id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0802.3085
|
EDA Publishing Association
|
T. Akashi, Y. Yoshimura
|
Profile Control of a Borosilicate-Glass Groove Formed by Deep Reactive
Ion Etching
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/EDA-Publishing)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
|
10.1088/0960-1317/18/10/105004
| null |
cs.OH
| null |
Deep reactive ion etching (DRIE) of borosilicate glass and profile control of
an etched groove are reported. DRIE was carried out using an anodically bonded
silicon wafer as an etching mask. We controlled the groove profile, namely
improving its sidewall angle, by removing excessively thick polymer film
produced by carbonfluoride etching gases during DRIE. Two fabrication processes
were experimentally compared for effective removal of the film : DRIE with the
addition of argon to the etching gases and a novel combined process in which
DRIE and subsequent ultrasonic cleaning in DI water were alternately carried
out. Both processes improved the sidewall angle, and it reached 85o independent
of the mask-opening width. The results showed the processes can remove
excessive polymer film on sidewalls. Accordingly, the processes are an
effective way to control the groove profile of borosilicate glass.
|
[
{
"version": "v1",
"created": "Thu, 21 Feb 2008 13:40:15 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Akashi",
"T.",
""
],
[
"Yoshimura",
"Y.",
""
]
] |
new_dataset
| 0.967453 |
0901.2665
|
Eric Polizzi
|
Eric Polizzi
|
A Density Matrix-based Algorithm for Solving Eigenvalue Problems
|
7 pages, 3 figures
| null |
10.1103/PhysRevB.79.115112
| null |
cs.CE cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new numerical algorithm for solving the symmetric eigenvalue problem is
presented. The technique deviates fundamentally from the traditional Krylov
subspace iteration based techniques (Arnoldi and Lanczos algorithms) or other
Davidson-Jacobi techniques, and takes its inspiration from the contour
integration and density matrix representation in quantum mechanics. It will be
shown that this new algorithm - named FEAST - exhibits high efficiency,
robustness, accuracy and scalability on parallel architectures. Examples from
electronic structure calculations of Carbon nanotubes (CNT) are presented, and
numerical performances and capabilities are discussed.
|
[
{
"version": "v1",
"created": "Sat, 17 Jan 2009 23:36:23 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Polizzi",
"Eric",
""
]
] |
new_dataset
| 0.977232 |
0911.2320
|
EPTCS
|
Paola Bonizzoni, Clelia De Felice, Rosalba Zizza
|
Circular Languages Generated by Complete Splicing Systems and Pure
Unitary Languages
| null |
EPTCS 9, 2009, pp. 22-31
|
10.4204/EPTCS.9.3
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Circular splicing systems are a formal model of a generative mechanism of
circular words, inspired by a recombinant behaviour of circular DNA. Some
unanswered questions are related to the computational power of such systems,
and finding a characterization of the class of circular languages generated by
circular splicing systems is still an open problem. In this paper we solve this
problem for complete systems, which are special finite circular splicing
systems. We show that a circular language L is generated by a complete system
if and only if the set Lin(L) of all words corresponding to L is a pure unitary
language generated by a set closed under the conjugacy relation. The class of
pure unitary languages was introduced by A. Ehrenfeucht, D. Haussler, G.
Rozenberg in 1983, as a subclass of the class of context-free languages,
together with a characterization of regular pure unitary languages by means of
a decidable property. As a direct consequence, we characterize (regular)
circular languages generated by complete systems. We can also decide whether
the language generated by a complete system is regular. Finally, we point out
that complete systems have the same computational power as finite simple
systems, an easy type of circular splicing system defined in the literature
from the very beginning, when only one rule is allowed. From our results on
complete systems, it follows that finite simple systems generate a class of
context-free languages containing non-regular languages, showing the
incorrectness of a longstanding result on simple systems.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 08:40:12 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Bonizzoni",
"Paola",
""
],
[
"De Felice",
"Clelia",
""
],
[
"Zizza",
"Rosalba",
""
]
] |
new_dataset
| 0.965938 |
0911.2364
|
Loet Leydesdorff
|
Wilfred Dolfsma, Loet Leydesdorff
|
Journals as constituents of scientific discourse: economic heterodoxy
| null |
Wilfred Dolfsma & Loet Leydesdorff, Journals as Constituents of
Scientific Discourse: Economic Heterodoxy, On the Horizon 16(4), 214-225,
2008
| null | null |
cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Purpose: to provide a view and analysis of the immediate field of journals
which surround a number of key heterodox economics journals.
Design/methodology/approach: Using citation data from the Science and Social
Science Citation Index, the individual and collective networks of a number of
journals in this field are analyzed. Findings: The size and shape of the
citation networks of journals can differ substantially, even if in a broadly
similar category. Heterodox economics cannot (yet) be considered as an
integrated specialty: authors in several journals in heterodox economics cite
more from mainstream economics than from other heterodox journals. There are
also strong links with other disciplinary fields such as geography, development
studies, women studies, etc.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 11:12:11 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Dolfsma",
"Wilfred",
""
],
[
"Leydesdorff",
"Loet",
""
]
] |
new_dataset
| 0.997518 |
0911.2423
|
Matt Purkeypile
|
Matt Purkeypile
|
Cove: A Practical Quantum Computer Programming Framework
|
Doctoral dissertation, 272 pages
| null | null | null |
cs.PL quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While not yet in commercial existence, quantum computers have the ability to
solve certain classes of problems that are not efficiently solvable on existing
Turing Machine based (classical) computers. For quantum computers to be of use,
methods of programming them must exist. Proposals exist for programming quantum
computers, but all of the existing ones suffer from flaws that make them
impractical in commercial software development environments. Cove is a
framework for programming quantum computers that extends existing classical
languages to allow for quantum computation, thus providing a quantum computing
toolkit for commercial software developers. Since the target users of Cove are
commercial developers, it is an object oriented framework that can be used by
multiple languages and also places emphasis on complete documentation. The
focus of Cove is not so much on the software product, but on the fundamental
concepts that make quantum computing practical for common developers.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 05:36:23 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Purkeypile",
"Matt",
""
]
] |
new_dataset
| 0.999687 |
0911.2033
|
EPTCS
|
Tom\'a\v{s} Babiak, Vojt\v{e}ch \v{R}eh\'ak, Jan Strej\v{c}ek
|
Almost Linear B\"uchi Automata
| null |
EPTCS 8, 2009, pp. 16-25
|
10.4204/EPTCS.8.2
| null |
cs.FL cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new fragment of Linear temporal logic (LTL) called LIO and a
new class of Buechi automata (BA) called Almost linear Buechi automata (ALBA).
We provide effective translations between LIO and ALBA showing that the two
formalisms are expressively equivalent. While standard translations of LTL into
BA use some intermediate formalisms, the presented translation of LIO into ALBA
is direct. As we expect applications of ALBA in model checking, we compare the
expressiveness of ALBA with other classes of Buechi automata studied in this
context and we indicate possible applications.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2009 00:48:28 GMT"
}
] | 2009-11-12T00:00:00 |
[
[
"Babiak",
"Tomáš",
""
],
[
"Řehák",
"Vojtěch",
""
],
[
"Strejček",
"Jan",
""
]
] |
new_dataset
| 0.987652 |
0901.2349
|
Eduardo G. Altmann
|
Eduardo G. Altmann, Janet B. Pierrehumbert, and Adilson E. Motter
|
Beyond word frequency: Bursts, lulls, and scaling in the temporal
distributions of words
| null |
PLoS ONE 4 (11): e7678 (2009)
|
10.1371/journal.pone.0007678
| null |
cs.CL cond-mat.dis-nn physics.data-an physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Background: Zipf's discovery that word frequency distributions obey a power
law established parallels between biological and physical processes, and
language, laying the groundwork for a complex systems perspective on human
communication. More recent research has also identified scaling regularities in
the dynamics underlying the successive occurrences of events, suggesting the
possibility of similar findings for language as well.
Methodology/Principal Findings: By considering frequent words in USENET
discussion groups and in disparate databases where the language has different
levels of formality, here we show that the distributions of distances between
successive occurrences of the same word display bursty deviations from a
Poisson process and are well characterized by a stretched exponential (Weibull)
scaling. The extent of this deviation depends strongly on semantic type -- a
measure of the logicality of each word -- and less strongly on frequency. We
develop a generative model of this behavior that fully determines the dynamics
of word usage.
Conclusions/Significance: Recurrence patterns of words are well described by
a stretched exponential distribution of recurrence times, an empirical scaling
that cannot be anticipated from Zipf's law. Because the use of words provides a
uniquely precise and powerful lens on human thought and activity, our findings
also have implications for other overt manifestations of collective human
dynamics.
|
[
{
"version": "v1",
"created": "Thu, 15 Jan 2009 21:12:12 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Nov 2009 16:07:23 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Altmann",
"Eduardo G.",
""
],
[
"Pierrehumbert",
"Janet B.",
""
],
[
"Motter",
"Adilson E.",
""
]
] |
new_dataset
| 0.972386 |
0911.1862
|
EPTCS
|
Luca Aceto (Reykjavik University), Anna Ingolfsdottir (Reykjavik
University), Joshua Sack (Reykjavik University)
|
Characteristic Formulae for Fixed-Point Semantics: A General Framework
| null |
EPTCS 8, 2009, pp. 1-15
|
10.4204/EPTCS.8.1
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The literature on concurrency theory offers a wealth of examples of
characteristic-formula constructions for various behavioural relations over
finite labelled transition systems and Kripke structures that are defined in
terms of fixed points of suitable functions. Such constructions and their
proofs of correctness have been developed independently, but have a common
underlying structure. This study provides a general view of characteristic
formulae that are expressed in terms of logics with a facility for the
recursive definition of formulae. It is shown how several examples of
characteristic-formula constructions from the literature can be recovered as
instances of the proposed general framework, and how the framework can be used
to yield novel constructions.
|
[
{
"version": "v1",
"created": "Tue, 10 Nov 2009 09:14:55 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Aceto",
"Luca",
"",
"Reykjavik University"
],
[
"Ingolfsdottir",
"Anna",
"",
"Reykjavik\n University"
],
[
"Sack",
"Joshua",
"",
"Reykjavik University"
]
] |
new_dataset
| 0.976149 |
cs/0606025
|
Xiaowen Zhang
|
Xiaowen Zhang, Li Shu, Ke Tang
|
A Chaotic Cipher Mmohocc and Its Security Analysis
|
14 pages, 4 figures, 4 tables
| null |
10.1117/12.717682
| null |
cs.CR
| null |
In this paper we introduce a new chaotic stream cipher Mmohocc which utilizes
the fundamental chaos characteristics. The designs of the major components of
the cipher are given. Its cryptographic properties of period, auto- and
cross-correlations, and the mixture of Markov processes and spatiotemporal
effects are investigated. The cipher is resistant to the related-key-IV
attacks, Time/Memory/Data tradeoff attacks, algebraic attacks, and chosen-text
attacks. The keystreams successfully passed two batteries of statistical tests
and the encryption speed is comparable with RC4.
|
[
{
"version": "v1",
"created": "Tue, 6 Jun 2006 17:42:56 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Zhang",
"Xiaowen",
""
],
[
"Shu",
"Li",
""
],
[
"Tang",
"Ke",
""
]
] |
new_dataset
| 0.999605 |
0906.2947
|
Stylianos Basagiannis
|
Stylianos Basagiannis, Panagiotis Katsaros and Andrew Pombortsis
|
Attacking an OT-Based Blind Signature Scheme
|
3 pages, 2 figures, sumbitted for evaluation, under the title
"Security Analysis of an OT-based blind signature scheme"
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we describe an attack against one of the
Oblivious-Transfer-based blind signatures scheme, proposed in [1]. An attacker
with a primitive capability of producing specific-range random numbers, while
exhibiting a partial MITM behavior, is able to corrupt the communication
between the protocol participants. The attack is quite efficient as it leads to
a protocol communication corruption and has a sound-minimal computational cost.
We propose a solution to fix the security flaw.
|
[
{
"version": "v1",
"created": "Tue, 16 Jun 2009 14:23:19 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Jun 2009 12:02:35 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Jul 2009 11:33:05 GMT"
},
{
"version": "v4",
"created": "Tue, 10 Nov 2009 14:24:14 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Basagiannis",
"Stylianos",
""
],
[
"Katsaros",
"Panagiotis",
""
],
[
"Pombortsis",
"Andrew",
""
]
] |
new_dataset
| 0.998306 |
0911.1510
|
Gitanjali Bhutani
|
Gitanjali Bhutani
|
A Near-Optimal Scheme for TCP ACK Pacing to Maintain Throughput in
Wireless Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The advent of fourth generation technologies in wireless networks and the
rapid growth of 3G have heralded an era that will require researchers to find
reliable and easily implement-able solutions to the problem of poor TCP
performance in the wireless environment. Since a large part of the Internet is
TCP-based, solving this problem will be instrumental in determining if the move
from wired to wireless will be seamless or not. This paper proposes a scheme
that uses the base station's ability to predict the time at which the link may
be going down and to estimate the period for which the mobile would be
unreachable due to conditions like fading. By using cross-layer and ACK pacing
algorithms, the base station prevents the fixed host from timing out while
waiting for ACKs from the mobile. This in turn prevents TCP on the fixed host
from bringing down the throughput drastically due to temporary network
conditions, caused by mobility or the unreliability of wireless links.
Experimental results indicate a reasonable increase in throughput when the ACK
holding scheme is used.
|
[
{
"version": "v1",
"created": "Sun, 8 Nov 2009 10:38:18 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Bhutani",
"Gitanjali",
""
]
] |
new_dataset
| 0.992929 |
0911.1707
|
Michel Nabaa
|
Michel Nabaa (LITIS), Cyrille Bertelle (LITIS), Antoine Dutot (LITIS),
Damien Olivier (LITIS), Pascal Mallet
|
A Dynamic Vulnerability Map to Assess the Risk of Road Network Traffic
Utilization
| null |
International Symposium on Risk Models and Applications, Ki\`ev :
Ukraine (2008)
| null | null |
cs.AI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Le Havre agglomeration (CODAH) includes 16 establishments classified Seveso
with high threshold. In the literature, we construct vulnerability maps to help
decision makers assess the risk. Such approaches remain static and do take into
account the population displacement in the estimation of the vulnerability. We
propose a decision making tool based on a dynamic vulnerability map to evaluate
the difficulty of evacuation in the different sectors of CODAH. We use a
Geographic Information system (GIS) to visualize the map which evolves with the
road traffic state through a detection of communities in large graphs
algorithm.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2009 15:43:54 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Nabaa",
"Michel",
"",
"LITIS"
],
[
"Bertelle",
"Cyrille",
"",
"LITIS"
],
[
"Dutot",
"Antoine",
"",
"LITIS"
],
[
"Olivier",
"Damien",
"",
"LITIS"
],
[
"Mallet",
"Pascal",
""
]
] |
new_dataset
| 0.970291 |
cs/0306066
|
Venicio Duic
|
Venicio Duic, Massimo Lamanna
|
The COMPASS Event Store in 2002
|
Talk from the 2003 conference: "Computing in High Energy and Nuclear
Physics" (CHEP03), La Jolla, Ca, USA, March 2003, 6 pages. PSN MOKT011
| null |
10.1109/TNS.2004.832645
| null |
cs.DB
| null |
COMPASS, the fixed-target experiment at CERN studying the structure of the
nucleon and spectroscopy, collected over 260 TB during summer 2002 run. All
these data, together with reconstructed events information, were put from the
beginning in a database infrastructure based on Objectivity/DB and on the
hierarchical storage manager CASTOR. The experience in the usage of the
database is reviewed and the evolution of the system outlined.
|
[
{
"version": "v1",
"created": "Fri, 13 Jun 2003 14:33:53 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Duic",
"Venicio",
""
],
[
"Lamanna",
"Massimo",
""
]
] |
new_dataset
| 0.997726 |
cs/0404016
|
Tze Wei Tang
|
T.W. Tang, A. Allison and D. Abbott
|
Parrondo's games with chaotic switching
|
11 pages, 9 figures
| null |
10.1117/12.561307
| null |
cs.GT
| null |
This paper investigates the different effects of chaotic switching on
Parrondo's games, as compared to random and periodic switching. The rate of
winning of Parrondo's games with chaotic switching depends on coefficient(s)
defining the chaotic generator, initial conditions of the chaotic sequence and
the proportion of Game A played. Maximum rate of winning can be obtained with
all the above mentioned factors properly set, and this occurs when chaotic
switching approaches periodic behavior.
|
[
{
"version": "v1",
"created": "Wed, 7 Apr 2004 06:15:41 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Tang",
"T. W.",
""
],
[
"Allison",
"A.",
""
],
[
"Abbott",
"D.",
""
]
] |
new_dataset
| 0.976698 |
cs/0407047
|
David N. Levin
|
David N. Levin (U.of Chicago)
|
Channel-Independent and Sensor-Independent Stimulus Representations
|
The results of a numerically simulated experiment, which illustrates
the proposed method, have been added to the version submitted on October 27,
2004. This paper has been accepted for publication in the Journal of Applied
Physics. For related papers, see http://www.geocities.com/dlevin2001/
| null |
10.1063/1.2128687
| null |
cs.CV cs.AI
| null |
This paper shows how a machine, which observes stimuli through an
uncharacterized, uncalibrated channel and sensor, can glean machine-independent
information (i.e., channel- and sensor-independent information) about the
stimuli. First, we demonstrate that a machine defines a specific coordinate
system on the stimulus state space, with the nature of that coordinate system
depending on the device's channel and sensor. Thus, machines with different
channels and sensors "see" the same stimulus trajectory through state space,
but in different machine-specific coordinate systems. For a large variety of
physical stimuli, statistical properties of that trajectory endow the stimulus
configuration space with differential geometric structure (a metric and
parallel transfer procedure), which can then be used to represent relative
stimulus configurations in a coordinate-system-independent manner (and,
therefore, in a channel- and sensor-independent manner). The resulting
description is an "inner" property of the stimulus time series in the sense
that it does not depend on extrinsic factors like the observer's choice of a
coordinate system in which the stimulus is viewed (i.e., the observer's choice
of channel and sensor). This methodology is illustrated with analytic examples
and with a numerically simulated experiment. In an intelligent sensory device,
this kind of representation "engine" could function as a "front-end" that
passes channel/sensor-independent stimulus representations to a pattern
recognition module. After a pattern recognizer has been trained in one of these
devices, it could be used without change in other devices having different
channels and sensors.
|
[
{
"version": "v1",
"created": "Mon, 19 Jul 2004 17:13:34 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Oct 2004 22:55:06 GMT"
},
{
"version": "v3",
"created": "Mon, 26 Sep 2005 22:35:45 GMT"
}
] | 2009-11-10T00:00:00 |
[
[
"Levin",
"David N.",
"",
"U.of Chicago"
]
] |
new_dataset
| 0.99921 |
0812.3404
|
Olivier Leveque
|
Olivier Leveque, Christophe Vignat, Melda Yuksel
|
Diversity-Multiplexing Tradeoff for the MIMO Static Half-Duplex Relay
|
19 pages, 2 figures, submitted to the IEEE Transactions on
Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we investigate the diversity-multiplexing tradeoff (DMT) of the
multiple-antenna (MIMO) static half-duplex relay channel. A general expression
is derived for the DMT upper bound, which can be achieved by a
compress-and-forward protocol at the relay, under certain assumptions. The DMT
expression is given as the solution of a minimization problem in general, and
an explicit expression is found when the relay channel is symmetric in terms of
number of antennas, i.e. the source and the destination have n antennas each,
and the relay has m antennas. It is observed that the static half-duplex DMT
matches the full-duplex DMT when the relay has a single antenna, and is
strictly below the full-duplex DMT when the relay has multiple antennas.
Besides, the derivation of the upper bound involves a new asymptotic study of
spherical integrals (that is, integrals with respect to the Haar measure on the
unitary group U(n)), which is a topic of mathematical interest in itself.
|
[
{
"version": "v1",
"created": "Wed, 17 Dec 2008 21:10:26 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Nov 2009 22:48:30 GMT"
}
] | 2009-11-09T00:00:00 |
[
[
"Leveque",
"Olivier",
""
],
[
"Vignat",
"Christophe",
""
],
[
"Yuksel",
"Melda",
""
]
] |
new_dataset
| 0.99451 |
0911.1288
|
Hugues Genevois
|
Caroline Cance, Hugues Genevois, Dani\`ele Dubois
|
What is instrumentality in new digital msuical devices ? A contribution
from cognitive linguistics and psychology
|
11 pages
|
What is instrumentality in new digital musical devices ? A
contribution from cognitive linguistics and psychology, Paris : France (2009)
| null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As far as music is concerned, instruments have always been part of a cultural
?landscape? (on technical, expressive and symbolic levels). The present
contribution explores the changes brought about by the shift that occurred
during the 20th century, from mechanical to digital instruments (also named
?virtual instruments?). First and foremost, a short recall of some historical
steps of the technological developments that have renewed our relationship to
sound, music, and instruments will be presented. Second, an analysis of
different discourses and terminologies presently used in the domains of
musicology and computer music will account for the evolution of the notion of
instrumentality.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 16:06:40 GMT"
}
] | 2009-11-09T00:00:00 |
[
[
"Cance",
"Caroline",
""
],
[
"Genevois",
"Hugues",
""
],
[
"Dubois",
"Danièle",
""
]
] |
new_dataset
| 0.994517 |
cs/0208013
|
Jim Gray
|
Alexander S. Szalay, Jim Gray, Jan vandenBerg
|
Petabyte Scale Data Mining: Dream or Reality?
|
originals at
http://research.microsoft.com/scripts/pubs/view.asp?TR_ID=MSR-TR-2002-84
|
SIPE Astronmy Telescopes and Instruments, 22-28 August 2002,
Waikoloa, Hawaii
|
10.1117/12.461427
|
MSR-TR-2002-84
|
cs.DB cs.CE
| null |
Science is becoming very data intensive1. Today's astronomy datasets with
tens of millions of galaxies already present substantial challenges for data
mining. In less than 10 years the catalogs are expected to grow to billions of
objects, and image archives will reach Petabytes. Imagine having a 100GB
database in 1996, when disk scanning speeds were 30MB/s, and database tools
were immature. Such a task today is trivial, almost manageable with a laptop.
We think that the issue of a PB database will be very similar in six years. In
this paper we scale our current experiments in data archiving and analysis on
the Sloan Digital Sky Survey2,3 data six years into the future. We analyze
these projections and look at the requirements of performing data mining on
such data sets. We conclude that the task scales rather well: we could do the
job today, although it would be expensive. There do not seem to be any
show-stoppers that would prevent us from storing and using a Petabyte dataset
six years from today.
|
[
{
"version": "v1",
"created": "Wed, 7 Aug 2002 22:49:56 GMT"
}
] | 2009-11-07T00:00:00 |
[
[
"Szalay",
"Alexander S.",
""
],
[
"Gray",
"Jim",
""
],
[
"vandenBerg",
"Jan",
""
]
] |
new_dataset
| 0.993376 |
0809.4822
|
Jean-Marie Vanherpe
|
Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO)
|
On normal odd partitions in cubic graphs
| null |
Discussiones Mathematicae Graph Theory 29, 2 (2009) 293-312
| null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A normal partition of the edges of a cubic graph is a partition into trails
(no repeated edge) such that each vertex is the end vertex of exactly one trail
of the partition. We investigate this notion and give some results and
problems.
|
[
{
"version": "v1",
"created": "Sun, 28 Sep 2008 05:57:36 GMT"
}
] | 2009-11-06T00:00:00 |
[
[
"Fouquet",
"Jean-Luc",
"",
"LIFO"
],
[
"Vanherpe",
"Jean-Marie",
"",
"LIFO"
]
] |
new_dataset
| 0.976959 |
0911.1036
|
Lahatra Rakotondrainibe
|
Lahatra Rakotondrainibe (IETR), Yvan Kokar (IETR), Gheorghe Zaharia
(IETR), Gha\"is El Zein (IETR)
|
Syst\`eme de Communications Sans Fil Tr\`es Haut D\'ebit \`a 60 GHz
| null |
XXIIe Colloque Traitement du Signal et des Images (GRETSI '09),
Dijon : France (2009)
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the study and the realization at IETR of a high data rate
60 GHz wireless communications system. The system uses a simple single carrier
architecture. The receiver architecture is based on a differential demodulation
which minimizes the intersymbol interference (ISI) effect and a signal
processing unit composed of a joint frame and byte synchronization block and a
conventional RS (255, 239) decoder. The byte synchronization technique provides
a high preamble detection probability and a very small value of the false
detection probability. First measurement results show a good communication link
quality in line of sight environments with directional antennas.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 14:11:57 GMT"
}
] | 2009-11-06T00:00:00 |
[
[
"Rakotondrainibe",
"Lahatra",
"",
"IETR"
],
[
"Kokar",
"Yvan",
"",
"IETR"
],
[
"Zaharia",
"Gheorghe",
"",
"IETR"
],
[
"Zein",
"Ghaïs El",
"",
"IETR"
]
] |
new_dataset
| 0.999467 |
0911.1082
|
Yan Zhu
|
Yan Zhu and Dongning Guo
|
Ergodic Fading One-sided Interference Channels without State Information
at Transmitters
|
Submitted to IEEE Transaction on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work studies the capacity region of a two-user ergodic interference
channel with fading, where only one of the users is subject to interference
from the other user, and the channel state information (CSI) is only available
at the receivers. A layered erasure model with one-sided interference and with
arbitrary fading statistics is studied first, whose capacity region is
completely determined as a polygon. Each dominant rate pair can be regarded as
the outcome of a trade-off between the rate gain of the interference-free user
and the rate loss of the other user due to interference. Using insights from
the layered erasure model, inner and outer bounds of the capacity region are
provided for the one-sided fading Gaussian interference channels. In
particular, the inner bound is achieved by artificially creating layers in the
signaling of the interference-free user. The outer bound is developed by
characterizing a similar trade-off as in the erasure model by taking a
"layered" view using the incremental channel approach. Furthermore, the gap
between the inner and outer bounds is no more than 12.772 bits per channel use
per user, regardless of the signal-to-noise ratios and fading statistics.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 17:26:32 GMT"
}
] | 2009-11-06T00:00:00 |
[
[
"Zhu",
"Yan",
""
],
[
"Guo",
"Dongning",
""
]
] |
new_dataset
| 0.991357 |
0911.1112
|
Michael Nelson
|
Herbert Van de Sompel, Michael L. Nelson, Robert Sanderson, Lyudmila
L. Balakireva, Scott Ainsworth, Harihar Shankar
|
Memento: Time Travel for the Web
|
14 pages, 5 figures
| null | null | null |
cs.IR cs.DL
|
http://creativecommons.org/licenses/by/3.0/
|
The Web is ephemeral. Many resources have representations that change over
time, and many of those representations are lost forever. A lucky few manage to
reappear as archived resources that carry their own URIs. For example, some
content management systems maintain version pages that reflect a frozen prior
state of their changing resources. Archives recurrently crawl the web to obtain
the actual representation of resources, and subsequently make those available
via special-purpose archived resources. In both cases, the archival copies have
URIs that are protocol-wise disconnected from the URI of the resource of which
they represent a prior state. Indeed, the lack of temporal capabilities in the
most common Web protocol, HTTP, prevents getting to an archived resource on the
basis of the URI of its original. This turns accessing archived resources into
a significant discovery challenge for both human and software agents, which
typically involves following a multitude of links from the original to the
archival resource, or of searching archives for the original URI. This paper
proposes the protocol-based Memento solution to address this problem, and
describes a proof-of-concept experiment that includes major servers of archival
content, including Wikipedia and the Internet Archive. The Memento solution is
based on existing HTTP capabilities applied in a novel way to add the temporal
dimension. The result is a framework in which archived resources can seamlessly
be reached via the URI of their original: protocol-based time travel for the
Web.
|
[
{
"version": "v1",
"created": "Thu, 5 Nov 2009 20:52:22 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Nov 2009 21:35:50 GMT"
}
] | 2009-11-06T00:00:00 |
[
[
"Van de Sompel",
"Herbert",
""
],
[
"Nelson",
"Michael L.",
""
],
[
"Sanderson",
"Robert",
""
],
[
"Balakireva",
"Lyudmila L.",
""
],
[
"Ainsworth",
"Scott",
""
],
[
"Shankar",
"Harihar",
""
]
] |
new_dataset
| 0.999442 |
0911.0727
|
Manik Lal Das
|
Animesh Agarwal, Vaibhav Shrimali, Manik Lal Das
|
GSM Security Using Identity-based Cryptography
|
10 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Current security model in Global System for Mobile Communications (GSM)
predominantly use symmetric key cryptography. The rapid advancement of Internet
technology facilitates online trading, banking, downloading, emailing using
resource-constrained handheld devices such as personal digital assistants and
cell phones. However, these applications require more security than the present
GSM supports. Consequently, a careful design of GSM security using both
symmetric and asymmetric key cryptography would make GSM security more
adaptable in security intensive applications. This paper presents a secure and
efficient protocol for GSM security using identity based cryptography. The
salient features of the proposed protocol are (i) authenticated key exchange;
(ii) mutual authentication amongst communicating entities; and (iii) user
anonymity. The security analysis of the protocol shows its strength against
some known threats observed in conventional GSM security.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2009 04:18:44 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Agarwal",
"Animesh",
""
],
[
"Shrimali",
"Vaibhav",
""
],
[
"Das",
"Manik Lal",
""
]
] |
new_dataset
| 0.996334 |
0911.0660
|
Ramy Gohary
|
Ramy H. Gohary and Timothy N. Davidson
|
The capacity region of a product of two unmatched Gaussian broadcast
channels with three particular messages and a common message
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers a Gaussian broadcast channel with two unmatched degraded
components, three particular messages, and a common message that is intended
for all three receivers. It is shown that for this channel superposition coding
and Gaussian signalling is sufficient to achieve every point in the capacity
region.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2009 19:39:07 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Gohary",
"Ramy H.",
""
],
[
"Davidson",
"Timothy N.",
""
]
] |
new_dataset
| 0.968938 |
0809.5204
|
Georg B\"ocherer
|
Georg B\"ocherer and Alexandre de Baynast
|
A Distributed MAC Protocol for Cooperation in Random Access Networks
|
5 pages, improved presentation compared to previous version v1
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
WLAN is one of the most successful applications of wireless communications in
daily life because of low cost and ease of deployment. The enabling technique
for this success is the use of random access schemes for the wireless channel.
Random access requires minimal coordination between the nodes, which
considerably reduces the cost of the infrastructure. Recently, cooperative
communication in wireless networks has been of increasing interest because it
promises higher rates and reliability. An additional MAC overhead is necessary
to coordinate the nodes to allow cooperation and this overhead can possibly
cancel out the cooperative benefits. In this work, a completely distributed
protocol is proposed that allows nodes in the network to cooperate via Two-Hop
and Decode-and-Forward for transmitting their data to a common gateway node. It
is shown that high throughput gains are obtained in terms of the individual
throughput that can be guaranteed to any node in the network. These results are
validated by Monte Carlo simulations.
|
[
{
"version": "v1",
"created": "Tue, 30 Sep 2008 14:17:05 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Nov 2009 15:57:30 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Böcherer",
"Georg",
""
],
[
"de Baynast",
"Alexandre",
""
]
] |
new_dataset
| 0.999146 |
0911.0399
|
Rdv Ijcsis
|
A.Essaouabi and F. Regragui, E.Ibnelhaj
|
A Wavelet-Based Digital Watermarking for Video
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 6, No. 1, pp. 029-033, October 2009, USA
| null |
ISSN 1947 5500
|
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel video watermarking system operating in the three dimensional wavelet
transform is here presented. Specifically the video sequence is partitioned
into spatio temporal units and the single shots are projected onto the 3D
wavelet domain. First a grayscale watermark image is decomposed into a series
of bitplanes that are preprocessed with a random location matrix. After that
the preprocessed bitplanes are adaptively spread spectrum and added in 3D
wavelet coefficients of the video shot. Our video watermarking algorithm is
robust against the attacks of frame dropping, averaging and swapping.
Furthermore, it allows blind retrieval of embedded watermark which does not
need the original video and the watermark is perceptually invisible. The
algorithm design, evaluation, and experimentation of the proposed scheme are
described in this paper.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2009 20:07:52 GMT"
}
] | 2009-11-03T00:00:00 |
[
[
"Essaouabi",
"A.",
""
],
[
"Regragui",
"F.",
""
],
[
"Ibnelhaj",
"E.",
""
]
] |
new_dataset
| 0.998777 |
0903.0548
|
Li Chia Choo
|
Li-Chia Choo and Kai-Kit Wong
|
On the 3-Receiver Broadcast Channel with Degraded Message Sets and
Confidential Messages
|
Revised version submiitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, bounds to the rate-equivocation region for the general
3-receiver broadcast channel (BC) with degraded message sets, are presented for
confidential messages to be kept secret from one of the receivers. This model
is more general than the 2-receiver BCs with confidential messages with an
external wiretapper, and the recently studied 3-receiver degraded BCs with
confidential messages, since in the model studied in this paper, the conditions
on the receivers are general and the wiretapper receives the common message.
Wyner's code partitioning combined with double-binning is used to show the
achievable rate tuples. Error probability analysis and equivocation calculation
are also provided. The secure coding scheme is sufficient to provide security
for the 3-receiver BC with 2 or 3 degraded message sets, for the scenarios: (i)
3 degraded message sets, where the first confidential message is sent to
receivers 1 and 2 and the second confidential message is sent to receiver 1,
(ii) 2 degraded message sets, where one confidential message is sent to
receiver 1, and (iii) 2 degraded message sets, where one confidential message
is sent to receivers 1 and 2. The proof for the outer bound is shown for the
cases where receiver 1 is more capable than the wiretap receiver 3, for the
first two scenarios. Under the condition that both receivers 1 and 2 are less
noisy than the wiretap receiver 3, the inner and outer bounds coincide, giving
the rate-equivocation region for (iii). In addition, a new outer bound for the
general 3-receiver BC with 3 degraded messages is obtained.
|
[
{
"version": "v1",
"created": "Tue, 3 Mar 2009 14:53:11 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Oct 2009 16:10:28 GMT"
}
] | 2009-10-27T00:00:00 |
[
[
"Choo",
"Li-Chia",
""
],
[
"Wong",
"Kai-Kit",
""
]
] |
new_dataset
| 0.994159 |
0910.4854
|
Serguei Mokhov
|
Serguei A. Mokhov and Yingying She
|
Yet Another Pacman 3D Adventures
|
31 pages, 8 figures. A 2006 report, corresponding to the open source
project here: http://sourceforge.net/projects/yap3dad/
| null | null | null |
cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This game is meant to be extension of the overly-beaten pacman-style game
(code-named "Yet Another Pacman 3D Adventures", or YAP3DAD) from the proposed
ideas and other projects with advance visual and computer graphics features,
including a-game-in-a-game approach. The project is an open-source project
published on SourceForge.net for possible future development and extension.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 10:55:16 GMT"
}
] | 2009-10-27T00:00:00 |
[
[
"Mokhov",
"Serguei A.",
""
],
[
"She",
"Yingying",
""
]
] |
new_dataset
| 0.997638 |
0910.4500
|
Marco Volpe
|
Andrea Masini, Luca Vigan\`o, Marco Volpe
|
A History of Until
|
24 pages, full version of paper at Methods for Modalities 2009
(M4M-6)
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Until is a notoriously difficult temporal operator as it is both existential
and universal at the same time: A until B holds at the current time instant w
iff either B holds at w or there exists a time instant w' in the future at
which B holds and such that A holds in all the time instants between the
current one and w'. This "ambivalent" nature poses a significant challenge when
attempting to give deduction rules for until. In this paper, in contrast, we
make explicit this duality of until to provide well-behaved natural deduction
rules for linear-time logics by introducing a new temporal operator that allows
us to formalize the "history" of until, i.e., the "internal" universal
quantification over the time instants between the current one and w'. This
approach provides the basis for formalizing deduction systems for temporal
logics endowed with the until operator. For concreteness, we give here a
labeled natural deduction system for a linear-time logic endowed with the new
operator and show that, via a proper translation, such a system is also sound
and complete with respect to the linear temporal logic LTL with until.
|
[
{
"version": "v1",
"created": "Fri, 23 Oct 2009 15:31:57 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Oct 2009 17:10:16 GMT"
}
] | 2009-10-26T00:00:00 |
[
[
"Masini",
"Andrea",
""
],
[
"Viganò",
"Luca",
""
],
[
"Volpe",
"Marco",
""
]
] |
new_dataset
| 0.974823 |
0910.4186
|
Hsien-Po Shiang
|
Hsien-Po Shiang, Mihaela van der Schaar
|
Media-TCP: A Quality-Centric TCP-Friendly Congestion Control for
Multimedia Transmission
|
15 pages, 8 figures, 4 tables, and 2 algorithms
| null | null | null |
cs.NI cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a quality-centric congestion control for multimedia
streaming over IP networks, which we refer to as media-TCP. Unlike existing
congestion control schemes that adapt a user's sending rate merely to the
network condition, our solution adapts the sending rate to both the network
condition and the application characteristics by explicitly considering the
distortion impacts, delay deadlines, and interdependencies of different video
packet classes. Hence, our media-aware solution is able to provide differential
services for transmitting various packet classes and thereby, further improves
the multimedia streaming quality. We model this problem using a Finite-Horizon
Markov Decision Process (FHMDP) and determine the optimal congestion control
policy that maximizes the long-term multimedia quality, while adhering to the
horizon- TCP-friendliness constraint, which ensures long-term fairness with
existing TCP applications. We show that the FHMDP problem can be decomposed
into multiple optimal stopping problems, which admit a low-complexity
threshold-based solution. Moreover, unlike existing congestion control
approaches, which focus on maintaining throughput-based fairness among users,
the proposed media-TCP aims to achieve quality-based fairness among multimedia
users. We also derive sufficient conditions for multiple multimedia users to
achieve quality-based fairness using media-TCP congestion control. Our
simulation results show that the proposed media-TCP achieves more than 3dB
improvement in terms of PSNR over the conventional TCP congestion control
approaches, with the largest improvements observed for real-time streaming
applications requiring stringent playback delays.
|
[
{
"version": "v1",
"created": "Wed, 21 Oct 2009 21:53:25 GMT"
}
] | 2009-10-23T00:00:00 |
[
[
"Shiang",
"Hsien-Po",
""
],
[
"van der Schaar",
"Mihaela",
""
]
] |
new_dataset
| 0.999494 |
0910.4342
|
Steve Kremer
|
Joshua D. Guttman (The MITRE Corporation and Worcester Polytechnic
Institute)
|
Fair Exchange in Strand Spaces
| null |
EPTCS 7, 2009, pp. 46-60
|
10.4204/EPTCS.7.4
| null |
cs.CR cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many cryptographic protocols are intended to coordinate state changes among
principals. Exchange protocols coordinate delivery of new values to the
participants, e.g. additions to the set of values they possess. An exchange
protocol is fair if it ensures that delivery of new values is balanced: If one
participant obtains a new possession via the protocol, then all other
participants will, too. Fair exchange requires progress assumptions, unlike
some other protocol properties. The strand space model is a framework for
design and verification of cryptographic protocols. A strand is a local
behavior of a single principal in a single session of a protocol. A bundle is a
partially ordered global execution built from protocol strands and adversary
activities. The strand space model needs two additions for fair exchange
protocols. First, we regard the state as a multiset of facts, and we allow
strands to cause changes in this state via multiset rewriting. Second, progress
assumptions stipulate that some channels are resilient-and guaranteed to
deliver messages-and some principals are assumed not to stop at certain
critical steps. This method leads to proofs of correctness that cleanly
separate protocol properties, such as authentication and confidentiality, from
invariants governing state evolution. G. Wang's recent fair exchange protocol
illustrates the approach.
|
[
{
"version": "v1",
"created": "Thu, 22 Oct 2009 17:13:44 GMT"
}
] | 2009-10-23T00:00:00 |
[
[
"Guttman",
"Joshua D.",
"",
"The MITRE Corporation and Worcester Polytechnic\n Institute"
]
] |
new_dataset
| 0.971935 |
0910.3811
|
Damien Chablat
|
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Stefan Staicu
|
Dynamics of the Orthoglide parallel robot
| null |
UPB Scientific Bulletin, Series D: Mechanical Engineering 71, 3
(2009) 3-16
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recursive matrix relations for kinematics and dynamics of the Orthoglide
parallel robot having three concurrent prismatic actuators are established in
this paper. These are arranged according to the Cartesian coordinate system
with fixed orientation, which means that the actuating directions are normal to
each other. Three identical legs connecting to the moving platform are located
on three planes being perpendicular to each other too. Knowing the position and
the translation motion of the platform, we develop the inverse kinematics
problem and determine the position, velocity and acceleration of each element
of the robot. Further, the principle of virtual work is used in the inverse
dynamic problem. Some matrix equations offer iterative expressions and graphs
for the input forces and the powers of the three actuators.
|
[
{
"version": "v1",
"created": "Tue, 20 Oct 2009 11:18:55 GMT"
}
] | 2009-10-21T00:00:00 |
[
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Staicu",
"Stefan",
""
]
] |
new_dataset
| 0.964297 |
0710.0142
|
Marco Baldi
|
Marco Baldi
|
LDPC codes in the McEliece cryptosystem: attacks and countermeasures
|
NATO Advanced Research Workshop 2008: Enhancing Crypto-Primitives
with Techniques from Coding Theory
|
NATO Science for Peace and Security Series - D: Information and
Communication Security, vol. 23, pp. 160-174, IOS Press, 2009. Edited by Bart
Preneel, Stefan Dodunekov, Vincent Rijmen, Svetla Nikova. ISBN
978-1-60750-002-5
|
10.3233/978-1-60750-002-5-160
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The McEliece cryptosystem is a public-key cryptosystem based on coding theory
that has successfully resisted cryptanalysis for thirty years. The original
version, based on Goppa codes, is able to guarantee a high level of security,
and is faster than competing solutions, like RSA. Despite this, it has been
rarely considered in practical applications, due to two major drawbacks: i)
large size of the public key and ii) low transmission rate. Low-Density
Parity-Check (LDPC) codes are state-of-art forward error correcting codes that
permit to approach the Shannon limit while ensuring limited complexity.
Quasi-Cyclic (QC) LDPC codes are a particular class of LDPC codes, able to join
low complexity encoding of QC codes with high-performing and low-complexity
decoding of LDPC codes. In a previous work it has been proposed to adopt a
particular family of QC-LDPC codes in the McEliece cryptosystem to reduce the
key size and increase the transmission rate. Recently, however, new attacks
have been found that are able to exploit a flaw in the transformation from the
private key to the public one. Such attacks can be effectively countered by
changing the form of some constituent matrices, without altering the system
parameters. This work gives an overview of the QC-LDPC codes-based McEliece
cryptosystem and its cryptanalysis. Two recent versions are considered, and
their ability to counter all the currently known attacks is discussed. A third
version able to reach a higher security level is also proposed. Finally, it is
shown that the new QC-LDPC codes-based cryptosystem scales favorably with the
key length.
|
[
{
"version": "v1",
"created": "Sun, 30 Sep 2007 14:33:00 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Jan 2009 11:53:29 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Baldi",
"Marco",
""
]
] |
new_dataset
| 0.999036 |
0910.2961
|
Yan Zhu
|
Yan Zhu and Dongning Guo
|
Isotropic MIMO Interference Channels without CSIT: The Loss of Degrees
of Freedom
|
appears in Allerton 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies two-user MIMO interference channel with isotropic fading.
We assume that users are equipped with arbitrary number of antennas and the
channel state information (CSI) is available at receivers only. An outer bound
is obtained for the degree of freedom region, which suggests the loss of
degrees of freedom due to the lack of CSI at transmitters under many
circumstances.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2009 18:39:27 GMT"
}
] | 2009-10-16T00:00:00 |
[
[
"Zhu",
"Yan",
""
],
[
"Guo",
"Dongning",
""
]
] |
new_dataset
| 0.996881 |
0806.3284
|
Daniel M. Gordon
|
Daniel M. Gordon, Victor Miller and Peter Ostapenko
|
Optimal hash functions for approximate closest pairs on the n-cube
|
IEEE Transactions on Information Theory, to appear
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One way to find closest pairs in large datasets is to use hash functions. In
recent years locality-sensitive hash functions for various metrics have been
given: projecting an n-cube onto k bits is simple hash function that performs
well. In this paper we investigate alternatives to projection. For various
parameters hash functions given by complete decoding algorithms for codes work
better, and asymptotically random codes perform better than projection.
|
[
{
"version": "v1",
"created": "Fri, 20 Jun 2008 17:19:44 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Oct 2009 15:40:02 GMT"
}
] | 2009-10-15T00:00:00 |
[
[
"Gordon",
"Daniel M.",
""
],
[
"Miller",
"Victor",
""
],
[
"Ostapenko",
"Peter",
""
]
] |
new_dataset
| 0.997771 |
0910.2649
|
Chinmay Karande
|
Chinmay Karande
|
Polynomially Correlated Knapsack is NP-complete
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
0-1 Knapsack is a fundamental NP-complete problem. In this article we prove
that it remains NP-complete even when the weights of the objects in the packing
constraints and their values in the objective function satisfy specific
stringent conditions: the values are integral powers of the weights of the
objects.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2009 15:43:40 GMT"
}
] | 2009-10-15T00:00:00 |
[
[
"Karande",
"Chinmay",
""
]
] |
new_dataset
| 0.993605 |
0910.1844
|
N Vunka Jungum
|
Pascal Fallavollita
|
3D/2D Registration of Mapping Catheter Images for Arrhythmia
Interventional Assistance
|
International Journal of Computer Science Issues, IJCSI, Volume 4,
Issue 2, pp10-19, September 2009
|
P. Fallavollita, " 3D/2D Registration of Mapping Catheter Images
for Arrhythmia Interventional Assistance", International Journal of Computer
Science Issues, IJCSI, Volume 4, Issue 2, pp10-19, September 2009"
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Radiofrequency (RF) catheter ablation has transformed treatment for
tachyarrhythmias and has become first-line therapy for some tachycardias. The
precise localization of the arrhythmogenic site and the positioning of the RF
catheter over that site are problematic: they can impair the efficiency of the
procedure and are time consuming (several hours). Electroanatomic mapping
technologies are available that enable the display of the cardiac chambers and
the relative position of ablation lesions. However, these are expensive and use
custom-made catheters. The proposed methodology makes use of standard catheters
and inexpensive technology in order to create a 3D volume of the heart chamber
affected by the arrhythmia. Further, we propose a novel method that uses a
priori 3D information of the mapping catheter in order to estimate the 3D
locations of multiple electrodes across single view C-arm images. The monoplane
algorithm is tested for feasibility on computer simulations and initial canine
data.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 20:07:11 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Fallavollita",
"Pascal",
""
]
] |
new_dataset
| 0.996323 |
0910.1857
|
N Vunka Jungum
|
Ahmad Shukri Mohd Noor and Md Yazid Md Saman
|
Distributed Object Medical Imaging Model
|
" International Journal of Computer Science Issues, IJCSI, Volume 4,
Issue 2, pp42-48, September 2009"
|
A.S.M. Noor and Y.Saman, "Distributed Object Medical Imaging
Model", International Journal of Computer Science Issues, IJCSI, Volume 4,
Issue 2, pp42-48, September 2009
| null | null |
cs.SE cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Digital medical informatics and images are commonly used in hospitals today,.
Because of the interrelatedness of the radiology department and other
departments, especially the intensive care unit and emergency department, the
transmission and sharing of medical images has become a critical issue. Our
research group has developed a Java-based Distributed Object Medical Imaging
Model(DOMIM) to facilitate the rapid development and deployment of medical
imaging applications in a distributed environment that can be shared and used
by related departments and mobile physiciansDOMIM is a unique suite of
multimedia telemedicine applications developed for the use by medical related
organizations. The applications support realtime patients' data, image files,
audio and video diagnosis annotation exchanges. The DOMIM enables joint
collaboration between radiologists and physicians while they are at distant
geographical locations. The DOMIM environment consists of heterogeneous,
autonomous, and legacy resources. The Common Object Request Broker Architecture
(CORBA), Java Database Connectivity (JDBC), and Java language provide the
capability to combine the DOMIM resources into an integrated, interoperable,
and scalable system. The underneath technology, including IDL ORB, Event
Service, IIOP JDBC/ODBC, legacy system wrapping and Java implementation are
explored. This paper explores a distributed collaborative CORBA/JDBC based
framework that will enhance medical information management requirements and
development. It encompasses a new paradigm for the delivery of health services
that requires process reengineering, cultural changes, as well as
organizational changes
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2009 20:42:48 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Noor",
"Ahmad Shukri Mohd",
""
],
[
"Saman",
"Md Yazid Md",
""
]
] |
new_dataset
| 0.961296 |
0910.1922
|
Valentin Savin
|
Valentin Savin
|
Binary Linear-Time Erasure Decoding for Non-Binary LDPC codes
|
5 pages, ITW
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we first introduce the extended binary representation of
non-binary codes, which corresponds to a covering graph of the bipartite graph
associated with the non-binary code. Then we show that non-binary codewords
correspond to binary codewords of the extended representation that further
satisfy some simplex-constraint: that is, bits lying over the same symbol-node
of the non-binary graph must form a codeword of a simplex code. Applied to the
binary erasure channel, this description leads to a binary erasure decoding
algorithm of non-binary LDPC codes, whose complexity depends linearly on the
cardinality of the alphabet. We also give insights into the structure of
stopping sets for non-binary LDPC codes, and discuss several aspects related to
upper-layer FEC applications.
|
[
{
"version": "v1",
"created": "Sat, 10 Oct 2009 14:41:46 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Savin",
"Valentin",
""
]
] |
new_dataset
| 0.999421 |
0910.1954
|
Sahand Haji Ali Ahmad
|
Sahand Haji Ali Ahmad, Mingyan Liu
|
Multi-channel Opportunistic Access: A Case of Restless Bandits with
Multiple Plays
|
8 pages, 0 figures, Forty-Seventh Annual Allerton Conference on
Communication, Control, and Computing, 2009
|
Proceedings of Forty-Seventh Annual Allerton Conference on
Communication, Control, and Computing, 2009
| null | null |
cs.IT cs.DM math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers the following stochastic control problem that arises in
opportunistic spectrum access: a system consists of n channels (Gilbert-Elliot
channels)where the state (good or bad) of each channel evolves as independent
and identically distributed Markov processes. A user can select exactly k
channels to sense and access (based on the sensing result) in each time slot. A
reward is obtained whenever the user senses and accesses a good channel. The
objective is to design a channel selection policy that maximizes the expected
discounted total reward accrued over a finite or infinite horizon. In our
previous work we established the optimality of a greedy policy for the special
case of k = 1 (i.e., single channel access) under the condition that the
channel state transitions are positively correlated over time. In this paper we
show under the same condition the greedy policy is optimal for the general case
of k >= 1; the methodology introduced here is thus more general. This problem
may be viewed as a special case of the restless bandit problem, with multiple
plays. We discuss connections between the current problem and existing
literature on this class of problems.
|
[
{
"version": "v1",
"created": "Sat, 10 Oct 2009 22:36:48 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Ahmad",
"Sahand Haji Ali",
""
],
[
"Liu",
"Mingyan",
""
]
] |
new_dataset
| 0.998575 |
0910.2154
|
Jocelyne Troccaz
|
J. Tonetti (CHU-Grenoble ortho-traumato), L. Vadcard (LSE), P. Girard
(IHPC), M. Dubois (LPS), P. Merloz (CHU-Grenoble ortho-traumato), Jocelyne
Troccaz (TIMC)
|
Assessment of a percutaneous iliosacral screw insertion simulator
| null |
Orthop Traumatol Surg Res (2009) epub ahead of print
|
10.1016/j.otsr.2009.07.005
| null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
BACKGROUND: Navigational simulator use for specialized training purposes is
rather uncommon in orthopaedic and trauma surgery. However, it reveals
providing a valuable tool to train orthopaedic surgeons and help them to plan
complex surgical procedures. PURPOSE: This work's objective was to assess
educational efficiency of a path simulator under fluoroscopic guidance applied
to sacroiliac joint percutaneous screw fixation. MATERIALS AND METHODS: We
evaluated 23 surgeons' accuracy inserting a guide-wire in a human cadaver
experiment, following a pre-established procedure. These medical trainees were
defined in three prospective respects: novice or skilled; with or without
theoretical knowledge; with or without surgical procedure familiarity. Analysed
criteria for each tested surgeon included the number of intraoperative X-rays
taken in order to achieve the surgical procedure as well as an iatrogenic index
reflecting the surgeon's ability to detect any hazardous trajectory at the time
of performing said procedure. RESULTS: An average number of 13 X-rays was
required for wire implantation by the G1 group. G2 group, assisted by the
simulator use, required an average of 10 X-rays. A substantial difference was
especially observed within the novice sub-group (N), with an average of 12.75
X-rays for the G1 category and an average of 8.5 X-rays for the G2 category. As
far as the iatrogenic index is concerned, we were unable to observe any
significant difference between the groups.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 12:49:03 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Tonetti",
"J.",
"",
"CHU-Grenoble ortho-traumato"
],
[
"Vadcard",
"L.",
"",
"LSE"
],
[
"Girard",
"P.",
"",
"IHPC"
],
[
"Dubois",
"M.",
"",
"LPS"
],
[
"Merloz",
"P.",
"",
"CHU-Grenoble ortho-traumato"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
]
] |
new_dataset
| 0.984796 |
0910.2173
|
Roua Youssef
|
Roua Youssef and Alexandre Graell i Amat
|
Distributed Turbo-Like Codes for Multi-User Cooperative Relay Networks
|
Submitted to ICC 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a distributed turbo-like coding scheme for wireless networks
with relays is proposed. We consider a scenario where multiple sources
communicate with a single destination with the help of a relay. The proposed
scheme can be regarded as of the decode-and-forward type. The relay decodes the
information from the sources and it properly combines and re-encodes them to
generate some extra redundancy, which is transmitted to the destination. The
amount of redundancy generated by the relay can simply be adjusted according to
requirements in terms of performance, throughput and/or power. At the
destination, decoding of the information of all sources is performed jointly
exploiting the redundancy provided by the relay in an iterative fashion. The
overall communication network can be viewed as a serially concatenated code.
The proposed distributed scheme achieves significant performance gains with
respect to the non-cooperation system, even for a very large number of users.
Furthermore, it presents a high flexibility in terms of code rate, block length
and number of users.
|
[
{
"version": "v1",
"created": "Mon, 12 Oct 2009 14:50:50 GMT"
}
] | 2009-10-13T00:00:00 |
[
[
"Youssef",
"Roua",
""
],
[
"Amat",
"Alexandre Graell i",
""
]
] |
new_dataset
| 0.995923 |
0906.3036
|
Gilles Champenois
|
Gilles Champenois
|
Mnesors for automatic control
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mnesors are defined as elements of a semimodule over the min-plus integers.
This two-sorted structure is able to merge graduation properties of vectors and
idempotent properties of boolean numbers, which makes it appropriate for hybrid
systems. We apply it to the control of an inverted pendulum and design a full
logical controller, that is, without the usual algebra of real numbers.
|
[
{
"version": "v1",
"created": "Tue, 16 Jun 2009 22:05:57 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Oct 2009 21:19:23 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Champenois",
"Gilles",
""
]
] |
new_dataset
| 0.999434 |
0910.1484
|
Alain Lecomte
|
Alain Lecomte (INRIA Futurs, SFLTAMP), Myriam Quatrini (IML)
|
Ludics and its Applications to natural Language Semantics
| null |
Lecture Notes in Artificial Intelligence LNAI, 5514 (2009) pp
242--255
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Proofs, in Ludics, have an interpretation provided by their counter-proofs,
that is the objects they interact with. We follow the same idea by proposing
that sentence meanings are given by the counter-meanings they are opposed to in
a dialectical interaction. The conception is at the intersection of a
proof-theoretic and a game-theoretic accounts of semantics, but it enlarges
them by allowing to deal with possibly infinite processes.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 12:21:22 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Lecomte",
"Alain",
"",
"INRIA Futurs, SFLTAMP"
],
[
"Quatrini",
"Myriam",
"",
"IML"
]
] |
new_dataset
| 0.952265 |
0910.1528
|
Jeffrey Shallit
|
Thomas Ang, Jeffrey Shallit
|
Length of the Shortest Word in the Intersection of Regular Languages
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this note, we give a construction that provides a tight lower bound of
mn-1 for the length of the shortest word in the intersection of two regular
languages with state complexities m and n.
|
[
{
"version": "v1",
"created": "Thu, 8 Oct 2009 15:16:48 GMT"
}
] | 2009-10-09T00:00:00 |
[
[
"Ang",
"Thomas",
""
],
[
"Shallit",
"Jeffrey",
""
]
] |
new_dataset
| 0.999312 |
0910.1217
|
EPTCS
|
Bogdan Aman, Gabriel Ciobanu
|
Mutual Mobile Membranes with Timers
| null |
EPTCS 6, 2009, pp. 1-15
|
10.4204/EPTCS.6.1
| null |
cs.FL q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A feature of current membrane systems is the fact that objects and membranes
are persistent. However, this is not true in the real world. In fact, cells and
intracellular proteins have a well-defined lifetime. Inspired from these
biological facts, we define a model of systems of mobile membranes in which
each membrane and each object has a timer representing their lifetime. We show
that systems of mutual mobile membranes with and without timers have the same
computational power. An encoding of timed safe mobile ambients into systems of
mutual mobile membranes with timers offers a relationship between two
formalisms used in describing biological systems.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 11:15:13 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Aman",
"Bogdan",
""
],
[
"Ciobanu",
"Gabriel",
""
]
] |
new_dataset
| 0.999492 |
0910.1255
|
Yves Deville
|
Marie Pelleau, Pascal Van Hentenryck, Charlotte Truchet
|
Sonet Network Design Problems
| null |
EPTCS 5, 2009, pp. 81-95
|
10.4204/EPTCS.5.7
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a new method and a constraint-based objective function to
solve two problems related to the design of optical telecommunication networks,
namely the Synchronous Optical Network Ring Assignment Problem (SRAP) and the
Intra-ring Synchronous Optical Network Design Problem (IDP). These network
topology problems can be represented as a graph partitioning with capacity
constraints as shown in previous works. We present here a new objective
function and a new local search algorithm to solve these problems. Experiments
conducted in Comet allow us to compare our method to previous ones and show
that we obtain better results.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 13:22:22 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Pelleau",
"Marie",
""
],
[
"Van Hentenryck",
"Pascal",
""
],
[
"Truchet",
"Charlotte",
""
]
] |
new_dataset
| 0.981627 |
0910.1273
|
Fabien Moutarde
|
Taoufik Bdiri (CAOR), Fabien Moutarde (CAOR), Nicolas Bourdis (CAOR),
Bruno Steux (CAOR)
|
Adaboost with "Keypoint Presence Features" for Real-Time Vehicle Visual
Detection
| null |
16th World Congress on Intelligent Transport Systems (ITSwc'2009),
Su\`ede (2009)
| null | null |
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present promising results for real-time vehicle visual detection, obtained
with adaBoost using new original ?keypoints presence features?. These
weak-classifiers produce a boolean response based on presence or absence in the
tested image of a ?keypoint? (~ a SURF interest point) with a descriptor
sufficiently similar (i.e. within a given distance) to a reference descriptor
characterizing the feature. A first experiment was conducted on a public image
dataset containing lateral-viewed cars, yielding 95% recall with 95% precision
on test set. Moreover, analysis of the positions of adaBoost-selected keypoints
show that they correspond to a specific part of the object category (such as
?wheel? or ?side skirt?) and thus have a ?semantic? meaning.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 14:26:01 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Bdiri",
"Taoufik",
"",
"CAOR"
],
[
"Moutarde",
"Fabien",
"",
"CAOR"
],
[
"Bourdis",
"Nicolas",
"",
"CAOR"
],
[
"Steux",
"Bruno",
"",
"CAOR"
]
] |
new_dataset
| 0.995819 |
0910.1295
|
Fabien Moutarde
|
Fabien Moutarde (CAOR), Alexandre Bargeton (CAOR), Anne Herbin, Lowik
Chanussot
|
Modular Traffic Sign Recognition applied to on-vehicle real-time visual
detection of American and European speed limit signs
| null |
14th World congress on Intelligent Transportation Systems
(ITS'2007), Beijing : China (2007)
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new modular traffic signs recognition system, successfully
applied to both American and European speed limit signs. Our sign detection
step is based only on shape-detection (rectangles or circles). This enables it
to work on grayscale images, contrary to most European competitors, which eases
robustness to illumination conditions (notably night operation). Speed sign
candidates are classified (or rejected) by segmenting potential digits inside
them (which is rather original and has several advantages), and then applying a
neural digit recognition. The global detection rate is ~90% for both (standard)
U.S. and E.U. speed signs, with a misclassification rate <1%, and no validated
false alarm in >150 minutes of video. The system processes in real-time ~20
frames/s on a standard high-end laptop.
|
[
{
"version": "v1",
"created": "Wed, 7 Oct 2009 15:43:01 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Moutarde",
"Fabien",
"",
"CAOR"
],
[
"Bargeton",
"Alexandre",
"",
"CAOR"
],
[
"Herbin",
"Anne",
""
],
[
"Chanussot",
"Lowik",
""
]
] |
new_dataset
| 0.99595 |
0910.0887
|
Jamshid Abouei
|
Jamshid Abouei, Konstantinos N. Plataniotis, Subbarayan Pasupathy
|
Green Modulation in Proactive Wireless Sensor Networks
|
submitted to IEEE Transactions on Wireless Communications (25 pages)
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to unique characteristics of sensor nodes, choosing energy-efficient
modulation scheme with low-complexity implementation (refereed to as green
modulation) is a critical factor in the physical layer of Wireless Sensor
Networks (WSNs). This paper presents (to the best of our knowledge) the first
in-depth analysis of energy efficiency of various modulation schemes using
realistic models in IEEE 802.15.4 standard and present state-of-the art
technology, to find the best scheme in a proactive WSN over Rayleigh and Rician
flat-fading channel models with path-loss. For this purpose, we describe the
system model according to a pre-determined time-based process in practical
sensor nodes. The present analysis also includes the effect of bandwidth and
active mode duration on energy efficiency of popular modulation designs in the
pass-band and Ultra-WideBand (UWB) categories. Experimental results show that
among various pass-band and UWB modulation schemes, Non-Coherent M-ary
Frequency Shift Keying (NC-MFSK) with small order of $M$ and On-Off Keying
(OOK) have significant energy saving compared to other schemes for short range
scenarios, and could be considered as realistic candidates in WSNs. In
addition, NC-MFSK and OOK have the advantage of less complexity and cost in
implementation than the other schemes.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 23:35:39 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Abouei",
"Jamshid",
""
],
[
"Plataniotis",
"Konstantinos N.",
""
],
[
"Pasupathy",
"Subbarayan",
""
]
] |
new_dataset
| 0.980282 |
0910.1028
|
Ernie Cohen
|
Ernie Cohen
|
Weak Kleene Algebra is Sound and (Possibly) Complete for Simulation
|
12 pages, 9 references
| null | null | null |
cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that the axioms of Weak Kleene Algebra (WKA) are sound and complete
for the theory of regular expressions modulo simulation equivalence, assuming
their completeness for monodic trees (as conjectured by Takai and Furusawa).
|
[
{
"version": "v1",
"created": "Tue, 6 Oct 2009 14:45:15 GMT"
}
] | 2009-10-07T00:00:00 |
[
[
"Cohen",
"Ernie",
""
]
] |
new_dataset
| 0.950972 |
0711.3926
|
Anand Sarwate
|
Anand D. Sarwate and Michael Gastpar
|
Rateless codes for AVC models
|
14 pages, double column, extended version of paper to appear in the
IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The arbitrarily varying channel (AVC) is a channel model whose state is
selected maliciously by an adversary. Fixed-blocklength coding assumes a
worst-case bound on the adversary's capabilities, which leads to pessimistic
results. This paper defines a variable-length perspective on this problem, for
which achievable rates are shown that depend on the realized actions of the
adversary. Specifically, rateless codes are constructed which require a limited
amount of common randomness. These codes are constructed for two kinds of AVC
models. In the first the channel state cannot depend on the channel input, and
in the second it can. As a byproduct, the randomized coding capacity of the AVC
with state depending on the transmitted codeword is found and shown to be
achievable with a small amount of common randomness. The results for this model
are proved using a randomized strategy based on list decoding.
|
[
{
"version": "v1",
"created": "Sun, 25 Nov 2007 22:39:24 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Mar 2009 02:23:18 GMT"
},
{
"version": "v3",
"created": "Sun, 2 Aug 2009 23:17:22 GMT"
},
{
"version": "v4",
"created": "Mon, 5 Oct 2009 22:59:51 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Sarwate",
"Anand D.",
""
],
[
"Gastpar",
"Michael",
""
]
] |
new_dataset
| 0.992685 |
0909.2517
|
Sk Sarif Hassan s
|
Pabitra Pal Choudhury, Sk. Sarif Hassan, Sudhakar Sahoo, Soubhik
Chakraborty
|
On the Interesting World of Fractals and Their Applications to Music
|
This paper tell about music fractals. It is delivered at FRMS-2009
| null | null | null |
cs.OH
|
http://creativecommons.org/licenses/publicdomain/
|
In this paper we have defined one function that has been used to construct
different fractals having fractal dimensions between 1.58 and 2. Also, we tried
to calculate the amount of increment of fractal dimension in accordance with
the base of the number systems. Further, interestingly enough, these very
fractals could be a frame of lyrics for the musicians, as we know that the
fractal dimension of music is around 1.65 and varies between a high of 1.68 and
a low of 1.60. Further, at the end we conjecture that the switching from one
music fractal to another is nothing but enhancing a constant amount fractal
dimension which might be equivalent to a kind of different sets of musical
notes in various orientations.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 11:07:50 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Oct 2009 06:34:25 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Choudhury",
"Pabitra Pal",
""
],
[
"Hassan",
"Sk. Sarif",
""
],
[
"Sahoo",
"Sudhakar",
""
],
[
"Chakraborty",
"Soubhik",
""
]
] |
new_dataset
| 0.99796 |
0910.0750
|
Adrien Richard
|
Adrien Richard
|
Local negative circuits and fixed points in Boolean networks
|
19 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To each Boolean function F from {0,1}^n to itself and each point x in
{0,1}^n, we associate the signed directed graph G_F(x) of order n that contains
a positive (resp. negative) arc from j to i if the partial derivative of f_i
with respect of x_j is positive (resp. negative) at point x. We then focus on
the following open problem: Is the absence of a negative circuit in G_F(x) for
all x in {0,1}^n a sufficient condition for F to have at least one fixed point?
As main result, we settle this problem under the additional condition that, for
all x in {0,1}^n, the out-degree of each vertex of G_F(x) is at most one.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2009 12:38:34 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Richard",
"Adrien",
""
]
] |
new_dataset
| 0.982279 |
0812.3893
|
Darren Strash
|
Michael T. Goodrich and Darren Strash
|
Succinct Greedy Geometric Routing in the Euclidean Plane
|
19 pages, 5 figures. To appear at 20th International Symposium on
Algorithms and Computation (ISAAC 2009)
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In greedy geometric routing, messages are passed in a network embedded in a
metric space according to the greedy strategy of always forwarding messages to
nodes that are closer to the destination. We show that greedy geometric routing
schemes exist for the Euclidean metric in R^2, for 3-connected planar graphs,
with coordinates that can be represented succinctly, that is, with O(log n)
bits, where n is the number of vertices in the graph. Moreover, our embedding
strategy introduces a coordinate system for R^2 that supports distance
comparisons using our succinct coordinates. Thus, our scheme can be used to
significantly reduce bandwidth, space, and header size over other recently
discovered greedy geometric routing implementations for R^2.
|
[
{
"version": "v1",
"created": "Fri, 19 Dec 2008 20:42:33 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Apr 2009 21:57:33 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Oct 2009 19:05:10 GMT"
}
] | 2009-10-02T00:00:00 |
[
[
"Goodrich",
"Michael T.",
""
],
[
"Strash",
"Darren",
""
]
] |
new_dataset
| 0.983402 |
0906.2995
|
Manfred Kufleitner
|
Volker Diekert, Manfred Kufleitner
|
Fragments of first-order logic over infinite words
|
Conference version presented at 26th International Symposium on
Theoretical Aspects of Computer Science, STACS 2009
| null | null | null |
cs.FL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give topological and algebraic characterizations as well as language
theoretic descriptions of the following subclasses of first-order logic FO[<]
for omega-languages: Sigma_2, FO^2, the intersection of FO^2 and Sigma_2, and
Delta_2 (and by duality Pi_2 and the intersection of FO^2 and Pi_2). These
descriptions extend the respective results for finite words. In particular, we
relate the above fragments to language classes of certain (unambiguous)
polynomials. An immediate consequence is the decidability of the membership
problem of these classes, but this was shown before by Wilke and Bojanczyk and
is therefore not our main focus. The paper is about the interplay of algebraic,
topological, and language theoretic properties.
|
[
{
"version": "v1",
"created": "Tue, 16 Jun 2009 18:43:43 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Oct 2009 20:52:31 GMT"
}
] | 2009-10-02T00:00:00 |
[
[
"Diekert",
"Volker",
""
],
[
"Kufleitner",
"Manfred",
""
]
] |
new_dataset
| 0.989361 |
0909.5479
|
EPTCS
|
Evangelos Markakis (Athens University of Economics and Business),
Ioannis Milis (Athens University of Economics and Business)
|
Proceedings Fourth Athens Colloquium on Algorithms and Complexity
| null |
EPTCS 4, 2009
|
10.4204/EPTCS.4
| null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
ACAC 2009 is organized by the Athens University of Economics and Business
(AUEB) and it is the fourth in a series of meetings that aim to bring together
researchers working on all areas of the theory of algorithms and computational
complexity. These meetings are expected to serve as a lively forum for
presenting results that are in a preliminary stage or have been recently
presented in some major conference. For the first time this year all submitted
papers were reviewed and ACAC also offered to the authors the choice of
publishing their contribution (provided it has not been published anywhere else
before) with the post-proceedings of EPTCS (Electronic Proceedings in
Theoretical Computer Science).
|
[
{
"version": "v1",
"created": "Wed, 30 Sep 2009 02:05:28 GMT"
}
] | 2009-10-01T00:00:00 |
[
[
"Markakis",
"Evangelos",
"",
"Athens University of Economics and Business"
],
[
"Milis",
"Ioannis",
"",
"Athens University of Economics and Business"
]
] |
new_dataset
| 0.973612 |
0902.0926
|
Yassine Ariba
|
Yassine Ariba (LAAS), Fr\'ed\'eric Gouaisbaut (LAAS), Sandy Rahme
(LAAS), Yann Labit (LAAS)
|
Robust control tools for traffic monitoring in TCP/AQM networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Several studies have considered control theory tools for traffic control in
communication networks, as for example the congestion control issue in IP
(Internet Protocol) routers. In this paper, we propose to design a linear
observer for time-delay systems to address the traffic monitoring issue in
TCP/AQM (Transmission Control Protocol/Active Queue Management) networks. Due
to several propagation delays and the queueing delay, the set TCP/AQM is
modeled as a multiple delayed system of a particular form. Hence, appropriate
robust control tools as quadratic separation are adopted to construct a delay
dependent observer for TCP flows estimation. Note that, the developed mechanism
enables also the anomaly detection issue for a class of DoS (Denial of Service)
attacks. At last, simulations via the network simulator NS-2 and an emulation
experiment validate the proposed methodology.
|
[
{
"version": "v1",
"created": "Thu, 5 Feb 2009 15:33:02 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Ariba",
"Yassine",
"",
"LAAS"
],
[
"Gouaisbaut",
"Frédéric",
"",
"LAAS"
],
[
"Rahme",
"Sandy",
"",
"LAAS"
],
[
"Labit",
"Yann",
"",
"LAAS"
]
] |
new_dataset
| 0.995929 |
0902.3286
|
Arunkumar Subramanian
|
Arunkumar Subramanian, Steven W. McLaughlin
|
MDS codes on the erasure-erasure wiretap channel
|
Submitted to the 2009 IEEE International Symposium on Information
Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers the problem of perfectly secure communication on a
modified version of Wyner's wiretap channel II where both the main and
wiretapper's channels have some erasures. A secret message is to be encoded
into $n$ channel symbols and transmitted. The main channel is such that the
legitimate receiver receives the transmitted codeword with exactly $n - \nu$
erasures, where the positions of the erasures are random. Additionally, an
eavesdropper (wire-tapper) is able to observe the transmitted codeword with $n
- \mu$ erasures in a similar fashion. This paper studies the maximum achievable
information rate with perfect secrecy on this channel and gives a coding scheme
using nested codes that achieves the secrecy capacity.
|
[
{
"version": "v1",
"created": "Thu, 19 Feb 2009 02:28:23 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Subramanian",
"Arunkumar",
""
],
[
"McLaughlin",
"Steven W.",
""
]
] |
new_dataset
| 0.996042 |
0904.1889
|
Stevan Harnad
|
Stevan Harnad
|
First Person Singular
|
6 pages
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Brian Rotman argues that (one) "mind" and (one) "god" are only conceivable,
literally, because of (alphabetic) literacy, which allowed us to designate each
of these ghosts as an incorporeal, speaker-independent "I" (or, in the case of
infinity, a notional agent that goes on counting forever). I argue that to have
a mind is to have the capacity to feel. No one can be sure which organisms
feel, hence have minds, but it seems likely that one-celled organisms and
plants do not, whereas animals do. So minds originated before humans and before
language --hence, a fortiori, before writing, whether alphabetic or
ideographic.
|
[
{
"version": "v1",
"created": "Sun, 12 Apr 2009 23:13:13 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Harnad",
"Stevan",
""
]
] |
new_dataset
| 0.999314 |
0907.2139
|
Mai-Anh Phan
|
Mai-Anh Phan, J\"org Huschke
|
Adaptive Point-to-Multipoint Transmission for Multimedia Broadcast
Multicast Services in LTE
|
6 pages, 7 figures
| null | null | null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper investigates point-to-multipoint (PTM) transmission supporting
adaptive modulation and coding (AMC) as well as retransmissions based on
incremental redundancy. In contrast to the classical PTM transmission which was
introduced by the Multimedia Broadcast Multicast Service (MBMS), the
adaptiveness requires user individual feedback channels that allow the
receivers to report their radio conditions and send positive or negative
acknowledgments (ACK/NACK) for a Layer 1 transport block to the eNodeB. In this
work, an adaptive PTM scheme based on feedback from multiple users is presented
and evaluated. Furthermore, a simple NACK-oriented feedback mechanism is
introduced to relieve the feedback channel that is used in the uplink. Finally,
the performance of different single-cell MBMS transmission modes is evaluated
by dynamic radio network simulations. It is shown that adaptive PTM
transmission outperforms the conventional MBMS configurations in terms of radio
resource consumption and user satisfaction rate.
|
[
{
"version": "v1",
"created": "Mon, 13 Jul 2009 11:21:23 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Phan",
"Mai-Anh",
""
],
[
"Huschke",
"Jörg",
""
]
] |
new_dataset
| 0.989 |
0907.4364
|
Miao Song
|
Miao Song
|
Dynamic Deformation of Uniform Elastic Two-Layer Objects
|
96 pages, 46 pages; master's thesis; August 2007; also available at
http://clues.concordia.ca/record=b2343207~S0
| null | null | null |
cs.GR
|
http://creativecommons.org/licenses/by/3.0/
|
This thesis presents a two-layer uniform facet elastic object for real-time
simulation based on physics modeling method. It describes the elastic object
procedural modeling algorithm with particle system from the simplest
one-dimensional object, to more complex two-dimensional and three-dimensional
objects.
The double-layered elastic object consists of inner and outer elastic mass
spring surfaces and compressible internal pressure. The density of the inner
layer can be set different from the density of the outer layer; the motion of
the inner layer can be opposite to the motion of the outer layer. These special
features, which cannot be achieved by a single layered object, result in
improved imitation of a soft body, such as tissue's liquidity non-uniform
deformation. The construction of the double-layered elastic object is closer to
the real tissue's physical structure.
The inertial behavior of the elastic object is well illustrated in
environments with gravity and collisions with walls, ceiling, and floor. The
collision detection is defined by elastic collision penalty method and the
motion of the object is guided by the Ordinary Differential Equation
computation.
Users can interact with the modeled objects, deform them, and observe the
response to their action in real time.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 19:13:02 GMT"
},
{
"version": "v2",
"created": "Sat, 25 Jul 2009 22:54:29 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Song",
"Miao",
""
]
] |
new_dataset
| 0.998702 |
0801.1784
|
Sergei Vyshenski
|
S. V. Vyshenski, P. V. Grigoriev, Yu. Yu. Dubenskaya
|
Ideal synchronizer for marked pairs in fork-join network
|
18 pages, 3 figures, in Russian, typos fixed
| null | null | null |
cs.DM
| null |
We introduce a new functional element (synchronizer for marked pairs) meant
to join results of parallel processing in two-branch fork-join queueing
network. Approximations for distribution of sojourn time at the synchronizer
are derived along with a validity domain. Calculations are performed assuming
that: arrivals to the network form a Poisson process, each branch operates like
an M/M/N queueing system. It is shown that mean sojourn time at a real
synchronizer node is bounded below by the value, defined by parameters of the
network (which contains the synchronizer) and does not depend upon performance
and particular properties of the synchronizer.
|
[
{
"version": "v1",
"created": "Fri, 11 Jan 2008 16:00:59 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jan 2008 20:57:32 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Vyshenski",
"S. V.",
""
],
[
"Grigoriev",
"P. V.",
""
],
[
"Dubenskaya",
"Yu. Yu.",
""
]
] |
new_dataset
| 0.996557 |
0808.3563
|
Stevan Harnad
|
Stevan Harnad
|
What It Feels Like To Hear Voices: Fond Memories of Julian Jaynes
|
16 pages
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Julian Jaynes's profound humanitarian convictions not only prevented him from
going to war, but would have prevented him from ever kicking a dog. Yet
according to his theory, not only are language-less dogs unconscious, but so
too were the speaking/hearing Greeks in the Bicameral Era, when they heard
gods' voices telling them what to do rather than thinking for themselves. I
argue that to be conscious is to be able to feel, and that all mammals (and
probably lower vertebrates and invertebrates too) feel, hence are conscious.
Julian Jaynes's brilliant analysis of our concepts of consciousness
nevertheless keeps inspiring ever more inquiry and insights into the age-old
mind/body problem and its relation to cognition and language.
|
[
{
"version": "v1",
"created": "Tue, 26 Aug 2008 18:17:44 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Harnad",
"Stevan",
""
]
] |
new_dataset
| 0.981036 |
0809.5023
|
Alexandre Proutiere A
|
Charles Bordenave, David McDonald, Alexandre Proutiere
|
Asymptotic stability region of slotted-Aloha
|
16 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We analyze the stability of standard, buffered, slotted-Aloha systems.
Specifically, we consider a set of $N$ users, each equipped with an infinite
buffer. Packets arrive into user $i$'s buffer according to some stationary
ergodic Markovian process of intensity $\lambda_i$. At the beginning of each
slot, if user $i$ has packets in its buffer, it attempts to transmit a packet
with fixed probability $p_i$ over a shared resource / channel. The transmission
is successful only when no other user attempts to use the channel. The
stability of such systems has been open since their very first analysis in 1979
by Tsybakov and Mikhailov. In this paper, we propose an approximate stability
condition, that is provably exact when the number of users $N$ grows large. We
provide theoretical evidence and numerical experiments to explain why the
proposed approximate stability condition is extremely accurate even for systems
with a restricted number of users (even two or three). We finally extend the
results to the case of more efficient CSMA systems.
|
[
{
"version": "v1",
"created": "Mon, 29 Sep 2008 18:34:47 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Bordenave",
"Charles",
""
],
[
"McDonald",
"David",
""
],
[
"Proutiere",
"Alexandre",
""
]
] |
new_dataset
| 0.989187 |
0810.1105
|
Anantha Raman Krishnan
|
Shashi Kiran Chilappagari, Anantha Raman Krishnan, Bane Vasic, Michael
W. Marcellin
|
Low-Density Parity-Check Codes Which Can Correct Three Errors Under
Iterative Decoding
|
25 pages. 11 Figures. Part of the work was presented at the
Information Theory Workshop (ITW), May 5-9 2008, Porto, Portugal. submitted
to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we give necessary and sufficient conditions for low-density
parity-check (LDPC) codes with column-weight three to correct three errors when
decoded using hard-decision message-passing decoding. Additionally, we give
necessary and sufficient conditions for column-weight-four codes to correct
three errors in four iterations of hard-decision message-passing decoding. We
then give a construction technique which results in codes satisfying these
conditions. We also provide numerical assessment of code performance via
simulation results.
|
[
{
"version": "v1",
"created": "Tue, 7 Oct 2008 06:22:16 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Chilappagari",
"Shashi Kiran",
""
],
[
"Krishnan",
"Anantha Raman",
""
],
[
"Vasic",
"Bane",
""
],
[
"Marcellin",
"Michael W.",
""
]
] |
new_dataset
| 0.990583 |
0909.4858
|
R Doomun
|
S. Rathi, K. Thanuskodi
|
A Secure and Fault tolerant framework for Mobile IPv6 based networks
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information Security
Vol. 5, No. 1, pp. 46-55, 2009
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile IPv6 will be an integral part of the next generation Internet
protocol. The importance of mobility in the Internet gets keep on increasing.
Current specification of Mobile IPv6 does not provide proper support for
reliability in the mobile network and there are other problems associated with
it. In this paper, we propose Virtual Private Network (VPN) based Home Agent
Reliability Protocol (VHAHA) as a complete system architecture and extension to
Mobile IPv6 that supports reliability and offers solutions to the security
problems that are found in Mobile IP registration part. The key features of
this protocol over other protocols are: better survivability, transparent
failure detection and recovery, reduced complexity of the system and workload,
secure data transfer and improved overall performance.
|
[
{
"version": "v1",
"created": "Sat, 26 Sep 2009 11:24:59 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Rathi",
"S.",
""
],
[
"Thanuskodi",
"K.",
""
]
] |
new_dataset
| 0.998819 |
0909.5012
|
Anthony Scemama
|
Anthony Scemama
|
IRPF90: a programming environment for high performance computing
|
18 pages, 14 figures
| null | null | null |
cs.SE cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
IRPF90 is a Fortran programming environment which helps the development of
large Fortran codes. In Fortran programs, the programmer has to focus on the
order of the instructions: before using a variable, the programmer has to be
sure that it has already been computed in all possible situations. For large
codes, it is common source of error. In IRPF90 most of the order of
instructions is handled by the pre-processor, and an automatic mechanism
guarantees that every entity is built before being used. This mechanism relies
on the {needs/needed by} relations between the entities, which are built
automatically. Codes written with IRPF90 execute often faster than Fortran
programs, are faster to write and easier to maintain.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 16:46:45 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Scemama",
"Anthony",
""
]
] |
new_dataset
| 0.999805 |
0909.5091
|
Stefano Zacchiroli
|
Ralf Treinen (PPS), Stefano Zacchiroli (PPS)
|
Expressing advanced user preferences in component installation
| null |
IWOCE 2009: 1st international workshop on Open component
ecosystems, Amsterdam : Netherlands (2009)
|
10.1145/1595800.1595806
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
State of the art component-based software collections - such as FOSS
distributions - are made of up to dozens of thousands components, with complex
inter-dependencies and conflicts. Given a particular installation of such a
system, each request to alter the set of installed components has potentially
(too) many satisfying answers. We present an architecture that allows to
express advanced user preferences about package selection in FOSS
distributions. The architecture is composed by a distribution-independent
format for describing available and installed packages called CUDF (Common
Upgradeability Description Format), and a foundational language called MooML to
specify optimization criteria. We present the syntax and semantics of CUDF and
MooML, and discuss the partial evaluation mechanism of MooML which allows to
gain efficiency in package dependency solvers.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 13:31:17 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Treinen",
"Ralf",
"",
"PPS"
],
[
"Zacchiroli",
"Stefano",
"",
"PPS"
]
] |
new_dataset
| 0.959982 |
cs/0210008
|
Christoph Durr
|
Christoph Durr, Ivan Rapaport, Guillaume Theyssier
|
Cellular automata and communication complexity
| null | null | null | null |
cs.CC
| null |
The model of cellular automata is fascinating because very simple local rules
can generate complex global behaviors. The relationship between local and
global function is subject of many studies. We tackle this question by using
results on communication complexity theory and, as a by-product, we provide
(yet another) classification of cellular automata.
|
[
{
"version": "v1",
"created": "Fri, 11 Oct 2002 16:29:19 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Durr",
"Christoph",
""
],
[
"Rapaport",
"Ivan",
""
],
[
"Theyssier",
"Guillaume",
""
]
] |
new_dataset
| 0.99905 |
cs/0306001
|
Michael Thomas
|
Conrad D. Steenberg and Eric Aslakson, Julian J. Bunn, Harvey B.
Newman, Michael Thomas, Frank van Lingen
|
Clarens Client and Server Applications
|
Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 4 pages, LaTeX, no figures, PSN
TUCT005
| null | null | null |
cs.DC
| null |
Several applications have been implemented with access via the Clarens web
service infrastructure, including virtual organization management, JetMET
physics data analysis using relational databases, and Storage Resource Broker
(SRB) access. This functionality is accessible transparently from Python
scripts, the Root analysis framework and from Java applications and browser
applets.
|
[
{
"version": "v1",
"created": "Fri, 30 May 2003 20:25:50 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jul 2003 20:22:55 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Steenberg",
"Conrad D.",
""
],
[
"Aslakson",
"Eric",
""
],
[
"Bunn",
"Julian J.",
""
],
[
"Newman",
"Harvey B.",
""
],
[
"Thomas",
"Michael",
""
],
[
"van Lingen",
"Frank",
""
]
] |
new_dataset
| 0.998922 |
cs/0306002
|
Michael Thomas
|
Conrad D. Steenberg and Eric Aslakson, Julian J. Bunn, Harvey B.
Newman, Michael Thomas, Frank van Lingen
|
The Clarens web services architecture
|
Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 6 pages, LaTeX, 4 figures, PSN
MONT008
| null | null | null |
cs.DC
| null |
Clarens is a uniquely flexible web services infrastructure providing a
unified access protocol to a diverse set of functions useful to the HEP
community. It uses the standard HTTP protocol combined with application layer,
certificate based authentication to provide single sign-on to individuals,
organizations and hosts, with fine-grained access control to services, files
and virtual organization (VO) management. This contribution describes the
server functionality, while client applications are described in a subsequent
talk.
|
[
{
"version": "v1",
"created": "Fri, 30 May 2003 20:34:05 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jul 2003 20:28:29 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Steenberg",
"Conrad D.",
""
],
[
"Aslakson",
"Eric",
""
],
[
"Bunn",
"Julian J.",
""
],
[
"Newman",
"Harvey B.",
""
],
[
"Thomas",
"Michael",
""
],
[
"van Lingen",
"Frank",
""
]
] |
new_dataset
| 0.999769 |
cs/0306014
|
Wellisch
|
J.P. Wellisch, C. Williams, and S. Ashby (CERN, Geneve, Switzerland)
|
SCRAM: Software configuration and management for the LHC Computing Grid
project
|
Computing in High Energy and Nuclear Physics, La Jolla, California,
March 24-28, 2003 1 tar file
| null | null | null |
cs.OH
| null |
Recently SCRAM (Software Configuration And Management) has been adopted by
the applications area of the LHC computing grid project as baseline
configuration management and build support infrastructure tool.
SCRAM is a software engineering tool, that supports the configuration
management and management processes for software development. It resolves the
issues of configuration definition, assembly break-down, build, project
organization, run-time environment, installation, distribution, deployment, and
source code distribution. It was designed with a focus on supporting a
distributed, multi-project development work-model.
We will describe the underlying technology, and the solutions SCRAM offers to
the above software engineering processes, while taking a users view of the
system under configuration management.
|
[
{
"version": "v1",
"created": "Mon, 2 Jun 2003 12:01:18 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Wellisch",
"J. P.",
"",
"CERN, Geneve, Switzerland"
],
[
"Williams",
"C.",
"",
"CERN, Geneve, Switzerland"
],
[
"Ashby",
"S.",
"",
"CERN, Geneve, Switzerland"
]
] |
new_dataset
| 0.99958 |
cs/0307029
|
Andreas de Vries
|
Andreas de Vries
|
The ray attack, an inefficient trial to break RSA cryptosystems
|
18 pages, 4 figures
| null | null | null |
cs.CR
| null |
The basic properties of RSA cryptosystems and some classical attacks on them
are described. Derived from geometric properties of the Euler functions, the
Euler function rays, a new ansatz to attack RSA cryptosystems is presented. A
resulting, albeit inefficient, algorithm is given. It essentially consists of a
loop with starting value determined by the Euler function ray and with step
width given by a function $\omega_e(n)$ being a multiple of the order
$\mathrm{ord}_n(e)$, where $e$ denotes the public key exponent and $n$ the RSA
modulus. For $n=pq$ and an estimate $r<\sqrt{pq}$ for the smaller prime factor
$p$, the running time is given by $T(e,n,r) = O((r-p)\ln e \ln n \ln r).$
|
[
{
"version": "v1",
"created": "Fri, 11 Jul 2003 14:47:27 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"de Vries",
"Andreas",
""
]
] |
new_dataset
| 0.997409 |
cs/0311025
|
Judith Beumer
|
K. Keahey, V. Welch, S. Lang, B. Liu, and S. Meder
|
Fine-Grained Authorization for Job Execution in the Grid: Design and
Implementation
|
13 pages, 2 figures
| null | null |
Preprint ANL/MCS-P1094-0903
|
cs.CR cs.DC
| null |
In this paper we describe our work on enabling fine-grained authorization for
resource usage and management. We address the need of virtual organizations to
enforce their own polices in addition to those of the resource owners, in
regard to both resource consumption and job management. To implement this
design, we propose changes and extensions to the Globus Toolkit's version 2
resource management mechanism. We describe the prototype and the policy
language that we designed to express fine-grained policies, and we present an
analysis of our solution.
|
[
{
"version": "v1",
"created": "Thu, 20 Nov 2003 15:02:13 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Keahey",
"K.",
""
],
[
"Welch",
"V.",
""
],
[
"Lang",
"S.",
""
],
[
"Liu",
"B.",
""
],
[
"Meder",
"S.",
""
]
] |
new_dataset
| 0.99831 |
cs/0404043
|
Neil J. Gunther
|
Neil J. Gunther
|
Benchmarking Blunders and Things That Go Bump in the Night
|
Invited presentation at the Workshop On Software Performance and
Reliability (WOPR2) Menlo Park, California, April 15-17 2004
| null | null | null |
cs.PF cs.SE
| null |
Benchmarking; by which I mean any computer system that is driven by a
controlled workload, is the ultimate in performance testing and simulation.
Aside from being a form of institutionalized cheating, it also offer countless
opportunities for systematic mistakes in the way the workloads are applied and
the resulting measurements interpreted. Right test, wrong conclusion is a
ubiquitous mistake that happens because test engineers tend to treat data as
divine. Such reverence is not only misplaced, it's also a sure ticket to
production hell when the application finally goes live. I demonstrate how such
mistakes can be avoided by means of two war stories that are real WOPRs. (a)
How to resolve benchmark flaws over the psychic hotline and (b) How benchmarks
can go flat with too much Java juice. In each case I present simple performance
models and show how they can be applied to correctly assess benchmark data.
|
[
{
"version": "v1",
"created": "Wed, 21 Apr 2004 20:07:07 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Gunther",
"Neil J.",
""
]
] |
new_dataset
| 0.985851 |
cs/0410013
|
Alex Vinokur
|
Alex Vinokur
|
Fibonacci connection between Huffman codes and Wythoff array
|
12 pages, 9 tables
| null | null | null |
cs.DM cs.DS math.CO math.NT
| null |
Fibonacci connection between non-decreasing sequences of positive integers
producing maximum height Huffman trees and the Wythoff array has been proved.
|
[
{
"version": "v1",
"created": "Wed, 6 Oct 2004 11:44:02 GMT"
},
{
"version": "v2",
"created": "Sat, 8 Oct 2005 07:50:59 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Vinokur",
"Alex",
""
]
] |
new_dataset
| 0.990372 |
cs/0411047
|
Ercan Erturk
|
E. Erturk and T.C. Corke and C. Gokcol
|
Numerical Solutions of 2-D Steady Incompressible Driven Cavity Flow at
High Reynolds Numbers
| null |
International Journal for Numerical Methods in Fluids 2005, Vol
48, pp 747-774
|
10.1002/fld.953
| null |
cs.NA math.NA physics.comp-ph physics.flu-dyn
| null |
Numerical calculations of the 2-D steady incompressible driven cavity flow
are presented. The Navier-Stokes equations in streamfunction and vorticity
formulation are solved numerically using a fine uniform grid mesh of 601x601.
The steady driven cavity solutions are computed for Re<21,000 with a maximum
absolute residuals of the governing equations that were less than 10-10. A new
quaternary vortex at the bottom left corner and a new tertiary vortex at the
top left corner of the cavity are observed in the flow field as the Reynolds
number increases. Detailed results are presented and comparisons are made with
benchmark solutions found in the literature.
|
[
{
"version": "v1",
"created": "Mon, 15 Nov 2004 23:38:00 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jan 2005 11:52:37 GMT"
},
{
"version": "v3",
"created": "Sat, 4 Jun 2005 09:12:04 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Erturk",
"E.",
""
],
[
"Corke",
"T. C.",
""
],
[
"Gokcol",
"C.",
""
]
] |
new_dataset
| 0.989284 |
cs/0411049
|
Ercan Erturk
|
E. Erturk and C. Gokcol
|
Fourth Order Compact Formulation of Navier-Stokes Equations and Driven
Cavity Flow at High Reynolds Numbers
| null |
International Journal for Numerical Methods in Fluids 2006, Vol
50, pp 421-436
|
10.1002/fld.1061
| null |
cs.NA math.NA physics.comp-ph physics.flu-dyn
| null |
A new fourth order compact formulation for the steady 2-D incompressible
Navier-Stokes equations is presented. The formulation is in the same form of
the Navier-Stokes equations such that any numerical method that solve the
Navier-Stokes equations can also be applied to this fourth order compact
formulation. In particular in this work the formulation is solved with an
efficient numerical method that requires the solution of tridiagonal systems
using a fine grid mesh of 601x601. Using this formulation, the steady 2-D
incompressible flow in a driven cavity is solved up to Reynolds number of
20,000 with fourth order spatial accuracy. Detailed solutions are presented.
|
[
{
"version": "v1",
"created": "Mon, 15 Nov 2004 23:52:25 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Dec 2005 07:49:17 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Erturk",
"E.",
""
],
[
"Gokcol",
"C.",
""
]
] |
new_dataset
| 0.999617 |
cs/0411069
|
Gang Peng
|
Gang Peng
|
CDN: Content Distribution Network
|
26 pages
| null | null | null |
cs.NI cs.IR
| null |
Internet evolves and operates largely without a central coordination, the
lack of which was and is critically important to the rapid growth and evolution
of Internet. However, the lack of management in turn makes it very difficult to
guarantee proper performance and to deal systematically with performance
problems. Meanwhile, the available network bandwidth and server capacity
continue to be overwhelmed by the skyrocketing Internet utilization and the
accelerating growth of bandwidth intensive content. As a result, Internet
service quality perceived by customers is largely unpredictable and
unsatisfactory. Content Distribution Network (CDN) is an effective approach to
improve Internet service quality. CDN replicates the content from the place of
origin to the replica servers scattered over the Internet and serves a request
from a replica server close to where the request originates. In this paper, we
first give an overview about CDN. We then present the critical issues involved
in designing and implementing an effective CDN and survey the approaches
proposed in literature to address these problems. An example of CDN is
described to show how a real commercial CDN operates. After this, we present a
scheme that provides fast service location for peer-to-peer systems, a special
type of CDN with no infrastructure support. We conclude with a brief projection
about CDN.
|
[
{
"version": "v1",
"created": "Thu, 18 Nov 2004 23:16:08 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Peng",
"Gang",
""
]
] |
new_dataset
| 0.985912 |
cs/0411085
|
Didier Donsez
|
Herve Duchesne (OBASCO Irisa), Christophe Augier (OBASCO Irisa),
Richard Urunuela (OBASCO Irisa)
|
Deploiement d'ordonnanceurs de processus specifiques dans un systeme
d'exploitation generaliste
| null |
DECOR04 (2004) 193-198
| null | null |
cs.NI
| null |
Bossa is a framework to develop new processes schedulers in commodity
operating systems. Although Bossa enables fine-grained management of the
processor through new scheduling policies, deploying an application with its
own scheduler raises some problems. In this paper we study the problems caused
when deploying an application and its scheduler and to adresse these, we
propose to establish Quality of Service contracts and mechanisms to reconfigure
the scheduler hierarchy.
|
[
{
"version": "v1",
"created": "Wed, 24 Nov 2004 10:31:48 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Duchesne",
"Herve",
"",
"OBASCO Irisa"
],
[
"Augier",
"Christophe",
"",
"OBASCO Irisa"
],
[
"Urunuela",
"Richard",
"",
"OBASCO Irisa"
]
] |
new_dataset
| 0.962136 |
cs/0412044
|
Riccardo Pucella
|
Karthikeyan Bhargavan, Cedric Fournet, Andrew D. Gordon, Riccardo
Pucella
|
TulaFale: A Security Tool for Web Services
|
26 pages, 4 figures. Appears in Proceedings of the 2nd International
Symposium on Formal Methods for Components and Objects (FMCS'03), LNCS 3188,
pp. 197-222
| null | null | null |
cs.CR
| null |
Web services security specifications are typically expressed as a mixture of
XML schemas, example messages, and narrative explanations. We propose a new
specification language for writing complementary machine-checkable descriptions
of SOAP-based security protocols and their properties. Our TulaFale language is
based on the pi calculus (for writing collections of SOAP processors running in
parallel), plus XML syntax (to express SOAP messaging), logical predicates (to
construct and filter SOAP messages), and correspondence assertions (to specify
authentication goals of protocols). Our implementation compiles TulaFale into
the applied pi calculus, and then runs Blanchet's resolution-based protocol
verifier. Hence, we can automatically verify authentication properties of SOAP
protocols.
|
[
{
"version": "v1",
"created": "Fri, 10 Dec 2004 21:18:48 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Bhargavan",
"Karthikeyan",
""
],
[
"Fournet",
"Cedric",
""
],
[
"Gordon",
"Andrew D.",
""
],
[
"Pucella",
"Riccardo",
""
]
] |
new_dataset
| 0.999653 |
cs/0502069
|
Sandor P. Fekete
|
Alexander Kroeller, Sandor P. Fekete, Carsten Buschmann, Stefan
Fischer and Dennis Pfisterer
|
Koordinatenfreies Lokationsbewusstsein (Localization without
Coordinates)
|
German, 15 pages, 6 figures, Latex, to appear in Information
Technology
| null | null | null |
cs.DC
| null |
Localization is one of the fundamental issues in sensor networks. It is
almost always assumed that it must be solved by assigning coordinates to the
nodes. This article discusses positioning algorithms from a theoretical,
practical and simulative point of view, and identifies difficulties and
limitations. Ideas for more abstract means of location awareness are presented
and the resulting possible improvements for applications are shown. Nodes with
certain topological or environmental properties are clustered, and the
neighborhood structure of the clusters is modeled as a graph. Eines der
fundamentalen Probleme in Sensornetzwerken besteht darin, ein Bewusstsein fuer
die Position eines Knotens im Netz zu entwickeln. Dabei wird fast immer davon
ausgegangen, dass dies durch die Zuweisung von Koordinaten zu erfolgen hat. In
diesem Artikel wird auf theoretischer, praktischer und simulativer Ebene ein
kritischer Blick auf entsprechende Verfahren geworfen, und es werden Grenzen
aufgezeigt. Es wird ein Ansatz vorgestellt, mit dem in der Zukunft eine
abstrakte Form von Lokationsbewusstsein etabliert werden kann, und es wird
gezeigt, wie Anwendungen dadurch verbessert werden koennen. Er basiert auf
einer graphenbasierten Modellierung des Netzes: Knoten mit bestimmten
topologischen oder Umwelteigenschaften werden zu Clustern zusammengefasst, und
Clusternachbarschaften dann als Graphen modelliert.
|
[
{
"version": "v1",
"created": "Tue, 15 Feb 2005 16:35:13 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Kroeller",
"Alexander",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Buschmann",
"Carsten",
""
],
[
"Fischer",
"Stefan",
""
],
[
"Pfisterer",
"Dennis",
""
]
] |
new_dataset
| 0.997962 |
cs/0508058
|
Herve Jegou
|
Herve Jegou and Christine Guillemot
|
Entropy coding with Variable Length Re-writing Systems
|
6 pages, To appear in the proceedings of the 2005 IEEE International
Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
| null | null | null |
cs.IT math.IT
| null |
This paper describes a new set of block source codes well suited for data
compression. These codes are defined by sets of productions rules of the form
a.l->b, where a in A represents a value from the source alphabet A and l, b are
-small- sequences of bits. These codes naturally encompass other Variable
Length Codes (VLCs) such as Huffman codes. It is shown that these codes may
have a similar or even a shorter mean description length than Huffman codes for
the same encoding and decoding complexity. A first code design method allowing
to preserve the lexicographic order in the bit domain is described. The
corresponding codes have the same mean description length (mdl) as Huffman
codes from which they are constructed. Therefore, they outperform from a
compression point of view the Hu-Tucker codes designed to offer the
lexicographic property in the bit domain. A second construction method allows
to obtain codes such that the marginal bit probability converges to 0.5 as the
sequence length increases and this is achieved even if the probability
distribution function is not known by the encoder.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2005 15:41:19 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Jegou",
"Herve",
""
],
[
"Guillemot",
"Christine",
""
]
] |
new_dataset
| 0.997951 |
cs/0508096
|
Styrmir Sigurjonsson
|
Styrmir Sigurjonsson and Young-Han Kim
|
On Multiple User Channels with Causal State Information at the
Transmitters
| null | null | null | null |
cs.IT math.IT
| null |
We extend Shannon's result on the capacity of channels with state information
to multiple user channels. More specifically, we characterize the capacity
(region) of degraded broadcast channels and physically degraded relay channels
where the channel state information is causally available at the transmitters.
We also obtain inner and outer bounds on the capacity region for multiple
access channels with causal state information at the transmitters.
|
[
{
"version": "v1",
"created": "Mon, 22 Aug 2005 21:36:02 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Sigurjonsson",
"Styrmir",
""
],
[
"Kim",
"Young-Han",
""
]
] |
new_dataset
| 0.991036 |
cs/0604063
|
Yi Hong Dr
|
Yi Hong, Emanuele Viterbo, and Jean-Claude Belfiore
|
Golden Space-Time Trellis Coded Modulation
|
33 pages, 13 figures
| null | null | null |
cs.IT math.IT
| null |
In this paper, we present a concatenated coding scheme for a high rate
$2\times 2$ multiple-input multiple-output (MIMO) system over slow fading
channels. The inner code is the Golden code \cite{Golden05} and the outer code
is a trellis code. Set partitioning of the Golden code is designed specifically
to increase the minimum determinant. The branches of the outer trellis code are
labeled with these partitions. Viterbi algorithm is applied for trellis
decoding. In order to compute the branch metrics a lattice sphere decoder is
used. The general framework for code optimization is given. The performance of
the proposed concatenated scheme is evaluated by simulation. It is shown that
the proposed scheme achieves significant performance gains over uncoded Golden
code.
|
[
{
"version": "v1",
"created": "Sun, 16 Apr 2006 09:08:41 GMT"
},
{
"version": "v2",
"created": "Tue, 23 May 2006 09:53:20 GMT"
},
{
"version": "v3",
"created": "Thu, 11 Jan 2007 00:33:19 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Hong",
"Yi",
""
],
[
"Viterbo",
"Emanuele",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
] |
new_dataset
| 0.979549 |
cs/0703150
|
Steven G. Johnson
|
Xuancheng Shao and Steven G. Johnson
|
Type-II/III DCT/DST algorithms with reduced number of arithmetic
operations
|
9 pages
|
Signal Processing vol. 88, issue 6, p. 1553-1564 (2008)
|
10.1016/j.sigpro.2008.01.004
| null |
cs.NA cs.DS cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present algorithms for the discrete cosine transform (DCT) and discrete
sine transform (DST), of types II and III, that achieve a lower count of real
multiplications and additions than previously published algorithms, without
sacrificing numerical accuracy. Asymptotically, the operation count is reduced
from ~ 2N log_2 N to ~ (17/9) N log_2 N for a power-of-two transform size N.
Furthermore, we show that a further N multiplications may be saved by a certain
rescaling of the inputs or outputs, generalizing a well-known technique for N=8
by Arai et al. These results are derived by considering the DCT to be a special
case of a DFT of length 4N, with certain symmetries, and then pruning redundant
operations from a recent improved fast Fourier transform algorithm (based on a
recursive rescaling of the conjugate-pair split radix algorithm). The improved
algorithms for DCT-III, DST-II, and DST-III follow immediately from the
improved count for the DCT-II.
|
[
{
"version": "v1",
"created": "Fri, 30 Mar 2007 00:53:48 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jan 2009 19:05:59 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Shao",
"Xuancheng",
""
],
[
"Johnson",
"Steven G.",
""
]
] |
new_dataset
| 0.982018 |
cs/0005033
|
Emanuele Panizzi
|
Emanuele Panizzi, Bernardo Pastorelli
|
Multimethods and separate static typechecking in a language with
C++-like object model
|
15 pages, 18 figures
| null | null |
UAQ DIE R.99-33
|
cs.PL
| null |
The goal of this paper is the description and analysis of multimethod
implementation in a new object-oriented, class-based programming language
called OOLANG. The implementation of the multimethod typecheck and selection,
deeply analyzed in the paper, is performed in two phases in order to allow
static typechecking and separate compilation of modules. The first phase is
performed at compile time, while the second is executed at link time and does
not require the modules' source code. OOLANG has syntax similar to C++; the
main differences are the absence of pointers and the realization of
polymorphism through subsumption. It adopts the C++ object model and supports
multiple inheritance as well as virtual base classes. For this reason, it has
been necessary to define techniques for realigning argument and return value
addresses when performing multimethod invocations.
|
[
{
"version": "v1",
"created": "Wed, 31 May 2000 07:54:30 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Panizzi",
"Emanuele",
""
],
[
"Pastorelli",
"Bernardo",
""
]
] |
new_dataset
| 0.997642 |
cs/0009011
|
Masaki Murata
|
Masaki Murata
|
Anaphora Resolution in Japanese Sentences Using Surface Expressions and
Examples
|
156 pages. Doctoral thesis in Kyoto University, December 1996,
supervised by M. Nagao
| null | null | null |
cs.CL
| null |
Anaphora resolution is one of the major problems in natural language
processing. It is also one of the important tasks in machine translation and
man/machine dialogue. We solve the problem by using surface expressions and
examples. Surface expressions are the words in sentences which provide clues
for anaphora resolution. Examples are linguistic data which are actually used
in conversations and texts. The method using surface expressions and examples
is a practical method. This thesis handles almost all kinds of anaphora: i. The
referential property and number of a noun phrase ii. Noun phrase direct
anaphora iii. Noun phrase indirect anaphora iv. Pronoun anaphora v. Verb phrase
ellipsis
|
[
{
"version": "v1",
"created": "Tue, 19 Sep 2000 00:44:47 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Murata",
"Masaki",
""
]
] |
new_dataset
| 0.999649 |
cs/0012001
|
Ted Herman
|
Ted Herman, Toshimitsu Masuzawa
|
Available and Stabilizing 2-3 Trees
|
22 pages, 5 figures
| null | null |
University of Iowa Department of Computer Science TR 00-04
|
cs.DC cs.DS
| null |
Transient faults corrupt the content and organization of data structures. A
recovery technique dealing with such faults is stabilization, which guarantees,
following some number of operations on the data structure, that content of the
data structure is legitimate. Another notion of fault tolerance is
availability, which is the property that operations continue to be applied
during the period of recovery after a fault, and successful updates are not
lost while the data structure stabilizes to a legitimate state. The available,
stabilizing 2-3 tree supports find, insert, and delete operations, each with
O(lg n) complexity when the tree's state is legitimate and contains n items.
For an illegitimate state, these operations have O(lg K) complexity where K is
the maximum capacity of the tree. Within O(t) operations, the state of the tree
is guaranteed to be legitimate, where t is the number of nodes accessible via
some path from the tree's root at the initial state. This paper resolves, for
the first time, issues of dynamic allocation and pointer organization in a
stabilizing data structure.
|
[
{
"version": "v1",
"created": "Fri, 1 Dec 2000 15:55:50 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Herman",
"Ted",
""
],
[
"Masuzawa",
"Toshimitsu",
""
]
] |
new_dataset
| 0.976617 |
cs/0103010
|
Masaki Murata
|
Masaki Murata, Kiyotaka Uchimoto, Qing Ma, and Hitoshi Isahara
|
Magical Number Seven Plus or Minus Two: Syntactic Structure Recognition
in Japanese and English Sentences
|
9 pages. Computation and Language. This paper is included in the book
entitled by "Computational Linguistics and Intelligent Text Processing,
Second International Conference, CICLing 2001, Mexico City, February 2001
Proceedings", Alexander Gelbukh (Ed.), Springer Publisher, ISSN 0302-9743,
ISBN 3-540-41687-0
|
CICLing'2001, Mexico City, February 2001
| null | null |
cs.CL
| null |
George A. Miller said that human beings have only seven chunks in short-term
memory, plus or minus two. We counted the number of bunsetsus (phrases) whose
modifiees are undetermined in each step of an analysis of the dependency
structure of Japanese sentences, and which therefore must be stored in
short-term memory. The number was roughly less than nine, the upper bound of
seven plus or minus two. We also obtained similar results with English
sentences under the assumption that human beings recognize a series of words,
such as a noun phrase (NP), as a unit. This indicates that if we assume that
the human cognitive units in Japanese and English are bunsetsu and NP
respectively, analysis will support Miller's $7 \pm 2$ theory.
|
[
{
"version": "v1",
"created": "Mon, 12 Mar 2001 08:23:19 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Murata",
"Masaki",
""
],
[
"Uchimoto",
"Kiyotaka",
""
],
[
"Ma",
"Qing",
""
],
[
"Isahara",
"Hitoshi",
""
]
] |
new_dataset
| 0.998226 |
cs/0103012
|
Masaki Murata
|
Masaki Murata, Kyoko Kanzaki, Kiyotaka Uchimoto, Qing Ma, and Hitoshi
Isahara
|
Meaning Sort - Three examples: dictionary construction, tagged corpus
construction, and information presentation system
|
14 pages. Computation and Language. This paper is included in the
book entitled by "Computational Linguistics and Intelligent Text Processing,
Second International Conference", Springer Publisher
|
CICLing'2001, Mexico City, February 2001
| null | null |
cs.CL
| null |
It is often useful to sort words into an order that reflects relations among
their meanings as obtained by using a thesaurus. In this paper, we introduce a
method of arranging words semantically by using several types of `{\sf is-a}'
thesauri and a multi-dimensional thesaurus. We also describe three major
applications where a meaning sort is useful and show the effectiveness of a
meaning sort. Since there is no doubt that a word list in meaning-order is
easier to use than a word list in some random order, a meaning sort, which can
easily produce a word list in meaning-order, must be useful and effective.
|
[
{
"version": "v1",
"created": "Mon, 12 Mar 2001 08:43:11 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Murata",
"Masaki",
""
],
[
"Kanzaki",
"Kyoko",
""
],
[
"Uchimoto",
"Kiyotaka",
""
],
[
"Ma",
"Qing",
""
],
[
"Isahara",
"Hitoshi",
""
]
] |
new_dataset
| 0.974024 |
cs/0109045
|
Zixiang Tan
|
Zixiang Alex Tan
|
Product Cycle, Wintelism, and Cross-national Production Networks (CPN)
for Developing Countries-- China's Telecom Manufacturing Industry as A Case
|
18 pages 5 figures
| null | null |
TPRC-2001-059
|
cs.CY
| null |
Focusing on the telecom manufacturing industry in China, this paper contends
that the existing literature needs to be expanded in order to explain the
Chinese case. First, product cycle theory could be applied to explain
multinational corporations' strategies of importing and localizing their
products in China in order to take advantage of lower labor costs and often
more significantly to break barriers to the Chinese market. Second, there are
no significant indicators pointing to local multinational subsidiaries and
indigenous manufacturers serving as a substantial part of the cross-national
production networks in the global telecom industry yet, although there are some
signs of potential development. Third, the success of "Wintelism" and the
maturity of cross-national production networks in the global market have had
significant impacts on China's indigenous industry.
|
[
{
"version": "v1",
"created": "Sat, 22 Sep 2001 03:49:23 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Tan",
"Zixiang Alex",
""
]
] |
new_dataset
| 0.982283 |
cs/9402101
| null |
C. X. Ling
|
Learning the Past Tense of English Verbs: The Symbolic Pattern
Associator vs. Connectionist Models
|
See http://www.jair.org/ for an online appendix and other files
accompanying this article
|
Journal of Artificial Intelligence Research, Vol 1, (1994),
209-229
| null | null |
cs.AI
| null |
Learning the past tense of English verbs - a seemingly minor aspect of
language acquisition - has generated heated debates since 1986, and has become
a landmark task for testing the adequacy of cognitive modeling. Several
artificial neural networks (ANNs) have been implemented, and a challenge for
better symbolic models has been posed. In this paper, we present a
general-purpose Symbolic Pattern Associator (SPA) based upon the decision-tree
learning algorithm ID3. We conduct extensive head-to-head comparisons on the
generalization ability between ANN models and the SPA under different
representations. We conclude that the SPA generalizes the past tense of unseen
verbs better than ANN models by a wide margin, and we offer insights as to why
this should be the case. We also discuss a new default strategy for
decision-tree learning algorithms.
|
[
{
"version": "v1",
"created": "Tue, 1 Feb 1994 00:00:00 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Ling",
"C. X.",
""
]
] |
new_dataset
| 0.963081 |
cs/9812023
|
Soumyadeep Paul
|
Soumyadeep Paul, Sudipta N. Sinha and Amitabha Mukerjee
|
Virtual Kathakali : Gesture Driven Metamorphosis
|
Proceedings of International Conference on Knowledge Based Computer
Systems, Mumbai, India, Dec '98. 12 pages, 19 figures
| null | null | null |
cs.HC
| null |
Training in motor skills such as athletics, dance, or gymnastics is not
possible today except in the direct presence of the coach/instructor. This
paper describes a computer vision based gesture recognition system which is
used to metamorphose the user into a Virtual person, e.g. as a Kathakali
dancer, which is graphically recreated at a near or diatant location. Thus this
can be seen by an off-site coach using low-bandwidth joint-motion data which
permits real time animation. The metamorphosis involves altering the appearance
and identity of the user and also creating a specific environment possibly in
interaction with other virtual creatures.
A robust vision module is used to identify the user, based on very simple
binary image processing in real time which also manages to resolve
self-occlusion, correct for clothing/colour and other variations among users.
Gestures are identified by locating key points at the shoulder, elbow and wrist
joint, which are then recreated in an articulated humanoid model, which in this
instance, representes a Kathakali dancer in elaborate traditional dress. Unlike
glove based or other and movement tracking systems, this application requires
the user to wear no hardwire devices and is aimed at making gesture tracking
simpler, cheaper, and more user friendly.
|
[
{
"version": "v1",
"created": "Tue, 29 Dec 1998 16:50:27 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Paul",
"Soumyadeep",
""
],
[
"Sinha",
"Sudipta N.",
""
],
[
"Mukerjee",
"Amitabha",
""
]
] |
new_dataset
| 0.999274 |
cs/9902018
|
Ee-Peng Lim
|
Yong Lin, Jian Xu, Ee-Peng Lim, Wee-Keong Ng
|
ZBroker: A Query Routing Broker for Z39.50 Databases
|
10 pages, 8 figures
| null | null | null |
cs.DL cs.DB
| null |
A query routing broker is a software agent that determines from a large set
of accessing information sources the ones most relevant to a user's information
need. As the number of information sources on the Internet increases
dramatically, future users will have to rely on query routing brokers to decide
a small number of information sources to query without incurring too much query
processing overheads. In this paper, we describe a query routing broker known
as ZBroker developed for bibliographic database servers that support the Z39.50
protocol. ZBroker samples the content of each bibliographic database by using
training queries and their results, and summarizes the bibliographic database
content into a knowledge base. We present the design and implementation of
ZBroker and describe its Web-based user interface.
|
[
{
"version": "v1",
"created": "Tue, 9 Feb 1999 03:50:24 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Lin",
"Yong",
""
],
[
"Xu",
"Jian",
""
],
[
"Lim",
"Ee-Peng",
""
],
[
"Ng",
"Wee-Keong",
""
]
] |
new_dataset
| 0.998993 |
cs/9905006
|
Stephen F. Bush
|
Stephen F. Bush
|
The Design and Analysis of Virtual Network Configuration for a Wireless
Mobile ATM Network
|
PhD Thesis
| null | null | null |
cs.NI
| null |
This research concentrates on the design and analysis of an algorithm
referred to as Virtual Network Configuration (VNC) which uses predicted future
states of a system for faster network configuration and management. VNC is
applied to the configuration of a wireless mobile ATM network. VNC is built on
techniques from parallel discrete event simulation merged with constraints from
real-time systems and applied to mobile ATM configuration and handoff.
Configuration in a mobile network is a dynamic and continuous process.
Factors such as load, distance, capacity and topology are all constantly
changing in a mobile environment. The VNC algorithm anticipates configuration
changes and speeds the reconfiguration process by pre-computing and caching
results. VNC propagates local prediction results throughout the VNC enhanced
system. The Global Positioning System is an enabling technology for the use of
VNC in mobile networks because it provides location information and accurate
time for each node.
This research has resulted in well defined structures for the encapsulation
of physical processes within Logical Processes and a generic library for
enhancing a system with VNC. Enhancing an existing system with VNC is straight
forward assuming the existing physical processes do not have side effects. The
benefit of prediction is gained at the cost of additional traffic and
processing. This research includes an analysis of VNC and suggestions for
optimization of the VNC algorithm and its parameters.
|
[
{
"version": "v1",
"created": "Tue, 11 May 1999 20:05:36 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Bush",
"Stephen F.",
""
]
] |
new_dataset
| 0.999533 |
cs/9912006
|
Masaki Murata
|
M. Murata, M. Nagao (Kyoto University)
|
Resolution of Verb Ellipsis in Japanese Sentence using Surface
Expressions and Examples
|
6 pages, 0 figures. Computation and Language
|
Natural Language Processing Pacific Rim Symposium 1997 (NLPRS'97),
Cape Panwa Hotel, Phuket, Thailand, December 2-4, 1997 p75-80
| null | null |
cs.CL
| null |
Verbs are sometimes omitted in Japanese sentences. It is necessary to recover
omitted verbs for purposes of language understanding, machine translation, and
conversational processing. This paper describes a practical way to recover
omitted verbs by using surface expressions and examples. We experimented the
resolution of verb ellipses by using this information, and obtained a recall
rate of 73% and a precision rate of 66% on test sentences.
|
[
{
"version": "v1",
"created": "Mon, 13 Dec 1999 05:19:46 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Murata",
"M.",
"",
"Kyoto University"
],
[
"Nagao",
"M.",
"",
"Kyoto University"
]
] |
new_dataset
| 0.998949 |
cs/0611162
|
Kai-Uwe Schmidt
|
Kai-Uwe Schmidt
|
Quaternary Constant-Amplitude Codes for Multicode CDMA
|
This is the revised journal version
|
IEEE Trans. Inf. Theory, vol. 55, no. 4, pp. 1824-1832, April 2009
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A constant-amplitude code is a code that reduces the peak-to-average power
ratio (PAPR) in multicode code-division multiple access (MC-CDMA) systems to
the favorable value 1. In this paper quaternary constant-amplitude codes (codes
over Z_4) of length 2^m with error-correction capabilities are studied. These
codes exist for every positive integer m, while binary constant-amplitude codes
cannot exist if m is odd. Every word of such a code corresponds to a function
from the binary m-tuples to Z_4 having the bent property, i.e., its Fourier
transform has magnitudes 2^{m/2}. Several constructions of such functions are
presented, which are exploited in connection with algebraic codes over Z_4 (in
particular quaternary Reed-Muller, Kerdock, and Delsarte-Goethals codes) to
construct families of quaternary constant-amplitude codes. Mappings from binary
to quaternary constant-amplitude codes are presented as well.
|
[
{
"version": "v1",
"created": "Thu, 30 Nov 2006 11:18:51 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Sep 2009 18:04:41 GMT"
}
] | 2009-09-24T00:00:00 |
[
[
"Schmidt",
"Kai-Uwe",
""
]
] |
new_dataset
| 0.999899 |
0909.3146
|
Fr\'ed\'erique Oggier
|
Frederique Oggier and Hanane Fathi
|
An Authentication Code against Pollution Attacks in Network Coding
| null | null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Systems exploiting network coding to increase their throughput suffer greatly
from pollution attacks which consist of injecting malicious packets in the
network. The pollution attacks are amplified by the network coding process,
resulting in a greater damage than under traditional routing. In this paper, we
address this issue by designing an unconditionally secure authentication code
suitable for multicast network coding. The proposed scheme is robust against
pollution attacks from outsiders, as well as coalitions of malicious insiders.
Intermediate nodes can verify the integrity and origin of the packets received
without having to decode, and thus detect and discard the malicious messages
in-transit that fail the verification. This way, the pollution is canceled out
before reaching the destinations. We analyze the performance of the scheme in
terms of both multicast throughput and goodput, and show the goodput gains. We
also discuss applications to file distribution.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 06:05:44 GMT"
}
] | 2009-09-18T00:00:00 |
[
[
"Oggier",
"Frederique",
""
],
[
"Fathi",
"Hanane",
""
]
] |
new_dataset
| 0.980111 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.