMT"
}
] | 2010-06-01T00:00:00 |
[
[
"Tanaka",
"Jun",
""
]
] |
new_dataset
| 0.999919 |
1002.3077
|
Marc Mezzarobba
|
Marc Mezzarobba (INRIA Rocquencourt)
|
NumGfun: a Package for Numerical and Analytic Computation with D-finite
Functions
| null | null | null | null |
cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article describes the implementation in the software package NumGfun of
classical algorithms that operate on solutions of linear differential equations
or recurrence relations with polynomial coefficients, including what seems to
be the first general implementation of the fast high-precision numerical
evaluation algorithms of Chudnovsky & Chudnovsky. In some cases, our
descriptions contain improvements over existing algorithms. We also provide
references to relevant ideas not currently used in NumGfun.
|
[
{
"version": "v1",
"created": "Tue, 16 Feb 2010 13:07:30 GMT"
},
{
"version": "v2",
"created": "Mon, 31 May 2010 08:12:06 GMT"
}
] | 2010-06-01T00:00:00 |
[
[
"Mezzarobba",
"Marc",
"",
"INRIA Rocquencourt"
]
] |
new_dataset
| 0.999173 |
1005.5444
|
Loet Leydesdorff
|
Loet Leydesdorff
|
Eugene Garfield and Algorithmic Historiography: Co-Words, Co-Authors,
and Journal Names
| null | null | null | null |
cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Algorithmic historiography was proposed by Eugene Garfield in collaboration
with Irving Sher in the 1960s, but further developed only recently into
HistCite^{TM} with Alexander Pudovkin. As in history writing, HistCite^{TM}
reconstructs by drawing intellectual lineages. In addition to cited references,
however, documents can be attributed a multitude of other variables such as
title words, keywords, journal names, author names, and even full texts. New
developments in multidimensional scaling (MDS) enable us not only to visualize
these patterns at each moment of time, but also to animate them over time.
Using title words, co-authors, and journal names in Garfield's oeuvre, the
method is demonstrated and further developed in this paper (and in the
animation at http://www.leydesdorff.net/garfield/animation). The variety and
substantive content of the animation enables us to write, visualize, and
animate the author's intellectual history.
|
[
{
"version": "v1",
"created": "Sat, 29 May 2010 09:34:13 GMT"
}
] | 2010-06-01T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
]
] |
new_dataset
| 0.999731 |
1005.5489
|
Constantin Jucovschi
|
Constantin Jucovschi, Michael Kohlhase
|
sTeXIDE: An Integrated Development Environment for sTeX Collections
|
To appear in The 9th International Conference on Mathematical
Knowledge Management: MKM 2010
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Authoring documents in MKM formats like OMDoc is a very tedious task. After
years of working on a semantically annotated corpus of sTeX documents (GenCS),
we identified a set of common, time-consuming subtasks, which can be supported
in an integrated authoring environment. We have adapted the modular Eclipse IDE
into sTeXIDE, an authoring solution for enhancing productivity in contributing
to sTeX based corpora. sTeXIDE supports context-aware command completion,
module management, semantic macro retrieval, and theory graph navigation.
|
[
{
"version": "v1",
"created": "Sat, 29 May 2010 22:31:05 GMT"
}
] | 2010-06-01T00:00:00 |
[
[
"Jucovschi",
"Constantin",
""
],
[
"Kohlhase",
"Michael",
""
]
] |
new_dataset
| 0.99078 |
1005.5591
|
Min-Zheng Shieh
|
Min-Zheng Shieh and Shi-Chun Tsai
|
On the minimum weight problem of permutation codes under Chebyshev
distance
|
5 pages. ISIT 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Permutation codes of length $n$ and distance $d$ is a set of permutations on
$n$ symbols, where the distance between any two elements in the set is at least
$d$. Subgroup permutation codes are permutation codes with the property that
the elements are closed under the operation of composition. In this paper,
under the distance metric $\ell_{\infty}$-norm, we prove that finding the
minimum weight codeword for subgroup permutation code is NP-complete. Moreover,
we show that it is NP-hard to approximate the minimum weight within the factor
$7/6-\epsilon$ for any $\epsilon>0$.
|
[
{
"version": "v1",
"created": "Mon, 31 May 2010 06:09:49 GMT"
}
] | 2010-06-01T00:00:00 |
[
[
"Shieh",
"Min-Zheng",
""
],
[
"Tsai",
"Shi-Chun",
""
]
] |
new_dataset
| 0.997967 |
0806.1215
|
Lav Varshney
|
Lav R. Varshney
|
Performance of LDPC Codes Under Faulty Iterative Decoding
|
Revised in May 2010 in response to reviewer comments
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Departing from traditional communication theory where decoding algorithms are
assumed to perform without error, a system where noise perturbs both
computational devices and communication channels is considered here. This paper
studies limits in processing noisy signals with noisy circuits by investigating
the effect of noise on standard iterative decoders for low-density parity-check
codes. Concentration of decoding performance around its average is shown to
hold when noise is introduced into message-passing and local computation.
Density evolution equations for simple faulty iterative decoders are derived.
In one model, computing nonlinear estimation thresholds shows that performance
degrades smoothly as decoder noise increases, but arbitrarily small probability
of error is not achievable. Probability of error may be driven to zero in
another system model; the decoding threshold again decreases smoothly with
decoder noise. As an application of the methods developed, an achievability
result for reliable memory systems constructed from unreliable components is
provided.
|
[
{
"version": "v1",
"created": "Fri, 6 Jun 2008 18:32:08 GMT"
},
{
"version": "v2",
"created": "Sun, 23 Aug 2009 15:36:42 GMT"
},
{
"version": "v3",
"created": "Fri, 28 May 2010 18:13:54 GMT"
}
] | 2010-05-31T00:00:00 |
[
[
"Varshney",
"Lav R.",
""
]
] |
new_dataset
| 0.969339 |
1005.3190
|
Isabel Rodet
|
Annie Luciani (ACROE)
|
From granular avalanches to fluid turbulences through oozing pastes. A
mesoscopic physically-based particle model
| null |
Graphicon 2000, Moscou : Russian Federation (2000)
| null | null |
cs.GR physics.comp-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we describe how we can precisely produce complex and various
dynamic morphological features such as structured and chaotic features which
occur in sand pilings (piles, avalanches, internal collapses, arches) , in
flowing fluids (laminar flowing, Kelvin-Helmholtz and Von Karmann eddies), and
in cohesive pastes (twist-and-turn oozing and packing) using only a single
unified model, called "mesoscopic model". This model is a physically-based
particle model whose behavior depends on only four simple, but easy to
understand, physically-based parameters : elasticity, viscosity and their local
areas of influence. It is fast to compute and easy to understand by
non-physicist users.
|
[
{
"version": "v1",
"created": "Tue, 18 May 2010 13:10:28 GMT"
}
] | 2010-05-31T00:00:00 |
[
[
"Luciani",
"Annie",
"",
"ACROE"
]
] |
new_dataset
| 0.99542 |
1005.4028
|
William Jackson
|
Rami Alnaqeib, Hamdan. O. Alanazi, Hamid. A. Jalab, M. A. Zaidan and
Ali K. Hmood
|
Internet Banking System Prototype
|
http://www.journalofcomputing.org
|
Journal of Computing, Volume 2, Issue 5, May 2010
| null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Internet Banking System refers to systems that enable bank customers to
access accounts and general information on bank products and services through a
personal computer or other intelligent device. Internet banking products and
services can include detailed account information for corporate customers as
well as account summery and transfer money. Ultimately, the products and
services obtained through Internet Banking may mirror products and services
offered through other bank delivery channels. In this paper, Internet Banking
System Prototype has been proposed in order to illustrate the services which is
provided by the Bank online services.
|
[
{
"version": "v1",
"created": "Fri, 21 May 2010 17:46:45 GMT"
}
] | 2010-05-31T00:00:00 |
[
[
"Alnaqeib",
"Rami",
""
],
[
"Alanazi",
"Hamdan. O.",
""
],
[
"Jalab",
"Hamid. A.",
""
],
[
"Zaidan",
"M. A.",
""
],
[
"Hmood",
"Ali K.",
""
]
] |
new_dataset
| 0.999296 |
0801.3703
|
Margreta Kuijper
|
Margreta Kuijper and Raquel Pinto
|
On minimality of convolutional ring encoders
|
13 pages in v1, submitted; 8 pages in revision v2
|
IEEE Trans. Information Theory, Vol. 55, No. 11, pp. 4890-4897,
November 2009
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Convolutional codes are considered with code sequences modelled as
semi-infinite Laurent series. It is wellknown that a convolutional code C over
a finite group G has a minimal trellis representation that can be derived from
code sequences. It is also wellknown that, for the case that G is a finite
field, any polynomial encoder of C can be algebraically manipulated to yield a
minimal polynomial encoder whose controller canonical realization is a minimal
trellis. In this paper we seek to extend this result to the finite ring case G
= Z_{p^r} by introducing a socalled "p-encoder". We show how to manipulate a
polynomial encoding of a noncatastrophic convolutional code over Z_{p^r} to
produce a particular type of p-encoder ("minimal p-encoder") whose controller
canonical realization is a minimal trellis with nonlinear features. The minimum
number of trellis states is then expressed as p^gamma, where gamma is the sum
of the row degrees of the minimal p-encoder. In particular, we show that any
convolutional code over Z_{p^r} admits a delay-free p-encoder which implies the
novel result that delay-freeness is not a property of the code but of the
encoder, just as in the field case. We conjecture that a similar result holds
with respect to catastrophicity, i.e., any catastrophic convolutional code over
Z_{p^r} admits a noncatastrophic p-encoder.
|
[
{
"version": "v1",
"created": "Thu, 24 Jan 2008 05:07:49 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Apr 2009 05:36:02 GMT"
}
] | 2010-05-28T00:00:00 |
[
[
"Kuijper",
"Margreta",
""
],
[
"Pinto",
"Raquel",
""
]
] |
new_dataset
| 0.987162 |
1005.1635
|
Hossein Bagheri
|
Hossein Bagheri, Abolfazl S. Motahari, and Amir K. Khandani
|
The Approximate Capacity Region of the Gaussian Z-Interference Channel
with Conferencing Encoders
|
25 pages, 6 figures, submitted to IEEE Transactions on Information
Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A two-user Gaussian Z-Interference Channel (GZIC) is considered, in which
encoders are connected through noiseless links with finite capacities. In this
setting, prior to each transmission block the encoders communicate with each
other over the cooperative links. The capacity region and the sum-capacity of
the channel are characterized within 1.71 bits per user and 2 bits in total,
respectively. It is also established that properly sharing the total limited
cooperation capacity between the cooperative links may enhance the achievable
region, even when compared to the case of unidirectional transmitter
cooperation with infinite cooperation capacity. To obtain the results,
genie-aided upper bounds on the sum-capacity and cut-set bounds on the
individual rates are compared with the achievable rate region. In the
interference-limited regime, the achievable scheme enjoys a simple type of
Han-Kobayashi signaling, together with the zero-forcing, and basic relaying
techniques. In the noise-limited regime, it is shown that treating interference
as noise achieves the capacity region up to a single bit per user.
|
[
{
"version": "v1",
"created": "Mon, 10 May 2010 19:51:59 GMT"
},
{
"version": "v2",
"created": "Thu, 27 May 2010 00:20:23 GMT"
}
] | 2010-05-28T00:00:00 |
[
[
"Bagheri",
"Hossein",
""
],
[
"Motahari",
"Abolfazl S.",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
new_dataset
| 0.990076 |
1005.4984
|
Tianxiong Ji
|
Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, and
Alexander Stoylar
|
Backpressure-based Packet-by-Packet Adaptive Routing in Communication
Networks
|
13 pages, 9 figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Backpressure-based adaptive routing algorithms where each packet is routed
along a possibly different path have been extensively studied in the
literature. However, such algorithms typically result in poor delay performance
and involve high implementation complexity. In this paper, we develop a new
adaptive routing algorithm built upon the widely-studied back-pressure
algorithm. We decouple the routing and scheduling components of the algorithm
by designing a probabilistic routing table which is used to route packets to
per-destination queues. The scheduling decisions in the case of wireless
networks are made using counters called shadow queues. The results are also
extended to the case of networks which employ simple forms of network coding.
In that case, our algorithm provides a low-complexity solution to optimally
exploit the routing-coding tradeoff.
|
[
{
"version": "v1",
"created": "Thu, 27 May 2010 04:31:05 GMT"
}
] | 2010-05-28T00:00:00 |
[
[
"Athanasopoulou",
"Eleftheria",
""
],
[
"Bui",
"Loc",
""
],
[
"Ji",
"Tianxiong",
""
],
[
"Srikant",
"R.",
""
],
[
"Stoylar",
"Alexander",
""
]
] |
new_dataset
| 0.9565 |
1005.5045
|
Mario Bravetti
|
Mario Bravetti
|
File Managing and Program Execution in Web Operating Systems
| null | null | null | null |
cs.SE cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Web Operating Systems can be seen as an extension of traditional Operating
Systems where the addresses used to manage files and execute programs (via the
basic load/execution mechanism) are extended from local filesystem path-names
to URLs. A first consequence is that, similarly as in traditional web
technologies, executing a program at a given URL, can be done in two
modalities: either the execution is performed client-side at the invoking
machine (and relative URL addressing in the executed program set to refer to
the invoked URL) or it is performed server-side at the machine addressed by the
invoked URL (as, e.g., for a web service). Moreover in this context, user
identification for access to programs and files and workflow-based composition
of service programs is naturally based on token/session-like mechanisms. We
propose a middleware based on client-server protocols and on a set primitives,
for managing files/resources and executing programs (in the form of
client-side/server-side components/services) in Web Operating Systems. We
formally define the semantics of such middleware via a process algebraic
approach.
|
[
{
"version": "v1",
"created": "Thu, 27 May 2010 12:28:51 GMT"
}
] | 2010-05-28T00:00:00 |
[
[
"Bravetti",
"Mario",
""
]
] |
new_dataset
| 0.985301 |
1005.4564
|
Isabel Rodet
|
Annie Luciani (ACROE, ICA), Matthieu Evrard (ICA), Damien Courouss\'e
(ICA), Nicolas Castagn\'e (ACROE, ICA), Claude Cadoz (ACROE, ICA), Jean-Loup
Florens (ACROE)
|
A basic gesture and motion format for virtual reality multisensory
applications
|
GRAPP'06, Set\`ubal : Portugal (2006)
| null | null | null |
cs.HC cs.GR cs.MM cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The question of encoding movements such as those produced by human gestures
may become central in the coming years, given the growing importance of
movement data exchanges between heterogeneous systems and applications (musical
applications, 3D motion control, virtual reality interaction, etc.). For the
past 20 years, various formats have been proposed for encoding movement,
especially gestures. Though, these formats, at different degrees, were designed
in the context of quite specific applications (character animation, motion
capture, musical gesture, biomechanical concerns...). The article introduce a
new file format, called GMS (for 'Gesture and Motion Signal'), with the aim of
being more low-level and generic, by defining the minimal features a format
carrying movement/gesture information needs, rather than by gathering all the
information generally given by the existing formats. The article argues that,
given its growing presence in virtual reality situations, the "gesture signal"
itself must be encoded, and that a specific format is needed. The proposed
format features the inner properties of such signals: dimensionality,
structural features, types of variables, and spatial and temporal properties.
The article first reviews the various situations with multisensory virtual
objects in which gesture controls intervene. The proposed format is then
deduced, as a mean to encode such versatile and variable "gestural and animated
scene".
|
[
{
"version": "v1",
"created": "Tue, 25 May 2010 13:16:29 GMT"
}
] | 2010-05-26T00:00:00 |
[
[
"Luciani",
"Annie",
"",
"ACROE, ICA"
],
[
"Evrard",
"Matthieu",
"",
"ICA"
],
[
"Couroussé",
"Damien",
"",
"ICA"
],
[
"Castagné",
"Nicolas",
"",
"ACROE, ICA"
],
[
"Cadoz",
"Claude",
"",
"ACROE, ICA"
],
[
"Florens",
"Jean-Loup",
"",
"ACROE"
]
] |
new_dataset
| 0.993184 |
0910.4507
|
Sam Skipsey
|
Sam Skipsey (1), David Ambrose-Griffith (2), Greig Cowan (3), Mike
Kenyon (1), Orlando Richards (3), Phil Roffe (2), Graeme Stewart (1) ((1)
University of Glasgow, UK, (2) University of Durham, UK, (3) University of
Edinburgh, UK)
|
ScotGrid: Providing an Effective Distributed Tier-2 in the LHC Era
|
Preprint for 17th International Conference on Computing in High
Energy and Nuclear Physics, 7 pages, 1 figure
|
J.Phys.Conf.Ser.219:052014,2010
|
10.1088/1742-6596/219/5/052014
|
GLAS-PPE/2009-07
|
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
ScotGrid is a distributed Tier-2 centre in the UK with sites in Durham,
Edinburgh and Glasgow. ScotGrid has undergone a huge expansion in hardware in
anticipation of the LHC and now provides more than 4MSI2K and 500TB to the LHC
VOs. Scaling up to this level of provision has brought many challenges to the
Tier-2 and we show in this paper how we have adopted new methods of organising
the centres, from fabric management and monitoring to remote management of
sites to management and operational procedures, to meet these challenges. We
describe how we have coped with different operational models at the sites,
where Glagsow and Durham sites are managed "in house" but resources at
Edinburgh are managed as a central university resource. This required the
adoption of a different fabric management model at Edinburgh and a special
engagement with the cluster managers. Challenges arose from the different job
models of local and grid submission that required special attention to resolve.
We show how ScotGrid has successfully provided an infrastructure for ATLAS and
LHCb Monte Carlo production. Special attention has been paid to ensuring that
user analysis functions efficiently, which has required optimisation of local
storage and networking to cope with the demands of user analysis. Finally,
although these Tier-2 resources are pledged to the whole VO, we have
established close links with our local physics user communities as being the
best way to ensure that the Tier-2 functions effectively as a part of the LHC
grid computing framework..
|
[
{
"version": "v1",
"created": "Fri, 23 Oct 2009 13:02:19 GMT"
}
] | 2010-05-25T00:00:00 |
[
[
"Skipsey",
"Sam",
""
],
[
"Ambrose-Griffith",
"David",
""
],
[
"Cowan",
"Greig",
""
],
[
"Kenyon",
"Mike",
""
],
[
"Richards",
"Orlando",
""
],
[
"Roffe",
"Phil",
""
],
[
"Stewart",
"Graeme",
""
]
] |
new_dataset
| 0.984463 |
1005.4290
|
Chriss Romy
|
C. S. Sridhar, R. ShashiKumar, S. Madhava Kumar, Manjula Sridhar,
Varun. D
|
E-Speed Governors For Public Transport Vehicles
|
IEEE Publication format, International Journal of Computer Science
and Information Security, IJCSIS, Vol. 8 No. 1, April 2010, USA. ISSN 1947
5500, http://sites.google.com/site/ijcsis/
| null | null | null |
cs.OH
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
An accident is unexpected, unusual, unintended and identifiable external
event which occurs at any place and at any time. The major concern faced by the
government and traffic officials is over speeding at limited speed zones like
hospitals, schools or residential places leading to causalities and more deaths
on the roads. Hence the speed of the vehicles is to be regulated and confined
to the limits as prescribed by the traffic regulations. In this paper we
propose a solution in the form of providing E-speed governor fitted with a
wireless communication system consisting of a Rx which receives the information
regarding the speed regulation for their zones. The TX will be made highly
intelligent and decide when receiver should be made active to regulate the
speed and unwarranted honking from the vehicles which can be deactivated in the
silent zones.
|
[
{
"version": "v1",
"created": "Mon, 24 May 2010 09:50:52 GMT"
}
] | 2010-05-25T00:00:00 |
[
[
"Sridhar",
"C. S.",
""
],
[
"ShashiKumar",
"R.",
""
],
[
"Kumar",
"S. Madhava",
""
],
[
"Sridhar",
"Manjula",
""
],
[
"D",
"Varun.",
""
]
] |
new_dataset
| 0.999628 |
1005.4395
|
Joseph Collins
|
Joseph B. Collins
|
An OpenMath Content Dictionary for Tensor Concepts
|
To appear in The 9th International Conference on Mathematical
Knowledge Management: MKM 2010
| null | null | null |
cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new OpenMath content dictionary, named tensor1, containing
symbols for the expression of tensor formulas. These symbols support the
expression of non-Cartesian coordinates and invariant, multilinear expressions
in the context of coordinate transformations. While current OpenMath symbols
support the expression of linear algebra formulas using matrices and vectors,
we find that there is an underlying assumption of Cartesian, or standard,
coordinates that makes the expression of general tensor formulas difficult, if
not impossible. In introducing these new OpenMath symbols for the expression of
tensor formulas, we attempt to maintain, as much as possible, consistency with
prior OpenMath symbol definitions for linear algebra.
|
[
{
"version": "v1",
"created": "Mon, 24 May 2010 18:46:34 GMT"
}
] | 2010-05-25T00:00:00 |
[
[
"Collins",
"Joseph B.",
""
]
] |
new_dataset
| 0.999072 |
1005.4009
|
William Jackson
|
E. Jenefa JebaJothi, V. Kavitha and T. Kavitha
|
Contention Based Routing in Mobile Ad Hoc Networks with Multiple Copies
|
http://www.journalofcomputing.org
|
Journal of Computing, Volume 2, Issue 5, May 2010
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Routing the packets efficiently in mobile ad hoc network does not have end to
end paths. Multiple copies are forwarded from the source to the destination. To
deal with such networks, researches introduced flooding based routing schemes
which leads to high probability of delivery. But the flooding based routing
schemes suffered with contention and large delays. Here the proposed protocol
"Spray Select Focus", sprays a few message copies into the network, neighbors
receives a copy and by that relay nodes we are choosing the shortest route and
then route that copy towards the destination. Previous works assumption is that
there is no contention and dead ends. But we argue that contention and dead
ends must be considered for finding efficiency in routing. So we are including
a network which has contention and dead ends and we applied the proposed
protocol. We can say that this protocol works well for the contention based
network.
|
[
{
"version": "v1",
"created": "Fri, 21 May 2010 17:09:47 GMT"
}
] | 2010-05-24T00:00:00 |
[
[
"JebaJothi",
"E. Jenefa",
""
],
[
"Kavitha",
"V.",
""
],
[
"Kavitha",
"T.",
""
]
] |
new_dataset
| 0.99946 |
1001.2942
|
Xiyong Zhang
|
Xiyong Zhang, Hua Guo, Yifa Li
|
Proof of a Conjecture about Rotation Symmetric Functions
| null | null | null | null |
cs.CR cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Rotation symmetric Boolean functions have important applications in the
design of cryptographic algorithms. In this paper, the Conjecture about
rotation symmetric Boolean functions (RSBFs) of degree 3 proposed by Cusik and
St\u{a}nic\u{a} is proved. As a result, the nonlinearity of such kind of
functions is determined.
|
[
{
"version": "v1",
"created": "Mon, 18 Jan 2010 02:27:46 GMT"
},
{
"version": "v2",
"created": "Thu, 20 May 2010 14:01:06 GMT"
}
] | 2010-05-21T00:00:00 |
[
[
"Zhang",
"Xiyong",
""
],
[
"Guo",
"Hua",
""
],
[
"Li",
"Yifa",
""
]
] |
new_dataset
| 0.995081 |
0910.4325
|
Simon Blackburn
|
Simon R. Blackburn, Maura B. Paterson and Douglas R. Stinson
|
Putting Dots in Triangles
|
10 pages Minor rephrasing: final version to submit to journal.
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a right-angled triangle of squares in a grid whose horizontal and
vertical sides are $n$ squares long, let N(n) denote the maximum number of dots
that can be placed into the cells of the triangle such that each row, each
column, and each diagonal parallel to the long side of the triangle contains at
most one dot. It has been proven that
$N(n) = \lfloor \frac{2n+1}{3} \rfloor$.
In this note, we give a new proof of this result using linear programming
techniques.
|
[
{
"version": "v1",
"created": "Thu, 22 Oct 2009 13:35:51 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Nov 2009 14:10:14 GMT"
},
{
"version": "v3",
"created": "Tue, 18 May 2010 14:27:23 GMT"
}
] | 2010-05-19T00:00:00 |
[
[
"Blackburn",
"Simon R.",
""
],
[
"Paterson",
"Maura B.",
""
],
[
"Stinson",
"Douglas R.",
""
]
] |
new_dataset
| 0.974822 |
0707.3540
|
Patrick Erik Bradley
|
Patrick Erik Bradley
|
Mumford dendrograms
|
16 pages, 7 figures; Incorporating Special Issue: Ultrametric and
p-Adic Applications in Computer Science
|
The Computer Journal, Vol. 53, No. 4 (2010), 393-404
|
10.1093/comjnl/bxm088
| null |
cs.DM
| null |
An effective $p$-adic encoding of dendrograms is presented through an
explicit embedding into the Bruhat-Tits tree for a $p$-adic number field. This
field depends on the number of children of a vertex and is a finite extension
of the field of $p$-adic numbers. It is shown that fixing $p$-adic
representatives of the residue field allows a natural way of encoding strings
by identifying a given alphabet with such representatives. A simple $p$-adic
hierarchic classification algorithm is derived for $p$-adic numbers, and is
applied to strings over finite alphabets. Examples of DNA coding are presented
and discussed. Finally, new geometric and combinatorial invariants of time
series of $p$-adic dendrograms are developped.
|
[
{
"version": "v1",
"created": "Tue, 24 Jul 2007 13:00:17 GMT"
}
] | 2010-05-18T00:00:00 |
[
[
"Bradley",
"Patrick Erik",
""
]
] |
new_dataset
| 0.998982 |
0711.0840
|
Kees Middelburg
|
J. A. Bergstra, C. A. Middelburg
|
A thread calculus with molecular dynamics
|
47 pages; examples and results added, phrasing improved, references
replaced
|
Information and Computation, 208(7):817-844, 2010
|
10.1016/j.ic.2010.01.004
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a theory of threads, interleaving of threads, and interaction
between threads and services with features of molecular dynamics, a model of
computation that bears on computations in which dynamic data structures are
involved. Threads can interact with services of which the states consist of
structured data objects and computations take place by means of actions which
may change the structure of the data objects. The features introduced include
restriction of the scope of names used in threads to refer to data objects.
Because that feature makes it troublesome to provide a model based on
structural operational semantics and bisimulation, we construct a projective
limit model for the theory.
|
[
{
"version": "v1",
"created": "Tue, 6 Nov 2007 11:25:20 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Nov 2008 09:29:03 GMT"
}
] | 2010-05-18T00:00:00 |
[
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] |
new_dataset
| 0.992993 |
1005.2672
|
Carst Tankink
|
Carst Tankink and Herman Geuvers and James McKinna and Freek Wiedijk
|
Proviola: A Tool for Proof Re-animation
|
Accepted for the 9th International Conference on Mathematical
Knowledge Management (MKM 2010), 15 pages
| null | null | null |
cs.LO cs.DL cs.HC cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To improve on existing models of interaction with a proof assistant (PA), in
particular for storage and replay of proofs, we in- troduce three related
concepts, those of: a proof movie, consisting of frames which record both user
input and the corresponding PA response; a camera, which films a user's
interactive session with a PA as a movie; and a proviola, which replays a movie
frame-by-frame to a third party. In this paper we describe the movie data
structure and we discuss a proto- type implementation of the camera and
proviola based on the ProofWeb system. ProofWeb uncouples the interaction with
a PA via a web- interface (the client) from the actual PA that resides on the
server. Our camera films a movie by "listening" to the ProofWeb communication.
The first reason for developing movies is to uncouple the reviewing of a formal
proof from the PA used to develop it: the movie concept enables users to
discuss small code fragments without the need to install the PA or to load a
whole library into it. Other advantages include the possibility to develop a
separate com- mentary track to discuss or explain the PA interaction. We assert
that a combined camera+proviola provides a generic layer between a client
(user) and a server (PA). Finally we claim that movies are the right type of
data to be stored in an encyclopedia of formalized mathematics, based on our
experience in filming the Coq standard library.
|
[
{
"version": "v1",
"created": "Sat, 15 May 2010 12:54:28 GMT"
}
] | 2010-05-18T00:00:00 |
[
[
"Tankink",
"Carst",
""
],
[
"Geuvers",
"Herman",
""
],
[
"McKinna",
"James",
""
],
[
"Wiedijk",
"Freek",
""
]
] |
new_dataset
| 0.998466 |
0903.4826
|
Fernando Hernando
|
Fernando Hernando and Diego Ruano
|
New Linear Codes from Matrix-Product Codes with Polynomial Units
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new construction of codes from old ones is considered, it is an extension
of the matrix-product construction. Several linear codes that improve the
parameters of the known ones are presented.
|
[
{
"version": "v1",
"created": "Fri, 27 Mar 2009 15:30:58 GMT"
},
{
"version": "v2",
"created": "Wed, 12 May 2010 16:06:21 GMT"
}
] | 2010-05-13T00:00:00 |
[
[
"Hernando",
"Fernando",
""
],
[
"Ruano",
"Diego",
""
]
] |
new_dataset
| 0.999717 |
1005.1744
|
Dan Shepherd
|
Dan Shepherd
|
Binary Matroids and Quantum Probability Distributions
|
24 pages (inc appendix & refs)
| null | null | null |
cs.CC quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We characterise the probability distributions that arise from quantum
circuits all of whose gates commute, and show when these distributions can be
classically simulated efficiently. We consider also marginal distributions and
the computation of correlation coefficients, and draw connections between the
simulation of stabiliser circuits and the combinatorics of representable
matroids, as developed in the 1990s.
|
[
{
"version": "v1",
"created": "Tue, 11 May 2010 08:13:14 GMT"
}
] | 2010-05-12T00:00:00 |
[
[
"Shepherd",
"Dan",
""
]
] |
new_dataset
| 0.983789 |
1005.1835
|
Benjamin Steinberg
|
Benjamin Steinberg
|
The Cerny conjecture for one-cluster automata with prime length cycle
| null | null | null | null |
cs.FL math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove the Cerny conjecture for one-cluster automata with prime length
cycle. Consequences are given for the hybrid Road-coloring-Cerny conjecture for
digraphs with a proper cycle of prime length.
|
[
{
"version": "v1",
"created": "Tue, 11 May 2010 13:55:00 GMT"
}
] | 2010-05-12T00:00:00 |
[
[
"Steinberg",
"Benjamin",
""
]
] |
new_dataset
| 0.990485 |
1005.1349
|
Ali Al-Bashabsheh
|
Ali Al-Bashabsheh, Yongyi Mao and Abbas Yongacoglu
|
On Holant Theorem and Its Proof
|
25th Queen's Biennial Symposium on Communications.
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Holographic algorithms are a recent breakthrough in computer science and has
found applications in information theory. This paper provides a proof to the
central component of holographic algorithms, namely, the Holant theorem.
Compared with previous works, the proof appears simpler and more direct. Along
the proof, we also develop a mathematical tool, which we call c-tensor. We
expect the notion of c-tensor may be applicable over a wide range of analysis.
|
[
{
"version": "v1",
"created": "Sat, 8 May 2010 19:28:55 GMT"
}
] | 2010-05-11T00:00:00 |
[
[
"Al-Bashabsheh",
"Ali",
""
],
[
"Mao",
"Yongyi",
""
],
[
"Yongacoglu",
"Abbas",
""
]
] |
new_dataset
| 0.98052 |
1005.0813
|
Robert Weigel
|
R.S. Weigel, D. M. Lindholm, A. Wilson, and J. Faden
|
TSDS: high-performance merge, subset, and filter software for time
series-like data
|
Submitted to Earth Science Informatics
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Time Series Data Server (TSDS) is a software package for implementing a
server that provides fast super-setting, sub-setting, filtering, and uniform
gridding of time series-like data. TSDS was developed to respond quickly to
requests for long time spans of data. Data may be served from a fast database,
typically created by aggregating granules (e.g., data files) from a remote data
source and storing them in a local cache that is optimized for serving time
series. The system was designed specifically for time series data, and is
optimized for requests where the longest dimension of the requested data
structure is time. Scalar, vector, and spectrogram time series types are
supported. The user can interact with the server by requesting a time series, a
date range, and an optional filter to apply to the data. Available filters
include strides, block average/minimum/maximum, exclude, and inequality.
Constraint expressions are supported, which allow such operations as a request
for data from one time series when a different time series satisfied a
specified relationship. TSDS builds upon DAP (Data Access Protocol), NcML
(netCDF Mark-up language) and related software libraries. In this work, we
describe the current design of this server, as well as planned features and
potential implementation strategies.
|
[
{
"version": "v1",
"created": "Tue, 13 Apr 2010 23:30:24 GMT"
}
] | 2010-05-06T00:00:00 |
[
[
"Weigel",
"R. S.",
""
],
[
"Lindholm",
"D. M.",
""
],
[
"Wilson",
"A.",
""
],
[
"Faden",
"J.",
""
]
] |
new_dataset
| 0.998897 |
1005.0086
|
Pino Caballero-Gil
|
Pino Caballero-Gil, Amparo F\'uster-Sabater, Oscar Delgado-Mohatar
|
Linear Cellular Automata as Discrete Models for Generating Cryptographic
Sequences
| null |
Journal of Research and Practice in Information Technology, Vol.
40, No. 4, November 2008
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we develop a new cellular automata-based linear model for
several nonlinear pseudorandom number generators with practical applications in
symmetric cryptography. Such a model generates all the solutions of linear
binary difference equations as well as many of these solutions are
pseudo-random keystream sequences. In this way, a linear structure based on
cellular automata may be used to generate not only difference equation
solutions but also cryptographic sequences. The proposed model is very simple
since it is based exclusively on successive concatenations of a basic linear
automaton.
|
[
{
"version": "v1",
"created": "Sat, 1 May 2010 15:31:01 GMT"
}
] | 2010-05-04T00:00:00 |
[
[
"Caballero-Gil",
"Pino",
""
],
[
"Fúster-Sabater",
"Amparo",
""
],
[
"Delgado-Mohatar",
"Oscar",
""
]
] |
new_dataset
| 0.96255 |
1005.0139
|
Sugata Sanyal
|
Jayesh Kataria, P.S. Dhekne and Sugata Sanyal
|
ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route
Requests
|
15 Pages, 6 Figures, 1 table, 3rd International Conference on
Computers and Devices for Communication (CODEC-06) Institute of Radio Physics
and Electronics, University of Calcutta, December 18-20, 2006.
|
International Journal of Computers, Information Technology and
Engineering (IJCITAE), Vol. 1, No. 1, pp 9-15, June 2007, Serial
Publications.
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reactive routing protocols like Ad Hoc On-Demand Distance Vector Routing
(AODV) and Dynamic Source Routing (DSR)in Ad-Hoc Wireless Networks which are
used in Mobile and Ad Hoc Networks (MANETs) work by flooding the network with
control packets. There is generally a limit on the number of these packets that
can be generated or forwarded. But a malicious node can disregard this limit
and flood the network with fake control packets. These packets hog the limited
bandwidth and processing power of genuine nodes in the network while being
forwarded. Due to this, genuine route requests suffer and many routes either do
not get a chance to materialize or they end up being longer than otherwise. In
this paper we propose a non cryptographic solution to the above problem and
prove its efficiency by means of simulation.
|
[
{
"version": "v1",
"created": "Sun, 2 May 2010 13:11:48 GMT"
}
] | 2010-05-04T00:00:00 |
[
[
"Kataria",
"Jayesh",
""
],
[
"Dhekne",
"P. S.",
""
],
[
"Sanyal",
"Sugata",
""
]
] |
new_dataset
| 0.995963 |
1005.0146
|
Vyacheslav Levitsky
|
Andriy Kovalchuk, Vyacheslav Levitsky, Igor Samolyuk and Valentyn
Yanchuk
|
The Formulator MathML Editor Project: User-Friendly Authoring of Content
Markup Documents
|
To appear in The 9th International Conference on Mathematical
Knowledge Management: MKM 2010
| null | null | null |
cs.DL cs.HC cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Implementation of an editing process for Content MathML formulas in common
visual style is a real challenge for a software developer who does not really
want the user to have to understand the structure of Content MathML in order to
edit an expression, since it is expected that users are often not that
technically minded. In this paper, we demonstrate how this aim is achieved in
the context of the Formulator project and discuss features of this MathML
editor, which provides a user with a WYSIWYG editing style while authoring
MathML documents with Content or mixed markup. We also present the approach
taken to enhance availability of the MathML editor to end-users, demonstrating
an online version of the editor that runs inside a Web browser.
|
[
{
"version": "v1",
"created": "Sun, 2 May 2010 16:12:32 GMT"
}
] | 2010-05-04T00:00:00 |
[
[
"Kovalchuk",
"Andriy",
""
],
[
"Levitsky",
"Vyacheslav",
""
],
[
"Samolyuk",
"Igor",
""
],
[
"Yanchuk",
"Valentyn",
""
]
] |
new_dataset
| 0.999514 |
1004.5436
|
Kang Ning
|
Kang Ning
|
Multiple oligo nucleotide arrays: Methods to reduce manufacture time and
cost
|
11 pages, 7 figures. A simple method targets some researchers in the
field.
| null | null | null |
cs.DM q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The customized multiple arrays are becoming vastly used in microarray
experiments for varies purposes, mainly for its ability to handle a large
quantity of data and output high quality results. However, experimenters who
use customized multiple arrays still face many problems, such as the cost and
time to manufacture the masks, and the cost for production of the multiple
arrays by costly machines. Although there is some research on the multiple
arrays, there is little concern on the manufacture time and cost, which is
actually important to experimenters. In this paper, we have proposed methods to
reduce the time and cost for the manufacture of the customized multiple arrays.
We have first introduced a heuristic algorithm for the mask decomposition
problem for multiple arrays. Then a streamline method is proposed for the
integration of different steps of manufacture on a higher level. Experiments
show that our methods are very effective in reduction of the time and cost of
manufacture of multiple arrays.
|
[
{
"version": "v1",
"created": "Fri, 30 Apr 2010 02:27:54 GMT"
}
] | 2010-05-03T00:00:00 |
[
[
"Ning",
"Kang",
""
]
] |
new_dataset
| 0.97518 |
1004.5601
|
Punarbasu Purkayastha
|
Alexander Barg and Punarbasu Purkayastha
|
Near MDS poset codes and distributions
|
13 pages, 1 figure
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study $q$-ary codes with distance defined by a partial order of the
coordinates of the codewords. Maximum Distance Separable (MDS) codes in the
poset metric have been studied in a number of earlier works. We consider codes
that are close to MDS codes by the value of their minimum distance. For such
codes, we determine their weight distribution, and in the particular case of
the "ordered metric" characterize distributions of points in the unit cube
defined by the codes. We also give some constructions of codes in the ordered
Hamming space.
|
[
{
"version": "v1",
"created": "Fri, 30 Apr 2010 19:45:38 GMT"
}
] | 2010-05-03T00:00:00 |
[
[
"Barg",
"Alexander",
""
],
[
"Purkayastha",
"Punarbasu",
""
]
] |
new_dataset
| 0.999143 |
1004.5195
|
Natalia Silberstein
|
Natalia Silberstein and Tuvi Etzion
|
On Perfect Codes in the Johnson Graph
|
Submitted for ACCT 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we consider the existence of nontrivial perfect codes in the
Johnson graph J(n,w). We present combinatorial and number theory techniques to
provide necessary conditions for existence of such codes and reduce the range
of parameters in which 1-perfect and 2-perfect codes may exist.
|
[
{
"version": "v1",
"created": "Thu, 29 Apr 2010 06:38:59 GMT"
}
] | 2010-04-30T00:00:00 |
[
[
"Silberstein",
"Natalia",
""
],
[
"Etzion",
"Tuvi",
""
]
] |
new_dataset
| 0.990728 |
1004.5214
|
Valentin Savin
|
Valentin Savin
|
Split-Extended LDPC codes for coded cooperation
|
6 pages, ISITA10
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new code design that aims to distribute an LDPC code over a
relay channel. It is based on a split-and-extend approach, which allows the
relay to split the set of bits connected to some parity-check of the LDPC code
into two or several subsets. Subsequently, the sums of bits within each subset
are used in a repeat-accumulate manner in order to generate extra bits sent
from the relay toward the destination. We show that the proposed design yields
LDPC codes with enhanced correction capacity and can be advantageously applied
to existing codes, which allows for addressing cooperation issues for evolving
standards. Finally, we derive density evolution equations for the proposed
design, and we show that Split-Extended LDPC codes can approach very closely
the capacity of the Gaussian relay channel.
|
[
{
"version": "v1",
"created": "Thu, 29 Apr 2010 08:10:02 GMT"
}
] | 2010-04-30T00:00:00 |
[
[
"Savin",
"Valentin",
""
]
] |
new_dataset
| 0.998658 |
1004.5257
|
Pierre Lescanne
|
Pierre Lescanne (LIP), Perrinel Matthieu (LIP)
|
On the Rationality of Escalation
|
23 p.
| null | null | null |
cs.GT cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Escalation is a typical feature of infinite games. Therefore tools conceived
for studying infinite mathematical structures, namely those deriving from
coinduction are essential. Here we use coinduction, or backward coinduction (to
show its connection with the same concept for finite games) to study carefully
and formally the infinite games especially those called dollar auctions, which
are considered as the paradigm of escalation. Unlike what is commonly admitted,
we show that, provided one assumes that the other agent will always stop,
bidding is rational, because it results in a subgame perfect equilibrium. We
show that this is not the only rational strategy profile (the only subgame
perfect equilibrium). Indeed if an agent stops and will stop at every step, we
claim that he is rational as well, if one admits that his opponent will never
stop, because this corresponds to a subgame perfect equilibrium. Amazingly, in
the infinite dollar auction game, the behavior in which both agents stop at
each step is not a Nash equilibrium, hence is not a subgame perfect
equilibrium, hence is not rational.
|
[
{
"version": "v1",
"created": "Thu, 29 Apr 2010 12:03:29 GMT"
}
] | 2010-04-30T00:00:00 |
[
[
"Lescanne",
"Pierre",
"",
"LIP"
],
[
"Matthieu",
"Perrinel",
"",
"LIP"
]
] |
new_dataset
| 0.985187 |
0805.0501
|
Christian Senger
|
Christian Senger, Vladimir Sidorenko, Martin Bossert, Victor Zyablov
|
Decoding Generalized Concatenated Codes Using Interleaved Reed-Solomon
Codes
|
Proceedings of the 2008 IEEE International Symposium on Information
Theory, Toronto, ON, Canada, July 6 - 11, 2008. 5 pages, 2 figures
| null |
10.1109/ISIT.2008.4595300
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Generalized Concatenated codes are a code construction consisting of a number
of outer codes whose code symbols are protected by an inner code. As outer
codes, we assume the most frequently used Reed-Solomon codes; as inner code, we
assume some linear block code which can be decoded up to half its minimum
distance. Decoding up to half the minimum distance of Generalized Concatenated
codes is classically achieved by the Blokh-Zyablov-Dumer algorithm, which
iteratively decodes by first using the inner decoder to get an estimate of the
outer code words and then using an outer error/erasure decoder with a varying
number of erasures determined by a set of pre-calculated thresholds. In this
paper, a modified version of the Blokh-Zyablov-Dumer algorithm is proposed,
which exploits the fact that a number of outer Reed-Solomon codes with average
minimum distance d can be grouped into one single Interleaved Reed-Solomon code
which can be decoded beyond d/2. This allows to skip a number of decoding
iterations on the one hand and to reduce the complexity of each decoding
iteration significantly - while maintaining the decoding performance - on the
other.
|
[
{
"version": "v1",
"created": "Mon, 5 May 2008 10:12:13 GMT"
}
] | 2010-04-29T00:00:00 |
[
[
"Senger",
"Christian",
""
],
[
"Sidorenko",
"Vladimir",
""
],
[
"Bossert",
"Martin",
""
],
[
"Zyablov",
"Victor",
""
]
] |
new_dataset
| 0.993241 |
1004.5034
|
Franck Butelle
|
Franck Butelle and Florent Hivert and Micaela Mayero and Fr\'ed\'eric
Toumazet
|
Formal Proof of SCHUR Conjugate Function
|
To appear in CALCULEMUS 2010
| null | null | null |
cs.LO cs.MS cs.SC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The main goal of our work is to formally prove the correctness of the key
commands of the SCHUR software, an interactive program for calculating with
characters of Lie groups and symmetric functions. The core of the computations
relies on enumeration and manipulation of combinatorial structures. As a first
"proof of concept", we present a formal proof of the conjugate function,
written in C. This function computes the conjugate of an integer partition. To
formally prove this program, we use the Frama-C software. It allows us to
annotate C functions and to generate proof obligations, which are proved using
several automated theorem provers. In this paper, we also draw on methodology,
discussing on how to formally prove this kind of program.
|
[
{
"version": "v1",
"created": "Wed, 28 Apr 2010 14:12:43 GMT"
}
] | 2010-04-29T00:00:00 |
[
[
"Butelle",
"Franck",
""
],
[
"Hivert",
"Florent",
""
],
[
"Mayero",
"Micaela",
""
],
[
"Toumazet",
"Frédéric",
""
]
] |
new_dataset
| 0.998863 |
1004.4821
|
Ashley Smith
|
Wriddhi Bhowmik and Shweta Srivastava
|
Optimum Design of a 4x4 Planar Butler Matrix Array for WLAN Application
|
Wriddhi Bhowmik and Shweta Srivastava, "Optimum Design of a 4x4
Planar Butler Matrix Array for WLAN Application", Journal of
Telecommunications, Volume 2, Issue 1, p68-74, April 2010
|
Journal of Telecommunications, Volume 2, Issue 1, p68-74, April
2010
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years, high-speed wireless communication is in vogue. In wireless
communication systems, multipath fading, delay and interference occurres by
reflection or diffraction. In a high-speed wireless communication, it becomes a
necessary to separate desired signal from delay or interference signal. Thus to
overcome these problems Smart antenna systems have been developed. Basically
there are two types of smart antenna systems, one is Switched beam system and
another Adaptive array system.This paper presents the optimum design of a 4x4
plannar Butler matrix array as a key component of a switched beam smart antenna
system, operating at 5.2 GHz for WLAN with a dielectric substrate, FR4 of er
=4.9 and h=1.6mm. Conception details, simulation results and measurements are
also given for the components (microstrip antenna, hybrid couplers,
cross-coupler, phase shifter) used to implement the matrix. In this
dissertation, mathematical calculations for all the components using MATLAB is
done and then every individual component is designed using the commercial
software SONNET. Then these entire components have been combined on a single
substrate and simulated using SONNET.
|
[
{
"version": "v1",
"created": "Mon, 26 Apr 2010 19:09:17 GMT"
}
] | 2010-04-28T00:00:00 |
[
[
"Bhowmik",
"Wriddhi",
""
],
[
"Srivastava",
"Shweta",
""
]
] |
new_dataset
| 0.988728 |
0910.5697
|
Eitan Yaakobi
|
Eitan Yaakobi and Tuvi Etzion
|
High Dimensional Error-Correcting Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we construct multidimensional codes with high dimension. The
codes can correct high dimensional errors which have the form of either small
clusters, or confined to an area with a small radius. We also consider small
number of errors in a small area. The clusters which are discussed are mainly
spheres such as semi-crosses and crosses. Also considered are clusters with
small number of errors such as 2-bursts, two errors in various clusters, and
three errors on a line. Our main focus is on the redundancy of the codes when
the most dominant parameter is the dimension of the code.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2009 18:06:41 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Apr 2010 08:35:15 GMT"
}
] | 2010-04-27T00:00:00 |
[
[
"Yaakobi",
"Eitan",
""
],
[
"Etzion",
"Tuvi",
""
]
] |
new_dataset
| 0.973366 |
1004.4356
|
Gautam Thakur
|
Gautam S. Thakur, Mukul Sharma, Ahmed Helmy
|
SHIELD: Social sensing and Help In Emergency using mobiLe Devices
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
School and College campuses face a perceived threat of violent crimes and
require a realistic plan against unpredictable emergencies and disasters.
Existing emergency systems (e.g., 911, campus-wide alerts) are quite useful,
but provide delayed response (often tens of minutes) and do not utilize
proximity or locality. There is a need to augment such systems with
proximity-based systems for more immediate response to attempt to prevent and
deter crime. In this paper we propose SHIELD, an on-campus emergency rescue and
alert management service. It is a fully distributed infrastructure-less
platform based on proximity-enabled trust and cooperation. It relies on
localized responses, sent using Bluetooth and/or WiFi on the fly to achieve
minimal response time and maximal availability thereby augmenting the
traditional notion of emergency services. Analysis of campus crime statistics
and WLAN traces surprisingly show a strong positive correlation (over 55%)
between on-campus crime statistics and spatio-temporal density distribution of
on-campus mobile users. This result provides a motivation to develop such
platform and points to the promise in reducing crime incidences. We also show
an implementation of a prototype application to be used in such scenarios.
|
[
{
"version": "v1",
"created": "Sun, 25 Apr 2010 15:10:56 GMT"
}
] | 2010-04-27T00:00:00 |
[
[
"Thakur",
"Gautam S.",
""
],
[
"Sharma",
"Mukul",
""
],
[
"Helmy",
"Ahmed",
""
]
] |
new_dataset
| 0.992731 |
1004.4465
|
William Jackson
|
Er. Anantdeep, Er. Sandeep kaur and Er. Balpreet Kaur
|
Mobile Zigbee Sensor Networks
|
https://sites.google.com/site/journalofcomputing/
|
Journal of Computing, Volume 2, Issue 4, April 2010, 95-99
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
OPNET Modeler accelerates network R&D and improves product quality through
high-fidelity modeling and scalable simulation. It provides a virtual
environment for designing protocols and devices, and for testing and
demonstrating designs in realistic scenarios prior to production. OPNET Modeler
supports 802.15.4 standard and has been used to make a model of PAN. Iterations
have been performed by changing the Power of the transmitter and the throughput
will has been analyzed to arrive at optimal values.An energy-efficient wireless
home network based on IEEE 802.15.4, a novel architecture has been proposed. In
this architecture, all nodes are classified into stationary nodes and mobile
nodes according to the functionality of each node. Mobile nodes are usually
battery-powered, and therefore need low-power operation. In order to improve
power consumption of mobile nodes, effective handover sequence based on MAC
broadcast and transmission power control based on LQ (link quality) are
employed. Experimental results demonstrate that by using the proposed
architecture, communication time and power consumption of mobile nodes can be
reduced by 1.2 seconds and 42.8%, respectively.
|
[
{
"version": "v1",
"created": "Mon, 26 Apr 2010 10:13:09 GMT"
}
] | 2010-04-27T00:00:00 |
[
[
"Anantdeep",
"Er.",
""
],
[
"kaur",
"Er. Sandeep",
""
],
[
"Kaur",
"Er. Balpreet",
""
]
] |
new_dataset
| 0.978244 |
1004.4469
|
William Jackson
|
Khawar Hameed, Kamran Ahsan and Weijun Yang
|
Mobile Commerce and Applications: An Exploratory Study and Review
|
Journal of Computing online at
https://sites.google.com/site/journalofcomputing/
|
Journal of Computing, Volume 2, Issue 4, April 2010
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile commerce is enabling the development of additional revenue streams for
organizations through the delivery of chargeable mobile services. According to
the European Information Technology Observatory, the total amount of revenue
generated by mobile commerce was reported to be less than {\pounds}9 million in
the United Kingdom in 2001. By 2005 this had, at least, doubled and more recent
industry forecasts project significant global growth in this area. Mobile
commerce creates a range of business opportunities and new revenue streams for
businesses across industry sectors via the deployment of innovative services,
applications and associated information content. This paper presents a review
of mobile commerce business models and their importance for the creation of
mobile commerce solutions.
|
[
{
"version": "v1",
"created": "Mon, 26 Apr 2010 10:19:59 GMT"
}
] | 2010-04-27T00:00:00 |
[
[
"Hameed",
"Khawar",
""
],
[
"Ahsan",
"Kamran",
""
],
[
"Yang",
"Weijun",
""
]
] |
new_dataset
| 0.999638 |
1004.4583
|
Ashley Smith
|
Iwan Adhicandra
|
Measuring Data and VoIP Traffic in WiMAX Networks
|
Iwan Adhicandra, "Measuring Data and VoIP Traffic in WiMAX Networks",
Journal of Telecommunications, Volume 2, Issue 1, p1-6, April 2010
|
Journal of Telecommunications, Volume 2, Issue 1, p1-6, April 2010
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to its large coverage area, low cost of deployment and high speed data
rates, WiMAX is a promising technology for providing wireless last-mile
connectivity. Physical and MAC layer of this technology refer to the IEEE
802.16e standard, which defines 5 different data delivery service classes that
can be used in order to satisfy Quality of Service (QoS) requirements of
different applications, such as VoIP, videoconference, FTP, Web, etc. The main
aim of the paper is to examine a case of QoS deployment over a cellular WiMAX
network. In particular, the paper compares the performance obtained using two
different QoS configurations differing from the delivery service class used to
transport VoIP traffic, i.e. UGS or ertPS. Results indicate that for
delay-sensitive traffic that fluctuates beyond its nominal rate, having the
possibility to give back some of its reserved bandwidth, ertPS has the
advantage to permit the transmission of BE traffic.
|
[
{
"version": "v1",
"created": "Mon, 26 Apr 2010 18:00:35 GMT"
}
] | 2010-04-27T00:00:00 |
[
[
"Adhicandra",
"Iwan",
""
]
] |
new_dataset
| 0.993915 |
1004.4605
|
Ashley Smith
|
Abdelati Malek Amel, Ben Abdelali Abdessalem and Mtibaa Abdellatif
|
Video shot boundary detection using motion activity descriptor
|
Abdelati Malek Amel, Ben Abdelali Abdessalem and Mtibaa Abdellatif,
"Video shot boundary detection using motion activity descriptor", Journal of
Telecommunications, Volume 2, Issue 1, p54-59, April 2010
|
Journal of Telecommunications, Volume 2, Issue 1, p54-59, April
2010
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper focus on the study of the motion activity descriptor for shot
boundary detection in video sequences. We interest in the validation of this
descriptor in the aim of its real time implementation with reasonable high
performances in shot boundary detection. The motion activity information is
extracted in uncompressed domain based on adaptive rood pattern search (ARPS)
algorithm. In this context, the motion activity descriptor was applied for
different video sequence.
|
[
{
"version": "v1",
"created": "Mon, 26 Apr 2010 19:00:08 GMT"
}
] | 2010-04-27T00:00:00 |
[
[
"Amel",
"Abdelati Malek",
""
],
[
"Abdessalem",
"Ben Abdelali",
""
],
[
"Abdellatif",
"Mtibaa",
""
]
] |
new_dataset
| 0.971624 |
1004.4616
|
Ashley Smith
|
Lamia Chaari, Rim Ayadi and Lotfi Kamoun
|
Conception and FPGA implementation of IEEE 802.11s mesh network MAC
layer transmitter
|
Lamia Chaari, Rim Ayadi and Lotfi Kamoun, "Conception and FPGA
implementation of IEEE 802.11s mesh network MAC layer transmitter"
|
Journal of Telecommunications, Volume 2, Issue 1, p115-123, April
2010
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes, a hardware implementation of Wireless Mesh Networks
(WMN) medium Access Controller (MAC) layer transmitter. In the literature a lot
of works are focused on WMN routing protocol as well as performance analysis
and software integration of WMN units, however few works deals with WMN
hardware implementation. In this field our contribution is to conceive and to
implements on FPGA a WMN MAC transmitter module. Our implementation, written in
hardware description language (HDL) is based on the IEEE 802.11 s standard. The
hardware implementation retains a good performance in speed.
|
[
{
"version": "v1",
"created": "Mon, 26 Apr 2010 19:35:56 GMT"
}
] | 2010-04-27T00:00:00 |
[
[
"Chaari",
"Lamia",
""
],
[
"Ayadi",
"Rim",
""
],
[
"Kamoun",
"Lotfi",
""
]
] |
new_dataset
| 0.991811 |
1004.2003
|
Norbert B\'atfai
|
Norbert B\'atfai
|
The Socceral Force
|
20 pages, 13 figures, added FerSML 0.0.2
| null | null | null |
cs.AI cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We have an audacious dream, we would like to develop a simulation and virtual
reality system to support the decision making in European football (soccer). In
this review, we summarize the efforts that we have made to fulfil this dream
until recently. In addition, an introductory version of FerSML (Footballer and
Football Simulation Markup Language) is presented in this paper.
|
[
{
"version": "v1",
"created": "Mon, 12 Apr 2010 16:24:54 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Apr 2010 11:26:15 GMT"
}
] | 2010-04-23T00:00:00 |
[
[
"Bátfai",
"Norbert",
""
]
] |
new_dataset
| 0.992438 |
0911.5667
|
Christian Senger
|
Christian Senger, Steffen Schober, Tong Mao, Alexander Zeh
|
End-to-End Algebraic Network Coding for Wireless TCP/IP Networks
|
Accepted for the 17th International Conference on Telecommunications
2010 (ICT2010), Doha, Qatar, April 4 - 7, 2010. 6 pages, 7 figures
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Transmission Control Protocol (TCP) was designed to provide reliable
transport services in wired networks. In such networks, packet losses mainly
occur due to congestion. Hence, TCP was designed to apply congestion avoidance
techniques to cope with packet losses. Nowadays, TCP is also utilized in
wireless networks where, besides congestion, numerous other reasons for packet
losses exist. This results in reduced throughput and increased transmission
round-trip time when the state of the wireless channel is bad. We propose a new
network layer, that transparently sits below the transport layer and hides non
congestion-imposed packet losses from TCP. The network coding in this new layer
is based on the well-known class of Maximum Distance Separable (MDS) codes.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2009 15:18:39 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Apr 2010 08:09:40 GMT"
}
] | 2010-04-21T00:00:00 |
[
[
"Senger",
"Christian",
""
],
[
"Schober",
"Steffen",
""
],
[
"Mao",
"Tong",
""
],
[
"Zeh",
"Alexander",
""
]
] |
new_dataset
| 0.999299 |
1004.3173
|
Richard Brent
|
Richard P. Brent
|
MP users guide
|
MP Users Guide (fourth edition), 73 pages. A technical report that
was not published elsewhere, submitted for archival purposes. For further
information see http://wwwmaths.anu.edu.au/~brent/pub/pub035.html
| null | null |
TR-CS-81-08, Department of Computer Science, Australian National
University (June 1981)
|
cs.MS math.NA math.NT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
MP is a package of ANSI Standard Fortran (ANS X3.9-1966) subroutines for
performing multiple-precision floating-point arithmetic and evaluating
elementary and special functions. The subroutines are machine independent and
the precision is arbitrary, subject to storage limitations. The User's Guide
describes the routines and their calling sequences, example and test programs,
use of the Augment precompiler, and gives installation instructions for the
package.
|
[
{
"version": "v1",
"created": "Mon, 19 Apr 2010 12:26:15 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Apr 2010 00:56:02 GMT"
}
] | 2010-04-21T00:00:00 |
[
[
"Brent",
"Richard P.",
""
]
] |
new_dataset
| 0.995266 |
1004.3486
|
Sheng-Gwo Chen
|
Jyh-Yang Wu, Mei-Hsiu Chi and Sheng-Gwo Chen
|
Convergent discrete Laplace-Beltrami operators over surfaces
|
13 pages and 4 figures
| null | null | null |
cs.CG cs.NA math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The convergence problem of the Laplace-Beltrami operators plays an essential
role in the convergence analysis of the numerical simulations of some important
geometric partial differential equations which involve the operator. In this
note we present a new effective and convergent algorithm to compute discrete
Laplace-Beltrami operators acting on functions over surfaces. We prove a
convergence theorem for our discretization. To our knowledge, this is the first
convergent algorithm of discrete Laplace-Beltrami operators over surfaces for
functions on general surfaces. Our algorithm is conceptually simple and easy to
compute. Indeed, the convergence rate of our new algorithm of discrete
Laplace-Beltrami operators over surfaces is $O(r)$ where r represents the size
of the mesh of discretization of the surface.
|
[
{
"version": "v1",
"created": "Tue, 20 Apr 2010 15:51:24 GMT"
}
] | 2010-04-21T00:00:00 |
[
[
"Wu",
"Jyh-Yang",
""
],
[
"Chi",
"Mei-Hsiu",
""
],
[
"Chen",
"Sheng-Gwo",
""
]
] |
new_dataset
| 0.975535 |
1004.3057
|
Bryan Ford
|
Henry Corrigan-Gibbs and Bryan Ford (Yale University)
|
Accountable Anonymous Group Messaging
|
12 pages, 5 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Users often wish to participate in online groups anonymously, but misbehaving
users may abuse this anonymity to spam or disrupt the group. Messaging
protocols such as Mix-nets and DC-nets leave online groups vulnerable to
denial-of-service and Sybil attacks, while accountable voting protocols are
unusable or inefficient for general anonymous messaging.
We present the first general messaging protocol that offers provable
anonymity with accountability for moderate-size groups, and efficiently handles
unbalanced loads where few members have much data to transmit in a given round.
The N group members first cooperatively shuffle an NxN matrix of pseudorandom
seeds, then use these seeds in N "pre-planned" DC-nets protocol runs. Each
DC-nets run transmits the variable-length bulk data comprising one member's
message, using the minimum number of bits required for anonymity under our
attack model. The protocol preserves message integrity and one-to-one
correspondence between members and messages, makes denial-of-service attacks by
members traceable to the culprit, and efficiently handles large and unbalanced
message loads. A working prototype demonstrates the protocol's practicality for
anonymous messaging in groups of 40+ member nodes.
|
[
{
"version": "v1",
"created": "Sun, 18 Apr 2010 20:32:38 GMT"
}
] | 2010-04-20T00:00:00 |
[
[
"Corrigan-Gibbs",
"Henry",
"",
"Yale University"
],
[
"Ford",
"Bryan",
"",
"Yale University"
]
] |
new_dataset
| 0.966435 |
1004.3178
|
Mohamed Ibrahim
|
Mohamed Ibrahim, Moustafa Youssef
|
CellSense: A Probabilistic RSSI-based GSM Positioning System
|
6 pages, 6 figures, Submitted to Globe-com 2010
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Context-aware applications have been gaining huge interest in the last few
years. With cell phones becoming ubiquitous computing devices, cell phone
localization has become an important research problem. In this paper, we
present CellSense, a prob- abilistic RSSI-based fingerprinting location
determina- tion system for GSM phones.We discuss the challenges of implementing
a probabilistic fingerprinting local- ization technique in GSM networks and
present the details of the CellSense system and how it addresses the
challenges. To evaluate our proposed system, we implemented CellSense on
Android-based phones. Re- sults for two different testbeds, representing urban
and rural environments, show that CellSense provides at least 23.8% enhancement
in accuracy in rural areas and at least 86.4% in urban areas compared to other
RSSI-based GSMlocalization systems. This comes with a minimal increase in
computational requirements. We also evaluate the effect of changing the
different system parameters on the accuracy-complexity tradeoff.
|
[
{
"version": "v1",
"created": "Mon, 19 Apr 2010 12:50:39 GMT"
}
] | 2010-04-20T00:00:00 |
[
[
"Ibrahim",
"Mohamed",
""
],
[
"Youssef",
"Moustafa",
""
]
] |
new_dataset
| 0.9983 |
1004.3263
|
Vishal Goyal
|
Aissam Berrahou, Mourad Rafi, Mohsine Eleuldj
|
DRMS Co-design by F4MS
|
International Journal of Computer Science Issues online at
http://ijcsi.org/articles/DRMS-Co-design-by-F4MS.php
|
IJCSI, Volume 7, Issue 2, March 2010
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present Digital Rights Management systems (DRMS) which are
becoming more and more complex due to technology revolution in relation with
telecommunication networks, multimedia applications and the reading equipments
(Mobile Phone, IPhone, PDA, DVD Player,..). The complexity of the DRMS,
involves the use of new tools and methodologies that support software
components and hardware components coupled design. The traditional systems
design approach has been somewhat hardware first in that the software
components are designed after the hardware has been designed and prototyped.
This leaves little flexibility in evaluating different design options and
hardware-software mappings. The key of codesign is to avoid isolation between
hardware and software designs to proceed in parallel, with feedback and
interaction between the two as the design progresses, in order to achieve high
quality designs with a reduced design time. In this paper, we present the F4MS
(Framework for Mixed Systems) which is a unified framework for software and
hardware design environment, simulation and aided execution of mixed systems.
To illustrate this work we propose an implementation of DRMS business model
based on F4MS framework.
|
[
{
"version": "v1",
"created": "Mon, 19 Apr 2010 18:01:45 GMT"
}
] | 2010-04-20T00:00:00 |
[
[
"Berrahou",
"Aissam",
""
],
[
"Rafi",
"Mourad",
""
],
[
"Eleuldj",
"Mohsine",
""
]
] |
new_dataset
| 0.997329 |
1004.3268
|
Vishal Goyal
|
Amir Mollanejad, Leili Mohammad Khanli, Mohammad Zeynali
|
DBSR: Dynamic base station Repositioning using Genetic algorithm in
wireless sensor network
|
International Journal of Computer Science Issues online at
http://ijcsi.org/articles/DBSR-Dynamic-base-station-Repositioning-using-Genetic-algorithm-in-wireless-sensor-network.php
|
IJCSI, Volume 7, Issue 2, March 2010
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless sensor networks (WSNs) are commonly used in various ubiquitous and
pervasive applications. Due to limited power resources, the optimal dynamic
base station (BS) replacement could be Prolong the sensor network lifetime. In
this paper we'll present a dynamic optimum method for base station replacement
so that can save energy in sensors and increases network lifetime. Because
positioning problem is a NPhard problem [1], therefore we'll use genetic
algorithm to solve positioning problem. We've considered energy and distance
parameters for finding BS optimized position. In our represented algorithm base
station position is fixed just during each round and its positioning is done at
the start of next round then it'll be placed in optimized position. Evaluating
our proposed algorithm, we'll execute DBSR algorithm on LEACH & HEED Protocols.
|
[
{
"version": "v1",
"created": "Mon, 19 Apr 2010 18:10:13 GMT"
}
] | 2010-04-20T00:00:00 |
[
[
"Mollanejad",
"Amir",
""
],
[
"Khanli",
"Leili Mohammad",
""
],
[
"Zeynali",
"Mohammad",
""
]
] |
new_dataset
| 0.978674 |
1001.0107
|
Changho Suh
|
Changho Suh and Kannan Ramchandran
|
Exact Regeneration Codes for Distributed Storage Repair Using
Interference Alignment
|
to be submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The high repair cost of (n,k) Maximum Distance Separable (MDS) erasure codes
has recently motivated a new class of codes, called Regenerating Codes, that
optimally trade off storage cost for repair bandwidth. On one end of this
spectrum of Regenerating Codes are Minimum Storage Regenerating (MSR) codes
that can match the minimum storage cost of MDS codes while also significantly
reducing repair bandwidth. In this paper, we describe Exact-MSR codes which
allow for any failed nodes (whether they are systematic or parity nodes) to be
regenerated exactly rather than only functionally or information-equivalently.
We show that Exact-MSR codes come with no loss of optimality with respect to
random-network-coding based MSR codes (matching the cutset-based lower bound on
repair bandwidth) for the cases of: (a) k/n <= 1/2; and (b) k <= 3. Our
constructive approach is based on interference alignment techniques, and,
unlike the previous class of random-network-coding based approaches, we provide
explicit and deterministic coding schemes that require a finite-field size of
at most 2(n-k).
|
[
{
"version": "v1",
"created": "Thu, 31 Dec 2009 18:36:03 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Apr 2010 20:17:54 GMT"
}
] | 2010-04-19T00:00:00 |
[
[
"Suh",
"Changho",
""
],
[
"Ramchandran",
"Kannan",
""
]
] |
new_dataset
| 0.997759 |
1001.0627
|
John Horton
|
John Horton, Lydia Chilton
|
The Labor Economics of Paid Crowdsourcing
| null | null | null | null |
cs.HC cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Crowdsourcing is a form of "peer production" in which work traditionally
performed by an employee is outsourced to an "undefined, generally large group
of people in the form of an open call." We present a model of workers supplying
labor to paid crowdsourcing projects. We also introduce a novel method for
estimating a worker's reservation wage--the smallest wage a worker is willing
to accept for a task and the key parameter in our labor supply model. It shows
that the reservation wages of a sample of workers from Amazon's Mechanical Turk
(AMT) are approximately log normally distributed, with a median wage of
$1.38/hour. At the median wage, the point elasticity of extensive labor supply
is 0.43. We discuss how to use our calibrated model to make predictions in
applied work. Two experimental tests of the model show that many workers
respond rationally to offered incentives. However, a non-trivial fraction of
subjects appear to set earnings targets. These "target earners" consider not
just the offered wage--which is what the rational model predicts--but also
their proximity to earnings goals. Interestingly, a number of workers clearly
prefer earning total amounts evenly divisible by 5, presumably because these
amounts make good targets.
|
[
{
"version": "v1",
"created": "Tue, 5 Jan 2010 20:55:50 GMT"
}
] | 2010-04-19T00:00:00 |
[
[
"Horton",
"John",
""
],
[
"Chilton",
"Lydia",
""
]
] |
new_dataset
| 0.998729 |
cs/0601002
|
G\"unter Rote
|
Wolfgang Mulzer and Guenter Rote
|
Minimum-weight triangulation is NP-hard
|
45 pages (including a technical appendix of 13 pages), 28 figures.
This revision contains a few improvements in the exposition
|
Journal of the ACM, 55, no. 2 (May 2008), Article 11, 29 pp.
|
10.1145/1346330.1346336
|
B 05-23 (revised)
|
cs.CG cs.CC
| null |
A triangulation of a planar point set S is a maximal plane straight-line
graph with vertex set S. In the minimum-weight triangulation (MWT) problem, we
are looking for a triangulation of a given point set that minimizes the sum of
the edge lengths. We prove that the decision version of this problem is
NP-hard. We use a reduction from PLANAR-1-IN-3-SAT. The correct working of the
gadgets is established with computer assistance, using dynamic programming on
polygonal faces, as well as the beta-skeleton heuristic to certify that certain
edges belong to the minimum-weight triangulation.
|
[
{
"version": "v1",
"created": "Mon, 2 Jan 2006 16:11:29 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Sep 2007 01:33:35 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Feb 2008 22:30:23 GMT"
}
] | 2010-04-19T00:00:00 |
[
[
"Mulzer",
"Wolfgang",
""
],
[
"Rote",
"Guenter",
""
]
] |
new_dataset
| 0.998583 |
0809.2651
|
Sasanka Roy
|
John Augustine, Brian Putnam, Sasanka Roy
|
Largest Empty Circle Centered on a Query Line
|
18 pages, 13 figures
| null |
10.1016/j.jda.2009.10.002
| null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Largest Empty Circle problem seeks the largest circle centered within the
convex hull of a set $P$ of $n$ points in $\mathbb{R}^2$ and devoid of points
from $P$. In this paper, we introduce a query version of this well-studied
problem. In our query version, we are required to preprocess $P$ so that when
given a query line $Q$, we can quickly compute the largest empty circle
centered at some point on $Q$ and within the convex hull of $P$.
We present solutions for two special cases and the general case; all our
queries run in $O(\log n)$ time. We restrict the query line to be horizontal in
the first special case, which we preprocess in $O(n \alpha(n) \log n)$ time and
space, where $\alpha(n)$ is the slow growing inverse of the Ackermann's
function. When the query line is restricted to pass through a fixed point, the
second special case, our preprocessing takes $O(n \alpha(n)^{O(\alpha(n))} \log
n)$ time and space. We use insights from the two special cases to solve the
general version of the problem with preprocessing time and space in $O(n^3 \log
n)$ and $O(n^3)$ respectively.
|
[
{
"version": "v1",
"created": "Tue, 16 Sep 2008 15:00:50 GMT"
}
] | 2010-04-15T00:00:00 |
[
[
"Augustine",
"John",
""
],
[
"Putnam",
"Brian",
""
],
[
"Roy",
"Sasanka",
""
]
] |
new_dataset
| 0.998352 |
1004.2322
|
Feng Xia
|
Guowei Wu, Chi Lin, Feng Xia, Lin Yao, He Zhang, Bing Liu
|
Dynamical Jumping Real-Time Fault-Tolerant Routing Protocol for Wireless
Sensor Networks
|
22 pages, 9 figures
|
Sensors, 10(3):2416-2437, 2010
|
10.3390/s100302416
| null |
cs.NI cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In time-critical wireless sensor network (WSN) applications, a high degree of
reliability is commonly required. A dynamical jumping real-time fault-tolerant
routing protocol (DMRF) is proposed in this paper. Each node utilizes the
remaining transmission time of the data packets and the state of the forwarding
candidate node set to dynamically choose the next hop. Once node failure,
network congestion or void region occurs, the transmission mode will switch to
jumping transmission mode, which can reduce the transmission time delay,
guaranteeing the data packets to be sent to the destination node within the
specified time limit. By using feedback mechanism, each node dynamically
adjusts the jumping probabilities to increase the ratio of successful
transmission. Simulation results show that DMRF can not only efficiently reduce
the effects of failure nodes, congestion and void region, but also yield higher
ratio of successful transmission, smaller transmission delay and reduced number
of control packets.
|
[
{
"version": "v1",
"created": "Wed, 14 Apr 2010 06:35:04 GMT"
}
] | 2010-04-15T00:00:00 |
[
[
"Wu",
"Guowei",
""
],
[
"Lin",
"Chi",
""
],
[
"Xia",
"Feng",
""
],
[
"Yao",
"Lin",
""
],
[
"Zhang",
"He",
""
],
[
"Liu",
"Bing",
""
]
] |
new_dataset
| 0.998133 |
1004.2447
|
Jeremy Faden Mr.
|
J. Faden, R. S. Weigel, J. Merka, R. H. W. Friedel
|
Autoplot: A browser for scientific data on the web
|
16 pages
| null |
10.1007/s12145-010-0049-0
| null |
cs.GR physics.data-an physics.space-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Autoplot is software developed for the Virtual Observatories in Heliophysics
to provide intelligent and automated plotting capabilities for many typical
data products that are stored in a variety of file formats or databases.
Autoplot has proven to be a flexible tool for exploring, accessing, and viewing
data resources as typically found on the web, usually in the form of a
directory containing data files with multiple parameters contained in each
file. Data from a data source is abstracted into a common internal data model
called QDataSet. Autoplot is built from individually useful components, and can
be extended and reused to create specialized data handling and analysis
applications and is being used in a variety of science visualization and
analysis applications. Although originally developed for viewing
heliophysics-related time series and spectrograms, its flexible and generic
data representation model makes it potentially useful for the Earth sciences.
|
[
{
"version": "v1",
"created": "Wed, 14 Apr 2010 16:40:41 GMT"
}
] | 2010-04-15T00:00:00 |
[
[
"Faden",
"J.",
""
],
[
"Weigel",
"R. S.",
""
],
[
"Merka",
"J.",
""
],
[
"Friedel",
"R. H. W.",
""
]
] |
new_dataset
| 0.999587 |
cs/0307066
|
Oleg Lodygensky
|
Oleg Lodygensky, Gilles Fedak, Vincent Neri, Alain Cordier, Franck
Cappello
|
Augernome & XtremWeb: Monte Carlos computation on a global computing
platform
| null |
ECONF C0303241:THAT001,2003
| null | null |
cs.DC
| null |
In this paper, we present XtremWeb, a Global Computing platform used to
generate monte carlos showers in Auger, an HEP experiment to study the highest
energy cosmic rays at Mallargue-Mendoza, Argentina.
XtremWeb main goal, as a Global Computing platform, is to compute distributed
applications using idle time of widely interconnected machines. It is
especially dedicated to -but not limited to- multi-parameters applications such
as monte carlos computations; its security mechanisms ensuring not only hosts
integrity but also results certification and its fault tolerant features,
encouraged us to test it and, finally, to deploy it as to support our CPU needs
to simulate showers.
We first introduce Auger computing needs and how Global Computing could help.
We then detail XtremWeb architecture and goals. The fourth and last part
presents the profits we have gained to choose this platform. We conclude on
what could be done next.
|
[
{
"version": "v1",
"created": "Tue, 29 Jul 2003 14:12:07 GMT"
}
] | 2010-04-15T00:00:00 |
[
[
"Lodygensky",
"Oleg",
""
],
[
"Fedak",
"Gilles",
""
],
[
"Neri",
"Vincent",
""
],
[
"Cordier",
"Alain",
""
],
[
"Cappello",
"Franck",
""
]
] |
new_dataset
| 0.998379 |
1001.2059
|
Roberto N\'obrega
|
Roberto W. Nobrega and Bartolomeu F. Uchoa-Filho
|
Multishot Codes for Network Coding using Rank-Metric Codes
|
6 pages, 4 figures. Replaced the extended injection distance (and
doubtful unproven statements about it) with the extended subspace distance;
some other minor corrections and points clarified.
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The multiplicative-additive finite-field matrix channel arises as an adequate
model for linear network coding systems when links are subject to errors and
erasures, and both the network topology and the network code are unknown. In a
previous work we proposed a general construction of multishot codes for this
channel based on the multilevel coding theory. Herein we apply this
construction to the rank-metric space, obtaining multishot rank-metric codes
which, by lifting, can be converted to codes for the aforementioned channel. We
also adapt well-known encoding and decoding algorithms to the considered
situation.
|
[
{
"version": "v1",
"created": "Wed, 13 Jan 2010 02:04:03 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Apr 2010 18:23:54 GMT"
}
] | 2010-04-13T00:00:00 |
[
[
"Nobrega",
"Roberto W.",
""
],
[
"Uchoa-Filho",
"Bartolomeu F.",
""
]
] |
new_dataset
| 0.999092 |
1004.1678
|
Rdv Ijcsis
|
Arabinda Nanda, Amiya Kumar Rath, Saroj Kumar Rout
|
Node Sensing & Dynamic Discovering Routes for Wireless Sensor Networks
|
IEEE Publication format, International Journal of Computer Science
and Information Security, IJCSIS, Vol. 7 No. 3, March 2010, USA. ISSN 1947
5500, http://sites.google.com/site/ijcsis/
| null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
The applications of Wireless Sensor Networks (WSN) contain a wide variety of
scenarios. In most of them, the network is composed of a significant number of
nodes deployed in an extensive area in which not all nodes are directly
connected. Then, the data exchange is supported by multihop communications.
Routing protocols are in charge of discovering and maintaining the routes in
the network. However, the correctness of a particular routing protocol mainly
depends on the capabilities of the nodes and on the application requirements.
This paper presents a dynamic discover routing method for communication between
sensor nodes and a base station in WSN. This method tolerates failures of
arbitrary individual nodes in the network (node failure) or a small part of the
network (area failure). Each node in the network does only local routing
preservation, needs to record only its neighbor nodes' information, and incurs
no extra routing overhead during failure free periods. It dynamically discovers
new routes when an intermediate node or a small part of the network in the path
from a sensor node to a base station fails. In our planned method, every node
decides its path based only on local information, such as its parent node and
neighbor nodes' routing information. So, it is possible to form a loop in the
routing path. We believe that the loop problem in sensor network routing is not
as serious as that in the Internet routing or traditional mobile ad-hoc
routing. We are trying to find all possible loops and eliminate the loops as
far as possible in WSN.
|
[
{
"version": "v1",
"created": "Sat, 10 Apr 2010 03:57:58 GMT"
}
] | 2010-04-13T00:00:00 |
[
[
"Nanda",
"Arabinda",
""
],
[
"Rath",
"Amiya Kumar",
""
],
[
"Rout",
"Saroj Kumar",
""
]
] |
new_dataset
| 0.998441 |
1004.1736
|
Zoltan Esik
|
Zoltan Esik
|
An undecidable property of context-free languages
| null | null | null | null |
cs.FL cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that there exists no algorithm to decide whether the language
generated by a context-free grammar is dense with respect to the lexicographic
ordering. As a corollary to this result, we show that it is undecidable whether
the lexicographic orderings of the languages generated by two context-free
grammars have the same order type.
|
[
{
"version": "v1",
"created": "Sat, 10 Apr 2010 19:16:50 GMT"
}
] | 2010-04-13T00:00:00 |
[
[
"Esik",
"Zoltan",
""
]
] |
new_dataset
| 0.998552 |
1004.1745
|
Rdv Ijcsis
|
Nabil Taib, Toufik Rekioua, Bruno Francois
|
An Improved Fixed Switching Frequency Direct Torque Control of Induction
Motor Drives Fed by Direct Matrix Converter
|
IEEE Publication format, International Journal of Computer Science
and Information Security, IJCSIS, Vol. 7 No. 3, March 2010, USA. ISSN 1947
5500, http://sites.google.com/site/ijcsis/
| null | null | null |
cs.OH
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
A few papers have been interested by the fixed switching frequency direct
torque control fed by direct matrix converters, where we can find just the use
of direct torque controlled space vector modulated method. In this present
paper, we present an improved method used for a fixed switching frequency
direct torque control (DTC) using a direct matrix converter (DMC). This method
is characterized by a simple structure, a fixed switching frequency which
causes minimal torque ripple and a unity input power factor. Using this
strategy, we combine the direct matrix converters advantages with those of
direct torque control (DTC) schemes. The used technique for constant frequency
is combined with the input current space vector to create the switching table
of direct matrix converter (DMC). Simulation results clearly demonstrate a
better dynamic and steady state performances of the proposed method.
|
[
{
"version": "v1",
"created": "Sat, 10 Apr 2010 22:10:43 GMT"
}
] | 2010-04-13T00:00:00 |
[
[
"Taib",
"Nabil",
""
],
[
"Rekioua",
"Toufik",
""
],
[
"Francois",
"Bruno",
""
]
] |
new_dataset
| 0.965337 |
1004.1746
|
Rdv Ijcsis
|
S Qamar, Niranjan Lal, Mrityunjay Singh
|
Internet ware cloud computing :Challenges
|
IEEE Publication format, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
IJCSIS, Vol. 7 No. 3, March 2010, 206-210
| null | null |
cs.DC
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
After decades of engineering development and infrastructural investment,
Internet connections have become commodity product in many countries, and
Internet scale "cloud computing" has started to compete with traditional
software business through its technological advantages and economy of scale.
Cloud computing is a promising enabling technology of Internet ware Cloud
Computing is termed as the next big thing in the modern corporate world. Apart
from the present day software and technologies, cloud computing will have a
growing impact on enterprise IT and business activities in many large
organizations. This paper provides an insight to cloud computing, its impacts
and discusses various issues that business organizations face while
implementing cloud computing. Further, it recommends various strategies that
organizations need to adopt while migrating to cloud computing. The purpose of
this paper is to develop an understanding of cloud computing in the modern
world and its impact on organizations and businesses. Initially the paper
provides a brief description of the cloud computing model introduction and its
purposes. Further it discusses various technical and non-technical issues that
need to be overcome in order for the benefits of cloud computing to be realized
in corporate businesses and organizations. It then provides various
recommendations and strategies that businesses need to work on before stepping
into new technologies.
|
[
{
"version": "v1",
"created": "Sat, 10 Apr 2010 22:17:18 GMT"
}
] | 2010-04-13T00:00:00 |
[
[
"Qamar",
"S",
""
],
[
"Lal",
"Niranjan",
""
],
[
"Singh",
"Mrityunjay",
""
]
] |
new_dataset
| 0.963221 |
0802.4237
|
Ranko Lazic
|
Ranko Lazic
|
Safety alternating automata on data words
|
23 pages
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A data word is a sequence of pairs of a letter from a finite alphabet and an
element from an infinite set, where the latter can only be compared for
equality. Safety one-way alternating automata with one register on infinite
data words are considered, their nonemptiness is shown EXPSPACE-complete, and
their inclusion decidable but not primitive recursive. The same complexity
bounds are obtained for satisfiability and refinement, respectively, for the
safety fragment of linear temporal logic with freeze quantification. Dropping
the safety restriction, adding past temporal operators, or adding one more
register, each causes undecidability.
|
[
{
"version": "v1",
"created": "Thu, 28 Feb 2008 16:54:31 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Mar 2009 18:52:17 GMT"
},
{
"version": "v3",
"created": "Fri, 9 Apr 2010 15:20:30 GMT"
}
] | 2010-04-12T00:00:00 |
[
[
"Lazic",
"Ranko",
""
]
] |
new_dataset
| 0.997484 |
1004.1511
|
Ludo M.G.M. Tolhuizen
|
Ludo Tolhuizen
|
Bounds for codes for a non-symmetric ternary channel
|
To be presented at 31st WIC Symposium on Information Theory in the
Benelux, Rotterdam, the Netherlands, May 11-12, 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We provide bounds for codes for a non-symmetric channel or, equivalently, for
ternary codes with the Manhattan distance.
|
[
{
"version": "v1",
"created": "Fri, 9 Apr 2010 09:49:11 GMT"
}
] | 2010-04-12T00:00:00 |
[
[
"Tolhuizen",
"Ludo",
""
]
] |
new_dataset
| 0.999855 |
0906.5022
|
Tad Hogg
|
Tad Hogg and Robert A. Freitas Jr
|
Chemical Power for Microscopic Robots in Capillaries
|
28 pages, 7 figures
|
Nanomedicine: Nanotechnology, Biology, and Medicine 6:298-317
(2010)
|
10.1016/j.nano.2009.10.002
| null |
cs.RO physics.bio-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The power available to microscopic robots (nanorobots) that oxidize
bloodstream glucose while aggregated in circumferential rings on capillary
walls is evaluated with a numerical model using axial symmetry and
time-averaged release of oxygen from passing red blood cells. Robots about one
micron in size can produce up to several tens of picowatts, in steady-state, if
they fully use oxygen reaching their surface from the blood plasma. Robots with
pumps and tanks for onboard oxygen storage could collect oxygen to support
burst power demands two to three orders of magnitude larger. We evaluate
effects of oxygen depletion and local heating on surrounding tissue. These
results give the power constraints when robots rely entirely on ambient
available oxygen and identify aspects of the robot design significantly
affecting available power. More generally, our numerical model provides an
approach to evaluating robot design choices for nanomedicine treatments in and
near capillaries.
|
[
{
"version": "v1",
"created": "Fri, 26 Jun 2009 23:54:08 GMT"
}
] | 2010-04-09T00:00:00 |
[
[
"Hogg",
"Tad",
""
],
[
"Freitas",
"Robert A.",
"Jr"
]
] |
new_dataset
| 0.985026 |
1004.1195
|
Sami Akin
|
Sami Akin, Mustafa Cenk Gursoy
|
Ergodic Capacity Analysis in Cognitive Radio Systems under Channel
Uncertainty
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, pilot-symbol-assisted transmission in cognitive radio systems
over time selective flat fading channels is studied. It is assumed that causal
and noncausal Wiener filter estimators are used at the secondary receiver with
the aid of training symbols to obtain the channel side information (CSI) under
an interference power constraint. Cognitive radio model is described together
with detection and false alarm probabilities determined by using a
Neyman-Person detector for channel sensing. Subsequently, for both filters, the
variances of estimate errors are calculated from the Doppler power spectrum of
the channel, and achievable rate expressions are provided considering the
scenarios which are results of channel sensing. Numerical results are obtained
in Gauss-Markov modeled channels, and achievable rates obtained by using causal
and noncausal filters are compared and it is shown that the difference is
decreasing with increasing signal-to-noise ratio (SNR). Moreover, the optimal
probability of detection and false alarm values are shown, and the tradeoff
between these two parameters is discussed. Finally, optimal power distributions
are provided.
|
[
{
"version": "v1",
"created": "Wed, 7 Apr 2010 21:31:38 GMT"
}
] | 2010-04-09T00:00:00 |
[
[
"Akin",
"Sami",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
]
] |
new_dataset
| 0.967257 |
1004.1216
|
Zhi Xu
|
Zhi Xu
|
Multi-Shift de Bruijn Sequence
|
9 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A (non-circular) de Bruijn sequence w of order n is a word such that every
word of length n appears exactly once in w as a factor. In this paper, we
generalize the concept to a multi-shift setting: a multi-shift de Bruijn
sequence tau(m,n) of shift m and order n is a word such that every word of
length n appears exactly once in w as a factor that starts at index im+1 for
some integer i>=0. We show the number of the multi-shift de Bruijn sequence
tau(m,n) is (a^n)!a^{(m-n)(a^n-1)} for 1<=n<=m and is (a^m!)^{a^{n-m}} for
1<=m<=n, where a=|Sigma|. We provide two algorithms for generating a tau(m,n).
The multi-shift de Bruijn sequence is important in solving the Frobenius
problem in a free monoid.
|
[
{
"version": "v1",
"created": "Thu, 8 Apr 2010 01:24:50 GMT"
}
] | 2010-04-09T00:00:00 |
[
[
"Xu",
"Zhi",
""
]
] |
new_dataset
| 0.999676 |
1004.1232
|
Rdv Ijcsis
|
Hossein Rouhani Zeidanloo, Azizah Bt Abdul Manaf
|
Botnet Detection by Monitoring Similar Communication Patterns
|
IEEE Publication format, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
IJCSIS, Vol. 7 No. 3, March 2010
| null | null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Botnet is most widespread and occurs commonly in today's cyber attacks,
resulting in serious threats to our network assets and organization's
properties. Botnets are collections of compromised computers (Bots) which are
remotely controlled by its originator (BotMaster) under a common
Command-and-Control (C&C) infrastructure. They are used to distribute commands
to the Bots for malicious activities such as distributed denial-of-service
(DDoS) attacks, spam and phishing. Most of the existing Botnet detection
approaches concentrate only on particular Botnet command and control (C&C)
protocols (e.g., IRC,HTTP) and structures (e.g., centralized), and can become
ineffective as Botnets change their structure and C&C techniques. In this paper
at first we provide taxonomy of Botnets C&C channels and evaluate well-known
protocols which are being used in each of them. Then we proposed a new general
detection framework which currently focuses on P2P based and IRC based Botnets.
This proposed framework is based on definition of Botnets. Botnet has been
defined as a group of bots that perform similar communication and malicious
activity patterns within the same Botnet. The point that distinguishes our
proposed detection framework from many other similar works is that there is no
need for prior knowledge of Botnets such as Botnet signature.
|
[
{
"version": "v1",
"created": "Thu, 8 Apr 2010 03:11:06 GMT"
}
] | 2010-04-09T00:00:00 |
[
[
"Zeidanloo",
"Hossein Rouhani",
""
],
[
"Manaf",
"Azizah Bt Abdul",
""
]
] |
new_dataset
| 0.954919 |
1004.1267
|
Arnaud Legout
|
Stevens Le Blond, Pere Manils, Abdelberi Chaabane, Mohamed Ali Kaafar,
Arnaud Legout, Claude Castellucia, Walid Dabbous (INRIA Sophia Antipolis /
INRIA Rh\^one-Alpes)
|
De-anonymizing BitTorrent Users on Tor
|
Poster accepted at the 7th USENIX Symposium on Network Design and
Implementation (NSDI '10), San Jose, CA : United States (2010)
| null | null | null |
cs.NI cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Some BitTorrent users are running BitTorrent on top of Tor to preserve their
privacy. In this extended abstract, we discuss three different attacks to
reveal the IP address of BitTorrent users on top of Tor. In addition, we
exploit the multiplexing of streams from different applications into the same
circuit to link non-BitTorrent applications to revealed IP addresses.
|
[
{
"version": "v1",
"created": "Thu, 8 Apr 2010 07:23:04 GMT"
}
] | 2010-04-09T00:00:00 |
[
[
"Blond",
"Stevens Le",
"",
"INRIA Sophia Antipolis /\n INRIA Rhône-Alpes"
],
[
"Manils",
"Pere",
"",
"INRIA Sophia Antipolis /\n INRIA Rhône-Alpes"
],
[
"Chaabane",
"Abdelberi",
"",
"INRIA Sophia Antipolis /\n INRIA Rhône-Alpes"
],
[
"Kaafar",
"Mohamed Ali",
"",
"INRIA Sophia Antipolis /\n INRIA Rhône-Alpes"
],
[
"Legout",
"Arnaud",
"",
"INRIA Sophia Antipolis /\n INRIA Rhône-Alpes"
],
[
"Castellucia",
"Claude",
"",
"INRIA Sophia Antipolis /\n INRIA Rhône-Alpes"
],
[
"Dabbous",
"Walid",
"",
"INRIA Sophia Antipolis /\n INRIA Rhône-Alpes"
]
] |
new_dataset
| 0.976296 |
1001.1798
|
Kai Fong Ernest Chong
|
Kai Fong Ernest Chong, Ernest Kurniawan, Sumei Sun and Kai Yen
|
Fountain Codes with Varying Probability Distributions
|
5 pages, 1 figure. Changes, including a different simulation example
in Section IV, are made to improve clarity. Theory remains unchanged.
Resubmitted to the 6th International Symposium on Turbo Codes & Iterative
Information Processing (ISTC 2010).
| null | null | null |
cs.IT math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fountain codes are rateless erasure-correcting codes, i.e., an essentially
infinite stream of encoded packets can be generated from a finite set of data
packets. Several fountain codes have been proposed recently to minimize
overhead, many of which involve modifications of the Luby transform (LT) code.
These fountain codes, like the LT code, have the implicit assumption that the
probability distribution is fixed throughout the encoding process. In this
paper, we will use the theory of posets to show that this assumption is
unnecessary, and by dropping it, we can achieve overhead reduction by as much
as 64% lower than LT codes. We also present the fundamental theory of
probability distribution designs for fountain codes with non-constant
probability distributions that minimize overhead.
|
[
{
"version": "v1",
"created": "Tue, 12 Jan 2010 06:12:37 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Apr 2010 06:09:45 GMT"
}
] | 2010-04-08T00:00:00 |
[
[
"Chong",
"Kai Fong Ernest",
""
],
[
"Kurniawan",
"Ernest",
""
],
[
"Sun",
"Sumei",
""
],
[
"Yen",
"Kai",
""
]
] |
new_dataset
| 0.998993 |
1003.4830
|
Carmelo Malta
|
Carmelo Malta, Jos\'e Martinez (LINA)
|
Limits of Commutativity on Abstract Data Types
| null |
5th International Conference on Information Systems and Management
of Data (CISMOD'92), Bangalore : India (1992)
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present some formal properties of (symmetrical) commutativity, the major
criterion used in transactional systems, which allow us to fully understand its
advantages and disadvantages. The main result is that commutativity is subject
to the same limitation as compatibility for arbitrary objects. However,
commutativity has also a number of attracting properties, one of which is
related to recovery and, to our knowledge, has not been exploited in the
literature. Advantages and disadvantages are illustrated on abstract data types
of interest. We also show how limits of commutativity have been circumvented,
which gives guidelines for doing so (or not!).
|
[
{
"version": "v1",
"created": "Thu, 25 Mar 2010 09:52:39 GMT"
}
] | 2010-04-08T00:00:00 |
[
[
"Malta",
"Carmelo",
"",
"LINA"
],
[
"Martinez",
"José",
"",
"LINA"
]
] |
new_dataset
| 0.981952 |
1003.4894
|
Michel Aurnague
|
Michel Aurnague (CLLE), Laure Vieu (IRIT), Andr\'ee Borillo (CLLE)
|
La repr\'esentation formelle des concepts spatiaux dans la langue
| null |
Langage et cognition spatiale, Michel Denis (Ed.) (1997) 69-102
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this chapter, we assume that systematically studying spatial markers
semantics in language provides a means to reveal fundamental properties and
concepts characterizing conceptual representations of space. We propose a
formal system accounting for the properties highlighted by the linguistic
analysis, and we use these tools for representing the semantic content of
several spatial relations of French. The first part presents a semantic
analysis of the expression of space in French aiming at describing the
constraints that formal representations have to take into account. In the
second part, after presenting the structure of our formal system, we set out
its components. A commonsense geometry is sketched out and several functional
and pragmatic spatial concepts are formalized. We take a special attention in
showing that these concepts are well suited to representing the semantic
content of several prepositions of French ('sur' (on), 'dans' (in), 'devant'
(in front of), 'au-dessus' (above)), and in illustrating the inferential
adequacy of these representations.
|
[
{
"version": "v1",
"created": "Thu, 25 Mar 2010 14:03:51 GMT"
}
] | 2010-04-08T00:00:00 |
[
[
"Aurnague",
"Michel",
"",
"CLLE"
],
[
"Vieu",
"Laure",
"",
"IRIT"
],
[
"Borillo",
"Andrée",
"",
"CLLE"
]
] |
new_dataset
| 0.984475 |
1004.1045
|
Chau Yuen
|
Yifan Chen, Chau Yuen
|
Double-Directional Information Azimuth Spectrum and Relay Network
Tomography for a Decentralized Wireless Relay Network
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel channel representation for a two-hop decentralized wireless relay
network (DWRN) is proposed, where the relays operate in a completely
distributive fashion. The modeling paradigm applies an analogous approach to
the description method for a double-directional multipath propagation channel,
and takes into account the finite system spatial resolution and the extended
relay listening/transmitting time. Specifically, the double-directional
information azimuth spectrum (IAS) is formulated to provide a compact
representation of information flows in a DWRN. The proposed channel
representation is then analyzed from a geometrically-based statistical modeling
perspective. Finally, we look into the problem of relay network tomography
(RNT), which solves an inverse problem to infer the internal structure of a
DWRN by using the instantaneous doubledirectional IAS recorded at multiple
measuring nodes exterior to the relay region.
|
[
{
"version": "v1",
"created": "Wed, 7 Apr 2010 10:28:30 GMT"
}
] | 2010-04-08T00:00:00 |
[
[
"Chen",
"Yifan",
""
],
[
"Yuen",
"Chau",
""
]
] |
new_dataset
| 0.999075 |
1004.1158
|
Hacene Belbachir
|
Kenza Guenda
|
New MDS Self-Dual Codes over Large Finite Fields
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We construct MDS Euclidean and Hermitian self-dual codes over large finite
fields of odd and even characteristics. Our codes arise from cyclic and
negacyclic duadic codes.
|
[
{
"version": "v1",
"created": "Wed, 7 Apr 2010 19:06:55 GMT"
}
] | 2010-04-08T00:00:00 |
[
[
"Guenda",
"Kenza",
""
]
] |
new_dataset
| 0.995847 |
1004.0259
|
Lennart Nacke Ph.D.
|
Lennart E. Nacke, Sophie Stellmach, Dennis Sasse, Craig A. Lindley
|
Gameplay experience in a gaze interaction game
|
pages 49-54, The 5th Conference on Communication by Gaze Interaction
- COGAIN 2009: Gaze Interaction For Those Who Want It Most, ISBN:
978-87-643-0475-6
| null | null | null |
cs.HC cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Assessing gameplay experience for gaze interaction games is a challenging
task. For this study, a gaze interaction Half-Life 2 game modification was
created that allowed eye tracking control. The mod was deployed during an
experiment at Dreamhack 2007, where participants had to play with gaze
navigation and afterwards rate their gameplay experience. The results show low
tension and negative affects scores on the gameplay experience questionnaire as
well as high positive challenge, immersion and flow ratings. The correlation
between spatial presence and immersion for gaze interaction was high and yields
further investigation. It is concluded that gameplay experience can be
correctly assessed with the methodology presented in this paper.
|
[
{
"version": "v1",
"created": "Thu, 1 Apr 2010 23:52:50 GMT"
}
] | 2010-04-05T00:00:00 |
[
[
"Nacke",
"Lennart E.",
""
],
[
"Stellmach",
"Sophie",
""
],
[
"Sasse",
"Dennis",
""
],
[
"Lindley",
"Craig A.",
""
]
] |
new_dataset
| 0.991155 |
1003.0958
|
Jianfeng Zhan
|
Jianfeng Zhan, Lei Wang, Weisong Shi, Shimin Gong and Xiutao Zang
|
PhoenixCloud: Provisioning Resources for Heterogeneous Cloud Workloads
|
Submitted to IEEE Transaction on Service Computing
| null | null | null |
cs.DC cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As more and more service providers choose Cloud platforms, a resource
provider needs to provision resources and supporting runtime environments (REs)
for heterogeneous workloads in different scenarios. Previous work fails to
resolve this issue in several ways: (1) it fails to pay attention to diverse RE
requirements, and does not enable creating coordinated REs on demand; (2) few
work investigates coordinated resource provisioning for heterogeneous
workloads. In this paper, our contributions are three-fold: (1) we present an
RE agreement that expresses diverse RE requirements, and build an innovative
system PhoenixCloud that enables a resource provider to create REs on demand
according to RE agreements; (2) we propose two coordinated resource
provisioning solutions for heterogeneous workloads in two typical Cloud
scenarios: first, a large organization operates a private Cloud for two
heterogeneous workloads; second, a large organization or two service providers
running heterogeneous workloads revert to a public Cloud; and (3) A
comprehensive evaluation has been performed in experiments. For typical
workload traces of parallel batch jobs and Web services, our experiments show
that: a) In the first Cloud scenario, when the throughput is almost same like
that of a dedicated cluster system, our solution decreases the configuration
size of cluster by about 40%; b) in the second scenario, our solution decreases
not only the total resource consumption, but also the peak resource consumption
maximally to 31% with respect to that of EC2 + RightScale solution.
|
[
{
"version": "v1",
"created": "Thu, 4 Mar 2010 03:26:26 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Mar 2010 06:24:32 GMT"
},
{
"version": "v3",
"created": "Tue, 30 Mar 2010 02:55:49 GMT"
},
{
"version": "v4",
"created": "Wed, 31 Mar 2010 00:40:42 GMT"
}
] | 2010-04-01T00:00:00 |
[
[
"Zhan",
"Jianfeng",
""
],
[
"Wang",
"Lei",
""
],
[
"Shi",
"Weisong",
""
],
[
"Gong",
"Shimin",
""
],
[
"Zang",
"Xiutao",
""
]
] |
new_dataset
| 0.97356 |
1003.5993
|
Xiangyong Zeng
|
Xiangyong Zeng and Jinyong Shan and Lei Hu
|
A Triple-Error-Correcting Cyclic Code from the Gold and Kasami-Welch APN
Power Functions
|
29 pages
| null | null | null |
cs.DM cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Based on a sufficient condition proposed by Hollmann and Xiang for
constructing triple-error-correcting codes, the minimum distance of a binary
cyclic code $\mathcal{C}_{1,3,13}$ with three zeros $\alpha$, $\alpha^3$, and
$\alpha^{13}$ of length $2^m-1$ and the weight divisibility of its dual code
are studied, where $m\geq 5$ is odd and $\alpha$ is a primitive element of the
finite field $\mathbb{F}_{2^m}$. The code $\mathcal{C}_{1,3,13}$ is proven to
have the same weight distribution as the binary triple-error-correcting
primitive BCH code $\mathcal{C}_{1,3,5}$ of the same length.
|
[
{
"version": "v1",
"created": "Wed, 31 Mar 2010 09:08:32 GMT"
}
] | 2010-04-01T00:00:00 |
[
[
"Zeng",
"Xiangyong",
""
],
[
"Shan",
"Jinyong",
""
],
[
"Hu",
"Lei",
""
]
] |
new_dataset
| 0.994098 |
0706.2153
|
Quentin Merigot
|
Fr\'ed\'eric Chazal (INRIA Sophia Antipolis), David Cohen-Steiner
(INRIA Sophia Antipolis), Quentin M\'erigot (INRIA Sophia Antipolis)
|
Stability of boundary measures
| null |
Boundary measures for geometric inference, Found. Comput. Math.,
10 (2), pp. 221-240, 2010
|
10.1007/s10208-009-9056-2
| null |
cs.CG math.CA math.MG
| null |
We introduce the boundary measure at scale r of a compact subset of the
n-dimensional Euclidean space. We show how it can be computed for point clouds
and suggest these measures can be used for feature detection. The main
contribution of this work is the proof a quantitative stability theorem for
boundary measures using tools of convex analysis and geometric measure theory.
As a corollary we obtain a stability result for Federer's curvature measures of
a compact, allowing to compute them from point-cloud approximations of the
compact.
|
[
{
"version": "v1",
"created": "Thu, 14 Jun 2007 16:03:28 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Jun 2007 09:06:56 GMT"
}
] | 2010-03-31T00:00:00 |
[
[
"Chazal",
"Frédéric",
"",
"INRIA Sophia Antipolis"
],
[
"Cohen-Steiner",
"David",
"",
"INRIA Sophia Antipolis"
],
[
"Mérigot",
"Quentin",
"",
"INRIA Sophia Antipolis"
]
] |
new_dataset
| 0.992439 |
0803.2262
|
Maximilien Gadouleau
|
Maximilien Gadouleau and Zhiyuan Yan
|
Constant-Rank Codes and Their Connection to Constant-Dimension Codes
|
10 pages, 3 figures, accepted to appear in IEEE Transactions on
Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Constant-dimension codes have recently received attention due to their
significance to error control in noncoherent random linear network coding. What
the maximal cardinality of any constant-dimension code with finite dimension
and minimum distance is and how to construct the optimal constant-dimension
code (or codes) that achieves the maximal cardinality both remain open research
problems. In this paper, we introduce a new approach to solving these two
problems. We first establish a connection between constant-rank codes and
constant-dimension codes. Via this connection, we show that optimal
constant-dimension codes correspond to optimal constant-rank codes over
matrices with sufficiently many rows. As such, the two aforementioned problems
are equivalent to determining the maximum cardinality of constant-rank codes
and to constructing optimal constant-rank codes, respectively. To this end, we
then derive bounds on the maximum cardinality of a constant-rank code with a
given minimum rank distance, propose explicit constructions of optimal or
asymptotically optimal constant-rank codes, and establish asymptotic bounds on
the maximum rate of a constant-rank code.
|
[
{
"version": "v1",
"created": "Sat, 15 Mar 2008 00:02:43 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Apr 2008 17:07:10 GMT"
},
{
"version": "v3",
"created": "Tue, 29 Apr 2008 22:29:31 GMT"
},
{
"version": "v4",
"created": "Sun, 6 Jul 2008 23:04:05 GMT"
},
{
"version": "v5",
"created": "Mon, 28 Jul 2008 23:05:24 GMT"
},
{
"version": "v6",
"created": "Tue, 23 Jun 2009 13:23:16 GMT"
},
{
"version": "v7",
"created": "Tue, 30 Mar 2010 09:49:46 GMT"
}
] | 2010-03-31T00:00:00 |
[
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
] |
new_dataset
| 0.998455 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.