id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
0903.2791
Steve Szabo
Sergio Lopez-Permouth and Steve Szabo
On the Hamming weight of Repeated Root Cyclic and Negacyclic Codes over Galois Rings
Submitted
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Repeated root Cyclic and Negacyclic codes over Galois rings have been studied much less than their simple root counterparts. This situation is beginning to change. For example, repeated root codes of length $p^s$, where $p$ is the characteristic of the alphabet ring, have been studied under some additional hypotheses. In each one of those cases, the ambient space for the codes has turned out to be a chain ring. In this paper, all remaining cases of cyclic and negacyclic codes of length $p^s$ over a Galois ring alphabet are considered. In these cases the ambient space is a local ring with simple socle but not a chain ring. Nonetheless, by reducing the problem to one dealing with uniserial subambients, a method for computing the Hamming distance of these codes is provided.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 16:25:32 GMT" } ]
2009-03-17T00:00:00
[ [ "Lopez-Permouth", "Sergio", "" ], [ "Szabo", "Steve", "" ] ]
new_dataset
0.998806
0903.2382
Olivier Carton
Jean Berstel, Luc Boasson, Olivier Carton, Isabelle Fagnot
Infinite words without palindrome
3 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that there exists an uniformly recurrent infinite word whose set of factors is closed under reversal and which has only finitely many palindromic factors.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 13:20:44 GMT" } ]
2009-03-16T00:00:00
[ [ "Berstel", "Jean", "" ], [ "Boasson", "Luc", "" ], [ "Carton", "Olivier", "" ], [ "Fagnot", "Isabelle", "" ] ]
new_dataset
0.997436
0807.4846
Natalia Silberstein
Tuvi Etzion and Natalia Silberstein
Error-Correcting Codes in Projective Spaces via Rank-Metric Codes and Ferrers Diagrams
Revised for IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coding in the projective space has received recently a lot of attention due to its application in network coding. Reduced row echelon form of the linear subspaces and Ferrers diagram can play a key role for solving coding problems in the projective space. In this paper we propose a method to design error-correcting codes in the projective space. We use a multilevel approach to design our codes. First, we select a constant weight code. Each codeword defines a skeleton of a basis for a subspace in reduced row echelon form. This skeleton contains a Ferrers diagram on which we design a rank-metric code. Each such rank-metric code is lifted to a constant dimension code. The union of these codes is our final constant dimension code. In particular the codes constructed recently by Koetter and Kschischang are a subset of our codes. The rank-metric codes used for this construction form a new class of rank-metric codes. We present a decoding algorithm to the constructed codes in the projective space. The efficiency of the decoding depends on the efficiency of the decoding for the constant weight codes and the rank-metric codes. Finally, we use puncturing on our final constant dimension codes to obtain large codes in the projective space which are not constant dimension.
[ { "version": "v1", "created": "Wed, 30 Jul 2008 12:18:22 GMT" }, { "version": "v2", "created": "Thu, 30 Oct 2008 06:45:43 GMT" }, { "version": "v3", "created": "Sun, 8 Feb 2009 10:16:42 GMT" }, { "version": "v4", "created": "Sat, 14 Mar 2009 20:04:58 GMT" } ]
2009-03-14T00:00:00
[ [ "Etzion", "Tuvi", "" ], [ "Silberstein", "Natalia", "" ] ]
new_dataset
0.966362
0903.2108
Maurice Margenstern
Maurice Margenstern
A new universal cellular automaton on the ternary heptagrid
35 pages, 33 figures
null
null
null
cs.FL cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we construct a new weakly universal cellular automaton on the ternary heptagrid. The previous result, obtained by the same author and Y. Song required six states only. This time, the number of states is four. This is the best result up to date for cellular automata in the hyperbolic plane.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 15:15:39 GMT" } ]
2009-03-13T00:00:00
[ [ "Margenstern", "Maurice", "" ] ]
new_dataset
0.967921
0903.1953
Balder ten Cate
Balder ten Cate, Laura Chiticariu, Phokion Kolaitis and Wang-Chiew Tan
Laconic schema mappings: computing core universal solutions by means of SQL queries
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new method for computing core universal solutions in data exchange settings specified by source-to-target dependencies, by means of SQL queries. Unlike previously known algorithms, which are recursive in nature, our method can be implemented directly on top of any DBMS. Our method is based on the new notion of a laconic schema mapping. A laconic schema mapping is a schema mapping for which the canonical universal solution is the core universal solution. We give a procedure by which every schema mapping specified by FO s-t tgds can be turned into a laconic schema mapping specified by FO s-t tgds that may refer to a linear order on the domain of the source instance. We show that our results are optimal, in the sense that the linear order is necessary and the method cannot be extended to schema mapping involving target constraints.
[ { "version": "v1", "created": "Wed, 11 Mar 2009 11:34:20 GMT" } ]
2009-03-12T00:00:00
[ [ "Cate", "Balder ten", "" ], [ "Chiticariu", "Laura", "" ], [ "Kolaitis", "Phokion", "" ], [ "Tan", "Wang-Chiew", "" ] ]
new_dataset
0.968183
cs/0305059
Emanuele Leonardi
E. Leonardi and M.W. Schulz
EU DataGRID testbed management and support at CERN
Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 7 pages, LaTeX. PSN THCT007
ECONF C0303241:THCT007,2003
null
null
cs.DC
null
In this paper we report on the first two years of running the CERN testbed site for the EU DataGRID project. The site consists of about 120 dual-processor PCs distributed over several testbeds used for different purposes: software development, system integration, and application tests. Activities at the site included test productions of MonteCarlo data for LHC experiments, tutorials and demonstrations of GRID technologies, and support for individual users analysis. This paper focuses on node installation and configuration techniques, service management, user support in a gridified environment, and includes considerations on scalability and security issues and comparisons with "traditional" production systems, as seen from the administrator point of view.
[ { "version": "v1", "created": "Fri, 30 May 2003 10:07:12 GMT" } ]
2009-03-12T00:00:00
[ [ "Leonardi", "E.", "" ], [ "Schulz", "M. W.", "" ] ]
new_dataset
0.990076
cs/0601040
Michel Parent
Michel Parent (INRIA Rocquencourt)
New Technologies for Sustainable Urban Transport in Europe
null
Transportation Research Board 85th Annual Meeting (2006)
null
null
cs.RO
null
In the past few years, the European Commission has financed several projects to examine how new technologies could improve the sustainability of European cities. These technologies concern new public transportation modes such as guided buses to form high capacity networks similar to light rail but at a lower cost and better flexibility, PRT (Personal Rapid Transit) and cybercars (small urban vehicles with fully automatic driving capabilities to be used in carsharing mode, mostly as a complement to mass transport). They also concern private vehicles with technologies which could improve the efficiency of the vehicles as well as their safety (Intelligent Speed Adaptation, Adaptive Cruise >.Control, Stop&Go, Lane Keeping,...) and how these new vehicles can complement mass transport in the form of car-sharing services.
[ { "version": "v1", "created": "Tue, 10 Jan 2006 13:57:28 GMT" } ]
2009-03-12T00:00:00
[ [ "Parent", "Michel", "", "INRIA Rocquencourt" ] ]
new_dataset
0.999178
0903.1659
Zhe Chen
Zhe Chen
Heuristic Reasoning on Graph and Game Complexity of Sudoku
6 pages, 2 figures
null
null
null
cs.AI cs.GT cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Sudoku puzzle has achieved worldwide popularity recently, and attracted great attention of the computational intelligence community. Sudoku is always considered as Satisfiability Problem or Constraint Satisfaction Problem. In this paper, we propose to focus on the essential graph structure underlying the Sudoku puzzle. First, we formalize Sudoku as a graph. Then a solving algorithm based on heuristic reasoning on the graph is proposed. The related r-Reduction theorem, inference theorem and their properties are proved, providing the formal basis for developments of Sudoku solving systems. In order to evaluate the difficulty levels of puzzles, a quantitative measurement of the complexity level of Sudoku puzzles based on the graph structure and information theory is proposed. Experimental results show that all the puzzles can be solved fast using the proposed heuristic reasoning, and that the proposed game complexity metrics can discriminate difficulty levels of puzzles perfectly.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 22:35:14 GMT" } ]
2009-03-11T00:00:00
[ [ "Chen", "Zhe", "" ] ]
new_dataset
0.977023
0903.1820
Michele Wigger
Amos Lapidoth, Stefan M. Moser, Michele A. Wigger
On the Capacity of Free-Space Optical Intensity Channels
Transmitted to IEEE Transactions on Information Theory. Presented at ISIT 2008 in Toronto
null
null
13454533334
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
New upper and lower bounds are presented on the capacity of the free-space optical intensity channel. This channel is characterized by inputs that are nonnegative (representing the transmitted optical intensity) and by outputs that are corrupted by additive white Gaussian noise (because in free space the disturbances arise from many independent sources). Due to battery and safety reasons the inputs are simultaneously constrained in both their average and peak power. For a fixed ratio of the average power to the peak power the difference between the upper and the lower bounds tends to zero as the average power tends to infinity, and the ratio of the upper and lower bounds tends to one as the average power tends to zero. The case where only an average-power constraint is imposed on the input is treated separately. In this case, the difference of the upper and lower bound tends to 0 as the average power tends to infinity, and their ratio tends to a constant as the power tends to zero.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 17:46:32 GMT" } ]
2009-03-11T00:00:00
[ [ "Lapidoth", "Amos", "" ], [ "Moser", "Stefan M.", "" ], [ "Wigger", "Michele A.", "" ] ]
new_dataset
0.980034
0903.1509
Sourav Dhar
Rabindranath Bera, Sourav Dhar, Debdatta Kandar
Digital Radar for Collision Avoidance and Automatic Cruise Control in Transportation
5 pages, 12 figs.,published in ISM-08, Bangalore, India, 3-6 December 2008
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A proper remote sensing device is required for automatic cruise control (ACC) to avoid collision in transportation system. In this paper we proposed a direct sequence spread spectrum (DSSS) radar for remote sensing in intelligent transporation system(ITS). We have successfully detected single target and through 1D radar imaging we are capable to separate multiple targets. We have also implemented DSSS radar using software defined radio (SDR) and successfully detected a single target.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 10:09:40 GMT" } ]
2009-03-10T00:00:00
[ [ "Bera", "Rabindranath", "" ], [ "Dhar", "Sourav", "" ], [ "Kandar", "Debdatta", "" ] ]
new_dataset
0.979694
0903.1196
Inge Bethke
Inge Bethke, Piet Rodenburg and Arjen Sevenster
The structure of finite meadows
12 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A meadow is a commutative ring with a total inverse operator satisfying 0^{-1}=0. We show that the class of finite meadows is the closure of the class of Galois fields under finite products. As a corollary, we obtain a unique representation of minimal finite meadows in terms of finite prime fields.
[ { "version": "v1", "created": "Fri, 6 Mar 2009 12:08:55 GMT" } ]
2009-03-09T00:00:00
[ [ "Bethke", "Inge", "" ], [ "Rodenburg", "Piet", "" ], [ "Sevenster", "Arjen", "" ] ]
new_dataset
0.999116
0810.2659
Pannir Selvam Elamvazhuthi
P.S. Elamvazhuthi (1 and 2), P.S. Kulkarni (1 and 3), and B.K. Dey (1) ((1) Indian Institute of Technology Bombay, Mumbai, India, (2) Cognizant Technology Solutions India Pvt. Ltd., Chennai, India, (3) Juniper Networks Inc., Bengaluru, India)
DSTC Layering Protocols in Wireless Cooperative Networks
39 pages, 20 figures. Part of this paper is submitted to IEEE 70th Vehicular Technology Conference: VTC2009-Fall for publication
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a radio network with single source-destination pair and some relays, a link between any two nodes is considered to have same or zero path loss. However in practice some links may have considerably high path loss than others but still being useful. In this report, we take into account signals received from these links also. \indent Our system model consists of a source-destination pair with two layers of relays in which weaker links between source and second layer and between the first layer and destination are also considered. We propose some protocols in this system model, run simulations under optimum power allocation, and compare these protocols. We show that under reasonable channel strength of these weaker links, the proposed protocols perform ($ \approx 2$ dB) better than the existing basic protocol. As expected, the degree of improvement increases with the strength of the weaker links. We also show that with the receive channel knowledge in relays, the reliability and data rate are improved.
[ { "version": "v1", "created": "Wed, 15 Oct 2008 10:57:55 GMT" }, { "version": "v2", "created": "Fri, 6 Mar 2009 09:29:59 GMT" }, { "version": "v3", "created": "Sat, 7 Mar 2009 17:02:26 GMT" } ]
2009-03-07T00:00:00
[ [ "Elamvazhuthi", "P. S.", "", "1 and 2" ], [ "Kulkarni", "P. S.", "", "1 and 3" ], [ "Dey", "B. K.", "" ] ]
new_dataset
0.98759
0903.0889
David Doty
David Doty, Matthew J. Patitz
A Domain-Specific Language for Programming in the Tile Assembly Model
null
null
null
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a domain-specific language (DSL) for creating sets of tile types for simulations of the abstract Tile Assembly Model. The language defines objects known as tile templates, which represent related groups of tiles, and a small number of basic operations on tile templates that help to eliminate the error-prone drudgery of enumerating such tile types manually or with low-level constructs of general-purpose programming languages. The language is implemented as a class library in Python (a so-called internal DSL), but is presented independently of Python or object-oriented programming, with emphasis on supporting the creation of visual editing tools for programmatically creating large sets of complex tile types without needing to write a program.
[ { "version": "v1", "created": "Thu, 5 Mar 2009 01:19:35 GMT" } ]
2009-03-06T00:00:00
[ [ "Doty", "David", "" ], [ "Patitz", "Matthew J.", "" ] ]
new_dataset
0.999328
0903.1033
\'Angel del R\'io
Jose Joaquin Bernal, Angel del Rio, Juan Jacobo Simon
Group code structures on affine-invariant codes
7 pages
null
null
null
cs.IT math.GR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A group code structure of a linear code is a description of the code as one-sided or two-sided ideal of a group algebra of a finite group. In these realizations, the group algebra is identified with the ambient space, and the group elements with the coordinates of the ambient space. It is well known that every affine-invariant code of length $p^m$, with $p$ prime, can be realized as an ideal of the group algebra $\F\I$, where $\I$ is the underlying additive group of the field with $p^m$ elements. In this paper we describe all the group code structures of an affine-invariant code of length $p^m$ in terms of a family of maps from $\I$ to the group of automorphisms of $\I$.
[ { "version": "v1", "created": "Thu, 5 Mar 2009 17:08:01 GMT" } ]
2009-03-06T00:00:00
[ [ "Bernal", "Jose Joaquin", "" ], [ "del Rio", "Angel", "" ], [ "Simon", "Juan Jacobo", "" ] ]
new_dataset
0.988966
cs/0611073
Michael Baer
Michael B. Baer
Prefix Codes for Power Laws with Countable Support
5 pages, 2 tables, submitted to Transactions on Information Theory
Information Theory, 2008. ISIT 2008. IEEE International Symposium on
10.1109/ISIT.2008.4595434
null
cs.IT math.IT
null
In prefix coding over an infinite alphabet, methods that consider specific distributions generally consider those that decline more quickly than a power law (e.g., Golomb coding). Particular power-law distributions, however, model many random variables encountered in practice. For such random variables, compression performance is judged via estimates of expected bits per input symbol. This correspondence introduces a family of prefix codes with an eye towards near-optimal coding of known distributions. Compression performance is precisely estimated for well-known probability distributions using these codes and using previously known prefix codes. One application of these near-optimal codes is an improved representation of rational numbers.
[ { "version": "v1", "created": "Wed, 15 Nov 2006 22:07:24 GMT" }, { "version": "v2", "created": "Thu, 21 Jun 2007 22:28:07 GMT" } ]
2009-03-06T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
new_dataset
0.998615
0706.4170
Alessandro Mirone
Alessandro Mirone
Hilbert++ Manual
null
null
null
null
cs.OH cond-mat.str-el
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present here an installation guide, a hand-on mini-tutorial through examples, and the theoretical foundations of the Hilbert++ code.
[ { "version": "v1", "created": "Thu, 28 Jun 2007 09:09:55 GMT" }, { "version": "v2", "created": "Sun, 1 Mar 2009 09:03:37 GMT" } ]
2009-03-03T00:00:00
[ [ "Mirone", "Alessandro", "" ] ]
new_dataset
0.986026
0712.3423
Alban Ponse
J.A. Bergstra, A. Ponse, M.B. van der Zwaag
Tuplix Calculus
22 pages
Scientific Annals of Computer Science, 18:35--61, 2008
null
PRG0713
cs.LO cs.CE
null
We introduce a calculus for tuplices, which are expressions that generalize matrices and vectors. Tuplices have an underlying data type for quantities that are taken from a zero-totalized field. We start with the core tuplix calculus CTC for entries and tests, which are combined using conjunctive composition. We define a standard model and prove that CTC is relatively complete with respect to it. The core calculus is extended with operators for choice, information hiding, scalar multiplication, clearing and encapsulation. We provide two examples of applications; one on incremental financial budgeting, and one on modular financial budget design.
[ { "version": "v1", "created": "Thu, 20 Dec 2007 13:58:14 GMT" } ]
2009-03-03T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Ponse", "A.", "" ], [ "van der Zwaag", "M. B.", "" ] ]
new_dataset
0.991797
0903.0034
Vladimir Braverman
Vladimir Braverman, Rafail Ostrovsky
Measuring Independence of Datasets
null
null
null
null
cs.DS cs.DB cs.IR cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A data stream model represents setting where approximating pairwise, or $k$-wise, independence with sublinear memory is of considerable importance. In the streaming model the joint distribution is given by a stream of $k$-tuples, with the goal of testing correlations among the components measured over the entire stream. In the streaming model, Indyk and McGregor (SODA 08) recently gave exciting new results for measuring pairwise independence. The Indyk and McGregor methods provide $\log{n}$-approximation under statistical distance between the joint and product distributions in the streaming model. Indyk and McGregor leave, as their main open question, the problem of improving their $\log n$-approximation for the statistical distance metric. In this paper we solve the main open problem posed by of Indyk and McGregor for the statistical distance for pairwise independence and extend this result to any constant $k$. In particular, we present an algorithm that computes an $(\epsilon, \delta)$-approximation of the statistical distance between the joint and product distributions defined by a stream of $k$-tuples. Our algorithm requires $O(({1\over \epsilon}\log({nm\over \delta}))^{(30+k)^k})$ memory and a single pass over the data stream.
[ { "version": "v1", "created": "Sun, 1 Mar 2009 01:29:54 GMT" } ]
2009-03-03T00:00:00
[ [ "Braverman", "Vladimir", "" ], [ "Ostrovsky", "Rafail", "" ] ]
new_dataset
0.986573
0902.4481
Jian Tan
Predrag R. Jelenkovic and Jian Tan
Stability of Finite Population ALOHA with Variable Packets
14 pages, 5 figures
null
null
EE2009-02-20
cs.PF cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
ALOHA is one of the most basic Medium Access Control (MAC) protocols and represents a foundation for other more sophisticated distributed and asynchronous MAC protocols, e.g., CSMA. In this paper, unlike in the traditional work that focused on mean value analysis, we study the distributional properties of packet transmission delays over an ALOHA channel. We discover a new phenomenon showing that a basic finite population ALOHA model with variable size (exponential) packets is characterized by power law transmission delays, possibly even resulting in zero throughput. These results are in contrast to the classical work that shows exponential delays and positive throughput for finite population ALOHA with fixed packets. Furthermore, we characterize a new stability condition that is entirely derived from the tail behavior of the packet and backoff distributions that may not be determined by mean values. The power law effects and the possible instability might be diminished, or perhaps eliminated, by reducing the variability of packets. However, we show that even a slotted (synchronized) ALOHA with packets of constant size can exhibit power law delays when the number of active users is random. From an engineering perspective, our results imply that the variability of packet sizes and number of active users need to be taken into consideration when designing robust MAC protocols, especially for ad-hoc/sensor networks where other factors, such as link failures and mobility, might further compound the problem.
[ { "version": "v1", "created": "Wed, 25 Feb 2009 22:59:58 GMT" }, { "version": "v2", "created": "Thu, 26 Feb 2009 22:34:03 GMT" } ]
2009-02-27T00:00:00
[ [ "Jelenkovic", "Predrag R.", "" ], [ "Tan", "Jian", "" ] ]
new_dataset
0.993114
0902.4572
Saloua Chettibi
Saloua Chettibi, M. Benmohamed
A Multipath Energy-Aware On demand Source Routing Protocol for Mobile Ad-Hoc Networks
null
1st Workshop on Next Generation Networks: Mobility, WNGN,, Maroc (2009)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Energy consumption is the most challenging issue in routing protocol design for mobile ad-hoc networks (MANETs), since mobile nodes are battery powered. Furthermore, replacing or recharging batteries is often impossible in critical environments such as in military or rescue missions. In a MANET, the energy depletion of a node does not affect the node itself only, but the overall network lifetime. In this paper, we present multipath and energy-aware on demand source routing (MEA-DSR) protocol, which exploits route diversity and information about batteries-energy levels for balancing energy consumption between mobile nodes. Simulation results, have shown that MEA-DSR protocol is more energy efficient than DSR in almost mobility scenarios.
[ { "version": "v1", "created": "Thu, 26 Feb 2009 12:47:12 GMT" } ]
2009-02-27T00:00:00
[ [ "Chettibi", "Saloua", "" ], [ "Benmohamed", "M.", "" ] ]
new_dataset
0.99737
cs/0701037
Gene Cooperman
Jason Ansel, Kapil Arya, Gene Cooperman
DMTCP: Transparent Checkpointing for Cluster Computations and the Desktop
17 pages; 2 figures, 8 plots, and 2 tables; description of DMTCP; Version 3: describing checkpointing both for distributed multi-threaded applications (including MPI), and interactive shell-like languages on desktop; Revised to reflect version published in IPDPS-09; Software at: http://dmtcp.sourceforge.net/
null
null
null
cs.DC cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
DMTCP (Distributed MultiThreaded CheckPointing) is a transparent user-level checkpointing package for distributed applications. Checkpointing and restart is demonstrated for a wide range of over 20 well known applications, including MATLAB, Python, TightVNC, MPICH2, OpenMPI, and runCMS. RunCMS runs as a 680 MB image in memory that includes 540 dynamic libraries, and is used for the CMS experiment of the Large Hadron Collider at CERN. DMTCP transparently checkpoints general cluster computations consisting of many nodes, processes, and threads; as well as typical desktop applications. On 128 distributed cores (32 nodes), checkpoint and restart times are typically 2 seconds, with negligible run-time overhead. Typical checkpoint times are reduced to 0.2 seconds when using forked checkpointing. Experimental results show that checkpoint time remains nearly constant as the number of nodes increases on a medium-size cluster. DMTCP automatically accounts for fork, exec, ssh, mutexes/semaphores, TCP/IP sockets, UNIX domain sockets, pipes, ptys (pseudo-terminals), terminal modes, ownership of controlling terminals, signal handlers, open file descriptors, shared open file descriptors, I/O (including the readline library), shared memory (via mmap), parent-child process relationships, pid virtualization, and other operating system artifacts. By emphasizing an unprivileged, user-space approach, compatibility is maintained across Linux kernels from 2.6.9 through the current 2.6.28. Since DMTCP is unprivileged and does not require special kernel modules or kernel patches, DMTCP can be incorporated and distributed as a checkpoint-restart module within some larger package.
[ { "version": "v1", "created": "Sat, 6 Jan 2007 11:36:50 GMT" }, { "version": "v2", "created": "Sun, 20 Apr 2008 08:42:29 GMT" }, { "version": "v3", "created": "Tue, 24 Feb 2009 18:13:25 GMT" } ]
2009-02-24T00:00:00
[ [ "Ansel", "Jason", "" ], [ "Arya", "Kapil", "" ], [ "Cooperman", "Gene", "" ] ]
new_dataset
0.996532
0902.3648
Claus-Peter Wirth
Volker Mattick, Claus-Peter Wirth
An Algebraic Dexter-Based Hypertext Reference Model
ii + 48 pages
null
null
Research Report 719/1999 (green/grey series), Fachbereich Informatik, University of Dortmund
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the first formal algebraic specification of a hypertext reference model. It is based on the well-known Dexter Hypertext Reference Model and includes modifications with respect to the development of hypertext since the WWW came up. Our hypertext model was developed as a product model with the aim to automatically support the design process and is extended to a model of hypertext-systems in order to be able to describe the state transitions in this process. While the specification should be easy to read for non-experts in algebraic specification, it guarantees a unique understanding and enables a close connection to logic-based development and verification.
[ { "version": "v1", "created": "Fri, 20 Feb 2009 19:57:30 GMT" } ]
2009-02-23T00:00:00
[ [ "Mattick", "Volker", "" ], [ "Wirth", "Claus-Peter", "" ] ]
new_dataset
0.998845
0902.3178
Deniz Gunduz
Deniz Gunduz, Osvaldo Simeone, Andrea J. Goldsmith, H. Vincent Poor and Shlomo Shamai (Shitz)
Multiple Multicasts with the Help of a Relay
Submitted to Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of simultaneous multicasting of multiple messages with the help of a relay terminal is considered. In particular, a model is studied in which a relay station simultaneously assists two transmitters in multicasting their independent messages to two receivers. The relay may also have an independent message of its own to multicast. As a first step to address this general model, referred to as the compound multiple access channel with a relay (cMACr), the capacity region of the multiple access channel with a "cognitive" relay is characterized, including the cases of partial and rate-limited cognition. Then, achievable rate regions for the cMACr model are presented based on decode-and-forward (DF) and compress-and-forward (CF) relaying strategies. Moreover, an outer bound is derived for the special case, called the cMACr without cross-reception, in which each transmitter has a direct link to one of the receivers while the connection to the other receiver is enabled only through the relay terminal. The capacity region is characterized for a binary modulo additive cMACr without cross-reception, showing the optimality of binary linear block codes, thus highlighting the benefits of physical layer network coding and structured codes. Results are extended to the Gaussian channel model as well, providing achievable rate regions for DF and CF, as well as for a structured code design based on lattice codes. It is shown that the performance with lattice codes approaches the upper bound for increasing power, surpassing the rates achieved by the considered random coding-based techniques.
[ { "version": "v1", "created": "Wed, 18 Feb 2009 16:04:03 GMT" } ]
2009-02-19T00:00:00
[ [ "Gunduz", "Deniz", "", "Shitz" ], [ "Simeone", "Osvaldo", "", "Shitz" ], [ "Goldsmith", "Andrea J.", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
new_dataset
0.952296
0902.2917
Matthias Hesse
Matthias Hesse (I3S), Jerome Lebrun (I3S), Luc Deneire (I3S)
Full Rate L2-Orthogonal Space-Time CPM for Three Antennas
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To combine the power efficiency of Continuous Phase Modulation (CPM) with enhanced performance in fading environments, some authors have suggested to use CPM in combination with Space-Time Codes (STC). Recently, we have proposed a CPM ST-coding scheme based on L2-orthogonality for two transmitting antennas. In this paper we extend this approach to the three antennas case. We analytically derive a family of coding schemes which we call Parallel Code (PC). This code family has full rate and we prove that the proposed coding scheme achieves full diversity as confirmed by accompanying simulations. We detail an example of the proposed ST codes that can be interpreted as a conventional CPM scheme with different alphabet sets for the different transmit antennas which results in a simplified implementation. Thanks to L2-orthogonality, the decoding complexity, usually exponentially proportional to the number of transmitting antennas, is reduced to linear complexity.
[ { "version": "v1", "created": "Tue, 17 Feb 2009 13:01:16 GMT" } ]
2009-02-18T00:00:00
[ [ "Hesse", "Matthias", "", "I3S" ], [ "Lebrun", "Jerome", "", "I3S" ], [ "Deneire", "Luc", "", "I3S" ] ]
new_dataset
0.969517
0902.2953
Artem Chebotko
Shiyong Lu, Rong Huang, Artem Chebotko, Yu Deng, Farshad Fotouhi
ImageSpace: An Environment for Image Ontology Management
Appeared in the International Journal of Information Theories and Applications (IJITA), 11(2), pp. 127-134, 2004
International Journal of Information Theories and Applications (IJITA), 11(2), pp. 127-134, 2004
null
null
cs.DL cs.DB cs.MM cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
More and more researchers have realized that ontologies will play a critical role in the development of the Semantic Web, the next generation Web in which content is not only consumable by humans, but also by software agents. The development of tools to support ontology management including creation, visualization, annotation, database storage, and retrieval is thus extremely important. We have developed ImageSpace, an image ontology creation and annotation tool that features (1) full support for the standard web ontology language DAML+OIL; (2) image ontology creation, visualization, image annotation and display in one integrated framework; (3) ontology consistency assurance; and (4) storing ontologies and annotations in relational databases. It is expected that the availability of such a tool will greatly facilitate the creation of image repositories as islands of the Semantic Web.
[ { "version": "v1", "created": "Tue, 17 Feb 2009 17:28:25 GMT" } ]
2009-02-18T00:00:00
[ [ "Lu", "Shiyong", "" ], [ "Huang", "Rong", "" ], [ "Chebotko", "Artem", "" ], [ "Deng", "Yu", "" ], [ "Fotouhi", "Farshad", "" ] ]
new_dataset
0.980962
0902.2975
Claus-Peter Wirth
Claus-Peter Wirth, Ruediger Lunde
Writing Positive/Negative-Conditional Equations Conveniently
ii + 21 pages
null
null
SEKI Working-Paper SWP-94-04
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a convenient notation for positive/negative-conditional equations. The idea is to merge rules specifying the same function by using case-, if-, match-, and let-expressions. Based on the presented macro-rule-construct, positive/negative-conditional equational specifications can be written on a higher level. A rewrite system translates the macro-rule-constructs into positive/negative-conditional equations.
[ { "version": "v1", "created": "Tue, 17 Feb 2009 19:13:32 GMT" } ]
2009-02-18T00:00:00
[ [ "Wirth", "Claus-Peter", "" ], [ "Lunde", "Ruediger", "" ] ]
new_dataset
0.976067
0902.2230
Ama\c{c} Herda\u{g}delen
Ama\c{c} Herda\u{g}delen and Marco Baroni
BagPack: A general framework to represent semantic relations
Long paper presented at GEMS - Geometric Models of Natural Language Semantics, workshop held in conjunction with the 12th Conference of the European Chapter of the Association for Computational Linguistics (EACL-09), Athens, Greece
null
null
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a way to represent word pairs instantiating arbitrary semantic relations that keeps track of the contexts in which the words in the pair occur both together and independently. The resulting features are of sufficient generality to allow us, with the help of a standard supervised machine learning algorithm, to tackle a variety of unrelated semantic tasks with good results and almost no task-specific tailoring.
[ { "version": "v1", "created": "Thu, 12 Feb 2009 23:02:06 GMT" } ]
2009-02-16T00:00:00
[ [ "Herdağdelen", "Amaç", "" ], [ "Baroni", "Marco", "" ] ]
new_dataset
0.995381
0902.2370
Gerhard Kramer
Gerhard Kramer, Yingbin Liang, Shlomo Shamai (Shitz)
Outer Bounds on the Admissible Source Region for Broadcast Channels with Dependent Sources
4 pages, presented at the Information Theory and Applications Workshop, UCSD, San Diego, Feb. 8-13, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Outer bounds on the admissible source region for broadcast channels with dependent sources are developed and used to prove capacity results for several classes of sources and channels.
[ { "version": "v1", "created": "Fri, 13 Feb 2009 18:40:13 GMT" } ]
2009-02-16T00:00:00
[ [ "Kramer", "Gerhard", "", "Shitz" ], [ "Liang", "Yingbin", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
new_dataset
0.978116
0902.2187
Joao Lima
Joao Paulo Lima, Veronica Teichrieb, Judith Kelner
A Standalone Markerless 3D Tracker for Handheld Augmented Reality
null
null
null
null
cs.CV cs.GR cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an implementation of a markerless tracking technique targeted to the Windows Mobile Pocket PC platform. The primary aim of this work is to allow the development of standalone augmented reality applications for handheld devices based on natural feature tracking. In order to achieve this goal, a subset of two computer vision libraries was ported to the Pocket PC platform. They were also adapted to use fixed point math, with the purpose of improving the overall performance of the routines. The port of these libraries opens up the possibility of having other computer vision tasks being executed on mobile platforms. A model based tracking approach that relies on edge information was adopted. Since it does not require a high processing power, it is suitable for constrained devices such as handhelds. The OpenGL ES graphics library was used to perform computer vision tasks, taking advantage of existing graphics hardware acceleration. An augmented reality application was created using the implemented technique and evaluations were done regarding tracking performance and accuracy
[ { "version": "v1", "created": "Thu, 12 Feb 2009 18:25:13 GMT" } ]
2009-02-13T00:00:00
[ [ "Lima", "Joao Paulo", "" ], [ "Teichrieb", "Veronica", "" ], [ "Kelner", "Judith", "" ] ]
new_dataset
0.996527
0902.1868
Publications Loria
Fabian Kuhn (CSAIL)
Local Multicoloring Algorithms: Computing a Nearly-Optimal TDMA Schedule in Constant Time
null
26th International Symposium on Theoretical Aspects of Computer Science STACS 2009 (2009) 613-624
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The described multicoloring problem has direct applications in the context of wireless ad hoc and sensor networks. In order to coordinate the access to the shared wireless medium, the nodes of such a network need to employ some medium access control (MAC) protocol. Typical MAC protocols control the access to the shared channel by time (TDMA), frequency (FDMA), or code division multiple access (CDMA) schemes. Many channel access schemes assign a fixed set of time slots, frequencies, or (orthogonal) codes to the nodes of a network such that nodes that interfere with each other receive disjoint sets of time slots, frequencies, or code sets. Finding a valid assignment of time slots, frequencies, or codes hence directly corresponds to computing a multicoloring of a graph $G$. The scarcity of bandwidth, energy, and computing resources in ad hoc and sensor networks, as well as the often highly dynamic nature of these networks require that the multicoloring can be computed based on as little and as local information as possible.
[ { "version": "v1", "created": "Wed, 11 Feb 2009 12:42:21 GMT" } ]
2009-02-12T00:00:00
[ [ "Kuhn", "Fabian", "", "CSAIL" ] ]
new_dataset
0.999175
0902.1891
Nitin Vats
Nitin Vats
NNRU, a noncommutative analogue of NTRU
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
NTRU public key cryptosystem is well studied lattice-based Cryptosystem along with Ajtai-Dwork and GGH systems. Underlying NTRU is a hard mathematical problem of finding short vectors in a certain lattice. (Shamir 1997) presented a lattice-based attack by which he could find the original secret key or alternate key. Shamir concluded if one designs a variant of NTRU where the calculations involved during encryption and decryption are non-commutative then the system will be secure against Lattice based attack.This paper presents a new cryptosystem with above property and we have proved that it is completely secure against Lattice based attack. It operates in the non-commutative ring M=M_k Z[X]/(X^n - I_{k*k}, where M is a matrix ring of k*k matrices of polynomials in R={Z}[X]/(X^n-1). Moreover We have got speed improvement by a factor of O(k^{1.624) over NTRU for the same bit of information.
[ { "version": "v1", "created": "Wed, 11 Feb 2009 13:48:04 GMT" } ]
2009-02-12T00:00:00
[ [ "Vats", "Nitin", "" ] ]
new_dataset
0.997698
0902.1220
Lalitha Sankar
Lalitha Sankar, Yingbin Liang, Narayan Mandayam, H. Vincent Poor
Opportunistic Communications in Fading Multiaccess Relay Channels
Submitted to the IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of optimal resource allocation is studied for ergodic fading orthogonal multiaccess relay channels (MARCs) in which the users (sources) communicate with a destination with the aid of a half-duplex relay that transmits on a channel orthogonal to that used by the transmitting sources. Under the assumption that the instantaneous fading state information is available at all nodes, the maximum sum-rate and the optimal user and relay power allocations (policies) are developed for a decode-and-forward (DF) relay. With the observation that a DF relay results in two multiaccess channels, one at the relay and the other at the destination, a single known lemma on the sum-rate of two intersecting polymatroids is used to determine the DF sum-rate and the optimal user and relay policies. The lemma also enables a broad topological classification of fading MARCs into one of three types. The first type is the set of partially clustered MARCs where a user is clustered either with the relay or with the destination such that the users waterfill on their bottle-neck links to the distant receiver. The second type is the set of clustered MARCs where all users are either proximal to the relay or to the destination such that opportunistic multiuser scheduling to one of the receivers is optimal. The third type consists of arbitrarily clustered MARCs which are a combination of the first two types, and for this type it is shown that the optimal policies are opportunistic non-waterfilling solutions. The analysis is extended to develop the rate region of a K-user orthogonal half-duplex MARC. Finally, cutset outer bounds are used to show that DF achieves the capacity region for a class of clustered orthogonal half-duplex MARCs.
[ { "version": "v1", "created": "Sat, 7 Feb 2009 04:37:04 GMT" } ]
2009-02-10T00:00:00
[ [ "Sankar", "Lalitha", "" ], [ "Liang", "Yingbin", "" ], [ "Mandayam", "Narayan", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.956517
0902.1253
Wadie Guizani
Laurent Boyer, Guillaume Theyssier (LM-Savoie)
On Local Symmetries And Universality In Cellular Autmata
null
26th International Symposium on Theoretical Aspects of Computer Science STACS 2009 (2009) 195-206
null
null
cs.DM math.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cellular automata (CA) are dynamical systems defined by a finite local rule but they are studied for their global dynamics. They can exhibit a wide range of complex behaviours and a celebrated result is the existence of (intrinsically) universal CA, that is CA able to fully simulate any other CA. In this paper, we show that the asymptotic density of universal cellular automata is 1 in several families of CA defined by local symmetries. We extend results previously established for captive cellular automata in two significant ways. First, our results apply to well-known families of CA (e.g. the family of outer-totalistic CA containing the Game of Life) and, second, we obtain such density results with both increasing number of states and increasing neighbourhood. Moreover, thanks to universality-preserving encodings, we show that the universality problem remains undecidable in some of those families.
[ { "version": "v1", "created": "Sat, 7 Feb 2009 17:54:02 GMT" } ]
2009-02-10T00:00:00
[ [ "Boyer", "Laurent", "", "LM-Savoie" ], [ "Theyssier", "Guillaume", "", "LM-Savoie" ] ]
new_dataset
0.998143
0902.1351
Cristina Fernandez-Cordoba
C. Fern\'andez-C\'ordoba and K. T. Phelps
On the minimum distance graph of an extended Preparata code
null
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The minimum distance graph of an extended Preparata code P(m) has vertices corresponding to codewords and edges corresponding to pairs of codewords that are distance 6 apart. The clique structure of this graph is investigated and it is established that the minimum distance graphs of two extended Preparata codes are isomorphic if and only if the codes are equivalent.
[ { "version": "v1", "created": "Mon, 9 Feb 2009 01:03:29 GMT" } ]
2009-02-10T00:00:00
[ [ "Fernández-Córdoba", "C.", "" ], [ "Phelps", "K. T.", "" ] ]
new_dataset
0.992589
0902.1364
Sadagopan Narasimhan
N.S.Narayanaswamy, N.Sadagopan and Apoorve Dubey
A Note on Contractible Edges in Chordal Graphs
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Contraction of an edge merges its end points into a new vertex which is adjacent to each neighbor of the end points of the edge. An edge in a $k$-connected graph is {\em contractible} if its contraction does not result in a graph of lower connectivity. We characterize contractible edges in chordal graphs using properties of tree decompositions with respect to minimal vertex separators.
[ { "version": "v1", "created": "Mon, 9 Feb 2009 05:07:07 GMT" } ]
2009-02-10T00:00:00
[ [ "Narayanaswamy", "N. S.", "" ], [ "Sadagopan", "N.", "" ], [ "Dubey", "Apoorve", "" ] ]
new_dataset
0.989869
0901.0168
Harshan Jagadeesh
J. Harshan, B. Sundar Rajan
Coding for Two-User SISO and MIMO Multiple Access Channels
18 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constellation Constrained (CC) capacity regions of a two-user SISO Gaussian Multiple Access Channel (GMAC) with finite complex input alphabets and continuous output are computed in this paper. When both the users employ the same code alphabet, it is well known that an appropriate rotation between the alphabets provides unique decodability to the receiver. For such a set-up, a metric is proposed to compute the angle(s) of rotation between the alphabets such that the CC capacity region is maximally enlarged. Subsequently, code pairs based on Trellis Coded Modulation (TCM) are designed for the two-user GMAC with $M$-PSK and $M$-PAM alphabet pairs for arbitrary values of $M$ and it is proved that, for certain angles of rotation, Ungerboeck labelling on the trellis of each user maximizes the guaranteed squared Euclidean distance of the \textit{sum trellis}. Hence, such a labelling scheme can be used systematically to construct trellis code pairs for a two-user GMAC to achieve sum rates close to the sum capacity of the channel. More importantly, it is shown for the first time that ML decoding complexity at the destination is significantly reduced when $M$-PAM alphabet pairs are employed with \textit{almost} no loss in the sum capacity. \indent A two-user Multiple Input Multiple Output (MIMO) fading MAC with $N_{t}$ antennas at both the users and a single antenna at the destination has also been considered with the assumption that the destination has the perfect knowledge of channel state information and the two users have the perfect knowledge of only the phase components of their channels. For such a set-up, two distinct classes of Space Time Block Code (STBC) pairs derived from the well known class of real orthogonal designs are proposed such that the STBC pairs are information lossless and have low ML decoding complexity.
[ { "version": "v1", "created": "Thu, 1 Jan 2009 18:05:39 GMT" }, { "version": "v2", "created": "Tue, 6 Jan 2009 06:52:00 GMT" }, { "version": "v3", "created": "Mon, 9 Feb 2009 16:11:13 GMT" } ]
2009-02-09T00:00:00
[ [ "Harshan", "J.", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.993418
0902.1047
Wadie Guizani
Nicolas Bousquet (ENS Cachan), Jean Daligault (LIRMM), Stephan Thomasse (LIRMM), Anders Yeo
A Polynomial Kernel For Multicut In Trees
null
26th International Symposium on Theoretical Aspects of Computer Science STACS 2009 (2009) 183-194
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The MULTICUT IN TREES problem consists in deciding, given a tree, a set of requests (i.e. paths in the tree) and an integer k, whether there exists a set of k edges cutting all the requests. This problem was shown to be FPT by Guo and Niedermeyer. They also provided an exponential kernel. They asked whether this problem has a polynomial kernel. This question was also raised by Fellows. We show that MULTICUT IN TREES has a polynomial kernel.
[ { "version": "v1", "created": "Fri, 6 Feb 2009 10:11:09 GMT" } ]
2009-02-09T00:00:00
[ [ "Bousquet", "Nicolas", "", "ENS Cachan" ], [ "Daligault", "Jean", "", "LIRMM" ], [ "Thomasse", "Stephan", "", "LIRMM" ], [ "Yeo", "Anders", "" ] ]
new_dataset
0.955318
0902.0514
Ross Duncan
Lucas Dixon and Ross Duncan
Graphical Reasoning in Compact Closed Categories for Quantum Computation
21 pages, 9 figures. This is the journal version of the paper published at AISC
null
null
null
cs.SC cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compact closed categories provide a foundational formalism for a variety of important domains, including quantum computation. These categories have a natural visualisation as a form of graphs. We present a formalism for equational reasoning about such graphs and develop this into a generic proof system with a fixed logical kernel for equational reasoning about compact closed categories. Automating this reasoning process is motivated by the slow and error prone nature of manual graph manipulation. A salient feature of our system is that it provides a formal and declarative account of derived results that can include `ellipses'-style notation. We illustrate the framework by instantiating it for a graphical language of quantum computation and show how this can be used to perform symbolic computation.
[ { "version": "v1", "created": "Tue, 3 Feb 2009 14:21:01 GMT" } ]
2009-02-04T00:00:00
[ [ "Dixon", "Lucas", "" ], [ "Duncan", "Ross", "" ] ]
new_dataset
0.996646
0902.0322
Gregoire Jacob M.
Gregoire Jacob, Herve Debar and Eric Filiol
Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most behavioral detectors of malware remain specific to a given language and platform, mostly PE executables for Windows. The objective of this paper is to define a generic approach for behavioral detection based on two layers respectively responsible for abstraction and detection. The first abstraction layer remains specific to a platform and a language. This first layer interprets the collected instructions, API calls and arguments and classifies these operations as well as the involved objects according to their purpose in the malware lifecycle. The second detection layer remains generic and is totally interoperable between the different abstraction components. This layer relies on parallel automata parsing attribute-grammars where semantic rules are used for object typing (object classification) and object binding (data-flow). To feed detection and to experiment with our approach we have developed two different abstraction components: one processing system call traces from native code and one processing the VBScript interpreted language. The different experimentations have provided promising detection rates, in particular for script files (89%), with almost none false positives. In the case of process traces, the detection rate remains significant (51%) but could be increased by more sophisticated collection tools.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 17:36:48 GMT" } ]
2009-02-03T00:00:00
[ [ "Jacob", "Gregoire", "" ], [ "Debar", "Herve", "" ], [ "Filiol", "Eric", "" ] ]
new_dataset
0.998837
0902.0337
Kaibin Huang
Kaibin Huang and Vincent K. N. Lau
Stability and Delay of Zero-Forcing SDMA with Limited Feedback
26 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the stability and queueing delay of Space Division Multiple Access (SDMA) systems with bursty traffic, where zero-forcing beamforming enables simultaneous transmission to multiple mobiles. Computing beamforming vectors relies on quantized channel state information (CSI) feedback (limited feedback) from mobiles. Define the stability region for SDMA as the set of multiuser packet-arrival rates for which the steady-state queue lengths are finite. Given perfect CSI feedback and equal power allocation over scheduled queues, the stability region is proved to be a convex polytope having the derived vertices. For any set of arrival rates in the stability region, multiuser queues are shown to be stabilized by a joint queue-and-beamforming control policy that maximizes the departure-rate-weighted sum of queue lengths. The stability region for limited feedback is found to be the perfect-CSI region multiplied by one minus a small factor. The required number of feedback bits per mobile is proved to scale logarithmically with the inverse of the above factor as well as linearly with the number of transmit antennas minus one. The effects of limited feedback on queueing delay are also quantified. For Poisson arrival processes, CSI quantization errors are shown to multiply average queueing delay by a factor larger than one. This factor can be controlled by adjusting the number of feedback bits per mobile following the derived relationship. For general arrival processes, CSI errors are found to increase Kingman's bound on the tail probability of the instantaneous delay by one plus a small factor. The required number of feedback bits per mobile is shown to scale logarithmically with this factor.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 19:05:59 GMT" } ]
2009-02-03T00:00:00
[ [ "Huang", "Kaibin", "" ], [ "Lau", "Vincent K. N.", "" ] ]
new_dataset
0.977192
0901.4876
Robert Brijder
Hendrik Blockeel, Robert Brijder
Non-Confluent NLC Graph Grammar Inference by Compressing Disjoint Subgraphs
12 pages, 1 figure
null
null
null
cs.LG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Grammar inference deals with determining (preferable simple) models/grammars consistent with a set of observations. There is a large body of research on grammar inference within the theory of formal languages. However, there is surprisingly little known on grammar inference for graph grammars. In this paper we take a further step in this direction and work within the framework of node label controlled (NLC) graph grammars. Specifically, we characterize, given a set of disjoint and isomorphic subgraphs of a graph $G$, whether or not there is a NLC graph grammar rule which can generate these subgraphs to obtain $G$. This generalizes previous results by assuming that the set of isomorphic subgraphs is disjoint instead of non-touching. This leads naturally to consider the more involved ``non-confluent'' graph grammar rules.
[ { "version": "v1", "created": "Fri, 30 Jan 2009 12:44:29 GMT" } ]
2009-02-02T00:00:00
[ [ "Blockeel", "Hendrik", "" ], [ "Brijder", "Robert", "" ] ]
new_dataset
0.967736
cs/0610108
Mohand Lagha
Mohand Lagha (AERONAUTIC Department of Blida University, Femto-ST), Messaoud Bensebti (AERONAUTIC Department of Blida University)
Doppler Spectrum Estimation by Ramanujan Fourier Transforms
null
null
null
null
cs.NA cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Doppler spectrum estimation of a weather radar signal in a classic way can be made by two methods, temporal one based in the autocorrelation of the successful signals, whereas the other one uses the estimation of the power spectral density PSD by using Fourier transforms. We introduces a new tool of signal processing based on Ramanujan sums cq(n), adapted to the analysis of arithmetical sequences with several resonances p/q. These sums are almost periodic according to time n of resonances and aperiodic according to the order q of resonances. New results will be supplied by the use of Ramanujan Fourier Transform (RFT) for the estimation of the Doppler spectrum for the weather radar signal.
[ { "version": "v1", "created": "Wed, 18 Oct 2006 14:43:45 GMT" }, { "version": "v2", "created": "Sun, 1 Feb 2009 19:24:25 GMT" } ]
2009-02-01T00:00:00
[ [ "Lagha", "Mohand", "", "AERONAUTIC Department of Blida University, Femto-ST" ], [ "Bensebti", "Messaoud", "", "AERONAUTIC Department of Blida University" ] ]
new_dataset
0.999195
0901.4646
Muhammad Mubashir Khan
Muhammad Mubashir Khan, Salahuddin Hyder, Mahmood K Pathan, Kashif H Sheikh
A Quantum Key Distribution Network Through Single Mode Optical Fiber
This paper has been submitted to the 2006 International Symposium on Collaborative Technologies and Systems (CTS 2006)May 14-17, 2006, Las Vegas, Nevada, USA
Khan, M.M., et al., A Quantum Key Distribution Network through Single Mode Optical Fiber. Proceedings of the International Symposium on Collaborative Technologies and Systems, 2006: p. 386-391
10.1109/CTS.2006.10
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum key distribution (QKD) has been developed within the last decade that is provably secure against arbitrary computing power, and even against quantum computer attacks. Now there is a strong need of research to exploit this technology in the existing communication networks. In this paper we have presented various experimental results pertaining to QKD like Raw key rate and Quantum bit error rate (QBER). We found these results over 25 km single mode optical fiber. The experimental setup implemented the enhanced version of BB84 QKD protocol. Based upon the results obtained, we have presented a network design which can be implemented for the realization of large scale QKD networks. Furthermore, several new ideas are presented and discussed to integrate the QKD technique in the classical communication networks.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 10:48:28 GMT" } ]
2009-01-30T00:00:00
[ [ "Khan", "Muhammad Mubashir", "" ], [ "Hyder", "Salahuddin", "" ], [ "Pathan", "Mahmood K", "" ], [ "Sheikh", "Kashif H", "" ] ]
new_dataset
0.965953
0901.4664
Inge Bethke
Jan A. Bergstra and I. Bethke
Square root meadows
9 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let Q_0 denote the rational numbers expanded to a meadow by totalizing inversion such that 0^{-1}=0. Q_0 can be expanded by a total sign function s that extracts the sign of a rational number. In this paper we discuss an extension Q_0(s ,\sqrt) of the signed rationals in which every number has a unique square root.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 12:42:46 GMT" } ]
2009-01-30T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Bethke", "I.", "" ] ]
new_dataset
0.996073
0901.4728
Krishnendu Chatterjee
Dietmar Berwanger and Krishnendu Chatterjee and Martin De Wulf and Laurent Doyen and Thomas A. Henzinger
Alpaga: A Tool for Solving Parity Games with Imperfect Information
11 pages, a shorter version to appear in TACAS 2009
null
null
null
cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Alpaga is a solver for two-player parity games with imperfect information. Given the description of a game, it determines whether the first player can ensure to win and, if so, it constructs a winning strategy. The tool provides a symbolic implementation of a recent algorithm based on antichains.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 17:34:36 GMT" } ]
2009-01-30T00:00:00
[ [ "Berwanger", "Dietmar", "" ], [ "Chatterjee", "Krishnendu", "" ], [ "De Wulf", "Martin", "" ], [ "Doyen", "Laurent", "" ], [ "Henzinger", "Thomas A.", "" ] ]
new_dataset
0.983817
0901.4754
Robert Frank Carslaw Walters
L. de Francesco Albasini, N. Sabadini, R.F.C. Walters
An algebra of automata which includes both classical and quantum entities
null
null
null
null
cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an algebra for composing automata which includes both classical and quantum entities and their communications. We illustrate by describing in detail a quantum protocol.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 19:28:13 GMT" } ]
2009-01-30T00:00:00
[ [ "Albasini", "L. de Francesco", "" ], [ "Sabadini", "N.", "" ], [ "Walters", "R. F. C.", "" ] ]
new_dataset
0.999533
0804.2191
Novella Bartolini
N. Bartolini, T. Calamoneri, E. G. Fusco, A. Massini, S. Silvestri
Push & Pull: autonomous deployment of mobile sensors for a complete coverage
Technical Report. This paper has been published on Wireless Networks, Springer. Animations and the complete code of the proposed algorithm are available for download at the address: http://www.dsi.uniroma1.it/~novella/mobile_sensors/
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile sensor networks are important for several strategic applications devoted to monitoring critical areas. In such hostile scenarios, sensors cannot be deployed manually and are either sent from a safe location or dropped from an aircraft. Mobile devices permit a dynamic deployment reconfiguration that improves the coverage in terms of completeness and uniformity. In this paper we propose a distributed algorithm for the autonomous deployment of mobile sensors called Push&Pull. According to our proposal, movement decisions are made by each sensor on the basis of locally available information and do not require any prior knowledge of the operating conditions or any manual tuning of key parameters. We formally prove that, when a sufficient number of sensors are available, our approach guarantees a complete and uniform coverage. Furthermore, we demonstrate that the algorithm execution always terminates preventing movement oscillations. Numerous simulations show that our algorithm reaches a complete coverage within reasonable time with moderate energy consumption, even when the target area has irregular shapes. Performance comparisons between Push&Pull and one of the most acknowledged algorithms show how the former one can efficiently reach a more uniform and complete coverage under a wide range of working scenarios.
[ { "version": "v1", "created": "Mon, 14 Apr 2008 14:38:52 GMT" }, { "version": "v2", "created": "Thu, 26 Jun 2008 15:23:54 GMT" }, { "version": "v3", "created": "Tue, 29 Jul 2008 13:43:10 GMT" }, { "version": "v4", "created": "Thu, 29 Jan 2009 14:58:50 GMT" } ]
2009-01-29T00:00:00
[ [ "Bartolini", "N.", "" ], [ "Calamoneri", "T.", "" ], [ "Fusco", "E. G.", "" ], [ "Massini", "A.", "" ], [ "Silvestri", "S.", "" ] ]
new_dataset
0.998636
0803.1030
David Soloveichik
David Soloveichik
Robust Stochastic Chemical Reaction Networks and Bounded Tau-Leaping
Tightened up section 5
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The behavior of some stochastic chemical reaction networks is largely unaffected by slight inaccuracies in reaction rates. We formalize the robustness of state probabilities to reaction rate deviations, and describe a formal connection between robustness and efficiency of simulation. Without robustness guarantees, stochastic simulation seems to require computational time proportional to the total number of reaction events. Even if the concentration (molecular count per volume) stays bounded, the number of reaction events can be linear in the duration of simulated time and total molecular count. We show that the behavior of robust systems can be predicted such that the computational work scales linearly with the duration of simulated time and concentration, and only polylogarithmically in the total molecular count. Thus our asymptotic analysis captures the dramatic speedup when molecular counts are large, and shows that for bounded concentrations the computation time is essentially invariant with molecular count. Finally, by noticing that even robust stochastic chemical reaction networks are capable of embedding complex computational problems, we argue that the linear dependence on simulated time and concentration is likely optimal.
[ { "version": "v1", "created": "Fri, 7 Mar 2008 17:36:54 GMT" }, { "version": "v2", "created": "Sun, 16 Nov 2008 02:10:39 GMT" }, { "version": "v3", "created": "Wed, 28 Jan 2009 09:58:41 GMT" } ]
2009-01-28T00:00:00
[ [ "Soloveichik", "David", "" ] ]
new_dataset
0.972878
0901.3902
Sylvain Marchand
Fabien Gallot, Owen Lagadec, Myriam Desainte-Catherine (LaBRI), Sylvain Marchand (LaBRI)
iKlax: a New Musical Audio Format for Active Listening
null
International Computer Music Conference (ICMC), Belfast : Irlande (2008)
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we are presenting a new model for interactive music. Unlike most interactive systems, our model is based on file organization, but does not require digital audio treatments. This model includes a definition of a constraints system and its solver. The products of this project are intended for the general public, inexperienced users, as well as professional musicians, and will be distributed commercially. We are here presenting three products of this project. The difficulty of this project is to design a technology and software products for interactive music which must be easy to use by the general public and by professional composers.
[ { "version": "v1", "created": "Sun, 25 Jan 2009 14:57:55 GMT" } ]
2009-01-27T00:00:00
[ [ "Gallot", "Fabien", "", "LaBRI" ], [ "Lagadec", "Owen", "", "LaBRI" ], [ "Desainte-Catherine", "Myriam", "", "LaBRI" ], [ "Marchand", "Sylvain", "", "LaBRI" ] ]
new_dataset
0.984996
0901.3924
David Eppstein
David Eppstein, Elena Mumford, Bettina Speckmann, and Kevin Verbeek
Area-Universal Rectangular Layouts
19 pages, 16 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A rectangular layout is a partition of a rectangle into a finite set of interior-disjoint rectangles. Rectangular layouts appear in various applications: as rectangular cartograms in cartography, as floorplans in building architecture and VLSI design, and as graph drawings. Often areas are associated with the rectangles of a rectangular layout and it might hence be desirable if one rectangular layout can represent several area assignments. A layout is area-universal if any assignment of areas to rectangles can be realized by a combinatorially equivalent rectangular layout. We identify a simple necessary and sufficient condition for a rectangular layout to be area-universal: a rectangular layout is area-universal if and only if it is one-sided. More generally, given any rectangular layout L and any assignment of areas to its regions, we show that there can be at most one layout (up to horizontal and vertical scaling) which is combinatorially equivalent to L and achieves a given area assignment. We also investigate similar questions for perimeter assignments. The adjacency requirements for the rectangles of a rectangular layout can be specified in various ways, most commonly via the dual graph of the layout. We show how to find an area-universal layout for a given set of adjacency requirements whenever such a layout exists.
[ { "version": "v1", "created": "Sun, 25 Jan 2009 22:07:47 GMT" } ]
2009-01-27T00:00:00
[ [ "Eppstein", "David", "" ], [ "Mumford", "Elena", "" ], [ "Speckmann", "Bettina", "" ], [ "Verbeek", "Kevin", "" ] ]
new_dataset
0.998795
0812.3563
Laurent Romary
Laurent Romary (LORIA)
Questions & Answers for TEI Newcomers
null
Jahrbuch f\"ur Computerphilologie 10 (2009)
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides an introduction to the Text Encoding Initia-tive (TEI), focused at bringing in newcomers who have to deal with a digital document project and are looking at the capacity that the TEI environment may have to fulfil his needs. To this end, we avoid a strictly technical presentation of the TEI and concentrate on the actual issues that such projects face, with parallel made on the situation within two institutions. While a quick walkthrough the TEI technical framework is provided, the papers ends up by showing the essential role of the community in the actual technical contributions that are being brought to the TEI.
[ { "version": "v1", "created": "Thu, 18 Dec 2008 15:51:17 GMT" }, { "version": "v2", "created": "Mon, 26 Jan 2009 09:51:37 GMT" } ]
2009-01-26T00:00:00
[ [ "Romary", "Laurent", "", "LORIA" ] ]
new_dataset
0.986578
0901.0536
Eren Sasoglu
Satish Babu Korada, Eren Sasoglu, Rudiger Urbanke
Polar Codes: Characterization of Exponent, Bounds, and Constructions
Submitted to IEEE Transactions on Information Theory, minor updates
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes were recently introduced by Ar\i kan. They achieve the capacity of arbitrary symmetric binary-input discrete memoryless channels under a low complexity successive cancellation decoding strategy. The original polar code construction is closely related to the recursive construction of Reed-Muller codes and is based on the $2 \times 2$ matrix $\bigl[ 1 &0 1& 1 \bigr]$. It was shown by Ar\i kan and Telatar that this construction achieves an error exponent of $\frac12$, i.e., that for sufficiently large blocklengths the error probability decays exponentially in the square root of the length. It was already mentioned by Ar\i kan that in principle larger matrices can be used to construct polar codes. A fundamental question then is to see whether there exist matrices with exponent exceeding $\frac12$. We first show that any $\ell \times \ell$ matrix none of whose column permutations is upper triangular polarizes symmetric channels. We then characterize the exponent of a given square matrix and derive upper and lower bounds on achievable exponents. Using these bounds we show that there are no matrices of size less than 15 with exponents exceeding $\frac12$. Further, we give a general construction based on BCH codes which for large $n$ achieves exponents arbitrarily close to 1 and which exceeds $\frac12$ for size 16.
[ { "version": "v1", "created": "Mon, 5 Jan 2009 19:39:05 GMT" }, { "version": "v2", "created": "Mon, 26 Jan 2009 18:17:45 GMT" } ]
2009-01-26T00:00:00
[ [ "Korada", "Satish Babu", "" ], [ "Sasoglu", "Eren", "" ], [ "Urbanke", "Rudiger", "" ] ]
new_dataset
0.99898
0901.3769
Sebastien Verel
William Beaudoin (I3S), S\'ebastien Verel (I3S), Philippe Collard (I3S), Cathy Escazut (I3S)
Deceptiveness and Neutrality - the ND family of fitness landscapes
Genetic And Evolutionary Computation Conference, Seatle : \'Etats-Unis d'Am\'erique (2006)
null
10.1145/1143997.1144091
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When a considerable number of mutations have no effects on fitness values, the fitness landscape is said neutral. In order to study the interplay between neutrality, which exists in many real-world applications, and performances of metaheuristics, it is useful to design landscapes which make it possible to tune precisely neutral degree distribution. Even though many neutral landscape models have already been designed, none of them are general enough to create landscapes with specific neutral degree distributions. We propose three steps to design such landscapes: first using an algorithm we construct a landscape whose distribution roughly fits the target one, then we use a simulated annealing heuristic to bring closer the two distributions and finally we affect fitness values to each neutral network. Then using this new family of fitness landscapes we are able to highlight the interplay between deceptiveness and neutrality.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 20:15:22 GMT" } ]
2009-01-26T00:00:00
[ [ "Beaudoin", "William", "", "I3S" ], [ "Verel", "Sébastien", "", "I3S" ], [ "Collard", "Philippe", "", "I3S" ], [ "Escazut", "Cathy", "", "I3S" ] ]
new_dataset
0.962732
0710.0105
Dmitrii Manin
Dmitrii Manin
Zipf's Law and Avoidance of Excessive Synonymy
47 pages; fixed reference list missing in v.1
Main text in Cognitive Science, 32 (7) 2008, pp. 1075 - 1098; Appendix A TBP separately in J. Quant. Ling.
10.1080/03640210802020003
null
cs.CL physics.soc-ph
null
Zipf's law states that if words of language are ranked in the order of decreasing frequency in texts, the frequency of a word is inversely proportional to its rank. It is very robust as an experimental observation, but to date it escaped satisfactory theoretical explanation. We suggest that Zipf's law may arise from the evolution of word semantics dominated by expansion of meanings and competition of synonyms.
[ { "version": "v1", "created": "Sun, 30 Sep 2007 03:21:54 GMT" }, { "version": "v2", "created": "Wed, 3 Oct 2007 03:36:45 GMT" } ]
2009-01-22T00:00:00
[ [ "Manin", "Dmitrii", "" ] ]
new_dataset
0.986281
0901.3189
James Lathrop
Steven M. Kautz, James I. Lathrop
Self-assembly of the discrete Sierpinski carpet and related fractals
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well known that the discrete Sierpinski triangle can be defined as the nonzero residues modulo 2 of Pascal's triangle, and that from this definition one can easily construct a tileset with which the discrete Sierpinski triangle self-assembles in Winfree's tile assembly model. In this paper we introduce an infinite class of discrete self-similar fractals that are defined by the residues modulo a prime p of the entries in a two-dimensional matrix obtained from a simple recursive equation. We prove that every fractal in this class self-assembles using a uniformly constructed tileset. As a special case we show that the discrete Sierpinski carpet self-assembles using a set of 30 tiles.
[ { "version": "v1", "created": "Wed, 21 Jan 2009 04:58:13 GMT" } ]
2009-01-22T00:00:00
[ [ "Kautz", "Steven M.", "" ], [ "Lathrop", "James I.", "" ] ]
new_dataset
0.997988
0901.2751
Fahad Saeed
Fahad Saeed
Pyro-Align: Sample-Align based Multiple Alignment system for Pyrosequencing Reads of Large Number
6 pages, 1 figure, Technical Report, Department of Biosystems Science and Engineering, ETH Zurich Switzerland
null
null
DBSSE-08-2008
cs.DS cs.DC q-bio.GN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pyro-Align is a multiple alignment program specifically designed for pyrosequencing reads of huge number. Multiple sequence alignment is shown to be NP-hard and heuristics are designed for approximate solutions. Multiple sequence alignment of pyrosequenceing reads is complex mainly because of 2 factors. One being the huge number of reads, making the use of traditional heuristics,that scale very poorly for large number, unsuitable. The second reason is that the alignment cannot be performed arbitrarily, because the position of the reads with respect to the original genome is important and has to be taken into account.In this report we present a short description of the multiple alignment system for pyrosequencing reads.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 00:26:18 GMT" } ]
2009-01-20T00:00:00
[ [ "Saeed", "Fahad", "" ] ]
new_dataset
0.977323
0901.2768
Ananthanarayanan Chockalingam
S. Barik, Saif K. Mohammed, A. Chockalingam, and B. Sundar Rajan
FRFD MIMO Systems: Precoded V-BLAST with Limited Feedback Versus Non-orthogonal STBC MIMO
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Full-rate (FR) and full-diversity (FD) are attractive features in MIMO systems. We refer to systems which achieve both FR and FD simultaneously as FRFD systems. Non-orthogonal STBCs can achieve FRFD without feedback, but their ML decoding complexities are high. V-BLAST without precoding achieves FR but not FD. FRFD can be achieved in V-BLAST through precoding given full channel state information at the transmitter (CSIT). However, with limited feedback precoding, V-BLAST achieves FD, but with some rate loss. Our contribution in this paper is two-fold: $i)$ we propose a limited feedback (LFB) precoding scheme which achieves FRFD in $2\times 2$, $3\times 3$ and $4\times 4$ V-BLAST systems (we refer to this scheme as FRFD-VBLAST-LFB scheme), and $ii)$ comparing the performances of the FRFD-VBLAST-LFB scheme and non-orthogonal STBCs without feedback (e.g., Golden code, perfect codes) under ML decoding, we show that in $2\times 2$ MIMO system with 4-QAM/16-QAM, FRFD-VBLAST-LFB scheme outperforms the Golden code by about 0.6 dB; in $3\times 3$ and $4\times 4$ MIMO systems, the performance of FRFD-VBLAST-LFB scheme is comparable to the performance of perfect codes. The FRFD-VBLAST-LFB scheme is attractive because 1) ML decoding becomes less complex compared to that of non-orthogonal STBCs, 2) the number of feedback bits required to achieve the above performance is small, 3) in slow-fading, it is adequate to send feedback bits only occasionally, and 4) in most practical wireless systems feedback channel is often available (e.g., for adaptive modulation, rate/power control).
[ { "version": "v1", "created": "Mon, 19 Jan 2009 05:35:35 GMT" } ]
2009-01-20T00:00:00
[ [ "Barik", "S.", "" ], [ "Mohammed", "Saif K.", "" ], [ "Chockalingam", "A.", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.981184
0901.2270
Robert Morelos-Zaragoza
Robert Morelos-Zaragoza
A Plotkin-Alamouti Superposition Coding Scheme for Cooperative Broadcasting in Wireless Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with superposition coding for cooperative broadcasting in the case of two coordinated source nodes, as introduced in the seminal work of Bergmans and Cover in 1974. A scheme is introduced for two classes of destination (or relay) nodes: Close nodes and far nodes, as ranked by their spatial distances to the pair of transmitting nodes. Two linear codes are combined using the (u,u+v)-construction devised by Plotkin to construct two-level linear unequal error protection (LUEP) codes. However, instead of binary addition of subcode codewords in the source encoder, here modulated subcode sequences are combined at the destination (or relay) nodes antennae. Bergmans and Cover referred to this as over-the-air mixing. In the case of Rayleigh fading, additional diversity order as well as robustness to channel estimation errors are obtained when source nodes transmit pairs of coded sequences in accordance to Alamouti's transmit diversity scheme. We refer to this combination as a Plotkin-Alamouti scheme and study its performance over AWGN and Rayleigh fading channels with a properly partitioned QPSK constellation.
[ { "version": "v1", "created": "Thu, 15 Jan 2009 14:17:34 GMT" } ]
2009-01-16T00:00:00
[ [ "Morelos-Zaragoza", "Robert", "" ] ]
new_dataset
0.999163
0901.1696
Julien Langou
Fred G. Gustavson, Jerzy Wasniewski, Jack J. Dongarra and Julien Langou
Rectangular Full Packed Format for Cholesky's Algorithm: Factorization, Solution and Inversion
null
null
null
null
cs.MS cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new data format for storing triangular, symmetric, and Hermitian matrices called RFPF (Rectangular Full Packed Format). The standard two dimensional arrays of Fortran and C (also known as full format) that are used to represent triangular and symmetric matrices waste nearly half of the storage space but provide high performance via the use of Level 3 BLAS. Standard packed format arrays fully utilize storage (array space) but provide low performance as there is no Level 3 packed BLAS. We combine the good features of packed and full storage using RFPF to obtain high performance via using Level 3 BLAS as RFPF is a standard full format representation. Also, RFPF requires exactly the same minimal storage as packed format. Each LAPACK full and/or packed triangular, symmetric, and Hermitian routine becomes a single new RFPF routine based on eight possible data layouts of RFPF. This new RFPF routine usually consists of two calls to the corresponding LAPACK full format routine and two calls to Level 3 BLAS routines. This means {\it no} new software is required. As examples, we present LAPACK routines for Cholesky factorization, Cholesky solution and Cholesky inverse computation in RFPF to illustrate this new work and to describe its performance on several commonly used computer platforms. Performance of LAPACK full routines using RFPF versus LAPACK full routines using standard format for both serial and SMP parallel processing is about the same while using half the storage. Performance gains are roughly one to a factor of 43 for serial and one to a factor of 97 for SMP parallel times faster using vendor LAPACK full routines with RFPF than with using vendor and/or reference packed routines.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 01:08:27 GMT" } ]
2009-01-14T00:00:00
[ [ "Gustavson", "Fred G.", "" ], [ "Wasniewski", "Jerzy", "" ], [ "Dongarra", "Jack J.", "" ], [ "Langou", "Julien", "" ] ]
new_dataset
0.999325
0901.1827
Carl Bracken
Carl Bracken, Tor Helleseth
Triple-Error-Correcting BCH-Like Codes
7 pages, submitted to ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The binary primitive triple-error-correcting BCH code is a cyclic code of minimum distance 7 with generator polynomial having zeros $\alpha$, $\alpha^3$ and $\alpha^5$ where $\alpha$ is a primitive root of unity. The zero set of the code is said to be {1,3,5}. In the 1970's Kasami showed that one can construct similar triple-error-correcting codes using zero sets consisting of different triples than the BCH codes. Furthermore, in 2000 Chang et. al. found new triples leading to triple-error-correcting codes. In this paper a new such triple is presented. In addition a new method is presented that may be of interest in finding further such triples.
[ { "version": "v1", "created": "Tue, 13 Jan 2009 16:51:51 GMT" } ]
2009-01-14T00:00:00
[ [ "Bracken", "Carl", "" ], [ "Helleseth", "Tor", "" ] ]
new_dataset
0.99848
0807.3212
Axel Kohnert
Axel Kohnert, Sascha Kurz
Construction of Large Constant Dimension Codes With a Prescribed Minimum Distance
13 pages, 1 figure, 1 table, submitted
Lecture Notes Computer Science Vol. 5393, 2008, p. 31 - 42
10.1007/978-3-540-89994-5_4
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we construct constant dimension space codes with prescribed minimum distance. There is an increased interest in space codes since a paper by Koetter and Kschischang were they gave an application in network coding. There is also a connection to the theory of designs over finite fields. We will modify a method of Braun, Kerber and Laue which they used for the construction of designs over finite fields to do the construction of space codes. Using this approach we found many new constant dimension spaces codes with a larger number of codewords than previously known codes. We will finally give a table of the best found constant dimension space codes.
[ { "version": "v1", "created": "Mon, 21 Jul 2008 06:59:59 GMT" } ]
2009-01-13T00:00:00
[ [ "Kohnert", "Axel", "" ], [ "Kurz", "Sascha", "" ] ]
new_dataset
0.999058
0901.1462
Jerome Jaffre
Guy Chavent (INRIA Rocquencourt, Ceremade)
A Fully Equivalent Global Pressure Formulation for Three-Phase Compressible Flow
null
null
null
RR-6788
cs.NA math.AP physics.class-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new global pressure formulation for immiscible three-phase compressible flows in porous media which is fully equivalent to the original equations, unlike the one introduced in \cite{CJ86}. In this formulation, the total volumetric flow of the three fluids and the global pressure follow a classical Darcy law, which simplifies the resolution of the pressure equation. However, this global pressure formulation exists only for Total Differential (TD) three-phase data, which depend only on two functions of saturations and global pressure: the global capillary pressure and the global mobility. Hence we introduce a class of interpolation which constructs such TD-three-phase data from any set of three two-phase data (for each pair of fluids) which satisfy a TD-compatibility condition.
[ { "version": "v1", "created": "Sun, 11 Jan 2009 20:02:58 GMT" } ]
2009-01-13T00:00:00
[ [ "Chavent", "Guy", "", "INRIA Rocquencourt, Ceremade" ] ]
new_dataset
0.998437
0901.1162
Anand Kumar Narayanan
Ming-Deh Huang and Anand Kumar Narayanan
Folded Algebraic Geometric Codes From Galois Extensions
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new class of list decodable codes based on Galois extensions of function fields and present a list decoding algorithm. These codes are obtained as a result of folding the set of rational places of a function field using certain elements (automorphisms) from the Galois group of the extension. This work is an extension of Folded Reed Solomon codes to the setting of Algebraic Geometric codes. We describe two constructions based on this framework depending on if the order of the automorphism used to fold the code is large or small compared to the block length. When the automorphism is of large order, the codes have polynomially bounded list size in the worst case. This construction gives codes of rate $R$ over an alphabet of size independent of block length that can correct a fraction of $1-R-\epsilon$ errors subject to the existence of asymptotically good towers of function fields with large automorphisms. The second construction addresses the case when the order of the element used to fold is small compared to the block length. In this case a heuristic analysis shows that for a random received word, the expected list size and the running time of the decoding algorithm are bounded by a polynomial in the block length. When applied to the Garcia-Stichtenoth tower, this yields codes of rate $R$ over an alphabet of size $(\frac{1}{\epsilon^2})^{O(\frac{1}{\epsilon})}$, that can correct a fraction of $1-R-\epsilon$ errors.
[ { "version": "v1", "created": "Fri, 9 Jan 2009 02:46:04 GMT" } ]
2009-01-12T00:00:00
[ [ "Huang", "Ming-Deh", "" ], [ "Narayanan", "Anand Kumar", "" ] ]
new_dataset
0.965855
0901.1244
Eric Chen
Eric Z. Chen
Constructions of Quasi-Twisted Two-Weight Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A code is said to be two-weight if the non-zero codewords have only two different a weight w1 and w2. Two-weight codes are closely related to strongly regular graphs. In this paper. It is shown that a consta-cyclic code of composite length can be put in the quasi-twisted form. Based on this transformation, a new construction method of quasi-twisted (QT) two-weight codes is presented. A large amount of QT two-weight codes are found, and some new codes are also constructed.
[ { "version": "v1", "created": "Fri, 9 Jan 2009 13:31:11 GMT" } ]
2009-01-12T00:00:00
[ [ "Chen", "Eric Z.", "" ] ]
new_dataset
0.996705
0712.0541
Eric Chen
Eric Z. Chen
New Construction of A Family of Quasi-Twisted Two-Weight Codes
4 pages, submitted to IEEE Trans. Information Theory
IEEE Trans. Inform. Theory, December 2008
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Based on cyclic and consta-cyclic simplex codes, a new explicit construction of a family of two-weight codes is presented. These two-weight codes obtained are in the form of 2-generator quasi-cyclic, or quasi-twisted structure. Based on this construction, new optimal binary quasi-cyclic [195, 8, 96], [210, 8, 104] and [240, 8, 120] codes, and good QC ternary [208, 6, 135] and [221, 6, 144] codes are thus obtained. It is also shown that many codes among the family meet the Griesmer bound and thereful are optimal.
[ { "version": "v1", "created": "Tue, 4 Dec 2007 15:03:44 GMT" }, { "version": "v2", "created": "Fri, 9 Jan 2009 13:22:50 GMT" } ]
2009-01-09T00:00:00
[ [ "Chen", "Eric Z.", "" ] ]
new_dataset
0.999645
0901.1123
Reza Rastegar
Arash Hariri, K. Navi, Reza Rastegar
A High Dynamic Range 3-Moduli-Set with Efficient Reverse Converter
null
Computers & Mathematics with Applications (2008), Vol 55, No 4, 660-668
null
null
cs.AR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
-Residue Number System (RNS) is a valuable tool for fast and parallel arithmetic. It has a wide application in digital signal processing, fault tolerant systems, etc. In this work, we introduce the 3-moduli set {2^n, 2^{2n}-1, 2^{2n}+1} and propose its residue to binary converter using the Chinese Remainder Theorem. We present its simple hardware implementation that mainly includes one Carry Save Adder (CSA) and a Modular Adder (MA). We compare the performance and area utilization of our reverse converter to the reverse converters of the moduli sets {2^n-1, 2^n, 2^n+1, 2^{2n}+1} and {2^n-1, 2^n, 2^n+1, 2^n-2^{(n+1)/2}+1, 2^n+2^{(n+1)/2}+1} that have the same dynamic range and we demonstrate that our architecture is better in terms of performance and area utilization. Also, we show that our reverse converter is faster than the reverse converter of {2^n-1, 2^n, 2^n+1} for dynamic ranges like 8-bit, 16-bit, 32-bit and 64-bit however it requires more area.
[ { "version": "v1", "created": "Thu, 8 Jan 2009 20:14:00 GMT" } ]
2009-01-09T00:00:00
[ [ "Hariri", "Arash", "" ], [ "Navi", "K.", "" ], [ "Rastegar", "Reza", "" ] ]
new_dataset
0.99838
0901.0825
Damien Chablat
Liang Ma (IRCCyN), Damien Chablat (IRCCyN), Fouad Bennis (IRCCyN), Wei Zhang (DIE), Fran\c{c}ois Guillaume (EADS)
A new muscle fatigue and recovery model and its ergonomics application in human simulation
IDMME - Virtual Concept, Beijing : Chine (2008)
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although automatic techniques have been employed in manufacturing industries to increase productivity and efficiency, there are still lots of manual handling jobs, especially for assembly and maintenance jobs. In these jobs, musculoskeletal disorders (MSDs) are one of the major health problems due to overload and cumulative physical fatigue. With combination of conventional posture analysis techniques, digital human modelling and simulation (DHM) techniques have been developed and commercialized to evaluate the potential physical exposures. However, those ergonomics analysis tools are mainly based on posture analysis techniques, and until now there is still no fatigue index available in the commercial software to evaluate the physical fatigue easily and quickly. In this paper, a new muscle fatigue and recovery model is proposed and extended to evaluate joint fatigue level in manual handling jobs. A special application case is described and analyzed by digital human simulation technique.
[ { "version": "v1", "created": "Wed, 7 Jan 2009 13:39:33 GMT" } ]
2009-01-08T00:00:00
[ [ "Ma", "Liang", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Bennis", "Fouad", "", "IRCCyN" ], [ "Zhang", "Wei", "", "DIE" ], [ "Guillaume", "François", "", "EADS" ] ]
new_dataset
0.994743
0807.2466
Marko A. Rodriguez
Marko A. Rodriguez and Vadas Gintautas and Alberto Pepe
A Grateful Dead Analysis: The Relationship Between Concert and Listening Behavior
null
First Monday, volume 14, number 1, ISSN:1396-0466, University of Illinois at Chicago Library, January 2009.
null
LA-UR-08-04421
cs.CY cs.GL
http://creativecommons.org/licenses/publicdomain/
The Grateful Dead were an American band that was born out of the San Francisco, California psychedelic movement of the 1960s. The band played music together from 1965 to 1995 and is well known for concert performances containing extended improvisations and long and unique set lists. This article presents a comparative analysis between 1,590 of the Grateful Dead's concert set lists from 1972 to 1995 and 2,616,990 last.fm Grateful Dead listening events from August 2005 to October 2007. While there is a strong correlation between how songs were played in concert and how they are listened to by last.fm members, the outlying songs in this trend identify interesting aspects of the band and their fans 10 years after the band's dissolution.
[ { "version": "v1", "created": "Tue, 15 Jul 2008 21:31:36 GMT" } ]
2009-01-07T00:00:00
[ [ "Rodriguez", "Marko A.", "" ], [ "Gintautas", "Vadas", "" ], [ "Pepe", "Alberto", "" ] ]
new_dataset
0.984884
0901.0573
Virgilio Rodriguez
Virgilio Rodriguez and Rudolf Mathar and Anke Schmeink
Asymptotic stability and capacity results for a broad family of power adjustment rules: Expanded discussion
9 pages; 3 figures
null
null
null
cs.IT math.FA math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In any wireless communication environment in which a transmitter creates interference to the others, a system of non-linear equations arises. Its form (for 2 terminals) is p1=g1(p2;a1) and p2=g2(p1;a2), with p1, p2 power levels; a1, a2 quality-of-service (QoS) targets; and g1, g2 functions akin to "interference functions" in Yates (JSAC, 13(7):1341-1348, 1995). Two fundamental questions are: (1) does the system have a solution?; and if so, (2) what is it?. (Yates, 1995) shows that IF the system has a solution, AND the "interference functions" satisfy some simple properties, a "greedy" power adjustment process will always converge to a solution. We show that, if the power-adjustment functions have similar properties to those of (Yates, 1995), and satisfy a condition of the simple form gi(1,1,...,1)<1, then the system has a unique solution that can be found iteratively. As examples, feasibility conditions for macro-diversity and multiple-connection receptions are given. Informally speaking, we complement (Yates, 1995) by adding the feasibility condition it lacked. Our analysis is based on norm concepts, and the Banach's contraction-mapping principle.
[ { "version": "v1", "created": "Mon, 5 Jan 2009 22:26:53 GMT" } ]
2009-01-07T00:00:00
[ [ "Rodriguez", "Virgilio", "" ], [ "Mathar", "Rudolf", "" ], [ "Schmeink", "Anke", "" ] ]
new_dataset
0.999164
0901.0521
Tobias Koch
Tobias Koch and Amos Lapidoth
On Multipath Fading Channels at High SNR
Submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work studies the capacity of multipath fading channels. A noncoherent channel model is considered, where neither the transmitter nor the receiver is cognizant of the realization of the path gains, but both are cognizant of their statistics. It is shown that if the delay spread is large in the sense that the variances of the path gains decay exponentially or slower, then capacity is bounded in the signal-to-noise ratio (SNR). For such channels, capacity does not tend to infinity as the SNR tends to infinity. In contrast, if the variances of the path gains decay faster than exponentially, then capacity is unbounded in the SNR. It is further demonstrated that if the number of paths is finite, then at high SNR capacity grows double-logarithmically with the SNR, and the capacity pre-loglog, defined as the limiting ratio of capacity to log(log(SNR)) as SNR tends to infinity, is 1 irrespective of the number of paths.
[ { "version": "v1", "created": "Mon, 5 Jan 2009 20:59:56 GMT" } ]
2009-01-06T00:00:00
[ [ "Koch", "Tobias", "" ], [ "Lapidoth", "Amos", "" ] ]
new_dataset
0.993524
0901.0062
Mokshay Madiman
Mokshay Madiman
Cores of Cooperative Games in Information Theory
12 pages, published at http://www.hindawi.com/GetArticle.aspx?doi=10.1155/2008/318704 in EURASIP Journal on Wireless Communications and Networking, Special Issue on "Theory and Applications in Multiuser/Multiterminal Communications", April 2008
EURASIP Journal on Wireless Communications and Networking, Volume 2008, Article ID 318704
10.1155/2008/318704
null
cs.IT cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cores of cooperative games are ubiquitous in information theory, and arise most frequently in the characterization of fundamental limits in various scenarios involving multiple users. Examples include classical settings in network information theory such as Slepian-Wolf source coding and multiple access channels, classical settings in statistics such as robust hypothesis testing, and new settings at the intersection of networking and statistics such as distributed estimation problems for sensor networks. Cooperative game theory allows one to understand aspects of all of these problems from a fresh and unifying perspective that treats users as players in a game, sometimes leading to new insights. At the heart of these analyses are fundamental dualities that have been long studied in the context of cooperative games; for information theoretic purposes, these are dualities between information inequalities on the one hand and properties of rate, capacity or other resource allocation regions on the other.
[ { "version": "v1", "created": "Wed, 31 Dec 2008 05:26:59 GMT" } ]
2009-01-05T00:00:00
[ [ "Madiman", "Mokshay", "" ] ]
new_dataset
0.992626
0808.0156
Paul Bunn
Yair Amir, Paul Bunn, Rafail Ostrovksy
Authenticated Adversarial Routing
Corrected typos. TCC '09 (to appear)
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this paper is to demonstrate the feasibility of authenticated throughput-efficient routing in an unreliable and dynamically changing synchronous network in which the majority of malicious insiders try to destroy and alter messages or disrupt communication in any way. More specifically, in this paper we seek to answer the following question: Given a network in which the majority of nodes are controlled by a malicious adversary and whose topology is changing every round, is it possible to develop a protocol with polynomially-bounded memory per processor that guarantees throughput-efficient and correct end-to-end communication? We answer the question affirmatively for extremely general corruption patterns: we only request that the topology of the network and the corruption pattern of the adversary leaves at least one path each round connecting the sender and receiver through honest nodes (though this path may change at every round). Out construction works in the public-key setting and enjoys bounded memory per processor (that does not depend on the amount of traffic and is polynomial in the network size.) Our protocol achieves optimal transfer rate with negligible decoding error. We stress that our protocol assumes no knowledge of which nodes are corrupted nor which path is reliable at any round, and is also fully distributed with nodes making decisions locally, so that they need not know the topology of the network at any time.
[ { "version": "v1", "created": "Fri, 1 Aug 2008 19:11:37 GMT" }, { "version": "v2", "created": "Wed, 22 Oct 2008 15:27:06 GMT" }, { "version": "v3", "created": "Sat, 3 Jan 2009 23:25:43 GMT" } ]
2009-01-04T00:00:00
[ [ "Amir", "Yair", "" ], [ "Bunn", "Paul", "" ], [ "Ostrovksy", "Rafail", "" ] ]
new_dataset
0.99663
0812.3214
Malay Dutta
Malay Dutta (Tezpur University India)
Two conjectures such that the proof of any one of them will lead to the proof that P = NP
Some minor corrections
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we define a construct called a time-graph. A complete time-graph of order n is the cartesian product of a complete graph with n vertices and a linear graph with n vertices. A time-graph of order n is given by a subset of the set of edges E(n) of such a graph. The notion of a hamiltonian time-graph is defined in a natural way and we define the Hamiltonian time-graph problem (HAMTG) as : Given a time-graph is it hamiltonian ? We show that the Hamiltonian path problem (HAMP) can be transformed to HAMTG in polynomial time. We then define certain vector spaces of functions from E(n) and E(n)xE(n) to B = {0,1}, the field of two elements and derive certain properties of these spaces. We give two conjectures about these spaces and prove that if any one of these conjectures is true, we get a polynomial time algorithm for the Hamiltonian path problem. Since the Hamiltonian path problem is NP-complete we obtain the proof of P = NP provided any one of the two conjectures is true.
[ { "version": "v1", "created": "Wed, 17 Dec 2008 07:03:53 GMT" }, { "version": "v2", "created": "Wed, 31 Dec 2008 03:53:16 GMT" } ]
2008-12-31T00:00:00
[ [ "Dutta", "Malay", "", "Tezpur University India" ] ]
new_dataset
0.978424
0812.2734
Benjamin Leveque
Kathie Cameron, Chinh Ho\`ang, Benjamin L\'ev\^eque
Asteroids in rooted and directed path graphs
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An asteroidal triple is a stable set of three vertices such that each pair is connected by a path avoiding the neighborhood of the third vertex. Asteroidal triples play a central role in a classical characterization of interval graphs by Lekkerkerker and Boland. Their result says that a chordal graph is an interval graph if and only if it contains no asteroidal triple. In this paper, we prove an analogous theorem for directed path graphs which are the intersection graphs of directed paths in a directed tree. For this purpose, we introduce the notion of a strong path. Two non-adjacent vertices are linked by a strong path if either they have a common neighbor or they are the endpoints of two vertex-disjoint chordless paths satisfying certain conditions. A strong asteroidal triple is an asteroidal triple such that each pair is linked by a strong path. We prove that a chordal graph is a directed path graph if and only if it contains no strong asteroidal triple. We also introduce a related notion of asteroidal quadruple, and conjecture a characterization of rooted path graphs which are the intersection graphs of directed paths in a rooted tree.
[ { "version": "v1", "created": "Mon, 15 Dec 2008 07:50:42 GMT" }, { "version": "v2", "created": "Tue, 30 Dec 2008 14:15:25 GMT" } ]
2008-12-30T00:00:00
[ [ "Cameron", "Kathie", "" ], [ "Hoàng", "Chinh", "" ], [ "Lévêque", "Benjamin", "" ] ]
new_dataset
0.999754
cs/0412099
Arindam Mitra
Arindam Mitra
An unbreakable cryptosystem
Acknowledgement is due
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The remarkably long-standing problem of cryptography is to generate completely secure key. It is widely believed that the task cannot be achieved within classical cryptography. However, there is no proof in support of this belief. We present an incredibly simple classical cryptosystem which can generate completely secure key.
[ { "version": "v1", "created": "Wed, 22 Dec 2004 06:26:57 GMT" }, { "version": "v10", "created": "Fri, 13 Jun 2008 15:43:55 GMT" }, { "version": "v11", "created": "Fri, 4 Jul 2008 15:14:20 GMT" }, { "version": "v12", "created": "Sat, 2 Aug 2008 14:23:51 GMT" }, { "version": "v13", "created": "Sat, 27 Dec 2008 15:53:49 GMT" }, { "version": "v2", "created": "Sat, 5 Mar 2005 14:10:55 GMT" }, { "version": "v3", "created": "Thu, 5 May 2005 13:29:58 GMT" }, { "version": "v4", "created": "Thu, 26 Oct 2006 14:42:42 GMT" }, { "version": "v5", "created": "Wed, 31 Jan 2007 14:01:40 GMT" }, { "version": "v6", "created": "Wed, 14 Mar 2007 13:12:39 GMT" }, { "version": "v7", "created": "Mon, 28 May 2007 14:41:12 GMT" }, { "version": "v8", "created": "Wed, 14 Nov 2007 16:06:26 GMT" }, { "version": "v9", "created": "Thu, 20 Mar 2008 15:57:58 GMT" } ]
2008-12-27T00:00:00
[ [ "Mitra", "Arindam", "" ] ]
new_dataset
0.982564
0812.1379
Leonid Barenboim
Leonid Barenboim and Michael Elkin
Distributed (Delta + 1)-coloring in linear (in Delta) time
12 pages, 2 figures. Contents added: pages 11-12
null
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The distributed (Delta + 1)-coloring problem is one of most fundamental and well-studied problems of Distributed Algorithms. Starting with the work of Cole and Vishkin in 86, there was a long line of gradually improving algorithms published. The current state-of-the-art running time is O(Delta log Delta + log^* n), due to Kuhn and Wattenhofer, PODC'06. Linial (FOCS'87) has proved a lower bound of 1/2 \log^* n for the problem, and Szegedy and Vishwanathan (STOC'93) provided a heuristic argument that shows that algorithms from a wide family of locally iterative algorithms are unlikely to achieve running time smaller than \Theta(Delta log Delta). We present a deterministic (Delta + 1)-coloring distributed algorithm with running time O(Delta) + 1/2 log^* n. We also present a tradeoff between the running time and the number of colors, and devise an O(Delta * t)-coloring algorithm with running time O(Delta / t + \log^* n), for any parameter t, 1 < t < Delta^{1-epsilon}, for an arbitrarily small constant epsilon, 0 < epsilon < 1. On the way to this result we study a generalization of the notion of graph coloring, which is called defective coloring. In an m-defective p-coloring the vertices are colored with p colors so that each vertex has up to m neighbors with the same color. We show that an m-defective p-coloring with reasonably small m and p can be computed very efficiently. We also develop a technique to employ multiple defect colorings of various subgraphs of the original graph G for computing a (Delta+1)-coloring of G. We believe that these techniques are of independent interest.
[ { "version": "v1", "created": "Sun, 7 Dec 2008 20:44:28 GMT" }, { "version": "v2", "created": "Fri, 26 Dec 2008 10:45:09 GMT" } ]
2008-12-26T00:00:00
[ [ "Barenboim", "Leonid", "" ], [ "Elkin", "Michael", "" ] ]
new_dataset
0.983048
0812.3873
Li Chia Choo
Li-Chia Choo, Kai-Kit Wong
The K-Receiver Broadcast Channel with Confidential Messages
19 pages, 1 figure, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The secrecy capacity region for the K-receiver degraded broadcast channel (BC) is given for confidential messages sent to the receivers and to be kept secret from an external wiretapper. Superposition coding and Wyner's random code partitioning are used to show the achievable rate tuples. Error probability analysis and equivocation calculation are also provided. In the converse proof, a new definition for the auxiliary random variables is used, which is different from either the case of the 2-receiver BC without common message or the K-receiver BC with common message, both with an external wiretapper; or the K-receiver BC without a wiretapper.
[ { "version": "v1", "created": "Fri, 19 Dec 2008 18:15:52 GMT" } ]
2008-12-22T00:00:00
[ [ "Choo", "Li-Chia", "" ], [ "Wong", "Kai-Kit", "" ] ]
new_dataset
0.996915
0812.3550
Pierre Genev\`es
Pierre Geneves and Nabil Layaida
XML Static Analyzer User Manual
null
null
null
RR-6726
cs.PL cs.DB cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This document describes how to use the XML static analyzer in practice. It provides informal documentation for using the XML reasoning solver implementation. The solver allows automated verification of properties that are expressed as logical formulas over trees. A logical formula may for instance express structural constraints or navigation properties (like e.g. path existence and node selection) in finite trees. Logical formulas can be expressed using the syntax of XPath expressions, DTD, XML Schemas, and Relax NG definitions.
[ { "version": "v1", "created": "Thu, 18 Dec 2008 15:22:46 GMT" } ]
2008-12-19T00:00:00
[ [ "Geneves", "Pierre", "" ], [ "Layaida", "Nabil", "" ] ]
new_dataset
0.999021
0812.3642
Deniz Gunduz
Deniz Gunduz, Andrea Goldsmith, H. Vincent Poor
MIMO Two-way Relay Channel: Diversity-Multiplexing Tradeoff Analysis
Presented at the Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, Oct. 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A multi-hop two-way relay channel is considered in which all the terminals are equipped with multiple antennas. Assuming independent quasi-static Rayleigh fading channels and channel state information available at the receivers, we characterize the optimal diversity-multiplexing gain tradeoff (DMT) curve for a full-duplex relay terminal. It is shown that the optimal DMT can be achieved by a compress-and-forward type relaying strategy in which the relay quantizes its received signal and transmits the corresponding channel codeword. It is noteworthy that, with this transmission protocol, the two transmissions in opposite directions can achieve their respective single user optimal DMT performances simultaneously, despite the interference they cause to each other. Motivated by the optimality of this scheme in the case of the two-way relay channel, a novel dynamic compress-and-forward (DCF) protocol is proposed for the one-way multi-hop MIMO relay channel for a half-duplex relay terminal, and this scheme is shown to achieve the optimal DMT performance.
[ { "version": "v1", "created": "Thu, 18 Dec 2008 20:25:14 GMT" } ]
2008-12-19T00:00:00
[ [ "Gunduz", "Deniz", "" ], [ "Goldsmith", "Andrea", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.999634
0803.0055
Benoit Masson
Alberto Dennunzio (DISCo), Pierre Guillon (IGM), Beno\^it Masson (LIF)
A compact topology for sand automata
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we exhibit a strong relation between the sand automata configuration space and the cellular automata configuration space. This relation induces a compact topology for sand automata, and a new context in which sand automata are homeomorphic to cellular automata acting on a specific subshift. We show that the existing topological results for sand automata, including the Hedlund-like representation theorem, still hold. In this context, we give a characterization of the cellular automata which are sand automata, and study some dynamical behaviors such as equicontinuity. Furthermore, we deal with the nilpotency. We show that the classical definition is not meaningful for sand automata. Then, we introduce a suitable new notion of nilpotency for sand automata. Finally, we prove that this simple dynamical behavior is undecidable.
[ { "version": "v1", "created": "Sat, 1 Mar 2008 08:36:39 GMT" } ]
2008-12-18T00:00:00
[ [ "Dennunzio", "Alberto", "", "DISCo" ], [ "Guillon", "Pierre", "", "IGM" ], [ "Masson", "Benoît", "", "LIF" ] ]
new_dataset
0.998843
0803.0528
Abdelhamid Mellouk
Said Hoceini (LISSI - Ea 3956), Abdelhamid Mellouk (LISSI - Ea 3956), Hayet Hafi (LISSI - Ea 3956)
Une approche modulaire probabiliste pour le routage \`a Qualit\'e de Service int\'egr\'ee
null
Colloque Francophone sur l'Ing\'enierie des Protocoles (CFIP), Les Arcs : France (2008)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to emerging real-time and multimedia applications, efficient routing of information packets in dynamically changing communication network requires that as the load levels, traffic patterns and topology of the network change, the routing policy also adapts. We focused in this paper on QoS based routing by developing a neuro-dynamic programming to construct dynamic state dependent routing policies. We propose an approach based on adaptive algorithm for packet routing using reinforcement learning which optimizes two criteria: cumulative cost path and end-to-end delay. Numerical results obtained with OPNET simulator for different packet interarrival times statistical distributions with different levels of traffic's load show that the proposed approach gives better results compared to standard optimal path routing algorithms.
[ { "version": "v1", "created": "Tue, 4 Mar 2008 19:43:55 GMT" } ]
2008-12-18T00:00:00
[ [ "Hoceini", "Said", "", "LISSI - Ea 3956" ], [ "Mellouk", "Abdelhamid", "", "LISSI - Ea 3956" ], [ "Hafi", "Hayet", "", "LISSI - Ea 3956" ] ]
new_dataset
0.997404
0803.1586
Jeroen Vendrig
Jarrad Springett, Jeroen Vendrig
Spatio-activity based object detection
To be submitted to: AVSS 2008 conference
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the SAMMI lightweight object detection method which has a high level of accuracy and robustness, and which is able to operate in an environment with a large number of cameras. Background modeling is based on DCT coefficients provided by cameras. Foreground detection uses similarity in temporal characteristics of adjacent blocks of pixels, which is a computationally inexpensive way to make use of object coherence. Scene model updating uses the approximated median method for improved performance. Evaluation at pixel level and application level shows that SAMMI object detection performs better and faster than the conventional Mixture of Gaussians method.
[ { "version": "v1", "created": "Tue, 11 Mar 2008 13:40:42 GMT" } ]
2008-12-18T00:00:00
[ [ "Springett", "Jarrad", "" ], [ "Vendrig", "Jeroen", "" ] ]
new_dataset
0.970431
0803.1764
Thomas Watteyne
Thomas Watteyne (INRIA Rh\^one-Alpes, FT R&D), Dominique Barthel (FT R&D), Mischa Dohler (CTTC), Isabelle Aug\'e-Blum (INRIA Rh\^one-Alpes)
WiFly: experimenting with Wireless Sensor Networks and Virtual coordinates
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Experimentation is important when designing communication protocols for Wireless Sensor Networks. Lower-layers have a major impact on upper-layer performance, and the complexity of the phenomena can not be entirely captured by analysis or simulation. In this report, we go through the complete process, from designing an energy-efficient self-organizing communication architecture (MAC, routing and application layers) to real-life experimentation roll-outs. The presented communication architecture includes a MAC protocol which avoids building and maintaining neighborhood tables, and a geographically-inspired routing protocol over virtual coordinates. The application consists of a mobile sink interrogating a wireless sensor network based on the requests issued by a disconnected base station. After the design process of this architecture, we verify it functions correctly by simulation, and we perform a temporal verification. This study is needed to calculate the maximum speed the mobile sink can take. We detail the implementation, and the results of the off-site experimentation (energy consumption at PHY layer, collision probability at MAC layer, and routing). Finally, we report on the real-world deployment where we have mounted the mobile sink node on a radio-controlled airplane.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 13:02:15 GMT" }, { "version": "v2", "created": "Fri, 14 Mar 2008 09:11:57 GMT" } ]
2008-12-18T00:00:00
[ [ "Watteyne", "Thomas", "", "INRIA Rhône-Alpes, FT R&D" ], [ "Barthel", "Dominique", "", "FT\n R&D" ], [ "Dohler", "Mischa", "", "CTTC" ], [ "Augé-Blum", "Isabelle", "", "INRIA Rhône-Alpes" ] ]
new_dataset
0.997792
0803.1975
Jean-Guillaume Dumas
Jean-Guillaume Dumas (LJK), Laurent Fousse (LJK), Bruno Salvy (INRIA Rocquencourt)
Compressed Modular Matrix Multiplication
Published in: MICA'2008 : Milestones in Computer Algebra, Tobago : Trinit\'e-et-Tobago (2008)
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose to store several integers modulo a small prime into a single machine word. Modular addition is performed by addition and possibly subtraction of a word containing several times the modulo. Modular Multiplication is not directly accessible but modular dot product can be performed by an integer multiplication by the reverse integer. Modular multiplication by a word containing a single residue is a also possible. Therefore matrix multiplication can be performed on such a compressed storage. We here give bounds on the sizes of primes and matrices for which such a compression is possible. We also explicit the details of the required compressed arithmetic routines.
[ { "version": "v1", "created": "Thu, 13 Mar 2008 19:15:42 GMT" } ]
2008-12-18T00:00:00
[ [ "Dumas", "Jean-Guillaume", "", "LJK" ], [ "Fousse", "Laurent", "", "LJK" ], [ "Salvy", "Bruno", "", "INRIA\n Rocquencourt" ] ]
new_dataset
0.998533
0803.2220
Panagiotis Papadakos
Panagiotis Papadakos, Giorgos Vasiliadis, Yannis Theoharis, Nikos Armenatzoglou, Stella Kopidaki, Yannis Marketakis, Manos Daskalakis, Kostas Karamaroudis, Giorgos Linardakis, Giannis Makrydakis, Vangelis Papathanasiou, Lefteris Sardis, Petros Tsialiamanis, Georgia Troullinou, Kostas Vandikas, Dimitris Velegrakis and Yannis Tzitzikas
The Anatomy of Mitos Web Search Engine
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Engineering a Web search engine offering effective and efficient information retrieval is a challenging task. This document presents our experiences from designing and developing a Web search engine offering a wide spectrum of functionalities and we report some interesting experimental results. A rather peculiar design choice of the engine is that its index is based on a DBMS, while some of the distinctive functionalities that are offered include advanced Greek language stemming, real time result clustering, and advanced link analysis techniques (also for spam page detection).
[ { "version": "v1", "created": "Fri, 14 Mar 2008 19:18:15 GMT" }, { "version": "v2", "created": "Sun, 16 Mar 2008 17:25:19 GMT" } ]
2008-12-18T00:00:00
[ [ "Papadakos", "Panagiotis", "" ], [ "Vasiliadis", "Giorgos", "" ], [ "Theoharis", "Yannis", "" ], [ "Armenatzoglou", "Nikos", "" ], [ "Kopidaki", "Stella", "" ], [ "Marketakis", "Yannis", "" ], [ "Daskalakis", "Manos", "" ], [ "Karamaroudis", "Kostas", "" ], [ "Linardakis", "Giorgos", "" ], [ "Makrydakis", "Giannis", "" ], [ "Papathanasiou", "Vangelis", "" ], [ "Sardis", "Lefteris", "" ], [ "Tsialiamanis", "Petros", "" ], [ "Troullinou", "Georgia", "" ], [ "Vandikas", "Kostas", "" ], [ "Velegrakis", "Dimitris", "" ], [ "Tzitzikas", "Yannis", "" ] ]
new_dataset
0.995867
0803.2305
Andrew Gacek
Andrew Gacek
The Abella Interactive Theorem Prover (System Description)
7 pages, to appear in IJCAR'08
null
null
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Abella is an interactive system for reasoning about aspects of object languages that have been formally presented through recursive rules based on syntactic structure. Abella utilizes a two-level logic approach to specification and reasoning. One level is defined by a specification logic which supports a transparent encoding of structural semantics rules and also enables their execution. The second level, called the reasoning logic, embeds the specification logic and allows the development of proofs of properties about specifications. An important characteristic of both logics is that they exploit the lambda tree syntax approach to treating binding in object languages. Amongst other things, Abella has been used to prove normalizability properties of the lambda calculus, cut admissibility for a sequent calculus and type uniqueness and subject reduction properties. This paper discusses the logical foundations of Abella, outlines the style of theorem proving that it supports and finally describes some of its recent applications.
[ { "version": "v1", "created": "Sat, 15 Mar 2008 16:15:10 GMT" }, { "version": "v2", "created": "Fri, 23 May 2008 15:28:08 GMT" } ]
2008-12-18T00:00:00
[ [ "Gacek", "Andrew", "" ] ]
new_dataset
0.99709
0803.2317
Jorge Sousa Pinto
Joao Gomes and Daniel Martins and Simao Melo de Sousa and Jorge Sousa Pinto
Lissom, a Source Level Proof Carrying Code Platform
Poster presented at the International Workshop on Proof-Carrying Code (PCC 06), 2006
null
null
null
cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a proposal for a Proof Carrying Code (PCC) architecture called Lissom. Started as a challenge for final year Computing students, Lissom was thought as a mean to prove to a sceptic community, and in particular to students, that formal verification tools can be put to practice in a realistic environment, and be used to solve complex and concrete problems. The attractiveness of the problems that PCC addresses has already brought students to show interest in this project.
[ { "version": "v1", "created": "Sat, 15 Mar 2008 18:53:06 GMT" } ]
2008-12-18T00:00:00
[ [ "Gomes", "Joao", "" ], [ "Martins", "Daniel", "" ], [ "de Sousa", "Simao Melo", "" ], [ "Pinto", "Jorge Sousa", "" ] ]
new_dataset
0.999335
0803.3553
Carl Bracken
Carl Bracken
New Families of Triple Error Correcting Codes with BCH Parameters
11 pages. Submitted to IEEE Transactions on information Theory
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discovered by Bose, Chaudhuri and Hocquenghem, the BCH family of error correcting codes are one of the most studied families in coding theory. They are also among the best performing codes, particularly when the number of errors being corrected is small relative to the code length. In this article we consider binary codes with minimum distance of 7. We construct new families of codes with these BCH parameters via a generalisation of the Kasami-Welch Theorem.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 13:08:19 GMT" } ]
2008-12-18T00:00:00
[ [ "Bracken", "Carl", "" ] ]
new_dataset
0.979238
0803.4049
Ke Liu
Ke Liu and Nael Abu-Ghazaleh
Stateless and Delivery Guaranteed Geometric Routing on Virtual Coordinate System
null
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stateless geographic routing provides relatively good performance at a fixed overhead, which is typically much lower than conventional routing protocols such as AODV. However, the performance of geographic routing is impacted by physical voids, and localization errors. Accordingly, virtual coordinate systems (VCS) were proposed as an alternative approach that is resilient to localization errors and that naturally routes around physical voids. However, VCS also faces virtual anomalies, causing their performance to trail geographic routing. In existing VCS routing protocols, there is a lack of an effective stateless and delivery guaranteed complementary routing algorithm that can be used to traverse voids. Most proposed solutions use variants of flooding or blind searching when a void is encountered. In this paper, we propose a spanning-path virtual coordinate system which can be used as a complete routing algorithm or as the complementary algorithm to greedy forwarding that is invoked when voids are encountered. With this approach, and for the first time, we demonstrate a stateless and delivery guaranteed geometric routing algorithm on VCS. When used in conjunction with our previously proposed aligned virtual coordinate system (AVCS), it out-performs not only all geometric routing protocols on VCS, but also geographic routing with accurate location information.
[ { "version": "v1", "created": "Fri, 28 Mar 2008 05:58:51 GMT" }, { "version": "v2", "created": "Sat, 29 Mar 2008 02:53:24 GMT" } ]
2008-12-18T00:00:00
[ [ "Liu", "Ke", "" ], [ "Abu-Ghazaleh", "Nael", "" ] ]
new_dataset
0.997834
0804.0561
Christian Duriez
Christian Duriez (INRIA Lille - Nord Europe), Fr\'ed\'eric Dubois (LMGC), Abderrahmane Kheddar (JRL), Claude Andriot (LIST)
Realistic Haptic Rendering of Interacting Deformable Objects in Virtual Environments
null
IEEE Transactions on Visualization and Computer Graphics 12, 1 (2006) 36-47
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new computer haptics algorithm to be used in general interactive manipulations of deformable virtual objects is presented. In multimodal interactive simulations, haptic feedback computation often comes from contact forces. Subsequently, the fidelity of haptic rendering depends significantly on contact space modeling. Contact and friction laws between deformable models are often simplified in up to date methods. They do not allow a "realistic" rendering of the subtleties of contact space physical phenomena (such as slip and stick effects due to friction or mechanical coupling between contacts). In this paper, we use Signorini's contact law and Coulomb's friction law as a computer haptics basis. Real-time performance is made possible thanks to a linearization of the behavior in the contact space, formulated as the so-called Delassus operator, and iteratively solved by a Gauss-Seidel type algorithm. Dynamic deformation uses corotational global formulation to obtain the Delassus operator in which the mass and stiffness ratio are dissociated from the simulation time step. This last point is crucial to keep stable haptic feedback. This global approach has been packaged, implemented, and tested. Stable and realistic 6D haptic feedback is demonstrated through a clipping task experiment.
[ { "version": "v1", "created": "Thu, 3 Apr 2008 13:49:51 GMT" } ]
2008-12-18T00:00:00
[ [ "Duriez", "Christian", "", "INRIA Lille - Nord Europe" ], [ "Dubois", "Frédéric", "", "LMGC" ], [ "Kheddar", "Abderrahmane", "", "JRL" ], [ "Andriot", "Claude", "", "LIST" ] ]
new_dataset
0.994593
0804.1185
Al-Sakib Khan Pathan
Al-Sakib Khan Pathan and Choong Seon Hong
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
3 Pages
10th IEEE International Conference on Advanced Communication Technology (IEEE ICACT 2008), Volume III, February 17-20, 2008, Phoenix Park, Korea, pp. 1618-1620
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh_s legendary timestamp-based remote authentication scheme using smart cards. After analyzing the improved scheme proposed by Yang-Wang-Chang, we have found that their scheme is still insecure and vulnerable to four types of forgery attacks. Hence, in this paper, we prove that, their claim that their scheme is intractable is incorrect. Also, we show that even an attack based on Sun et al._s attack could be launched against their scheme which they claimed to resolve with their proposal.
[ { "version": "v1", "created": "Tue, 8 Apr 2008 05:22:27 GMT" } ]
2008-12-18T00:00:00
[ [ "Pathan", "Al-Sakib Khan", "" ], [ "Hong", "Choong Seon", "" ] ]
new_dataset
0.996919
0804.1760
Michel Grabisch
Michel Grabisch (LIP6)
The Symmetric Sugeno Integral
null
Fuzzy Sets and Systems 139 (2003) 473-490
null
null
cs.DM math.PR math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an extension of the Sugeno integral for negative numbers, in the spirit of the symmetric extension of Choquet integral, also called \Sipos\ integral. Our framework is purely ordinal, since the Sugeno integral has its interest when the underlying structure is ordinal. We begin by defining negative numbers on a linearly ordered set, and we endow this new structure with a suitable algebra, very close to the ring of real numbers. In a second step, we introduce the M\"obius transform on this new structure. Lastly, we define the symmetric Sugeno integral, and show its similarity with the symmetric Choquet integral.
[ { "version": "v1", "created": "Thu, 10 Apr 2008 17:00:36 GMT" } ]
2008-12-18T00:00:00
[ [ "Grabisch", "Michel", "", "LIP6" ] ]
new_dataset
0.998779
0804.2992
Eberhard H.-A. Gerbracht
Eberhard H.-A. Gerbracht
"E pluribus unum" or How to Derive Single-equation Descriptions for Output-quantities in Nonlinear Circuits using Differential Algebra
V1: documentclass IEEEtran, 7 pages, 10 figures. Re-release of the printed version, with some minor typographical errors corrected
Proceedings of the 7th International Workshop on Symbolic Methods and Applications to Circuit Design, SMACD 2002, Sinaia, Romania, October 10-11, 2002; pp. 65-70; ISBN 973-85072-5-1
null
null
cs.SC math.CA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe by a number of examples how to deduce one single characterizing higher order differential equation for output quantities of an analog circuit. In the linear case, we apply basic "symbolic" methods from linear algebra to the system of differential equations which is used to model the analog circuit. For nonlinear circuits and their corresponding nonlinear differential equations, we show how to employ computer algebra tools implemented in Maple, which are based on differential algebra.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 19:55:58 GMT" } ]
2008-12-18T00:00:00
[ [ "Gerbracht", "Eberhard H. -A.", "" ] ]
new_dataset
0.998976
0805.0231
Nikolaus Hansen
Nikolaus Hansen (INRIA Futurs)
CMA-ES with Two-Point Step-Size Adaptation
null
null
null
RR-6527
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We combine a refined version of two-point step-size adaptation with the covariance matrix adaptation evolution strategy (CMA-ES). Additionally, we suggest polished formulae for the learning rate of the covariance matrix and the recombination weights. In contrast to cumulative step-size adaptation or to the 1/5-th success rule, the refined two-point adaptation (TPA) does not rely on any internal model of optimality. In contrast to conventional self-adaptation, the TPA will achieve a better target step-size in particular with large populations. The disadvantage of TPA is that it relies on two additional objective function
[ { "version": "v1", "created": "Fri, 2 May 2008 13:55:37 GMT" }, { "version": "v2", "created": "Sat, 3 May 2008 06:16:04 GMT" }, { "version": "v3", "created": "Tue, 13 May 2008 08:17:14 GMT" }, { "version": "v4", "created": "Sun, 18 May 2008 06:38:04 GMT" } ]
2008-12-18T00:00:00
[ [ "Hansen", "Nikolaus", "", "INRIA Futurs" ] ]
new_dataset
0.984346
0805.0857
EDA Publishing Association
L. Juhasz, A. Vass-Varnai, Veronika Timar-Horvath, Marc Desmulliez, Resh Dhariwal
Porous Alumina Based Capacitive MEMS RH Sensor
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of a joint research and development project at the BME and HWU is to produce a cheap, reliable, low-power and CMOS-MEMS process compatible capacitive type relative humidity (RH) sensor that can be incorporated into a state-of-the-art, wireless sensor network. In this paper we discuss the preparation of our new capacitive structure based on post-CMOS MEMS processes and the methods which were used to characterize the thin film porous alumina sensing layer. The average sensitivity is approx. 15 pF/RH% which is more than a magnitude higher than the values found in the literature. The sensor is equipped with integrated resistive heating, which can be used for maintenance to reduce drift, or for keeping the sensing layer at elevated temperature, as an alternative method for temperature-dependence cancellation.
[ { "version": "v1", "created": "Wed, 7 May 2008 08:41:41 GMT" } ]
2008-12-18T00:00:00
[ [ "Juhasz", "L.", "" ], [ "Vass-Varnai", "A.", "" ], [ "Timar-Horvath", "Veronika", "" ], [ "Desmulliez", "Marc", "" ], [ "Dhariwal", "Resh", "" ] ]
new_dataset
0.985347
0805.0858
EDA Publishing Association
R. R. Mansour, S. Fouladi, M. Bakeri-Kassem
Integrated RF MEMS/CMOS Devices
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A maskless post-processing technique for CMOS chips is developed that enables the fabrication of RF MEMS parallel-plate capacitors with a high quality factor and a very compact size. Simulations and measured results are presented for several MEMS/CMOS capacitors. A 2-pole coupled line tunable bandpass filter with a center frequency of 9.5 GHz is designed, fabricated and tested. A tuning range of 17% is achieved using integrated variable MEMS/CMOS capacitors with a quality factor exceeding 20. The tunable filter occupies a chip area of 1.2 x 2.1 mm2.
[ { "version": "v1", "created": "Wed, 7 May 2008 08:42:40 GMT" } ]
2008-12-18T00:00:00
[ [ "Mansour", "R. R.", "" ], [ "Fouladi", "S.", "" ], [ "Bakeri-Kassem", "M.", "" ] ]
new_dataset
0.994763
0805.0861
EDA Publishing Association
Jack Hoyd-Gigg Ng, Marc Desmulliez, Aongus Mccarthy, Himanshu Suyal, Kevin Prior, Duncan P. Hand
UV Direct-Writing of Metals on Polyimide
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conductive micro-patterned copper tracks were fabricated by UV direct-writing of a nanoparticle silver seed layer followed by selective electroless copper deposition. Silver ions were first incorporated into a hydrolyzed polyimide surface layer by wet chemical treatment. A photoreactive polymer coating, methoxy poly(ethylene glycol) (MPEG) was coated on top of the substrate prior to UV irradiation. Electrons released through the interaction between the MPEG molecules and UV photons allowed the reduction of the silver ions across the MPEG/doped polyimide interface. The resultant silver seed layer has a cluster morphology which is suitable for the initiation of electroless plating. Initial results showed that the deposited copper tracks were in good agreement with the track width on the photomask and laser direct-writing can also fabricate smaller line width metal tracks with good accuracy. The facile fabrication presented here can be carried out in air, at atmospheric pressure, and on contoured surfaces.
[ { "version": "v1", "created": "Wed, 7 May 2008 08:44:24 GMT" } ]
2008-12-18T00:00:00
[ [ "Ng", "Jack Hoyd-Gigg", "" ], [ "Desmulliez", "Marc", "" ], [ "Mccarthy", "Aongus", "" ], [ "Suyal", "Himanshu", "" ], [ "Prior", "Kevin", "" ], [ "Hand", "Duncan P.", "" ] ]
new_dataset
0.959657
0805.0871
EDA Publishing Association
X. Shan, Y. C. Soh, C. W. P. Shi, C. K. Tay, C. W. Lu
Large Area Roller Embossing of Multilayered Ceramic Green Composites
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we will report our achievements in developing large area patterning of multilayered ceramic green composites using roller embossing. The aim of our research is to pattern large area ceramic green composites using a modified roller laminating apparatus, which is compatible with screen printing machines, for integration of embossing and screen printing. The instrumentation of our roller embossing apparatus, as shown in Figure1, consists of roller 1 and rollers 2. Roller 1 is heated up to the desired embossing temperature ; roller 2 is, however, kept at room temperature. The mould is a nickel template manufactured by plating nickel-based micro patterns (height : 50 $\mu$m) on a nickel film (thickness : 70 $\mu$m) ; the substrate for the roller embossing is a multilayered Heraeus Heralock HL 2000 ceramic green composite. Comparing with the conventional simultaneous embossing, the advantages of roller embossing include : (1) low embossing force ; (2) easiness of demoulding ; (3) localized area in contact with heater ; and etc. We have demonstrated the capability of large area roller embossing with a panel size of 150mmx 150mm on the mentioned substrate. We have explored and confirmed the impact of parameters (feed speed, temperature of roller and applied pressure) to the pattern quality of roller embossing. Furthermore, under the optimized process parameters, we characterized the variations of pattern dimension over the panel area, and calculated a scaling factor in order to make the panel compatible with other processes. Figure 2 shows the embossed patterns on a 150mmx 150mm green ceramic panel.
[ { "version": "v1", "created": "Wed, 7 May 2008 08:58:21 GMT" } ]
2008-12-18T00:00:00
[ [ "Shan", "X.", "" ], [ "Soh", "Y. C.", "" ], [ "Shi", "C. W. P.", "" ], [ "Tay", "C. K.", "" ], [ "Lu", "C. W.", "" ] ]
new_dataset
0.995526
0805.0879
EDA Publishing Association
Cheng-Chih Hsueh, Gou-Jen Wang, Shan-Hui Hsu, Huey-Shan Hung
Fabrication of Nanostructured PLGA Scaffolds Using Anodic Aluminum Oxide Templates
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
PLGA (poly(lactic-co-glycolic acid)) is one of the most used biodegradable and biocompatible materials. Nanostructured PLGA even has great application potentials in tissue engineering. In this research, a fabrication technique for nanostructured PLGA membrane was investigated and developed. In this novel fabrication approach, an anodic aluminum oxide (AAO) film was use as the template ; the PLGA solution was then cast on it ; the vacuum air-extraction process was applied to transfer the nano porous pattern from the AAO membrane to the PLGA membrane and form nanostures on it. The cell culture experiments of the bovine endothelial cells demonstrated that the nanostructured PLGA membrane can double the cell growing rate. Compared to the conventional chemical-etching process, the physical fabrication method proposed in this research not only is simpler but also does not alter the characteristics of the PLGA. The nanostructure of the PLGA membrane can be well controlled by the AAO temperate.
[ { "version": "v1", "created": "Wed, 7 May 2008 09:04:13 GMT" } ]
2008-12-18T00:00:00
[ [ "Hsueh", "Cheng-Chih", "" ], [ "Wang", "Gou-Jen", "" ], [ "Hsu", "Shan-Hui", "" ], [ "Hung", "Huey-Shan", "" ] ]
new_dataset
0.995575
0805.0883
EDA Publishing Association
H. Yang, T.-H. Tsai, C.-C. Hu
Portable Valve-less Peristaltic Micro-pump Design and Fabrication
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/handle/2042/16838)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2008, Nice : France (2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is to describe a design and fabrication method for a valve-less peristaltic micro-pump. The valve-less peristaltic micro-pump with three membrane chambers in a serial is actuated by three piezoelectric (PZT) actuators. With the fluidic flow design, liquid in the flow channel is pumped to a constant flow speed ranged from 0.4 to 0.48 mm/s. In term of the maximum flow rate of the micro-pump is about 365 mircoliters/min, when the applied voltage is 24V and frequency 50 Hz. Photolithography process was used to fabricate the micro-pump mold. PDMS molding and PDMS bonding method were used to fabricate the micro-channel and actuator chambers. A portable drive controller was designed to control three PZT actuators in a proper sequence to drive the chamber membrane. Then, all parts were integrated into the portable valve-less peristaltic micro-pump system.
[ { "version": "v1", "created": "Wed, 7 May 2008 09:07:22 GMT" } ]
2008-12-18T00:00:00
[ [ "Yang", "H.", "" ], [ "Tsai", "T. -H.", "" ], [ "Hu", "C. -C.", "" ] ]
new_dataset
0.993392