id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
0906.3192
Mari Kobayashi
Mari Kobayashi, Merouane Debbah, Shlomo Shamai (Shitz)
Secured Communication over Frequency-Selective Fading Channels: a practical Vandermonde precoding
To appear in EURASIP journal on Wireless Communications and Networking, special issue on Wireless Physical Security, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the frequency-selective broadcast channel with confidential messages (BCC) in which the transmitter sends a confidential message to receiver 1 and a common message to receivers 1 and 2. In the case of a block transmission of N symbols followed by a guard interval of L symbols, the frequency-selective channel can be modeled as a N * (N+L) Toeplitz matrix. For this special type of multiple-input multiple-output (MIMO) channels, we propose a practical Vandermonde precoding that consists of projecting the confidential messages in the null space of the channel seen by receiver 2 while superposing the common message. For this scheme, we provide the achievable rate region, i.e. the rate-tuple of the common and confidential messages, and characterize the optimal covariance inputs for some special cases of interest. It is proved that the proposed scheme achieves the optimal degree of freedom (d.o.f) region. More specifically, it enables to send l <= L confidential messages and N-l common messages simultaneously over a block of N+L symbols. Interestingly, the proposed scheme can be applied to secured multiuser scenarios such as the K+1-user frequency-selective BCC with K confidential messages and the two-user frequency-selective BCC with two confidential messages. For each scenario, we provide the achievable secrecy degree of freedom (s.d.o.f.) region of the corresponding frequency-selective BCC and prove the optimality of the Vandermonde precoding. One of the appealing features of the proposed scheme is that it does not require any specific secrecy encoding technique but can be applied on top of any existing powerful encoding schemes.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 14:28:30 GMT" } ]
2009-06-18T00:00:00
[ [ "Kobayashi", "Mari", "", "Shitz" ], [ "Debbah", "Merouane", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
new_dataset
0.971813
0906.3208
EPTCS
Alexander Okhotin
Representing a P-complete problem by small trellis automata
null
EPTCS 1, 2009, pp. 185-198
10.4204/EPTCS.1.18
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A restricted case of the Circuit Value Problem known as the Sequential NOR Circuit Value Problem was recently used to obtain very succinct examples of conjunctive grammars, Boolean grammars and language equations representing P-complete languages (Okhotin, http://dx.doi.org/10.1007/978-3-540-74593-8_23 "A simple P-complete problem and its representations by language equations", MCU 2007). In this paper, a new encoding of the same problem is proposed, and a trellis automaton (one-way real-time cellular automaton) with 11 states solving this problem is constructed.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 15:21:41 GMT" } ]
2009-06-18T00:00:00
[ [ "Okhotin", "Alexander", "" ] ]
new_dataset
0.960366
0906.3286
Niall Murphy
Fred Lunnon
The Pagoda Sequence: a Ramble through Linear Complexity, Number Walls, D0L Sequences, Finite State Automata, and Aperiodic Tilings
null
EPTCS 1, 2009, pp. 130-148
10.4204/EPTCS.1.13
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We review the concept of the number wall as an alternative to the traditional linear complexity profile (LCP), and sketch the relationship to other topics such as linear feedback shift-register (LFSR) and context-free Lindenmayer (D0L) sequences. A remarkable ternary analogue of the Thue-Morse sequence is introduced having deficiency 2 modulo 3, and this property verified via the re-interpretation of the number wall as an aperiodic plane tiling.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 19:47:52 GMT" } ]
2009-06-18T00:00:00
[ [ "Lunnon", "Fred", "" ] ]
new_dataset
0.999369
0906.2866
Pierre Hyvernat
Pierre Hyvernat (LAMA, Iml)
Predicate Transformers, (co)Monads and Resolutions
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This short note contains random thoughts about a factorization theorem for closure/interior operators on a powerset which is reminiscent to the notion of resolution for a monad/comonad. The question originated from formal topology but is interesting in itself. The result holds constructively (even if it classically has several variations); but usually not predicatively (in the sense that the interpolant will no be given by a set). For those not familiar with predicativity issues, we look at a ``classical'' version where we bound the size of the interpolant.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 08:33:18 GMT" } ]
2009-06-17T00:00:00
[ [ "Hyvernat", "Pierre", "", "LAMA, Iml" ] ]
new_dataset
0.999176
0906.2315
Raphael Jolly
Raphael Jolly, Heinz Kredel
Symbolic Script Programming for Java
null
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computer algebra in Java is a promising field of development. It has not yet reached an industrial strength, in part because of a lack of good user interfaces. Using a general purpose scripting language can bring a natural mathematical notation, akin to the one of specialized interfaces included in most computer algebra systems. We present such an interface for Java computer algebra libraries, using scripts available in the JSR 223 framework. We introduce the concept of `symbolic programming' and show its usefulness by prototypes of symbolic polynomials and polynomial rings.
[ { "version": "v1", "created": "Fri, 12 Jun 2009 12:38:22 GMT" }, { "version": "v2", "created": "Sun, 14 Jun 2009 10:39:44 GMT" } ]
2009-06-15T00:00:00
[ [ "Jolly", "Raphael", "" ], [ "Kredel", "Heinz", "" ] ]
new_dataset
0.998752
0906.2061
Rethnakaran Pulikkoonattu
Rethnakaran Pulikkoonattu
On the Minimum Distance of Non Binary LDPC Codes
Student project report LTHC, EPFL, Switzerland, Jun. 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Minimum distance is an important parameter of a linear error correcting code. For improved performance of binary Low Density Parity Check (LDPC) codes, we need to have the minimum distance grow fast with n, the codelength. However, the best we can hope for is a linear growth in dmin with n. For binary LDPC codes, the necessary and sufficient conditions on the LDPC ensemble parameters, to ensure linear growth of minimum distance is well established. In the case of non-binary LDPC codes, the structure of logarithmic weight codewords is different from that of binary codes. We have carried out a preliminary study on the logarithmic bound on the the minimum distance of non-binary LDPC code ensembles. In particular, we have investigated certain configurations which would lead to low weight codewords. A set of simulations are performed to identify some of these configurations. Finally, we have provided a bound on the logarithmic minimum distance of nonbinary codes, using a strategy similar to the girth bound for binary codes. This bound has the same asymptotic behaviour as that of binary codes.
[ { "version": "v1", "created": "Thu, 11 Jun 2009 09:32:11 GMT" } ]
2009-06-12T00:00:00
[ [ "Pulikkoonattu", "Rethnakaran", "" ] ]
new_dataset
0.996474
0906.2143
Andrea Manara
J. T. Moscicki, A. Manara, M. Lamanna, P. Mendez, A. Muraru
Dependable Distributed Computing for the International Telecommunication Union Regional Radio Conference RRC06
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The International Telecommunication Union (ITU) Regional Radio Conference (RRC06) established in 2006 a new frequency plan for the introduction of digital broadcasting in European, African, Arab, CIS countries and Iran. The preparation of the plan involved complex calculations under short deadline and required dependable and efficient computing capability. The ITU designed and deployed in-situ a dedicated PC farm, in parallel to the European Organization for Nuclear Research (CERN) which provided and supported a system based on the EGEE Grid. The planning cycle at the RRC06 required a periodic execution in the order of 200,000 short jobs, using several hundreds of CPU hours, in a period of less than 12 hours. The nature of the problem required dynamic workload-balancing and low-latency access to the computing resources. We present the strategy and key technical choices that delivered a reliable service to the RRC06.
[ { "version": "v1", "created": "Thu, 11 Jun 2009 16:04:12 GMT" } ]
2009-06-12T00:00:00
[ [ "Moscicki", "J. T.", "" ], [ "Manara", "A.", "" ], [ "Lamanna", "M.", "" ], [ "Mendez", "P.", "" ], [ "Muraru", "A.", "" ] ]
new_dataset
0.999139
0906.1644
Florentina Pintea
Dorel Micle, Marcel Torok-Oance, Liviu Maruia
The morpho-topographic and cartographic analysis of the archaeological site Cornesti "Iarcuri", Timis County, Romania, using computer sciences methods (GIS and Remote Sensing techniques)
14 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),249-262
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The archaeological site Cornesti "Iarcuri" is the largest earth fortification in Romania, made out of four concentric compounds, spreading over 1780 hectares. It is known since 1700, but it had only a few small attempts of systematic research, the fortress gained interest only after the publishing of some satellite images by Google Earth. It is located in an area of high fields and it occupies three interfluves and contains two streams. Our paper contains a geomorphologic, topographic and cartographic analysis of the site in order to determine the limits, the structure, the morphology, the construction technique and the functionality of such a fortification.Our research is based on satellite image analysis, on archaeological topography, on soil, climate and vegetation analysis as a way to offer a complex image, through this interdisciplinary study of landscape archaeology. Through our work we try not to date the site as this objective will be achieved only after completing the systematic excavations which started in 2007, but only to analyze the co-relationship with the environment.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 07:02:11 GMT" } ]
2009-06-10T00:00:00
[ [ "Micle", "Dorel", "" ], [ "Torok-Oance", "Marcel", "" ], [ "Maruia", "Liviu", "" ] ]
new_dataset
0.999613
0906.1226
Jianhua Fan
Jorg Peters and Jianhua Fan
On the Complexity of Smooth Spline Surfaces from Quad Meshes
null
null
null
null
cs.GR cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper derives strong relations that boundary curves of a smooth complex of patches have to obey when the patches are computed by local averaging. These relations restrict the choice of reparameterizations for geometric continuity. In particular, when one bicubic tensor-product B-spline patch is associated with each facet of a quadrilateral mesh with n-valent vertices and we do not want segments of the boundary curves forced to be linear, then the relations dictate the minimal number and multiplicity of knots: For general data, the tensor-product spline patches must have at least two internal double knots per edge to be able to model a G^1-conneced complex of C^1 splines. This lower bound on the complexity of any construction is proven to be sharp by suitably interpreting an existing surface construction. That is, we have a tight bound on the complexity of smoothing quad meshes with bicubic tensor-product B-spline patches.
[ { "version": "v1", "created": "Fri, 5 Jun 2009 22:57:04 GMT" } ]
2009-06-09T00:00:00
[ [ "Peters", "Jorg", "" ], [ "Fan", "Jianhua", "" ] ]
new_dataset
0.993
0906.0859
Florentina Pintea
Emil Daniel Schwab
A Partial Order on Bipartite Graphs with n Vertices
10 pages,exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),315-324
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper examines a partial order on bipartite graphs (X1, X2, E) with n vertices, X1UX2={1,2,...,n}. This partial order is a natural partial order of subobjects of an object in a triangular category with bipartite graphs as morphisms.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 09:25:43 GMT" } ]
2009-06-05T00:00:00
[ [ "Schwab", "Emil Daniel", "" ] ]
new_dataset
0.99521
0906.0866
Florentina Pintea
Virgiliu Streian, Adela Ionescu
Web Publishing of the Files Obtained by Flash
10 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),349-358
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this article is to familiarize the user with the Web publishing of the files obtained by Flash. The article contains an overview of Macromedia Flash 5, as well as the running of a Playing Flash movie, information on Flash and Generator, the publishing of Flash movies, a HTLM publishing for Flash Player files and publishing by Generator templates.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 09:52:22 GMT" } ]
2009-06-05T00:00:00
[ [ "Streian", "Virgiliu", "" ], [ "Ionescu", "Adela", "" ] ]
new_dataset
0.98615
0906.0869
Florentina Pintea
Valentin Vieriu, Catalin Tuican
Adobe AIR, Bringing Rich Internet Applications to the Desktop
14 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),367-380
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rich Internet Applications are the new trend in software development today. Adobe AIR offers the possibility to create cross-platform desktop applications using popular Web technologies like HTML, JavaScript, Flash and Flex. This article is focused on presenting the advantages that this new environment has to offer for the web development community and how quickly you can develop a desktop application using Adobe AIR.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 10:00:21 GMT" } ]
2009-06-05T00:00:00
[ [ "Vieriu", "Valentin", "" ], [ "Tuican", "Catalin", "" ] ]
new_dataset
0.984265
0906.0877
Florentina Pintea
Florentina Anica Pintea, Georgiana Petruta Fintineanu, Bogdan Ioan Selariu
PayPal in Romania
8 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),277-284
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present paper refers to the usefulness of online payment through PayPal and to the development of this payment manner in Romania. PayPal is an example of a payment intermediary service that facilitates worldwide e-commerce.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 10:31:19 GMT" } ]
2009-06-05T00:00:00
[ [ "Pintea", "Florentina Anica", "" ], [ "Fintineanu", "Georgiana Petruta", "" ], [ "Selariu", "Bogdan Ioan", "" ] ]
new_dataset
0.998166
0906.0964
Brian Carroll
Brian Carroll
On Sparse Channel Estimation
M.S. Thesis (106 pages, 35 figures)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Channel Estimation is an essential component in applications such as radar and data communication. In multi path time varying environments, it is necessary to estimate time-shifts, scale-shifts (the wideband equivalent of Doppler-shifts), and the gains/phases of each of the multiple paths. With recent advances in sparse estimation (or "compressive sensing"), new estimation techniques have emerged which yield more accurate estimates of these channel parameters than traditional strategies. These estimation strategies, however, restrict potential estimates of time-shifts and scale-shifts to a finite set of values separated by a choice of grid spacing. A small grid spacing increases the number of potential estimates, thus lowering the quantization error, but also increases complexity and estimation time. Conversely, a large grid spacing lowers the number of potential estimates, thus lowering the complexity and estimation time, but increases the quantization error. In this thesis, we derive an expression which relates the choice of grid spacing to the mean-squared quantization error. Furthermore, we consider the case when scale-shifts are approximated by Doppler-shifts, and derive a similar expression relating the choice of the grid spacing and the quantization error. Using insights gained from these expressions, we further explore the effects of the choice and grid spacing, and examine when a wideband model can be well approximated by a narrowband model.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 19:45:40 GMT" } ]
2009-06-05T00:00:00
[ [ "Carroll", "Brian", "" ] ]
new_dataset
0.988425
0807.4247
Merce Villanueva
Cristina Fernandez-Cordoba, Jaume Pujol, and Merce Villanueva
Z2Z4-linear codes: rank and kernel
null
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A code C is Z2Z4-additive if the set of coordinates can be partitioned into two subsets X and Y such that the punctured code of C by deleting the coordinates outside X (respectively, Y) is a binary linear code (respectively, a quaternary linear code). In this paper, the rank and dimension of the kernel for Z2Z4-linear codes, which are the corresponding binary codes of Z2Z4-additive codes, are studied. The possible values of these two parameters for Z2Z4-linear codes, giving lower and upper bounds, are established. For each possible rank r between these bounds, the construction of a Z2Z4-linear code with rank r is given. Equivalently, for each possible dimension of the kernel k, the construction of a Z2Z4-linear code with dimension of the kernel k is given. Finally, the bounds on the rank, once the kernel dimension is fixed, are established and the construction of a Z2Z4-additive code for each possible pair (r,k) is given.
[ { "version": "v1", "created": "Sat, 26 Jul 2008 18:30:23 GMT" }, { "version": "v2", "created": "Thu, 4 Jun 2009 09:42:16 GMT" } ]
2009-06-04T00:00:00
[ [ "Fernandez-Cordoba", "Cristina", "" ], [ "Pujol", "Jaume", "" ], [ "Villanueva", "Merce", "" ] ]
new_dataset
0.998095
0906.0731
Paul Vitanyi
Paul M.B. Vitanyi (CWI, Amsterdam)
Distributed elections in an Archimedean ring of processors
null
16th ACM Symposium on Theory of Computing, Washington D.C., 1984, 542 - 547
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Unlimited asynchronism is intolerable in real physically distributed computer systems. Such systems, synchronous or not, use clocks and timeouts. Therefore the magnitudes of elapsed absolute time in the system need to satisfy the axiom of Archimedes. Under this restriction of asynchronicity logically time-independent solutions can be derived which are nonetheless better (in number of message passes) than is possible otherwise. The use of clocks by the individual processors, in elections in a ring of asynchronous processors without central control, allows a deterministic solution which requires but a linear number of message passes. To obtain the result it has to be assumed that the clocks measure finitely proportional absolute time-spans for their time units, that is, the magnitudes of elapsed time in the ring network satisfy the axiom of Archimedes. As a result, some basic subtilities associated with distributed computations are highlighted. For instance, the known nonlinear lower bound on the required number of message passes is cracked. For the synchronous case, in which the necessary assumptions hold a fortiori, the method is -asymptotically- the most efficient one yet, and of optimal order of magnitude. The deterministic algorithm is of -asymptotically- optimal bit complexity, and, in the synchronous case, also yields an optimal method to determine the ring size. All of these results improve the known ones.
[ { "version": "v1", "created": "Wed, 27 May 2009 16:07:56 GMT" } ]
2009-06-04T00:00:00
[ [ "Vitanyi", "Paul M. B.", "", "CWI, Amsterdam" ] ]
new_dataset
0.99076
0906.0739
Kun Zheng
Kun Zheng, Husheng Li, Seddik M. Djouadi and Jun Wang
Spectrum Sensing in Low SNR Regime via Stochastic Resonance
5 pages, 9 figures, submitted to Asilomar 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectrum sensing is essential in cognitive radio to enable dynamic spectrum access. In many scenarios, primary user signal must be detected reliably in low signal-to-noise ratio (SNR) regime under required sensing time. We propose to use stochastic resonance, a nonlinear filter having certain resonance frequency, to detect primary users when the SNR is very low. Both block and sequential detection schemes are studied. Simulation results show that, under the required false alarm rate, both detection probability and average detection delay can be substantially improved. A few implementation issues are also discussed.
[ { "version": "v1", "created": "Wed, 3 Jun 2009 16:29:22 GMT" } ]
2009-06-04T00:00:00
[ [ "Zheng", "Kun", "" ], [ "Li", "Husheng", "" ], [ "Djouadi", "Seddik M.", "" ], [ "Wang", "Jun", "" ] ]
new_dataset
0.984604
0906.0550
Josep Rif\`a
J. Borges J. Rifa V. Zinoviev
On linear completely regular codes with covering radius $\rho=1$. Construction and classification
Submitted to IEEE, Trans. Inf. Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Completely regular codes with covering radius $\rho=1$ must have minimum distance $d\leq 3$. For $d=3$, such codes are perfect and their parameters are well known. In this paper, the cases $d=1$ and $d=2$ are studied and completely characterized when the codes are linear. Moreover, it is proven that all these codes are completely transitive.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 17:48:02 GMT" } ]
2009-06-03T00:00:00
[ [ "Zinoviev", "J. Borges J. Rifa V.", "" ] ]
new_dataset
0.992297
0906.0151
Didehvar Farzaad
Mahtab Hoseininia, Farzad Didehvar, Mir Mehdi Seyyed Esfahani
Inventory competition in a multi channel distribution system: The Nash and Stackelberg game
20 pages, 1 figure
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates inventory management in a multi channel distribution system consisting of one manufacturer and an arbitrary number of retailers that face stochastic demand. Existence of the pure Nash equilibrium is proved and parameter restriction which implies uniqueness of it is derived. Also the Stackelberg game where the manufacturer plays a roll as a leader is discussed. Under specified parameter restrictions which guarantee profitability, sufficient condition for uniqueness of Stackelberg equilibrium is obtained. In addition comparison with simultaneous move game is made. The result shows that when whole prices are equal to production cost, manufacturer carries more inventory than simultaneous move game. Keywords: Inventory management, Substitution, Nash equilibrium, Stackelberg equilibrium.
[ { "version": "v1", "created": "Sun, 31 May 2009 12:25:12 GMT" } ]
2009-06-02T00:00:00
[ [ "Hoseininia", "Mahtab", "" ], [ "Didehvar", "Farzad", "" ], [ "Esfahani", "Mir Mehdi Seyyed", "" ] ]
new_dataset
0.996544
0906.0268
Vincent N\'elis
Vincent Nelis and Joel Goossens
MORA: an Energy-Aware Slack Reclamation Scheme for Scheduling Sporadic Real-Time Tasks upon Multiprocessor Platforms
11 pages
null
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the global and preemptive energy-aware scheduling problem of sporadic constrained-deadline tasks on DVFS-identical multiprocessor platforms. We propose an online slack reclamation scheme which profits from the discrepancy between the worst- and actual-case execution time of the tasks by slowing down the speed of the processors in order to save energy. Our algorithm called MORA takes into account the application-specific consumption profile of the tasks. We demonstrate that MORA does not jeopardize the system schedulability and we show by performing simulations that it can save up to 32% of energy (in average) compared to execution without using any energy-aware algorithm.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 12:10:10 GMT" } ]
2009-06-02T00:00:00
[ [ "Nelis", "Vincent", "" ], [ "Goossens", "Joel", "" ] ]
new_dataset
0.997127
0905.4612
Inge Bethke
Jan A. Bergstra and Inge Bethke
Straight-line instruction sequence completeness for total calculation on cancellation meadows
24 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A combination of program algebra with the theory of meadows is designed leading to a theory of computation in algebraic structures which use in addition to a zero test and copying instructions the instruction set $\{x \Leftarrow 0, x \Leftarrow 1, x\Leftarrow -x, x\Leftarrow x^{-1}, x\Leftarrow x+y, x\Leftarrow x\cdot y\}$. It is proven that total functions on cancellation meadows can be computed by straight-line programs using at most 5 auxiliary variables. A similar result is obtained for signed meadows.
[ { "version": "v1", "created": "Thu, 28 May 2009 11:13:58 GMT" }, { "version": "v2", "created": "Fri, 29 May 2009 14:14:17 GMT" } ]
2009-05-29T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Bethke", "Inge", "" ] ]
new_dataset
0.972498
0905.3713
Limin Xiang
Limin Xiang
A formal proof of the four color theorem
9 pages, 2 Figures
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A formal proof has not been found for the four color theorem since 1852 when Francis Guthrie first conjectured the four color theorem. Why? A bad idea, we think, directed people to a rough road. Using a similar method to that for the formal proof of the five color theorem, a formal proof is proposed in this paper of the four color theorem, namely, every planar graph is four-colorable. The formal proof proposed can also be regarded as an algorithm to color a planar graph using four colors so that no two adjacent vertices receive the same color.
[ { "version": "v1", "created": "Fri, 22 May 2009 15:57:26 GMT" }, { "version": "v2", "created": "Wed, 27 May 2009 09:44:28 GMT" } ]
2009-05-27T00:00:00
[ [ "Xiang", "Limin", "" ] ]
new_dataset
0.985237
0905.4090
Bart Jacobs
Bart Jacobs
Orthomodular lattices, Foulis Semigroups and Dagger Kernel Categories
31 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is a sequel to arXiv:0902.2355 and continues the study of quantum logic via dagger kernel categories. It develops the relation between these categories and both orthomodular lattices and Foulis semigroups. The relation between the latter two notions has been uncovered in the 1960s. The current categorical perspective gives a broader context and reconstructs this relationship between orthomodular lattices and Foulis semigroups as special instance.
[ { "version": "v1", "created": "Mon, 25 May 2009 22:38:41 GMT" } ]
2009-05-27T00:00:00
[ [ "Jacobs", "Bart", "" ] ]
new_dataset
0.97983
0905.4163
Murat Guzeltepe Mr
Murat Guzeltepe, Mehmet Ozen
Cyclic Codes over Some Finite Rings
null
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper cyclic codes are established with respect to the Mannheim metric over some finite rings by using Gaussian integers and the decoding algorithm for these codes is given.
[ { "version": "v1", "created": "Tue, 26 May 2009 11:06:33 GMT" } ]
2009-05-27T00:00:00
[ [ "Guzeltepe", "Murat", "" ], [ "Ozen", "Mehmet", "" ] ]
new_dataset
0.997781
0905.4200
Tom Hirschowitz
Richard Garner, Tom Hirschowitz (LAMA), Aur\'elien Pardon (LIP)
Variable binding, symmetric monoidal closed theories, and bigraphs
An introduction to two more technical previous preprints. Accepted at Concur '09
null
null
null
cs.LO cs.PL math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the use of symmetric monoidal closed (SMC) structure for representing syntax with variable binding, in particular for languages with linear aspects. In our setting, one first specifies an SMC theory T, which may express binding operations, in a way reminiscent from higher-order abstract syntax. This theory generates an SMC category S(T) whose morphisms are, in a sense, terms in the desired syntax. We apply our approach to Jensen and Milner's (abstract binding) bigraphs, which are linear w.r.t. processes. This leads to an alternative category of bigraphs, which we compare to the original.
[ { "version": "v1", "created": "Tue, 26 May 2009 13:43:16 GMT" } ]
2009-05-27T00:00:00
[ [ "Garner", "Richard", "", "LAMA" ], [ "Hirschowitz", "Tom", "", "LAMA" ], [ "Pardon", "Aurélien", "", "LIP" ] ]
new_dataset
0.985676
0905.3946
Chih-Hong Cheng
Chih-Hong Cheng, Christian Buckl, Javier Esparza, Alois Knoll
FTOS-Verify: Analysis and Verification of Non-Functional Properties for Fault-Tolerant Systems
(bibliography update)
null
null
null
cs.DC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The focus of the tool FTOS is to alleviate designers' burden by offering code generation for non-functional aspects including fault-tolerance mechanisms. One crucial aspect in this context is to ensure that user-selected mechanisms for the system model are sufficient to resist faults as specified in the underlying fault hypothesis. In this paper, formal approaches in verification are proposed to assist the claim. We first raise the precision of FTOS into pure mathematical constructs, and formulate the deterministic assumption, which is necessary as an extension of Giotto-like systems (e.g., FTOS) to equip with fault-tolerance abilities. We show that local properties of a system with the deterministic assumption will be preserved in a modified synchronous system used as the verification model. This enables the use of techniques known from hardware verification. As for implementation, we develop a prototype tool called FTOS-Verify, deploy it as an Eclipse add-on for FTOS, and conduct several case studies.
[ { "version": "v1", "created": "Mon, 25 May 2009 06:11:42 GMT" } ]
2009-05-26T00:00:00
[ [ "Cheng", "Chih-Hong", "" ], [ "Buckl", "Christian", "" ], [ "Esparza", "Javier", "" ], [ "Knoll", "Alois", "" ] ]
new_dataset
0.985908
0905.3998
Pierre Hyvernat
Pierre Hyvernat (IML)
Predicate Transformers and Linear Logic, yet another denotational model
null
Computer Science and Logic 2004, Karpacz : Pologne (2004)
null
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the refinement calculus, monotonic predicate transformers are used to model specifications for (imperative) programs. Together with a natural notion of simulation, they form a category enjoying many algebraic properties. We build on this structure to make predicate transformers into a de notational model of full linear logic: all the logical constructions have a natural interpretation in terms of predicate transformers (i.e. in terms of specifications). We then interpret proofs of a formula by a safety property for the corresponding specification.
[ { "version": "v1", "created": "Mon, 25 May 2009 19:16:00 GMT" } ]
2009-05-26T00:00:00
[ [ "Hyvernat", "Pierre", "", "IML" ] ]
new_dataset
0.994595
0902.0084
Miled Abdelwaheb
Abdelwaheb Miled
On a problem of Frobenius in three numbers
5 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For three positive integers ai, aj, ak pairwise coprime, we present an algorithm that find the least multiple of ai that is a positive linear combination of aj, ak. The average running time of this algorithm is O(1). Using this algorithm and the chinese remainder theorem leads to a direct computation of the Frobenius number f(a1, a2, a3).
[ { "version": "v1", "created": "Mon, 2 Feb 2009 14:13:52 GMT" }, { "version": "v2", "created": "Mon, 25 May 2009 17:37:11 GMT" } ]
2009-05-25T00:00:00
[ [ "Miled", "Abdelwaheb", "" ] ]
new_dataset
0.96654
0901.2207
Ryuhei Mori
Ryuhei Mori and Toshiyuki Tanaka
Performance and Construction of Polar Codes on Symmetric Binary-Input Memoryless Channels
5 pages, 3 figures, submitted to ISIT2009; revised
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Channel polarization is a method of constructing capacity achieving codes for symmetric binary-input discrete memoryless channels (B-DMCs) [1]. In the original paper, the construction complexity is exponential in the blocklength. In this paper, a new construction method for arbitrary symmetric binary memoryless channel (B-MC) with linear complexity in the blocklength is proposed. Furthermore, new upper and lower bounds of the block error probability of polar codes are derived for the BEC and the arbitrary symmetric B-MC, respectively.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 17:08:36 GMT" }, { "version": "v2", "created": "Sat, 23 May 2009 09:21:04 GMT" } ]
2009-05-23T00:00:00
[ [ "Mori", "Ryuhei", "" ], [ "Tanaka", "Toshiyuki", "" ] ]
new_dataset
0.98937
cs/0307023
David Eppstein
David Eppstein
Testing Bipartiteness of Geometric Intersection Graphs
32 pages, 20 figures. A shorter (10 page) version of this paper was presented at the 15th ACM-SIAM Symp. Discrete Algorithms, New Orleans, 2004, pp. 853-861
ACM Trans. Algorithms 5(2):15, 2009
10.1145/1497290.1497291
null
cs.CG
null
We show how to test the bipartiteness of an intersection graph of n line segments or simple polygons in the plane, or of balls in R^d, in time O(n log n). More generally we find subquadratic algorithms for connectivity and bipartiteness testing of intersection graphs of a broad class of geometric objects. For unit balls in R^d, connectivity testing has equivalent randomized complexity to construction of Euclidean minimum spanning trees, and hence is unlikely to be solved as efficiently as bipartiteness testing. For line segments or planar disks, testing k-colorability of intersection graphs for k>2 is NP-complete.
[ { "version": "v1", "created": "Wed, 9 Jul 2003 21:29:49 GMT" }, { "version": "v2", "created": "Fri, 16 Nov 2007 06:41:36 GMT" } ]
2009-05-23T00:00:00
[ [ "Eppstein", "David", "" ] ]
new_dataset
0.973947
0901.2370
Satish Babu Korada
Nadine Hussami, Satish Babu Korada, Rudiger Urbanke
Performance of Polar Codes for Channel and Source Coding
accepted in ISIT 2009, Figure 5 is different from the previous version
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes, introduced recently by Ar\i kan, are the first family of codes known to achieve capacity of symmetric channels using a low complexity successive cancellation decoder. Although these codes, combined with successive cancellation, are optimal in this respect, their finite-length performance is not record breaking. We discuss several techniques through which their finite-length performance can be improved. We also study the performance of these codes in the context of source coding, both lossless and lossy, in the single-user context as well as for distributed applications.
[ { "version": "v1", "created": "Fri, 16 Jan 2009 14:58:11 GMT" }, { "version": "v2", "created": "Fri, 22 May 2009 16:20:03 GMT" } ]
2009-05-22T00:00:00
[ [ "Hussami", "Nadine", "" ], [ "Korada", "Satish Babu", "" ], [ "Urbanke", "Rudiger", "" ] ]
new_dataset
0.999668
0905.3356
Rom\`an R. Zapatrin
George Parfionov, Rom\`an Zapatrin
Memento Ludi: Information Retrieval from a Game-Theoretic Perspective
null
null
null
null
cs.IR cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a macro-model of information retrieval process using Game Theory as a mathematical theory of conflicts. We represent the participants of the Information Retrieval process as a game of two abstract players. The first player is the `intellectual crowd' of users of search engines, the second is a community of information retrieval systems. In order to apply Game Theory, we treat search log data as Nash equilibrium strategies and solve the inverse problem of finding appropriate payoff functions. For that, we suggest a particular model, which we call Alpha model. Within this model, we suggest a method, called shifting, which makes it possible to partially control the behavior of massive users. This Note is addressed to researchers in both game theory (providing a new class of real life problems) and information retrieval, for whom we present new techniques to control the IR environment.
[ { "version": "v1", "created": "Wed, 20 May 2009 17:04:07 GMT" } ]
2009-05-21T00:00:00
[ [ "Parfionov", "George", "" ], [ "Zapatrin", "Romàn", "" ] ]
new_dataset
0.996887
0905.3107
Travis Gagie
Travis Gagie, Gonzalo Navarro, Yakov Nekrich
Fast and Compact Prefix Codes
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well-known that, given a probability distribution over $n$ characters, in the worst case it takes (\Theta (n \log n)) bits to store a prefix code with minimum expected codeword length. However, in this paper we first show that, for any $0<\epsilon<1/2$ with (1 / \epsilon = \Oh{\polylog{n}}), it takes $\Oh{n \log \log (1 / \epsilon)}$ bits to store a prefix code with expected codeword length within $\epsilon$ of the minimum. We then show that, for any constant (c > 1), it takes $\Oh{n^{1 / c} \log n}$ bits to store a prefix code with expected codeword length at most $c$ times the minimum. In both cases, our data structures allow us to encode and decode any character in $\Oh{1}$ time.
[ { "version": "v1", "created": "Tue, 19 May 2009 14:19:08 GMT" } ]
2009-05-20T00:00:00
[ [ "Gagie", "Travis", "" ], [ "Navarro", "Gonzalo", "" ], [ "Nekrich", "Yakov", "" ] ]
new_dataset
0.999194
0905.2540
Swan Dubois
Alain Cournier (MIS), Swan Dubois (LIP6, INRIA Rocquencourt), Vincent Villain (MIS)
Two snap-stabilizing point-to-point communication protocols in message-switched networks
null
null
null
null
cs.DS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A snap-stabilizing protocol, starting from any configuration, always behaves according to its specification. In this paper, we present a snap-stabilizing protocol to solve the message forwarding problem in a message-switched network. In this problem, we must manage resources of the system to deliver messages to any processor of the network. In this purpose, we use information given by a routing algorithm. By the context of stabilization (in particular, the system starts in an arbitrary configuration), this information can be corrupted. So, the existence of a snap-stabilizing protocol for the message forwarding problem implies that we can ask the system to begin forwarding messages even if routing information are initially corrupted. In this paper, we propose two snap-stabilizing algorithms (in the state model) for the following specification of the problem: - Any message can be generated in a finite time. - Any emitted message is delivered to its destination once and only once in a finite time. This implies that our protocol can deliver any emitted message regardless of the state of routing tables in the initial configuration. These two algorithms are based on the previous work of [MS78]. Each algorithm needs a particular method to be transform into a snap-stabilizing one but both of them do not introduce a significant overcost in memory or in time with respect to algorithms of [MS78].
[ { "version": "v1", "created": "Fri, 15 May 2009 12:41:01 GMT" } ]
2009-05-18T00:00:00
[ [ "Cournier", "Alain", "", "MIS" ], [ "Dubois", "Swan", "", "LIP6, INRIA Rocquencourt" ], [ "Villain", "Vincent", "", "MIS" ] ]
new_dataset
0.97057
0804.4073
Gilles Champenois
Gilles Champenois
Grainy Numbers
null
null
null
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Grainy numbers are defined as tuples of bits. They form a lattice where the meet and the join operations are an addition and a multiplication. They may be substituted for the real numbers in the definition of fuzzy sets. The aim is to propose an alternative negation for the complement that we'll call supplement.
[ { "version": "v1", "created": "Fri, 25 Apr 2008 09:36:17 GMT" }, { "version": "v2", "created": "Thu, 8 May 2008 09:07:18 GMT" }, { "version": "v3", "created": "Thu, 12 Jun 2008 22:10:31 GMT" }, { "version": "v4", "created": "Wed, 9 Jul 2008 11:01:54 GMT" }, { "version": "v5", "created": "Thu, 10 Jul 2008 09:23:47 GMT" }, { "version": "v6", "created": "Sun, 17 May 2009 13:45:46 GMT" } ]
2009-05-17T00:00:00
[ [ "Champenois", "Gilles", "" ] ]
new_dataset
0.999853
0904.0768
Andrew Thangaraj
Srimathy Srinivasan, Andrew Thangaraj
Codes on Planar Graphs
several improvements in presentation; more figures for illustration
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Codes defined on graphs and their properties have been subjects of intense recent research. On the practical side, constructions for capacity-approaching codes are graphical. On the theoretical side, codes on graphs provide several intriguing problems in the intersection of coding theory and graph theory. In this paper, we study codes defined by planar Tanner graphs. We derive an upper bound on minimum distance $d$ of such codes as a function of the code rate $R$ for $R \ge 5/8$. The bound is given by $$d\le \lceil \frac{7-8R}{2(2R-1)} \rceil + 3\le 7.$$ Among the interesting conclusions of this result are the following: (1) planar graphs do not support asymptotically good codes, and (2) finite-length, high-rate codes on graphs with high minimum distance will necessarily be non-planar.
[ { "version": "v1", "created": "Sun, 5 Apr 2009 12:43:37 GMT" }, { "version": "v2", "created": "Fri, 15 May 2009 06:42:29 GMT" } ]
2009-05-15T00:00:00
[ [ "Srinivasan", "Srimathy", "" ], [ "Thangaraj", "Andrew", "" ] ]
new_dataset
0.999773
0904.2541
Heidi Gebauer
Heidi Gebauer
Disproof of the Neighborhood Conjecture with Implications to SAT
12 pages, 1 figure
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a Maker/Breaker game described by Beck. As a result we disprove a conjecture of Beck on positional games, establish a connection between this game and SAT and construct an unsatisfiable k-CNF formula with few occurrences per variable, thereby improving a previous result by Hoory and Szeider and showing that the bound obtained from the Lovasz Local Lemma is tight up to a constant factor. The Maker/Breaker game we study is as follows. Maker and Breaker take turns in choosing vertices from a given n-uniform hypergraph F, with Maker going first. Maker's goal is to completely occupy a hyperedge and Breaker tries to avoid this. Beck conjectures that if the maximum neighborhood size of F is at most 2^(n-1) then Breaker has a winning strategy. We disprove this conjecture by establishing an n-uniform hypergraph with maximum neighborhood size 3*2^(n - 3) where Maker has a winning strategy. Moreover, we show how to construct an n-uniform hypergraph with maximum degree (2^(n-1))/n where maker has a winning strategy. Finally, we establish a connection between SAT and the Maker/Breaker game we study. We can use this connection to derive new results in SAT. Kratochvil, Savicky and Tuza showed that for every k >= 3 there is an integer f(k) such that every (k,f(k))-formula is satisfiable, but (k,f(k) + 1)-SAT is already NP-complete (it is not known whether f(k) is computable). Kratochvil, Savicky and Tuza also gave the best known lower bound f(k) = Omega(2^k/k), which is a consequence of the Lovasz Local Lemma. We prove that, in fact, f(k) = Theta(2^k/k), improving upon the best known upper bound O((log k) * 2^k/k) by Hoory and Szeider.
[ { "version": "v1", "created": "Thu, 16 Apr 2009 17:04:21 GMT" }, { "version": "v2", "created": "Thu, 7 May 2009 21:25:14 GMT" }, { "version": "v3", "created": "Fri, 15 May 2009 07:59:53 GMT" } ]
2009-05-15T00:00:00
[ [ "Gebauer", "Heidi", "" ] ]
new_dataset
0.99428
0905.2214
Michael Goodrich
Michael T. Goodrich, Michael J. Nelson, Jonathan Z. Sun
The Rainbow Skip Graph: A Fault-Tolerant Constant-Degree P2P Relay Structure
Expanded version of a paper appearing in ACM-SIAM Symp. on Discrete Algorithms (SODA)
null
null
null
cs.DS cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a distributed data structure, which we call the rainbow skip graph. To our knowledge, this is the first peer-to-peer data structure that simultaneously achieves high fault tolerance, constant-sized nodes, and fast update and query times for ordered data. It is a non-trivial adaptation of the SkipNet/skip-graph structures of Harvey et al. and Aspnes and Shah, so as to provide fault-tolerance as these structures do, but to do so using constant-sized nodes, as in the family tree structure of Zatloukal and Harvey. It supports successor queries on a set of n items using O(log n) messages with high probability, an improvement over the expected O(log n) messages of the family tree.
[ { "version": "v1", "created": "Wed, 13 May 2009 22:40:52 GMT" } ]
2009-05-15T00:00:00
[ [ "Goodrich", "Michael T.", "" ], [ "Nelson", "Michael J.", "" ], [ "Sun", "Jonathan Z.", "" ] ]
new_dataset
0.996477
0905.2249
Joseph O'Rourke
Joseph O'Rourke
Some Properties of Yao Y4 Subgraphs
7 pages, 6 figures
null
null
Smith Technical Report 093
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Yao graph for k=4, Y4, is naturally partitioned into four subgraphs, one per quadrant. We show that the subgraphs for one quadrant differ from the subgraphs for two adjacent quadrants in three properties: planarity, connectedness, and whether the directed graphs are spanners.
[ { "version": "v1", "created": "Thu, 14 May 2009 04:49:00 GMT" } ]
2009-05-15T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
new_dataset
0.96302
0812.0581
Arnaud Legout
Stevens Le Blond (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Arnaud Legout (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Walid Dabbous (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes)
Pushing BitTorrent Locality to the Limit
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, it dramatically increases the traffic on inter-ISP links. To solve this issue, the idea to keep a fraction of the P2P traffic local to each ISP was introduced a few years ago. Since then, P2P solutions exploiting locality have been introduced. However, several fundamental issues on locality still need to be explored. In particular, how far can we push locality, and what is, at the scale of the Internet, the reduction of traffic that can be achieved with locality? In this paper, we perform extensive experiments on a controlled environment with up to 10 000 BitTorrent clients to evaluate the impact of high locality on inter-ISP links traffic and peers download completion time. We introduce two simple mechanisms that make high locality possible in challenging scenarios and we show that we save up to several orders of magnitude inter-ISP traffic compared to traditional locality without adversely impacting peers download completion time. In addition, we crawled 214 443 torrents representing 6 113 224 unique peers spread among 9 605 ASes. We show that whereas the torrents we crawled generated 11.6 petabytes of inter-ISP traffic, our locality policy implemented for all torrents would have reduced the global inter-ISP traffic by 40%.
[ { "version": "v1", "created": "Tue, 2 Dec 2008 20:07:47 GMT" }, { "version": "v2", "created": "Tue, 12 May 2009 15:06:58 GMT" } ]
2009-05-12T00:00:00
[ [ "Blond", "Stevens Le", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ], [ "Legout", "Arnaud", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ], [ "Dabbous", "Walid", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ] ]
new_dataset
0.994974
0711.2605
Gregory Price
Gregory N. Price and Erik D. Demaine
Generalized D-Forms Have No Spurious Creases
revised
null
null
null
cs.CG
http://creativecommons.org/licenses/by/3.0/
A convex surface that is flat everywhere but on finitely many smooth curves (or "seams") and points is a seam form. We show that the only creases through the flat components of a seam form are either between vertices or tangent to the seams. As corollaries we resolve open problems about certain special seam forms: the flat components of a D-form have no creases at all, and the flat component of a pita-form has at most one crease, between the seam's endpoints.
[ { "version": "v1", "created": "Fri, 16 Nov 2007 20:58:57 GMT" }, { "version": "v2", "created": "Thu, 7 May 2009 05:45:19 GMT" } ]
2009-05-07T00:00:00
[ [ "Price", "Gregory N.", "" ], [ "Demaine", "Erik D.", "" ] ]
new_dataset
0.998791
0905.0737
Ignacio Vega-Paez M en C
Ignacio Vega-Paez, Jose Angel Ortega, Georgina G. Pulido
REC language is a live on IBM1130 simulator, EL lenguaje REC esta vivo en el simulador de la IBM 1130
This work is archaeological reconstruction of REC/A language
null
null
IBP-TR2009-04
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
REC (Regular Expression Compiler) is a concise programming language development in mayor Mexican Universities at end of 60s which allows students to write programs without knowledge of the complicated syntax of languages like FORTRAN and ALGOL. The language is recursive and contains only four elements for control. This paper describes use of the interpreter of REC written in FORTRAN on IBM1130 Simulator from -Computer History Simulation- Project.
[ { "version": "v1", "created": "Wed, 6 May 2009 04:21:15 GMT" } ]
2009-05-07T00:00:00
[ [ "Vega-Paez", "Ignacio", "" ], [ "Ortega", "Jose Angel", "" ], [ "Pulido", "Georgina G.", "" ] ]
new_dataset
0.99969
0905.0749
Daniel Sidobre
Xavier Broqu\`ere (LAAS), Daniel Sidobre (LAAS), Ignacio Herrera-Aguilar (LAAS)
Soft Motion Trajectory Planner for Service Manipulator Robot
null
International Conference on Intelligent Robots and Systems, IROS 2008. IEEE/RSJ, Nice : France (2008)
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Human interaction introduces two main constraints: Safety and Comfort. Therefore service robot manipulator can't be controlled like industrial robotic manipulator where personnel is isolated from the robot's work envelope. In this paper, we present a soft motion trajectory planner to try to ensure that these constraints are satisfied. This planner can be used on-line to establish visual and force control loop suitable in presence of human. The cubic trajectories build by this planner are good candidates as output of a manipulation task planner. The obtained system is then homogeneous from task planning to robot control. The soft motion trajectory planner limits jerk, acceleration and velocity in cartesian space using quaternion. Experimental results carried out on a Mitsubishi PA10-6CE arm are presented.
[ { "version": "v1", "created": "Wed, 6 May 2009 06:12:28 GMT" } ]
2009-05-07T00:00:00
[ [ "Broquère", "Xavier", "", "LAAS" ], [ "Sidobre", "Daniel", "", "LAAS" ], [ "Herrera-Aguilar", "Ignacio", "", "LAAS" ] ]
new_dataset
0.99619
0804.1932
Martin Grohe
Leslie Ann Goldberg, Martin Grohe, Mark Jerrum, Marc Thurley
A complexity dichotomy for partition functions with mixed signs
null
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Partition functions, also known as homomorphism functions, form a rich family of graph invariants that contain combinatorial invariants such as the number of k-colourings or the number of independent sets of a graph and also the partition functions of certain "spin glass" models of statistical physics such as the Ising model. Building on earlier work by Dyer, Greenhill and Bulatov, Grohe, we completely classify the computational complexity of partition functions. Our main result is a dichotomy theorem stating that every partition function is either computable in polynomial time or #P-complete. Partition functions are described by symmetric matrices with real entries, and we prove that it is decidable in polynomial time in terms of the matrix whether a given partition function is in polynomial time or #P-complete. While in general it is very complicated to give an explicit algebraic or combinatorial description of the tractable cases, for partition functions described by a Hadamard matrices -- these turn out to be central in our proofs -- we obtain a simple algebraic tractability criterion, which says that the tractable cases are those "representable" by a quadratic polynomial over the field GF(2).
[ { "version": "v1", "created": "Fri, 11 Apr 2008 18:36:01 GMT" }, { "version": "v2", "created": "Thu, 10 Jul 2008 15:24:13 GMT" }, { "version": "v3", "created": "Tue, 5 May 2009 16:47:49 GMT" } ]
2009-05-05T00:00:00
[ [ "Goldberg", "Leslie Ann", "" ], [ "Grohe", "Martin", "" ], [ "Jerrum", "Mark", "" ], [ "Thurley", "Marc", "" ] ]
new_dataset
0.992136
0905.0417
N. Prasanth Anthapadmanabhan
N. Prasanth Anthapadmanabhan and Alexander Barg
Two-Level Fingerprinting Codes
5 pages, 1 figure, Proc. 2009 IEEE International Symposium on Information Theory (ISIT 2009), Seoul, Korea, June 28 - July 3, 2009
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the notion of two-level fingerprinting and traceability codes. In this setting, the users are organized in a hierarchical manner by classifying them into various groups; for instance, by dividing the distribution area into several geographic regions, and collecting users from the same region into one group. Two-level fingerprinting and traceability codes have the following property: As in traditional (one-level) codes, when given an illegal copy produced by a coalition of users, the decoder identifies one of the guilty users if the coalition size is less than a certain threshold $t$. Moreover, even when the coalition is of a larger size $s$ $(> t)$, the decoder still provides partial information by tracing one of the groups containing a guilty user. We establish sufficient conditions for a code to possess the two-level traceability property. In addition, we also provide constructions for two-level fingerprinting codes and characterize the corresponding set of achievable rates.
[ { "version": "v1", "created": "Mon, 4 May 2009 16:26:27 GMT" } ]
2009-05-05T00:00:00
[ [ "Anthapadmanabhan", "N. Prasanth", "" ], [ "Barg", "Alexander", "" ] ]
new_dataset
0.999782
0904.4926
Athanasios Lioumpas S.
Athanasios S. Lioumpas and George K. Karagiannidis
Variable-Rate M-PSK Communications without Channel Amplitude Estimation
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Channel estimation at the receiver side is essential to adaptive modulation schemes, prohibiting low complexity systems from using variable rate and/or variable power transmissions. Towards providing a solution to this problem, we introduce a variable-rate (VR) M-PSK modulation scheme, for communications over fading channels, in the absence of channel gain estimation at the receiver. The choice of the constellation size is based on the signal-plus-noise (S+N) sampling value rather than on the signal-to-noise ratio (S/N). It is analytically shown that S+N can serve as an excellent simpler criterion, alternative to S/N, for determining the modulation order in VR systems. In this way, low complexity transceivers can use VR transmissions in order to increase their spectral efficiency under an error performance constraint. As an application, we utilize the proposed VR modulation scheme in equal gain combining (EGC) diversity receivers.
[ { "version": "v1", "created": "Thu, 30 Apr 2009 19:35:17 GMT" } ]
2009-05-01T00:00:00
[ [ "Lioumpas", "Athanasios S.", "" ], [ "Karagiannidis", "George K.", "" ] ]
new_dataset
0.994942
0901.2062
Yanling Chen
Yanling Chen and Han Vinck
Notes on Reed-Muller Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the Reed-Muller (RM) codes. For the first order RM code, we prove that it is unique in the sense that any linear code with the same length, dimension and minimum distance must be the first order RM code; For the second order RM code, we give a constructive linear sub-code family for the case when m is even. This is an extension of Corollary 17 of Ch. 15 in the coding book by MacWilliams and Sloane. Furthermore, we show that the specified sub-codes of length <= 256 have minimum distance equal to the upper bound or the best known lower bound for all linear codes of the same length and dimension. As another interesting result, we derive an additive commutative group of the symplectic matrices with full rank.
[ { "version": "v1", "created": "Wed, 14 Jan 2009 16:47:41 GMT" }, { "version": "v2", "created": "Thu, 30 Apr 2009 14:40:19 GMT" } ]
2009-04-30T00:00:00
[ [ "Chen", "Yanling", "" ], [ "Vinck", "Han", "" ] ]
new_dataset
0.981452
0904.3827
Annick Valibouze
Annick Valibouze (LSTA, Lip6)
La R\'esolvante de Lagrange et ses Applications
26 pages
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the changes of representations of a group are used in order to describe its action as algebraic Galois group of an univariate polynomial on the roots of factors of any Lagrange resolvent. By this way, the Galois group of resolvent factors are pre-determinated. In follows, different applications are exposed; in particular, some classical results of algebraic Galois theory.
[ { "version": "v1", "created": "Fri, 24 Apr 2009 09:00:48 GMT" } ]
2009-04-27T00:00:00
[ [ "Valibouze", "Annick", "", "LSTA, Lip6" ] ]
new_dataset
0.980418
0904.3552
Florentina Pintea
Papin Nicolae, Tiberiu Marius Karnyanszky
Internet: Romania vs. Europe
14 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 153-166
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents various access ways to Internet for home users, both for those who are low consumers (consumed time online or traffic monthly value), or large consumers (unlimited connection). The main purpose of the work consists in making a comparison between the situation of the Internet in Romania and other countries in Europe such as Hungary (more western than Romania, so a little more developed, still an Eastern country comparing to the more developed countries in Western Europe and others well developed such as England, Italy, France, and to those in development such as Poland, and at the periphery of Europe such as Ukraine.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 13:30:49 GMT" } ]
2009-04-24T00:00:00
[ [ "Nicolae", "Papin", "" ], [ "Karnyanszky", "Tiberiu Marius", "" ] ]
new_dataset
0.999368
0904.3611
Aubin Jarry
Florian Huc and Aubin Jarry
VRAC: Virtual Raw Anchor Coordinates Routing in Sensor Networks -- Concepts and Experimental Protocol
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to make full use of geographic routing techniques developed for large scale networks, nodes must be localized. However, localization and virtual localization techniques in sensor networks are dependent either on expensive and sometimes unavailable hardware (e.g. GPS) or on sophisticated localization calculus (e.g. triangulation) which are both error-prone and with a costly overhead. Instead of localizing nodes in a traditional 2-dimensional space, we intend to use directly the raw distance to a set of anchors to route messages in the multi-dimensional space. This should enable us to use any geographic routing protocol in a robust and efficient manner in a very large range of scenarios.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 07:40:59 GMT" } ]
2009-04-24T00:00:00
[ [ "Huc", "Florian", "" ], [ "Jarry", "Aubin", "" ] ]
new_dataset
0.977474
0904.3631
Florentina Pintea
Ioan Despi, Lucian Luca
On the Ambiguity of Commercial Open Source
10 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 31-40
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Open source and commercial applications used to be two separate worlds. The former was the work of amateurs who had little interest in making a profit, while the latter was only profit oriented and was produced by big companies. Nowadays open source is a threat and an opportunity to serious businesses of all kinds, generating good profits while delivering low costs products to customers. The competition between commercial and open source software has impacted the industry and the society as a whole. But in the last years, the markets for commercial and open source software are converging rapidly and it is interesting to resume and discuss the implications of this new paradigm, taking into account arguments pro and against it.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 09:07:15 GMT" } ]
2009-04-24T00:00:00
[ [ "Despi", "Ioan", "" ], [ "Luca", "Lucian", "" ] ]
new_dataset
0.978228
0904.3718
Florentina Pintea
K. Yermashov, K. H. Siemsen, K. Wolke, R.A. Rasenack
Architecture of the Neurath Basic Model View Controller
6 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 277-282
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The idea of the Neurath Basic Model View Controller (NBMVC) appeared during the discussion of the design of domain-specific modeling tools based on the Neurath Modeling Language [Yer06]. The NBMVC is the core of the modeling process within the modeling environment. It reduces complexity out of the design process by providing domain-specific interfaces between the developer and the model. These interfaces help to organize and manipulate the model. The organization includes, for example, a layer with visual components to drop them in and filter them out. The control routines includes, for example, model transformations.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 15:05:01 GMT" } ]
2009-04-24T00:00:00
[ [ "Yermashov", "K.", "" ], [ "Siemsen", "K. H.", "" ], [ "Wolke", "K.", "" ], [ "Rasenack", "R. A.", "" ] ]
new_dataset
0.99824
0806.3033
Eric Sopena
Adrien Guignard (LaBRI), Eric Sopena (LaBRI)
Compound Node-Kayles on Paths
Theoretical Computer Science (2009) to appear
Theoretical Computer Science 410, 21-23 (2009) 2033-2044
10.1016/j.tcs.2008.12.053
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In his celebrated book "On Number and Games" (Academic Press, New-York, 1976), J.H. Conway introduced twelve versions of compound games. We analyze these twelve versions for the Node-Kayles game on paths. For usual disjunctive compound, Node-Kayles has been solved for a long time under normal play, while it is still unsolved under mis\`ere play. We thus focus on the ten remaining versions, leaving only one of them unsolved.
[ { "version": "v1", "created": "Wed, 18 Jun 2008 15:47:10 GMT" }, { "version": "v2", "created": "Mon, 5 Jan 2009 20:16:06 GMT" } ]
2009-04-23T00:00:00
[ [ "Guignard", "Adrien", "", "LaBRI" ], [ "Sopena", "Eric", "", "LaBRI" ] ]
new_dataset
0.980359
0904.3458
Praveen Sivadasan
Praveen Sivadasan, P Sojan Lal
JConstHide: A Framework for Java Source Code Constant Hiding
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the program in a semi complied form called byte codes. The existing obfuscation systems obfuscate the Java class files. Obfuscated source code produce obfuscated byte codes and hence two level obfuscation (source code and byte code level) of the program makes it more resilient to reverse engineering attacks . But source code obfuscation is much more difficult due to richer set of programming constructs and the scope of the different variables used in the program and only very little progress has been made on this front. We in this paper are proposing a framework named JConstHide for hiding constants, especially integers in the java source codes, to defeat reverse engineering through decompilation. To the best of our knowledge, no data hiding software are available for java source code constant hiding.
[ { "version": "v1", "created": "Wed, 22 Apr 2009 13:15:31 GMT" } ]
2009-04-23T00:00:00
[ [ "Sivadasan", "Praveen", "" ], [ "Lal", "P Sojan", "" ] ]
new_dataset
0.99905
0904.3148
Hao Chen
Hao Chen
CRT-Based High Speed Parallel Architecture for Long BCH Encoding
3 pages
null
null
null
cs.AR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
BCH (Bose-Chaudhuri-Hocquenghen) error correcting codes ([1]-[2]) are now widely used in communication systems and digital technology. Direct LFSR(linear feedback shifted register)-based encoding of a long BCH code suffers from serial-in and serial-out limitation and large fanout effect of some XOR gates. This makes the LFSR-based encoders of long BCH codes cannot keep up with the data transmission speed in some applications. Several parallel long parallel encoders for long cyclic codes have been proposed in [3]-[8]. The technique for eliminating the large fanout effect by J-unfolding method and some algebraic manipulation was presented in [7] and [8] . In this paper we propose a CRT(Chinese Remainder Theorem)-based parallel architecture for long BCH encoding. Our novel technique can be used to eliminate the fanout bottleneck. The only restriction on the speed of long BCH encoding of our CRT-based architecture is $log_2N$, where $N$ is the length of the BCH code.
[ { "version": "v1", "created": "Tue, 21 Apr 2009 00:34:43 GMT" } ]
2009-04-22T00:00:00
[ [ "Chen", "Hao", "" ] ]
new_dataset
0.999471
0904.3165
Roy Yates
David Tse, Roy Yates
Fading Broadcast Channels with State Information at the Receivers
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite considerable progress on the information-theoretic broadcast channel, the capacity region of fading broadcast channels with channel state known at the receivers but unknown at the transmitter remains unresolved. We address this subject by introducing a layered erasure broadcast channel model in which each component channel has a state that specifies the received signal levels in an instance of a deterministic binary expansion channel. We find the capacity region of this class of broadcast channels. The capacity achieving strategy assigns each signal level to the user that derives the maximum expected rate from that level. The outer bound is based on a channel enhancement that creates a degraded broadcast channel for which the capacity region is known. This same approach is then used to find inner and outer bounds to the capacity region of fading Gaussian broadcast channels. The achievability scheme employs a superposition of binary inputs. For intermittent AWGN channels and for Rayleigh fading channels, the achievable rates are observed to be with 1-2 bits of the outer bound at high SNR. We also prove that the achievable rate region is within 6.386 bits/s/Hz of the capacity region for all fading AWGN broadcast channels.
[ { "version": "v1", "created": "Tue, 21 Apr 2009 06:11:07 GMT" } ]
2009-04-22T00:00:00
[ [ "Tse", "David", "" ], [ "Yates", "Roy", "" ] ]
new_dataset
0.992663
0804.4896
Sidney Rosario
Anne Bouillard (IRISA), Sidney Rosario (IRISA), Albert Benveniste (IRISA), Stefan Haar (IRISA)
Monotony in Service Orchestrations
null
null
null
RR-6528
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web Service orchestrations are compositions of different Web Services to form a new service. The services called during the orchestration guarantee a given performance to the orchestrater, usually in the form of contracts. These contracts can be used by the orchestrater to deduce the contract it can offer to its own clients, by performing contract composition. An implicit assumption in contract based QoS management is: "the better the component services perform, the better the orchestration's performance will be". Thus, contract based QoS management for Web services orchestrations implicitly assumes monotony. In some orchestrations, however, monotony can be violated, i.e., the performance of the orchestration improves when the performance of a component service degrades. This is highly undesirable since it can render the process of contract composition inconsistent. In this paper we define monotony for orchestrations modelled by Colored Occurrence Nets (CO-nets) and we characterize the classes of monotonic orchestrations. We show that few orchestrations are indeed monotonic, mostly since latency can be traded for quality of data. We also propose a sound refinement of monotony, called conditional monotony, which forbids this kind of cheating and show that conditional monotony is widely satisfied by orchestrations. This finding leads to reconsidering the way SLAs should be formulated.
[ { "version": "v1", "created": "Wed, 30 Apr 2008 19:59:01 GMT" }, { "version": "v2", "created": "Tue, 13 May 2008 08:22:29 GMT" } ]
2009-04-20T00:00:00
[ [ "Bouillard", "Anne", "", "IRISA" ], [ "Rosario", "Sidney", "", "IRISA" ], [ "Benveniste", "Albert", "", "IRISA" ], [ "Haar", "Stefan", "", "IRISA" ] ]
new_dataset
0.992558
0805.0087
Sebastien Tixeuil
Adnan Vora, Mikhail Nesterenko, S\'ebastien Tixeuil (LIP6), Sylvie Dela\"et (LRI)
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
null
null
null
RR-6529
cs.DC cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Sybil attack in unknown port networks such as wireless is not considered tractable. A wireless node is not capable of independently differentiating the universe of real nodes from the universe of arbitrary non-existent fictitious nodes created by the attacker. Similar to failure detectors, we propose to use universe detectors to help nodes determine which universe is real. In this paper, we (i) define several variants of the neighborhood discovery problem under Sybil attack (ii) propose a set of matching universe detectors (iii) demonstrate the necessity of additional topological constraints for the problems to be solvable: node density and communication range; (iv) present SAND -- an algorithm that solves these problems with the help of appropriate universe detectors, this solution demonstrates that the proposed universe detectors are the weakest detectors possible for each problem.
[ { "version": "v1", "created": "Thu, 1 May 2008 11:45:54 GMT" }, { "version": "v2", "created": "Tue, 13 May 2008 08:34:03 GMT" } ]
2009-04-20T00:00:00
[ [ "Vora", "Adnan", "", "LIP6" ], [ "Nesterenko", "Mikhail", "", "LIP6" ], [ "Tixeuil", "Sébastien", "", "LIP6" ], [ "Delaët", "Sylvie", "", "LRI" ] ]
new_dataset
0.99694
0807.0425
Cedric Adjih
Song Yean Cho (INRIA Rocquencourt, LIX), C\'edric Adjih (INRIA Rocquencourt)
Wireless Broadcast with Network Coding in Mobile Ad-Hoc Networks: DRAGONCAST
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network coding is a recently proposed method for transmitting data, which has been shown to have potential to improve wireless network performance. We study network coding for one specific case of multicast, broadcasting, from one source to all nodes of the network. We use network coding as a loss tolerant, energy-efficient, method for broadcast. Our emphasis is on mobile networks. Our contribution is the proposal of DRAGONCAST, a protocol to perform network coding in such a dynamically evolving environment. It is based on three building blocks: a method to permit real-time decoding of network coding, a method to adjust the network coding transmission rates, and a method for ensuring the termination of the broadcast. The performance and behavior of the method are explored experimentally by simulations; they illustrate the excellent performance of the protocol.
[ { "version": "v1", "created": "Wed, 2 Jul 2008 19:23:50 GMT" } ]
2009-04-20T00:00:00
[ [ "Cho", "Song Yean", "", "INRIA Rocquencourt, LIX" ], [ "Adjih", "Cédric", "", "INRIA\n Rocquencourt" ] ]
new_dataset
0.996413
0812.2971
Ning Chen
Meghanad D. Wagh, Ning Chen, and Zhiyuan Yan
Cyclotomic FFT of Length 2047 Based on a Novel 11-point Cyclic Convolution
11 pages, 1 figure
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this manuscript, we propose a novel 11-point cyclic convolution algorithm based on alternate Fourier transform. With the proposed bilinear form, we construct a length-2047 cyclotomic FFT.
[ { "version": "v1", "created": "Tue, 16 Dec 2008 05:04:31 GMT" }, { "version": "v2", "created": "Tue, 10 Mar 2009 00:49:02 GMT" }, { "version": "v3", "created": "Mon, 20 Apr 2009 15:44:27 GMT" } ]
2009-04-20T00:00:00
[ [ "Wagh", "Meghanad D.", "" ], [ "Chen", "Ning", "" ], [ "Yan", "Zhiyuan", "" ] ]
new_dataset
0.998257
0904.2584
Jose Avelino Manzano Lizcano
J. A. Manzano Lizcano, S. A. Jaramillo Florez
New technologies for high speed computer networks: a wavelet approach
in spanish, 13 pages, associated research in http://www.airenatural.com; Published in Revista AIELEC de la Universidad Pontificia Bolivariana. 2001
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Indoor multpropagation channel is modeled by the Kaiser electromagnetic wavelet. A method for channel characterization is proposed by modeling all the reflections of indoor propagation in a kernel function instead of its impulse response. This lead us to consider a fractal modulation scheme in which Kaiser wavelets substitute the traditional sinusoidal carrier.
[ { "version": "v1", "created": "Thu, 16 Apr 2009 20:48:43 GMT" } ]
2009-04-20T00:00:00
[ [ "Lizcano", "J. A. Manzano", "" ], [ "Florez", "S. A. Jaramillo", "" ] ]
new_dataset
0.973489
cs/0505088
Valmir Barbosa
Rodrigo S. C. Leao, Valmir C. Barbosa
6-cycle double covers of cubic graphs
This version fixes typos and minor technical problems, and updates references
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A cycle double cover (CDC) of an undirected graph is a collection of the graph's cycles such that every edge of the graph belongs to exactly two cycles. We describe a constructive method for generating all the cubic graphs that have a 6-CDC (a CDC in which every cycle has length 6). As an application of the method, we prove that all such graphs have a Hamiltonian cycle. A sense of direction is an edge labeling on graphs that follows a globally consistent scheme and is known to considerably reduce the complexity of several distributed problems. In [9], a particular instance of sense of direction, called a chordal sense of direction (CSD), is studied and the class of k-regular graphs that admit a CSD with exactly k labels (a minimal CSD) is analyzed. We now show that nearly all the cubic graphs in this class have a 6-CDC, the only exception being K4.
[ { "version": "v1", "created": "Tue, 31 May 2005 15:52:37 GMT" }, { "version": "v2", "created": "Wed, 1 Jun 2005 11:58:31 GMT" }, { "version": "v3", "created": "Fri, 3 Jun 2005 12:42:40 GMT" }, { "version": "v4", "created": "Fri, 17 Apr 2009 12:35:28 GMT" } ]
2009-04-17T00:00:00
[ [ "Leao", "Rodrigo S. C.", "" ], [ "Barbosa", "Valmir C.", "" ] ]
new_dataset
0.993231
0705.3015
Erik Schnetter
Dylan Stark, Gabrielle Allen, Tom Goodale, Thomas Radke, Erik Schnetter
An Extensible Timing Infrastructure for Adaptive Large-scale Applications
null
In Roman Wyrzykowski et al., editors, Parallel Processing and Applied Mathematics (PPAM), 2007, Gdansk, Poland, volume 4967 of Lecture Notes in Computer Science (LNCS), pages 1170-1179. Springer, 2007.
null
null
cs.PF cs.DC
null
Real-time access to accurate and reliable timing information is necessary to profile scientific applications, and crucial as simulations become increasingly complex, adaptive, and large-scale. The Cactus Framework provides flexible and extensible capabilities for timing information through a well designed infrastructure and timing API. Applications built with Cactus automatically gain access to built-in timers, such as gettimeofday and getrusage, system-specific hardware clocks, and high-level interfaces such as PAPI. We describe the Cactus timer interface, its motivation, and its implementation. We then demonstrate how this timing information can be used by an example scientific application to profile itself, and to dynamically adapt itself to a changing environment at run time.
[ { "version": "v1", "created": "Mon, 21 May 2007 19:00:25 GMT" } ]
2009-04-16T00:00:00
[ [ "Stark", "Dylan", "" ], [ "Allen", "Gabrielle", "" ], [ "Goodale", "Tom", "" ], [ "Radke", "Thomas", "" ], [ "Schnetter", "Erik", "" ] ]
new_dataset
0.956605
0806.3542
Jiwoong Lee
Jiwoong Lee, Jean C. Walrand
Design and Analysis of an Asynchronous Zero Collision MAC Protocol
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes and analyzes a distributed MAC protocol that achieves zero collision with no control message exchange nor synchronization. ZC (ZeroCollision) is neither reservation-based nor dynamic TDMA; the protocol supports variable-length packets and does not lose efficiency when some of the stations do not transmit. At the same time, ZC is not a CSMA; in its steady state, it is completely collision-free. The stations transmit repeatedly in a round-robin order once the convergence state is reached. If some stations skip their turn, their transmissions are replaced by idle $20 \mu$-second mini-slots that enable the other stations to keep track of their order. Because of its short medium access delay and its efficiency, the protocol supports both real-time and elastic applications. The protocol allows for nodes leaving and joining the network; it can allocate more throughput to specific nodes (such as an access point). The protocol is robust against carrier sensing errors or clock drift. While collision avoidance is guaranteed in a single collision domain, it is not the case in a multiple collision one. However, experiments show ZC supports a comparable amount of goodput to CSMA in a multiple collision domain environment. The paper presents an analysis and extensive simulations of the protocol, confirming that ZC outperforms both CSMA and TDMA at high and low load.
[ { "version": "v1", "created": "Sun, 22 Jun 2008 03:11:28 GMT" } ]
2009-04-16T00:00:00
[ [ "Lee", "Jiwoong", "" ], [ "Walrand", "Jean C.", "" ] ]
new_dataset
0.988082
0904.2375
Navin Kashyap
Akiko Manada and Navin Kashyap
The Zeta Function of a Periodic-Finite-Type Shift
To appear in Proceedings of the 2009 IEEE International Symposium on Information Theory (ISIT'09); 5 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The class of periodic-finite-type shifts (PFT's) is a class of sofic shifts that strictly includes the class of shifts of finite type (SFT's), and the zeta function of a PFT is a generating function for the number of periodic sequences in the shift. In this paper, we derive a useful formula for the zeta function of a PFT. This formula allows the zeta function of a PFT to be computed more efficiently than the specialization of a formula known for a generic sofic shift
[ { "version": "v1", "created": "Wed, 15 Apr 2009 18:56:15 GMT" } ]
2009-04-16T00:00:00
[ [ "Manada", "Akiko", "" ], [ "Kashyap", "Navin", "" ] ]
new_dataset
0.98044
0901.3761
Jeffrey Shallit
J. Brzozowski, E. Grant, J. Shallit
Closures in Formal Languages and Kuratowski's Theorem
submitted to DLT 2009
null
null
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A famous theorem of Kuratowski states that in a topological space, at most 14 distinct sets can be produced by repeatedly applying the operations of closure and complement to a given set. We re-examine this theorem in the setting of formal languages, where closure is either Kleene closure or positive closure. We classify languages according to the structure of the algebra they generate under iterations of complement and closure. We show that there are precisely 9 such algebras in the case of positive closure, and 12 in the case of Kleene closure.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 19:45:01 GMT" } ]
2009-04-15T00:00:00
[ [ "Brzozowski", "J.", "" ], [ "Grant", "E.", "" ], [ "Shallit", "J.", "" ] ]
new_dataset
0.99898
0904.2012
David Spivak
David I. Spivak
Simplicial Databases
null
null
null
null
cs.DB cs.IR
http://creativecommons.org/licenses/by/3.0/
In this paper, we define a category DB, called the category of simplicial databases, whose objects are databases and whose morphisms are data-preserving maps. Along the way we give a precise formulation of the category of relational databases, and prove that it is a full subcategory of DB. We also prove that limits and colimits always exist in DB and that they correspond to queries such as select, join, union, etc. One feature of our construction is that the schema of a simplicial database has a natural geometric structure: an underlying simplicial set. The geometry of a schema is a way of keeping track of relationships between distinct tables, and can be thought of as a system of foreign keys. The shape of a schema is generally intuitive (e.g. the schema for round-trip flights is a circle consisting of an edge from $A$ to $B$ and an edge from $B$ to $A$), and as such, may be useful for analyzing data. We give several applications of our approach, as well as possible advantages it has over the relational model. We also indicate some directions for further research.
[ { "version": "v1", "created": "Mon, 13 Apr 2009 21:20:57 GMT" } ]
2009-04-15T00:00:00
[ [ "Spivak", "David I.", "" ] ]
new_dataset
0.987731
0904.2136
Fernando S\'aenz-P\'erez
S. Est\'evez-Mart\'in, T. Hortal\'a-Gonz\'alez, Rodr\'iguez-Artalejo, R. del Vado-V\'irseda, F. S\'aenz-P\'erez, and A. J. Fern\'andez
On the Cooperation of the Constraint Domains H, R and FD in CFLP
113 pages, 5 figures, 18 tables
null
null
null
cs.PL cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a computational model for the cooperation of constraint domains and an implementation for a particular case of practical importance. The computational model supports declarative programming with lazy and possibly higher-order functions, predicates, and the cooperation of different constraint domains equipped with their respective solvers, relying on a so-called Constraint Functional Logic Programming (CFLP) scheme. The implementation has been developed on top of the CFLP system TOY, supporting the cooperation of the three domains H, R and FD, which supply equality and disequality constraints over symbolic terms, arithmetic constraints over the real numbers, and finite domain constraints over the integers, respectively. The computational model has been proved sound and complete w.r.t. the declarative semantics provided by the $CFLP$ scheme, while the implemented system has been tested with a set of benchmarks and shown to behave quite efficiently in comparison to the closest related approach we are aware of. To appear in Theory and Practice of Logic Programming (TPLP)
[ { "version": "v1", "created": "Tue, 14 Apr 2009 14:58:46 GMT" } ]
2009-04-15T00:00:00
[ [ "Estévez-Martín", "S.", "" ], [ "Hortalá-González", "T.", "" ], [ "Rodríguez-Artalejo", "", "" ], [ "del Vado-Vírseda", "R.", "" ], [ "Sáenz-Pérez", "F.", "" ], [ "Fernández", "A. J.", "" ] ]
new_dataset
0.987268
0904.1915
Zhilin Wu
Stephane Grumbach (INRIA Liama), Zhilin Wu (CASIA Liama)
Logical locality entails frugal distributed computation over graphs
31 pages, 0 figures
null
null
null
cs.LO cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
First-order logic is known to have limited expressive power over finite structures. It enjoys in particular the locality property, which states that first-order formulae cannot have a global view of a structure. This limitation ensures on their low sequential computational complexity. We show that the locality impacts as well on their distributed computational complexity. We use first-order formulae to describe the properties of finite connected graphs, which are the topology of communication networks, on which the first-order formulae are also evaluated. We show that over bounded degree networks and planar networks, first-order properties can be frugally evaluated, that is, with only a bounded number of messages, of size logarithmic in the number of nodes, sent over each link. Moreover, we show that the result carries over for the extension of first-order logic with unary counting.
[ { "version": "v1", "created": "Mon, 13 Apr 2009 06:16:39 GMT" } ]
2009-04-14T00:00:00
[ [ "Grumbach", "Stephane", "", "INRIA Liama" ], [ "Wu", "Zhilin", "", "CASIA Liama" ] ]
new_dataset
0.999734
0904.1931
Byron Gao
Obi L. Griffith, Byron J. Gao, Mikhail Bilenky, Yuliya Prichyna, Martin Ester, Steven J.M. Jones
KiWi: A Scalable Subspace Clustering Algorithm for Gene Expression Analysis
International Conference on Bioinformatics and Biomedical Engineering (iCBBE), 2009
null
null
null
cs.DB cs.AI q-bio.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Subspace clustering has gained increasing popularity in the analysis of gene expression data. Among subspace cluster models, the recently introduced order-preserving sub-matrix (OPSM) has demonstrated high promise. An OPSM, essentially a pattern-based subspace cluster, is a subset of rows and columns in a data matrix for which all the rows induce the same linear ordering of columns. Existing OPSM discovery methods do not scale well to increasingly large expression datasets. In particular, twig clusters having few genes and many experiments incur explosive computational costs and are completely pruned off by existing methods. However, it is of particular interest to determine small groups of genes that are tightly coregulated across many conditions. In this paper, we present KiWi, an OPSM subspace clustering algorithm that is scalable to massive datasets, capable of discovering twig clusters and identifying negative as well as positive correlations. We extensively validate KiWi using relevant biological datasets and show that KiWi correctly assigns redundant probes to the same cluster, groups experiments with common clinical annotations, differentiates real promoter sequences from negative control sequences, and shows good association with cis-regulatory motif predictions.
[ { "version": "v1", "created": "Mon, 13 Apr 2009 08:16:53 GMT" } ]
2009-04-14T00:00:00
[ [ "Griffith", "Obi L.", "" ], [ "Gao", "Byron J.", "" ], [ "Bilenky", "Mikhail", "" ], [ "Prichyna", "Yuliya", "" ], [ "Ester", "Martin", "" ], [ "Jones", "Steven J. M.", "" ] ]
new_dataset
0.997526
cs/0610159
Vaneet Aggarwal
Vaneet Aggarwal, A. Robert Calderbank
Boolean Functions, Projection Operators and Quantum Error Correcting Codes
Submitted to IEEE Transactions on Information Theory, October 2006, to appear in IEEE Transactions on Information Theory, 2008
IEEE Trans. Inf. Theory, vol. 54, no. 4, pp.1700-1707, Apr. 2008.
10.1109/TIT.2008.917720
null
cs.IT math.IT quant-ph
null
This paper describes a fundamental correspondence between Boolean functions and projection operators in Hilbert space. The correspondence is widely applicable, and it is used in this paper to provide a common mathematical framework for the design of both additive and non-additive quantum error correcting codes. The new framework leads to the construction of a variety of codes including an infinite class of codes that extend the original ((5,6,2)) code found by Rains [21]. It also extends to operator quantum error correcting codes.
[ { "version": "v1", "created": "Fri, 27 Oct 2006 16:50:41 GMT" }, { "version": "v2", "created": "Thu, 1 Mar 2007 20:58:22 GMT" }, { "version": "v3", "created": "Mon, 24 Sep 2007 13:20:15 GMT" } ]
2009-04-14T00:00:00
[ [ "Aggarwal", "Vaneet", "" ], [ "Calderbank", "A. Robert", "" ] ]
new_dataset
0.9969
0904.1672
Joost Vennekens
Joost Vennekens, Marc Denecker, Maurice Bruynooghe
CP-logic: A Language of Causal Probabilistic Events and Its Relation to Logic Programming
To be published in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This papers develops a logical language for representing probabilistic causal laws. Our interest in such a language is twofold. First, it can be motivated as a fundamental study of the representation of causal knowledge. Causality has an inherent dynamic aspect, which has been studied at the semantical level by Shafer in his framework of probability trees. In such a dynamic context, where the evolution of a domain over time is considered, the idea of a causal law as something which guides this evolution is quite natural. In our formalization, a set of probabilistic causal laws can be used to represent a class of probability trees in a concise, flexible and modular way. In this way, our work extends Shafer's by offering a convenient logical representation for his semantical objects. Second, this language also has relevance for the area of probabilistic logic programming. In particular, we prove that the formal semantics of a theory in our language can be equivalently defined as a probability distribution over the well-founded models of certain logic programs, rendering it formally quite similar to existing languages such as ICL or PRISM. Because we can motivate and explain our language in a completely self-contained way as a representation of probabilistic causal laws, this provides a new way of explaining the intuitions behind such probabilistic logic programs: we can say precisely which knowledge such a program expresses, in terms that are equally understandable by a non-logician. Moreover, we also obtain an additional piece of knowledge representation methodology for probabilistic logic programs, by showing how they can express probabilistic causal laws.
[ { "version": "v1", "created": "Fri, 10 Apr 2009 10:00:55 GMT" } ]
2009-04-13T00:00:00
[ [ "Vennekens", "Joost", "" ], [ "Denecker", "Marc", "" ], [ "Bruynooghe", "Maurice", "" ] ]
new_dataset
0.981594
0904.1703
Walid Belkhir
Walid Belkhir
Closure Under Minors of Undirected Entanglement
null
null
null
null
cs.DM cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Entanglement is a digraph complexity measure that origins in fixed-point theory. Its purpose is to count the nested depth of cycles in digraphs. In this paper we prove that the class of undirected graphs of entanglement at most $k$, for arbitrary fixed $k \in \mathbb{N}$, is closed under taking minors. Our proof relies on the game theoretic characterization of entanglement in terms of Robber and Cops games.
[ { "version": "v1", "created": "Fri, 10 Apr 2009 15:32:19 GMT" } ]
2009-04-13T00:00:00
[ [ "Belkhir", "Walid", "" ] ]
new_dataset
0.969383
0904.1729
Sugumar Murugesan
Sugumar Murugesan, Philip Schniter
Joint Opportunistic Scheduling in Multi-Cellular Systems
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of multiuser scheduling with partial channel information in a multi-cell environment. The scheduling problem is formulated jointly with the ARQ based channel learning process and the intercell interference mitigating cell breathing protocol. The optimal joint scheduling policy under various system constraints is established. The general problem is posed as a generalized Restless Multiarmed Bandit process and the notion of indexability is studied. We conjecture, with numerical support, that the multicell multiuser scheduling problem is indexable and obtain a partial structure of the index policy.
[ { "version": "v1", "created": "Fri, 10 Apr 2009 18:55:12 GMT" } ]
2009-04-13T00:00:00
[ [ "Murugesan", "Sugumar", "" ], [ "Schniter", "Philip", "" ] ]
new_dataset
0.958056
0705.0419
Luigi Santocanale
Walid Belkhir (LIF), Luigi Santocanale (LIF)
Undirected Graphs of Entanglement Two
null
FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, Inde (2007)
10.1007/978-3-540-77050-3_42
null
cs.LO cs.GT
null
Entanglement is a complexity measure of directed graphs that origins in fixed point theory. This measure has shown its use in designing efficient algorithms to verify logical properties of transition systems. We are interested in the problem of deciding whether a graph has entanglement at most k. As this measure is defined by means of games, game theoretic ideas naturally lead to design polynomial algorithms that, for fixed k, decide the problem. Known characterizations of directed graphs of entanglement at most 1 lead, for k = 1, to design even faster algorithms. In this paper we present an explicit characterization of undirected graphs of entanglement at most 2. With such a characterization at hand, we devise a linear time algorithm to decide whether an undirected graph has this property.
[ { "version": "v1", "created": "Thu, 3 May 2007 08:07:11 GMT" }, { "version": "v2", "created": "Thu, 30 Aug 2007 09:04:14 GMT" } ]
2009-04-09T00:00:00
[ [ "Belkhir", "Walid", "", "LIF" ], [ "Santocanale", "Luigi", "", "LIF" ] ]
new_dataset
0.990422
0904.0813
Azadeh Khaleghi
Azadeh Khaleghi, Frank R. Kschischang
Projective Space Codes for the Injection Metric
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the context of error control in random linear network coding, it is useful to construct codes that comprise well-separated collections of subspaces of a vector space over a finite field. In this paper, the metric used is the so-called "injection distance", introduced by Silva and Kschischang. A Gilbert-Varshamov bound for such codes is derived. Using the code-construction framework of Etzion and Silberstein, new non-constant-dimension codes are constructed; these codes contain more codewords than comparable codes designed for the subspace metric.
[ { "version": "v1", "created": "Sun, 5 Apr 2009 20:06:33 GMT" }, { "version": "v2", "created": "Wed, 8 Apr 2009 14:24:02 GMT" } ]
2009-04-08T00:00:00
[ [ "Khaleghi", "Azadeh", "" ], [ "Kschischang", "Frank R.", "" ] ]
new_dataset
0.999393
0904.1084
Sylvain Lavernhe
Kwamiwi Mawussi (LURPA), Sylvain Lavernhe (LURPA), Claire Lartigue (LURPA)
Usinage de poches en UGV - Aide au choix de strat\'egies
null
Revue Internationale de CFAO et d'informatique graphique 18, 3 (2003) 337-349
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper deals with associating the optimal machining strategy to a given pocket geometry, within the context of High-Speed Machining (HSM) of aeronautical pockets. First we define different classes of pocket features according to geometrical criteria. Following, we propose a method allowing to associate a set of capable tools to the features. Each capable tool defines a machined zone with a specific geometry. The last part of the paper is thus dedicated to associate the optimal machining strategy to a given geometry within the context of HSM. Results highlight that analyses must be conducted in a dynamical as well as a geometrical viewpoint. In particular, it becomes necessary to integrate dynamical specifities associated to the behavior of the couple machine/NC unit in the tool path calculation.
[ { "version": "v1", "created": "Tue, 7 Apr 2009 09:06:39 GMT" } ]
2009-04-08T00:00:00
[ [ "Mawussi", "Kwamiwi", "", "LURPA" ], [ "Lavernhe", "Sylvain", "", "LURPA" ], [ "Lartigue", "Claire", "", "LURPA" ] ]
new_dataset
0.982694
0904.1186
Bjoern Grohmann
Bjoern Grohmann
A New Key-Agreement-Protocol
4 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new 4-pass Key-Agreement Protocol is presented. The security of the protocol mainly relies on the existence of a (polynomial-computable) One-Way-Function and the supposed computational hardness of solving a specific system of equations.
[ { "version": "v1", "created": "Tue, 7 Apr 2009 17:45:52 GMT" } ]
2009-04-08T00:00:00
[ [ "Grohmann", "Bjoern", "" ] ]
new_dataset
0.959943
0903.4046
Baris Baykant Alagoz
B. Baykant Alagoz
Boolean Logic with Fault Tolerant Coding
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Error detectable and error correctable coding in Hamming space was researched to discover possible fault tolerant coding constellations, which can implement Boolean logic with fault tolerant property. Basic logic operators of the Boolean algebra were developed to apply fault tolerant coding in the logic circuits. It was shown that application of three-bit fault tolerant codes have provided the digital system skill of auto-recovery without need for designing additional-fault tolerance mechanisms.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 09:33:40 GMT" }, { "version": "v2", "created": "Tue, 7 Apr 2009 08:53:28 GMT" } ]
2009-04-07T00:00:00
[ [ "Alagoz", "B. Baykant", "" ] ]
new_dataset
0.996257
0904.0962
Amelia Sparavigna
Amelia Sparavigna
Color Dipole Moments for Edge Detection
8 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dipole and higher moments are physical quantities used to describe a charge distribution. In analogy with electromagnetism, it is possible to define the dipole moments for a gray-scale image, according to the single aspect of a gray-tone map. In this paper we define the color dipole moments for color images. For color maps in fact, we have three aspects, the three primary colors, to consider. Associating three color charges to each pixel, color dipole moments can be easily defined and used for edge detection.
[ { "version": "v1", "created": "Mon, 6 Apr 2009 16:25:08 GMT" } ]
2009-04-07T00:00:00
[ [ "Sparavigna", "Amelia", "" ] ]
new_dataset
0.982915
0904.0589
Van Hung Le
Van Hung Le (1), Fei Liu (1), and Dinh Khang Tran (2) ((1)La Trobe University, Australia (2)Hanoi University of Technology, Vietnam)
Fuzzy Linguistic Logic Programming and its Applications
33 pages, to appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper introduces fuzzy linguistic logic programming, which is a combination of fuzzy logic programming, introduced by P. Vojtas, and hedge algebras in order to facilitate the representation and reasoning on human knowledge expressed in natural languages. In fuzzy linguistic logic programming, truth values are linguistic ones, e.g., VeryTrue, VeryProbablyTrue, and LittleFalse, taken from a hedge algebra of a linguistic truth variable, and linguistic hedges (modifiers) can be used as unary connectives in formulae. This is motivated by the fact that humans reason mostly in terms of linguistic terms rather than in terms of numbers, and linguistic hedges are often used in natural languages to express different levels of emphasis. The paper presents: (i) the language of fuzzy linguistic logic programming; (ii) a declarative semantics in terms of Herbrand interpretations and models; (iii) a procedural semantics which directly manipulates linguistic terms to compute a lower bound to the truth value of a query, and proves its soundness; (iv) a fixpoint semantics of logic programs, and based on it, proves the completeness of the procedural semantics; (v) several applications of fuzzy linguistic logic programming; and (vi) an idea of implementing a system to execute fuzzy linguistic logic programs.
[ { "version": "v1", "created": "Fri, 3 Apr 2009 14:45:20 GMT" } ]
2009-04-06T00:00:00
[ [ "Le", "Van Hung", "" ], [ "Liu", "Fei", "" ], [ "Tran", "Dinh Khang", "" ] ]
new_dataset
0.990842
0903.4959
Ioannis Koukoutsidis
Ioannis Koukoutsidis
TCP over 3G links: Problems and Solutions
A review paper prepared unofficially for the Institute of Informatics and Telecommunications of NCSR Demokritos, in November 2005 (13 pages, 3 figures)
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This review paper presents analytical information regarding the transfer of TCP data flows on paths towards interconnected wireless systems, with emphasis on 3G cellular networks. The focus is on protocol modifications in face of problems arising from terminal mobility and wireless transmission. The objective of this paper is not to present an exhaustive review of the literature, but to filter out the causes of poor TCP performance in such systems and give a rationalized view of measures that can be taken against them.
[ { "version": "v1", "created": "Sat, 28 Mar 2009 09:23:17 GMT" }, { "version": "v2", "created": "Sun, 5 Apr 2009 12:52:36 GMT" } ]
2009-04-05T00:00:00
[ [ "Koukoutsidis", "Ioannis", "" ] ]
new_dataset
0.985455
0904.0437
Vincent Rialle
Vincent Rialle (TIMC, DMIS), Catherine Ollivet (FA 93), Carole Guigui (TIMC), Christian Herv\'e (LEM)
What Do Family Caregivers of Alzheimer's Disease Patients Desire in Smart Home Technologies?
null
Methods of information in medicine 47, 1 (2008) 63-69
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Objectives - The authors' aim was to investigate the representations, wishes, and fears of family caregivers (FCs) regarding 14 innovative technologies (IT) for care aiding and burden alleviation, given the severe physical and psychological stress induced by dementia care, and the very slow uptake of these technologies in our society. Methods - A cluster sample survey based on a self-administered questionnaire was carried out on data collected from 270 families of patients with Alzheimer's disease or related disorders, located in the greater Paris area. Multiple Correspondence Analysis was used in addition to usual statistical tests to identify homogenous FCs clusters concerning the appreciation or rejection of the considered technologies. Results - Two opposite clusters were clearly defined: FCs in favor of a substantial use of technology, and those rather or totally hostile. Furthermore the distributions of almost all the answers of appreciations were U shaped. Significant relations were demonstrated between IT appreciation and FC's family or gender statuses (e.g., female FCs appreciated more than male FCs a tracking device for quick recovering of wandering patients: p=0.0025, N=195). Conclusions - The study provides further evidence of the contrasted perception of technology in dementia care at home, and suggests the development of public debates based on rigorous assessment of practices and a strict ethical aim to protect against misuse.
[ { "version": "v1", "created": "Thu, 2 Apr 2009 18:16:47 GMT" } ]
2009-04-03T00:00:00
[ [ "Rialle", "Vincent", "", "TIMC, DMIS" ], [ "Ollivet", "Catherine", "", "FA 93" ], [ "Guigui", "Carole", "", "TIMC" ], [ "Hervé", "Christian", "", "LEM" ] ]
new_dataset
0.988103
0904.0034
Luis Menasch\'e Schechter
Mario R. F. Benevides and L. Menasch\'e Schechter
CCS-Based Dynamic Logics for Communicating Concurrent Programs
28 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work presents three increasingly expressive Dynamic Logics in which the programs are CCS processes (sCCS-PDL, CCS-PDL and XCCS-PDL). Their goal is to reason about properties of concurrent programs and systems described using CCS. In order to accomplish that, CCS's operators and constructions are added to a basic modal logic in order to create dynamic logics that are suitable for the description and verification of properties of communicating, concurrent and non-deterministic programs and systems, in a similar way as PDL is used for the sequential case. We provide complete axiomatizations for the three logics. Unlike Peleg's Concurrent PDL with Channels, our logics have a simple Kripke semantics, complete axiomatizations and the finite model property.
[ { "version": "v1", "created": "Wed, 1 Apr 2009 02:07:44 GMT" } ]
2009-04-02T00:00:00
[ [ "Benevides", "Mario R. F.", "" ], [ "Schechter", "L. Menasché", "" ] ]
new_dataset
0.992145
0904.0058
Damien Chablat
Damien Chablat (IRCCyN), Stefan Staicu
Kinematics of A 3-PRP planar parallel robot
null
UPB Scientific Bulletin, Series D: Mechanical Engineering 71, 1 (2009) 3-16
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recursive modelling for the kinematics of a 3-PRP planar parallel robot is presented in this paper. Three planar chains connecting to the moving platform of the manipulator are located in a vertical plane. Knowing the motion of the platform, we develop the inverse kinematics and determine the positions, velocities and accelerations of the robot. Several matrix equations offer iterative expressions and graphs for the displacements, velocities and accelerations of three prismatic actuators.
[ { "version": "v1", "created": "Wed, 1 Apr 2009 19:31:33 GMT" } ]
2009-04-02T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Staicu", "Stefan", "" ] ]
new_dataset
0.991743
0904.0145
Damien Chablat
Raza Ur-Rehman (IRCCyN), St\'ephane Caro (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Kinematic and Dynamic Analysis of the 2-DOF Spherical Wrist of Orthoglide 5-axis
null
Troisi\`eme Congr\`es International. Conception et Mod\'elisation des Syst\`emes M\'ecaniques, Hammamet : Tunisie (2009)
null
null
cs.RO physics.class-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the kinematics and dynamics of a two degree of freedom spherical manipulator, the wrist of Orthoglide 5-axis. The latter is a parallel kinematics machine composed of two manipulators: i) the Orthoglide 3-axis; a three-dof translational parallel manipulator that belongs to the family of Delta robots, and ii) the Agile eye; a two-dof parallel spherical wrist. The geometric and inertial parameters used in the model are determined by means of a CAD software. The performance of the spherical wrist is emphasized by means of several test trajectories. The effects of machining and/or cutting forces and the length of the cutting tool on the dynamic performance of the wrist are also analyzed. Finally, a preliminary selection of the motors is proposed from the velocities and torques required by the actuators to carry out the test trajectories.
[ { "version": "v1", "created": "Wed, 1 Apr 2009 19:33:59 GMT" } ]
2009-04-02T00:00:00
[ [ "Ur-Rehman", "Raza", "", "IRCCyN" ], [ "Caro", "Stéphane", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
new_dataset
0.997137
0903.4898
Predrag Jelenkovic
Predrag R. Jelenkovic and Ana Radovanovic
Asymptotic Optimality of the Static Frequency Caching in the Presence of Correlated Requests
null
null
null
null
cs.PF cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well known that the static caching algorithm that keeps the most frequently requested documents in the cache is optimal in case when documents are of the same size and requests are independent and equally distributed. However, it is hard to develop explicit and provably optimal caching algorithms when requests are statistically correlated. In this paper, we show that keeping the most frequently requested documents in the cache is still optimal for large cache sizes even if the requests are strongly correlated.
[ { "version": "v1", "created": "Fri, 27 Mar 2009 20:05:17 GMT" } ]
2009-03-31T00:00:00
[ [ "Jelenkovic", "Predrag R.", "" ], [ "Radovanovic", "Ana", "" ] ]
new_dataset
0.975485
0903.5045
Amelia Sparavigna
Amelia Sparavigna
Digital Restoration of Ancient Papyri
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image processing can be used for digital restoration of ancient papyri, that is, for a restoration performed on their digital images. The digital manipulation allows reducing the background signals and enhancing the readability of texts. In the case of very old and damaged documents, this is fundamental for identification of the patterns of letters. Some examples of restoration, obtained with an image processing which uses edges detection and Fourier filtering, are shown. One of them concerns 7Q5 fragment of the Dead Sea Scrolls.
[ { "version": "v1", "created": "Mon, 30 Mar 2009 06:00:15 GMT" } ]
2009-03-31T00:00:00
[ [ "Sparavigna", "Amelia", "" ] ]
new_dataset
0.995083
cs/0611146
Shengtian Yang
Shengtian Yang, Yan Chen, Peiliang Qiu
Linear-Codes-Based Lossless Joint Source-Channel Coding for Multiple-Access Channels
18 pages, 3 figures
IEEE Trans. Inf. Theory 55 (2009) 1468-1486
10.1109/TIT.2009.2013009
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A general lossless joint source-channel coding (JSCC) scheme based on linear codes and random interleavers for multiple-access channels (MACs) is presented and then analyzed in this paper. By the information-spectrum approach and the code-spectrum approach, it is shown that a linear code with a good joint spectrum can be used to establish limit-approaching lossless JSCC schemes for correlated general sources and general MACs, where the joint spectrum is a generalization of the input-output weight distribution. Some properties of linear codes with good joint spectra are investigated. A formula on the "distance" property of linear codes with good joint spectra is derived, based on which, it is further proved that, the rate of any systematic codes with good joint spectra cannot be larger than the reciprocal of the corresponding alphabet cardinality, and any sparse generator matrices cannot yield linear codes with good joint spectra. The problem of designing arbitrary rate coding schemes is also discussed. A novel idea called "generalized puncturing" is proposed, which makes it possible that one good low-rate linear code is enough for the design of coding schemes with multiple rates. Finally, various coding problems of MACs are reviewed in a unified framework established by the code-spectrum approach, under which, criteria and candidates of good linear codes in terms of spectrum requirements for such problems are clearly presented.
[ { "version": "v1", "created": "Wed, 29 Nov 2006 01:12:57 GMT" }, { "version": "v2", "created": "Thu, 3 Jan 2008 03:05:19 GMT" }, { "version": "v3", "created": "Sun, 2 Nov 2008 04:05:09 GMT" }, { "version": "v4", "created": "Sun, 14 Dec 2008 13:01:38 GMT" }, { "version": "v5", "created": "Tue, 31 Mar 2009 12:00:48 GMT" } ]
2009-03-31T00:00:00
[ [ "Yang", "Shengtian", "" ], [ "Chen", "Yan", "" ], [ "Qiu", "Peiliang", "" ] ]
new_dataset
0.995582
0903.4770
Sk Sarif Hassan s
Pal Choudhury Pabitra, Sahoo Sudhakar, Nayak Birendra Kumar, and Hassan Sk. Sarif
Act of CVT and EVT In The Formation of Number-Theoretic Fractals
15 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we have defined two functions that have been used to construct different fractals having fractal dimensions between 1 and 2. More precisely, we can say that one of our defined functions produce the fractals whose fractal dimension lies in [1.58, 2) and rest function produce the fractals whose fractal dimension lies in (1, 1.58]. Also we tried to calculate the amount of increment of fractal dimension in accordance with base of the number systems. And in switching of fractals from one base to another, the increment of fractal dimension is constant, which is 1.58, its quite surprising!
[ { "version": "v1", "created": "Fri, 27 Mar 2009 10:38:32 GMT" } ]
2009-03-30T00:00:00
[ [ "Pabitra", "Pal Choudhury", "" ], [ "Sudhakar", "Sahoo", "" ], [ "Kumar", "Nayak Birendra", "" ], [ "Sarif", "Hassan Sk.", "" ] ]
new_dataset
0.999498
0903.4554
Mikko Malinen
Mikko Malinen
Fountain Codes and Invertible Matrices
3 pages, 2 figures, submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with Fountain codes, and especially with their encoding matrices, which are required here to be invertible. A result is stated that an encoding matrix induces a permutation. Also, a result is that encoding matrices form a group with multiplication operation. An encoding is a transformation, which reduces the entropy of an initially high-entropy input vector. A special encoding matrix, with which the entropy reduction is more effective than with matrices created by the Ideal Soliton distribution is formed. Experimental results with entropy reduction are shown.
[ { "version": "v1", "created": "Thu, 26 Mar 2009 11:15:05 GMT" } ]
2009-03-27T00:00:00
[ [ "Malinen", "Mikko", "" ] ]
new_dataset
0.99955
0903.4299
Florentina Pintea
Virgiliu Streian, Adela Ionescu
Token Ring Project
6 pages, exposed on 4th International Conferences "Actualities and Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 85-90
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ring topology is a simple configuration used to connect processes that communicate among themselves. A number of network standards such as token ring, token bus, and FDDI are based on the ring connectivity. This article will develop an implementation of a ring of processes that communicate among themselves via pipe links. The processes are nodes in the ring. Each process reads from its standard input and writes in its standard output. N-1 process redirects the its standard output to a standard input of the process through a pipe. When the ring-structure is designed, the project can be extended to simulate networks or to implement algorithms for mutual exclusion.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 11:19:56 GMT" } ]
2009-03-26T00:00:00
[ [ "Streian", "Virgiliu", "" ], [ "Ionescu", "Adela", "" ] ]
new_dataset
0.980905
0903.4302
Florentina Pintea
Daniela Ilea, Dan L. Lacrama
ShopList: Programming PDA applications for Windows Mobile using C#
8 pages, exposed on 4th International Conferences "Actualities and Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 91-98
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is focused on a C# and Sql Server Mobile 2005 application to keep evidence of a shop list. The purpose of the application is to offer to the user an easier way to manage his shopping options.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 11:26:50 GMT" } ]
2009-03-26T00:00:00
[ [ "Ilea", "Daniela", "" ], [ "Lacrama", "Dan L.", "" ] ]
new_dataset
0.99824
0903.4101
Evira Mayordomo
Elvira Mayordomo, Philippe Moser, Sylvain Perifel
Polylog space compression, pushdown compression, and Lempel-Ziv are incomparable
null
null
null
null
cs.CC cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The pressing need for efficient compression schemes for XML documents has recently been focused on stack computation, and in particular calls for a formulation of information-lossless stack or pushdown compressors that allows a formal analysis of their performance and a more ambitious use of the stack in XML compression, where so far it is mainly connected to parsing mechanisms. In this paper we introduce the model of pushdown compressor, based on pushdown transducers that compute a single injective function while keeping the widest generality regarding stack computation. We also consider online compression algorithms that use at most polylogarithmic space (plogon). These algorithms correspond to compressors in the data stream model. We compare the performance of these two families of compressors with each other and with the general purpose Lempel-Ziv algorithm. This comparison is made without any a priori assumption on the data's source and considering the asymptotic compression ratio for infinite sequences. We prove that in all cases they are incomparable.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 15:37:21 GMT" } ]
2009-03-25T00:00:00
[ [ "Mayordomo", "Elvira", "" ], [ "Moser", "Philippe", "" ], [ "Perifel", "Sylvain", "" ] ]
new_dataset
0.994729
0903.2448
Mehrnoosh Sadrzadeh
Mehrnoosh Sadrzadeh and Roy Dyckhoff
Positive Logic with Adjoint Modalities: Proof Theory, Semantics and Reasoning about Information
This paper is the full version of the article that is to appear in the ENTCS proceedings of the 25th conference on the Mathematical Foundations of Programming Semantics (MFPS), April 2009, University of Oxford
null
null
null
cs.LO cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a simple modal logic whose non-modal part has conjunction and disjunction as connectives and whose modalities come in adjoint pairs, but are not in general closure operators. Despite absence of negation and implication, and of axioms corresponding to the characteristic axioms of (e.g.) T, S4 and S5, such logics are useful, as shown in previous work by Baltag, Coecke and the first author, for encoding and reasoning about information and misinformation in multi-agent systems. For such a logic we present an algebraic semantics, using lattices with agent-indexed families of adjoint pairs of operators, and a cut-free sequent calculus. The calculus exploits operators on sequents, in the style of "nested" or "tree-sequent" calculi; cut-admissibility is shown by constructive syntactic methods. The applicability of the logic is illustrated by reasoning about the muddy children puzzle, for which the calculus is augmented with extra rules to express the facts of the muddy children scenario.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 18:30:55 GMT" }, { "version": "v2", "created": "Thu, 19 Mar 2009 16:46:40 GMT" }, { "version": "v3", "created": "Mon, 23 Mar 2009 18:42:39 GMT" } ]
2009-03-23T00:00:00
[ [ "Sadrzadeh", "Mehrnoosh", "" ], [ "Dyckhoff", "Roy", "" ] ]
new_dataset
0.998945
0710.2970
An-Ping Li
An-Ping Li
A generic attack to ciphers
4 pages
null
null
null
cs.CR
null
In this paper, we present a generic attack for ciphers, which is in essence a collision attack on the secret keys of ciphers .
[ { "version": "v1", "created": "Tue, 16 Oct 2007 07:45:58 GMT" }, { "version": "v2", "created": "Wed, 17 Oct 2007 10:34:37 GMT" } ]
2009-03-21T00:00:00
[ [ "Li", "An-Ping", "" ] ]
new_dataset
0.994815
0712.1400
An-Ping Li
An-Ping Li
Birthday attack to discrete logarithm
4 pages
null
null
null
cs.CR
null
The discrete logarithm in a finite group of large order has been widely applied in public key cryptosystem. In this paper, we will present a probabilistic algorithm for discrete logarithm.
[ { "version": "v1", "created": "Mon, 10 Dec 2007 06:15:49 GMT" }, { "version": "v2", "created": "Tue, 11 Dec 2007 01:57:48 GMT" } ]
2009-03-21T00:00:00
[ [ "Li", "An-Ping", "" ] ]
new_dataset
0.996758
0805.3858
An-Ping Li
An-Ping Li
A New Type of Cipher: DICING_csb
There is a new variant added in the section 5
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream cipher and block cipher. Hence, the new type of cipher has fast rate like a stream cipher and need no MAC.
[ { "version": "v1", "created": "Mon, 26 May 2008 02:09:32 GMT" }, { "version": "v2", "created": "Mon, 2 Jun 2008 01:13:20 GMT" } ]
2009-03-21T00:00:00
[ [ "Li", "An-Ping", "" ] ]
new_dataset
0.986268
0807.3383
An-Ping Li
An-Ping Li
Recover plaintext attack to block ciphers
there is a remark added
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
we will present an estimation for the upper-bound of the amount of 16-bytes plaintexts for English texts, which indicates that the block ciphers with block length no more than 16-bytes will be subject to recover plaintext attacks in the occasions of plaintext -known or plaintext-chosen attacks.
[ { "version": "v1", "created": "Tue, 22 Jul 2008 08:25:30 GMT" }, { "version": "v2", "created": "Thu, 24 Jul 2008 06:42:38 GMT" }, { "version": "v3", "created": "Fri, 25 Jul 2008 01:47:23 GMT" }, { "version": "v4", "created": "Tue, 29 Jul 2008 00:27:08 GMT" } ]
2009-03-21T00:00:00
[ [ "Li", "An-Ping", "" ] ]
new_dataset
0.999714
0903.2742
Gabriel Istrate
Gabriel Istrate
On Hadwiger's Number of a graph with partial information
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the possibility of proving upper bounds on Hadwiger's number of a graph with partial information, mirroring several known upper bounds for the chromatic number. For each such bound we determine whether the corresponding bound for Hadwiger's number holds. Our results suggest that the ``locality'' of an inequality accounts for the existence of such an extension.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 12:53:25 GMT" } ]
2009-03-17T00:00:00
[ [ "Istrate", "Gabriel", "" ] ]
new_dataset
0.956742