id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0805.0885
|
EDA Publishing Association
|
A. G. G. Toh, Z. F. Wang, S.H. Ng
|
Fabrication of Embedded Microvalve on PMMA Microfluidic Devices through
Surface Functionalization
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The integration of a PDMS membrane within orthogonally placed PMMA
microfluidic channels enables the pneumatic actuation of valves within bonded
PMMA-PDMS-PMMA multilayer devices. Here, surface functionalization of PMMA
substrates via acid catalyzed hydrolysis and air plasma corona treatment were
investigated as possible techniques to permanently bond PMMA microfluidic
channels to PDMS surfaces. FTIR and water contact angle analysis of
functionalized PMMA substrates showed that air plasma corona treatment was most
effective in inducing PMMA hydrophilicity. Subsequent fluidic tests showed that
air plasma modified and bonded PMMA multilayer devices could withstand fluid
pressure at an operational flow rate of 9 mircoliters/min. The pneumatic
actuation of the embedded PDMS membrane was observed through optical microscopy
and an electrical resistance based technique. PDMS membrane actuation occurred
at pneumatic pressures of as low as 10kPa and complete valving occurred at
14kPa for 100 micrometers x 100 micrometers channel cross-sections.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:09:11 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Toh",
"A. G. G.",
""
],
[
"Wang",
"Z. F.",
""
],
[
"Ng",
"S. H.",
""
]
] |
new_dataset
| 0.994342 |
0805.0889
|
EDA Publishing Association
|
B. Charlot (IES), W. Sun, K. Yamashita, H. Fujita, H. Toshiyoshi
|
In-Plane Bistable Nanowire For Memory Devices
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a nanomechanical device design to be used in a non-volatile
mechanical memory point. The structure is composed of a suspended slender
nanowire (width : 100nm, thickness 430nm length : 8 to 30$\mu$m) clamped at its
both ends. Electrodes are placed on each sides of the nanowire and are used to
actuate the structure (writing, erasing) and to measure the position through a
capactive bridge (reading). The structure is patterned by electron beam
lithography on a pre-stressed thermally grown silicon dioxide layer. When later
released, the stressed material relaxes and the beam buckles in a position of
lower energy. Such symmetric beams, called Euler beams, show two stable
deformed positions thus form a bistable structure. This paper will present the
fabrication, simulation and mechanical and electrical actuation of an in plane
bistable nanowire. Final paper will include a section on FEM simulations.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:13:48 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Charlot",
"B.",
"",
"IES"
],
[
"Sun",
"W.",
""
],
[
"Yamashita",
"K.",
""
],
[
"Fujita",
"H.",
""
],
[
"Toshiyoshi",
"H.",
""
]
] |
new_dataset
| 0.999726 |
0805.0892
|
EDA Publishing Association
|
P. Bruschi, M. Dei, M. Piotto
|
Single Chip Sensing of Multiple Gas Flows
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The fabrication and experimental characterization of a thermal flow meter,
capable of detecting and measuring two independent gas flows with a single
chip, is described. The device is based on a 4 x 4 mm2 silicon chip, where a
series of differential micro-anemometers have been integrated together with
standard electronic components by means of postprocessing techniques. The
innovative aspect of the sensor is the use of a plastic adapter, thermally
bonded to the chip, to convey the gas flow only to the areas where the sensors
are located. The use of this inexpensive packaging procedure to include
different sensing structures in distinct flow channels is demonstrated.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:16:51 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Bruschi",
"P.",
""
],
[
"Dei",
"M.",
""
],
[
"Piotto",
"M.",
""
]
] |
new_dataset
| 0.987258 |
0805.0903
|
EDA Publishing Association
|
Jhy-Cherng Tsai, Ming-Fong Chen, Hsiharng Yang
|
Design And Fabrication of High Numerical Aperture And Low Aberration
Bi-Convex Micro Lens Array
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Micro lens array is crucial in various kinds of optical and electronic
applications. A micro lens array with high numerical aperture (NA) and low
aberration is in particular needed. This research is aimed to design and
fabricate such a micro lens array with simple structure while keeps the same NA
of a same-diameter hemisphere lens. A bi-convex semispherical micro lens array,
with corresponding NA 0.379, by PDMS is first designed and analyzed.
Experiments are further conducted to fabricate the designed micro lens array by
the thermal reflow process. The formed profile is then sputtered with copper to
serve as the mold. The front and the rear micro lens array are fabricated by
plating PDMS to the mold and then assembled to form the designed micro lens
array.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:27:43 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Tsai",
"Jhy-Cherng",
""
],
[
"Chen",
"Ming-Fong",
""
],
[
"Yang",
"Hsiharng",
""
]
] |
new_dataset
| 0.991813 |
0805.0904
|
EDA Publishing Association
|
N. Crespy (IES), J. Courteaud (IES), P. Combette (IES), P. Temple
Boyer (LAAS), A. Giani (IES), A. Foucaran (IES)
|
Micromachined Inclinometer Based on Fluid Convection
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a numerical simulation and experimental results of a
one-dimensional thermal inclinometer with the cavity filled of gas and liquid.
The sensor principle consists of one heating resistor placed between two
detectors. When the resistor is electrically powered, it creates a symmetrical
temperature profile inside a micromachined silicon cavity. By applying a tilt
to the sensor, the profile shifts in the same direction of the sensible axis
corresponding to the horizontal one to one. The temperature profile and the
sensitivity according to the CO2 gas and mineral oil SAE50 have been studied
using numerical resolution of fluid dynamics equations with the computational
fluid dynamics (CFD) software package Fluent V6.2. We have shown that the
sensitivity of liquid sensors is higher than the gas sensors one. By using
micromachined silicon technique, a thermal inclinometer with one pair of
detectors placed at 300 um from the heater has been made. Experimental
measurements corroborate with the numerical simulation.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:28:10 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Crespy",
"N.",
"",
"IES"
],
[
"Courteaud",
"J.",
"",
"IES"
],
[
"Combette",
"P.",
"",
"IES"
],
[
"Boyer",
"P. Temple",
"",
"LAAS"
],
[
"Giani",
"A.",
"",
"IES"
],
[
"Foucaran",
"A.",
"",
"IES"
]
] |
new_dataset
| 0.998912 |
0805.0906
|
EDA Publishing Association
|
Doekle Yntema, Joost Van Honschoten, Remco Wiegerink
|
Integrated 3D Sound Intensity Sensor with Four-Wire Particle Velocity
Sensors
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new symmetrical four-wire sensor configuration has resulted in a fully
integrated sound intensity sensor with significant lower noise floor and
smaller size than its predecessors. An integrated sound pressure sensor was
further miniaturized by using a folded "back chamber" at both sides of the
chip.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:29:07 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Yntema",
"Doekle",
""
],
[
"Van Honschoten",
"Joost",
""
],
[
"Wiegerink",
"Remco",
""
]
] |
new_dataset
| 0.999545 |
0805.0908
|
EDA Publishing Association
|
Y. Ju, M. Hamada, T. Kobayashi, H. Soyama
|
A Nanostructual Microwave Probe Used for Atomic Force Microscope
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In order to develop a new structure microwave probe, the fabrication of AFM
probe on the GaAs wafer was studied. A waveguide was introduced by evaporating
Au film on the top and bottom surfaces of the GaAs AFM probe. A tip having 8
micrometers high, and curvature radius about 50 nm was formed. The dimensions
of the cantilever are 250x30x15 micrometers. The open structure of the
waveguide at the tip of the probe was introduced by using FIB fabrication. AFM
topography of a grating sample was measured by using the fabricated GaAs
microwave probe. The fabricated probe was found having nanometer scale
resolution, and microwave emission was detected successfully at the tip of the
probe by approaching Cr-V steel and Au wire samples.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:30:38 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Ju",
"Y.",
""
],
[
"Hamada",
"M.",
""
],
[
"Kobayashi",
"T.",
""
],
[
"Soyama",
"H.",
""
]
] |
new_dataset
| 0.999017 |
0805.0913
|
EDA Publishing Association
|
Y.-H. Wang, Tzu-Han Hsueh, Rong-Hua Ma, Chia-Yen Lee, Lung-Ming Fu,
P.-Ch. Chou, Chien-Hsiung Tsai
|
A Microcantilever-based Gas Flow Sensor for Flow Rate and Direction
Detection
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The purpose of this paper is to apply characteristics of residual stress that
causes cantilever beams to bend for manufacturing a micro-structured gas flow
sensor. This study uses a silicon wafer deposited silicon nitride layers,
reassembled the gas flow sensor with four cantilever beams that perpendicular
to each other and manufactured piezoresistive structure on each
micro-cantilever by MEMS technologies, respectively. When the cantilever beams
are formed after etching the silicon wafer, it bends up a little due to the
released residual stress induced in the previous fabrication process. As air
flows through the sensor upstream and downstream beam deformation was made,
thus the airflow direction can be determined through comparing the resistance
variation between different cantilever beams. The flow rate can also be
measured by calculating the total resistance variations on the four
cantilevers.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:34:02 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Wang",
"Y. -H.",
""
],
[
"Hsueh",
"Tzu-Han",
""
],
[
"Ma",
"Rong-Hua",
""
],
[
"Lee",
"Chia-Yen",
""
],
[
"Fu",
"Lung-Ming",
""
],
[
"Chou",
"P. -Ch.",
""
],
[
"Tsai",
"Chien-Hsiung",
""
]
] |
new_dataset
| 0.967003 |
0805.0930
|
EDA Publishing Association
|
Anis Nordin, Ioana Voiculescu, Mona Zaghloul
|
On-Chip Hotplate for Temperature Control of Cmos Saw Resonators
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to the sensitivity of the piezoelectric layer in surface acoustic wave
(SAW) resonators to temperature, a method of achieving device stability as a
function of temperature is required. This work presents the design, modeling
and characterization of integrated dual-serpentine polysilicon resistors as a
method for temperature control of CMOS SAW resonators. The design employs the
oven control temperature stabilization scheme where the device's temperature is
elevated to higher than Tmax to maintain constant device temperature. The
efficiency of the polysilicon resistor as a heating element was verified
through a 1-D partial differential equation model, 3-D CoventorWare finite
element simulations and measurements using Compix thermal camera. To verify
that the on-chip hotplate is effective as a temperature control method, both DC
and RF measurements of the heater together with the resonator were conducted.
Experimental results have indicated that the TCF of the CMOS SAW resonator of
-97.2 ppm/deg C has been reduced to -23.19 ppm/deg C when heated to 56 deg C.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:45:09 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Nordin",
"Anis",
""
],
[
"Voiculescu",
"Ioana",
""
],
[
"Zaghloul",
"Mona",
""
]
] |
new_dataset
| 0.999582 |
0805.0932
|
EDA Publishing Association
|
Salim Touati, Nicolas Lorphelin, Alexandre Kanciurzewski, Renaud Robin
(IEMN), A.-S. Rollier, Olivier Millet, Karim Segueni
|
Low Voltage Totally Free Flexible RF MEMS Switch With Anti-Stiction
System
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper concerns a new design of RF MEMS switch combined with an
innovative process which enable low actuation voltage (<5V) and avoid stiction.
First, the structure described with principal design issues, the corresponding
anti-stiction system is presented and FEM simulations are done. Then, a short
description of the process flow based on two non polymer sacrificial layers.
Finally, RF measurements are presented and preliminary experimental protocol
and results of anti-stiction validation is detailed. Resulting RF performances
are -30dB of isolation and -0.45dB of insertion loss at 10 GHz.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:46:05 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Touati",
"Salim",
"",
"IEMN"
],
[
"Lorphelin",
"Nicolas",
"",
"IEMN"
],
[
"Kanciurzewski",
"Alexandre",
"",
"IEMN"
],
[
"Robin",
"Renaud",
"",
"IEMN"
],
[
"Rollier",
"A. -S.",
""
],
[
"Millet",
"Olivier",
""
],
[
"Segueni",
"Karim",
""
]
] |
new_dataset
| 0.967536 |
0805.0934
|
EDA Publishing Association
|
Renaud Robin, Salim Touati, Karim Segueni, Olivier Millet, Lionel
Buchaillot (IEMN)
|
A New Four States High Deflection Low Actuation Voltage Electrostatic
Mems Switch for RF Applications
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a new electrostatic MEMS (MicroElectroMechanical System)
based on a single high reliability totally free flexible membrane. Using four
electrodes, this structure enables four states which allowed large deflections
(4$\mu$m) with low actuation voltage (7,5V). This design presents also a good
contact force and improve the restoring force of the structure. As an example
of application, a Single Pole Double Throw (SPDT) for 24GHz applications, based
on this design, has been simulated.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:47:09 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Robin",
"Renaud",
"",
"IEMN"
],
[
"Touati",
"Salim",
"",
"IEMN"
],
[
"Segueni",
"Karim",
"",
"IEMN"
],
[
"Millet",
"Olivier",
"",
"IEMN"
],
[
"Buchaillot",
"Lionel",
"",
"IEMN"
]
] |
new_dataset
| 0.990575 |
0805.0935
|
EDA Publishing Association
|
C.-Y. Lee, Zgen-Hui Chen, Hsien-Tseng Chang, Chiang-Ho Cheng,
Chih-Yung Wen
|
Design and Fabrication of a Novel Micro Electromagnetic Actuator
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The present study presents a new micro electromagnetic actuator utilizing a
PDMS membrane with a magnet. The actuator is integrated with micro coils to
electromagnetically actuate the membrane and results in a large deflection. The
micro electromagnetic actuator proposed in this study is easily fabricated and
is readily integrated with existing bio-medical chips due to its planar
structure.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:47:38 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Lee",
"C. -Y.",
""
],
[
"Chen",
"Zgen-Hui",
""
],
[
"Chang",
"Hsien-Tseng",
""
],
[
"Cheng",
"Chiang-Ho",
""
],
[
"Wen",
"Chih-Yung",
""
]
] |
new_dataset
| 0.999021 |
0805.0938
|
EDA Publishing Association
|
Patrick Sangouard (ESYCOM-Esiee), G. Lissorgues (ESYCOM-Esiee), T.
Bourouina (ESYCOM-Esiee)
|
A Novel Piezoelectric Microtransformer for Autonmous Sensors
Applications
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work relates to a novel piezoelectric transformer to be used in an
autonomous sensor unit, possibly in conjunction with a RF-MEMS retro-modulator.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:49:38 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Sangouard",
"Patrick",
"",
"ESYCOM-Esiee"
],
[
"Lissorgues",
"G.",
"",
"ESYCOM-Esiee"
],
[
"Bourouina",
"T.",
"",
"ESYCOM-Esiee"
]
] |
new_dataset
| 0.999204 |
0805.0941
|
EDA Publishing Association
|
Andras Vass-Varnai, M. Rencz
|
Package Hermeticity Testing with Thermal Transient Measurements
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The rapid incursion of new technologies such as MEMS and smart sensor device
manufacturing requires new tailor-made packaging designs. In many applications
these devices are exposed to humid environments. Since the penetration of
moisture into the package may result in internal corrosion or shift of the
operating parameters, the reliability testing of hermetically sealed packages
has become a crucial question in the semiconductor industry.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:52:00 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Vass-Varnai",
"Andras",
""
],
[
"Rencz",
"M.",
""
]
] |
new_dataset
| 0.988779 |
0805.0942
|
EDA Publishing Association
|
C. Seguineau, M. Ignat (SIMAP), C. Malhaire (INSAT), S. Brida, X.
Lafontan, J.-M. Desmarres, C. Josserond (SIMAP), L. Debove (SIMAP)
|
Micro-tensile tests on micromachined metal on polymer specimens:
elasticity, plasticity and rupture
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This study is focused on the mechanical characterization of materials used in
microelectronic and micro- electromechanical systems (MEMS) devices. In order
to determine their mechanical parameters, a new deformation bench test with
suitable micromachined specimens have been developed. Uniaxial tensile tests
were performed on "low cost" specimens, consisting in electroplated thin copper
films and structures, deposited on a polimide type substrate. Moreover, a
cyclic mechanical actuation via piezoelectric actuators was tested on the same
deformation bench. These experiments validate the device for performing dynamic
characterization of materials, and reliability studies of different
microstructures.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:52:18 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Seguineau",
"C.",
"",
"SIMAP"
],
[
"Ignat",
"M.",
"",
"SIMAP"
],
[
"Malhaire",
"C.",
"",
"INSAT"
],
[
"Brida",
"S.",
"",
"SIMAP"
],
[
"Lafontan",
"X.",
"",
"SIMAP"
],
[
"Desmarres",
"J. -M.",
"",
"SIMAP"
],
[
"Josserond",
"C.",
"",
"SIMAP"
],
[
"Debove",
"L.",
"",
"SIMAP"
]
] |
new_dataset
| 0.994142 |
0805.0943
|
EDA Publishing Association
|
K.I. Sinclair, T. Tilford, M.Y.P. Desmulliez, G. Goussetis, C. Bailey,
K. Parrott, A.J. Sangster
|
Open Ended Microwave Oven for Packaging
|
Submitted on behalf of EDA Publishing Association
(http://irevues.inist.fr/handle/2042/16838)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2008, Nice : France (2008)
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel open waveguide cavity resonator is presented for the combined
variable frequency microwave curing of bumps, underfills and encapsulants, as
well as the alignment of devices for fast flip-chip assembly, direct chip
attach (DCA) or wafer-scale level packaging (WSLP). This technology achieves
radio frequency (RF) curing of adhesives used in microelectronics,
optoelectronics and medical devices with potential simultaneous micron-scale
alignment accuracy and bonding of devices. In principle, the open oven cavity
can be fitted directly onto a flip-chip or wafer scale bonder and, as such,
will allow for the bonding of devices through localised heating thus reducing
the risk to thermally sensitive devices. Variable frequency microwave (VFM)
heating and curing of an idealised polymer load is numerically simulated using
a multi-physics approach. Electro-magnetic fields within a novel open ended
microwave oven developed for use in micro-electronics manufacturing
applications are solved using a de icated Yee scheme finite-difference
time-domain (FDTD) solver. Temperature distribution, degree of cure and thermal
stresses are analysed using an Unstructured Finite Volume method (UFVM)
multi-physics package. The polymer load was meshed for thermophysical analysis,
whilst the microwave cavity - encompassing the polymer load - was meshed for
microwave irradiation. The two solution domains are linked using a
cross-mapping routine. The principle of heating using the evanescent fringing
fields within the open-end of the cavity is demonstrated. A closed loop
feedback routine is established allowing the temperature within a lossy sample
to be controlled. A distribution of the temperature within the lossy sample is
obtained by using a thermal imaging camera.
|
[
{
"version": "v1",
"created": "Wed, 7 May 2008 09:52:26 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Sinclair",
"K. I.",
""
],
[
"Tilford",
"T.",
""
],
[
"Desmulliez",
"M. Y. P.",
""
],
[
"Goussetis",
"G.",
""
],
[
"Bailey",
"C.",
""
],
[
"Parrott",
"K.",
""
],
[
"Sangster",
"A. J.",
""
]
] |
new_dataset
| 0.998297 |
0805.3747
|
Anon Plangprasopchok
|
Anon Plangprasopchok and Kristina Lerman
|
Constructing Folksonomies from User-specified Relations on Flickr
|
14 Pages, Submitted to the Workshop on Web Mining and Web Usage
Analysis (WebKDD 2008)
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many social Web sites allow users to publish content and annotate with
descriptive metadata. In addition to flat tags, some social Web sites have
recently began to allow users to organize their content and metadata
hierarchically. The social photosharing site Flickr, for example, allows users
to group related photos in sets, and related sets in collections. The social
bookmarking site Del.icio.us similarly lets users group related tags into
bundles. Although the sites themselves don't impose any constraints on how
these hierarchies are used, individuals generally use them to capture
relationships between concepts, most commonly the broader/narrower relations.
Collective annotation of content with hierarchical relations may lead to an
emergent classification system, called a folksonomy. While some researchers
have explored using tags as evidence for learning folksonomies, we believe that
hierarchical relations described above offer a high-quality source of evidence
for this task.
We propose a simple approach to aggregate shallow hierarchies created by many
distinct Flickr users into a common folksonomy. Our approach uses statistics to
determine if a particular relation should be retained or discarded. The
relations are then woven together into larger hierarchies. Although we have not
carried out a detailed quantitative evaluation of the approach, it looks very
promising since it generates very reasonable, non-trivial hierarchies.
|
[
{
"version": "v1",
"created": "Sat, 24 May 2008 07:02:24 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Plangprasopchok",
"Anon",
""
],
[
"Lerman",
"Kristina",
""
]
] |
new_dataset
| 0.959595 |
0806.1569
|
Feng Xia
|
Feng Xia, Yu-Chu Tian, Yanjun Li, Youxian Sun
|
Wireless Sensor/Actuator Network Design for Mobile Control Applications
|
17 pages, 8 figures; Open Access at
http://www.mdpi.org/sensors/papers/s7102157.pdf
|
Sensors, vol.7, no.10, pp.2157-2173, 2007
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless sensor/actuator networks (WSANs) are emerging as a new generation of
sensor networks. Serving as the backbone of control applications, WSANs will
enable an unprecedented degree of distributed and mobile control. However, the
unreliability of wireless communications and the real-time requirements of
control applications raise great challenges for WSAN design. With emphasis on
the reliability issue, this paper presents an application-level design
methodology for WSANs in mobile control applications. The solution is generic
in that it is independent of the underlying platforms, environment, control
system models, and controller design. To capture the link quality
characteristics in terms of packet loss rate, experiments are conducted on a
real WSAN system. From the experimental observations, a simple yet efficient
method is proposed to deal with unpredictable packet loss on actuator nodes.
Trace-based simulations give promising results, which demonstrate the
effectiveness of the proposed approach.
|
[
{
"version": "v1",
"created": "Tue, 10 Jun 2008 04:20:01 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Xia",
"Feng",
""
],
[
"Tian",
"Yu-Chu",
""
],
[
"Li",
"Yanjun",
""
],
[
"Sun",
"Youxian",
""
]
] |
new_dataset
| 0.998225 |
0806.1711
|
Ian Kash
|
Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern
|
The Lotus-Eater Attack
| null | null | null | null |
cs.NI cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many protocols for distributed and peer-to-peer systems have the feature that
nodes will stop providing service for others once they have received a certain
amount of service. Examples include BitTorent's unchoking policy, BAR Gossip's
balanced exchanges, and threshold strategies in scrip systems. An attacker can
exploit this by providing service in a targeted way to prevent chosen nodes
from providing service. While such attacks cannot be prevented, we discuss
techniques that can be used to limit the damage they do. These techniques
presume that a certain number of processes will follow the recommended
protocol, even if they could do better by ``gaming'' the system.
|
[
{
"version": "v1",
"created": "Tue, 10 Jun 2008 17:31:42 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Kash",
"Ian A.",
""
],
[
"Friedman",
"Eric J.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] |
new_dataset
| 0.993571 |
0806.1812
|
Vasiliki Liagkou Dr.
|
V. Liagkou, E. Makri, P. Spirakis and Y.C. Stamatiou
|
A probabilistic key agreement scheme for sensor networks without key
predistribution
|
14 pages, 1 figure
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The dynamic establishment of shared information (e.g. secret key) between two
entities is particularly important in networks with no pre-determined structure
such as wireless sensor networks (and in general wireless mobile ad-hoc
networks). In such networks, nodes establish and terminate communication
sessions dynamically with other nodes which may have never been encountered
before, in order to somehow exchange information which will enable them to
subsequently communicate in a secure manner. In this paper we give and
theoretically analyze a series of protocols that enables two entities that have
never encountered each other before to establish a shared piece of information
for use as a key in setting up a secure communication session with the aid of a
shared key encryption algorithm. These protocols do not require previous
pre-distribution of candidate keys or some other piece of information of
specialized form except a small seed value, from which the two entities can
produce arbitrarily long strings with many similarities.
|
[
{
"version": "v1",
"created": "Wed, 11 Jun 2008 08:39:04 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Liagkou",
"V.",
""
],
[
"Makri",
"E.",
""
],
[
"Spirakis",
"P.",
""
],
[
"Stamatiou",
"Y. C.",
""
]
] |
new_dataset
| 0.972567 |
0806.2549
|
Adrien Van Den Bossche
|
Adrien Van Den Bossche (LATTIS), Thierry Val (LATTIS), Eric Campo
(LATTIS)
|
Prototyping and Performance Analysis of a QoS MAC Layer for Industrial
Wireless Network
|
7th IFAC International Conference on. Fieldbuses and nETworks in
industrial and embedded systems, Toulouse : France (2007)
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Today's industrial sensor networks require strong reliability and guarantees
on messages delivery. These needs are even more important in real time
applications like control/command, such as robotic wireless communications
where strong temporal constraints are critical. For these reasons, classical
random-based Medium Access Control (MAC) protocols present a non-null frame
collision probability. In this paper we present an original full deterministic
MAC-layer for industrial wireless network and its performance evaluation thanks
to the development of a material prototype.
|
[
{
"version": "v1",
"created": "Mon, 16 Jun 2008 11:40:57 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Bossche",
"Adrien Van Den",
"",
"LATTIS"
],
[
"Val",
"Thierry",
"",
"LATTIS"
],
[
"Campo",
"Eric",
"",
"LATTIS"
]
] |
new_dataset
| 0.983451 |
0806.2726
|
Matthias Hesse
|
Matthias Hesse (I3S), Jerome Lebrun (I3S), Luc Deneire (I3S)
|
L2 Orthogonal Space Time Code for Continuous Phase Modulation
| null |
Dans 9th IEEE International Workshop on Signal Processing Advances
in Wireless Communications (2008)
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To combine the high power efficiency of Continuous Phase Modulation (CPM)
with either high spectral efficiency or enhanced performance in low Signal to
Noise conditions, some authors have proposed to introduce CPM in a MIMO frame,
by using Space Time Codes (STC). In this paper, we address the code design
problem of Space Time Block Codes combined with CPM and introduce a new design
criterion based on L2 orthogonality. This L2 orthogonality condition, with the
help of simplifying assumption, leads, in the 2x2 case, to a new family of
codes. These codes generalize the Wang and Xia code, which was based on
pointwise orthogonality. Simulations indicate that the new codes achieve full
diversity and a slightly better coding gain. Moreover, one of the codes can be
interpreted as two antennas fed by two conventional CPMs using the same data
but with different alphabet sets. Inspection of these alphabet sets lead also
to a simple explanation of the (small) spectrum broadening of Space Time Coded
CPM.
|
[
{
"version": "v1",
"created": "Tue, 17 Jun 2008 08:59:18 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Hesse",
"Matthias",
"",
"I3S"
],
[
"Lebrun",
"Jerome",
"",
"I3S"
],
[
"Deneire",
"Luc",
"",
"I3S"
]
] |
new_dataset
| 0.998163 |
0806.2760
|
Matthias Hesse
|
Matthias Hesse (I3S), Jerome Lebrun (I3S), Luc Deneire (I3S)
|
L2 OSTC-CPM: Theory and design
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The combination of space-time coding (STC) and continuous phase modulation
(CPM) is an attractive field of research because both STC and CPM bring many
advantages for wireless communications. Zhang and Fitz [1] were the first to
apply this idea by constructing a trellis based scheme. But for these codes the
decoding effort grows exponentially with the number of transmitting antennas.
This was circumvented by orthogonal codes introduced by Wang and Xia [2].
Unfortunately, based on Alamouti code [3], this design is restricted to two
antennas. However, by relaxing the orthogonality condition, we prove here that
it is possible to design L2-orthogonal space-time codes which achieve full rate
and full diversity with low decoding effort. In part one, we generalize the
two-antenna code proposed by Wang and Xia [2] from pointwise to
L2-orthogonality and in part two we present the first L2-orthogonal code for
CPM with three antennas. In this report, we detail these results and focus on
the properties of these codes. Of special interest is the optimization of the
bit error rate which depends on the initial phase of the system. Our simulation
results illustrate the systemic behavior of these conditions.
|
[
{
"version": "v1",
"created": "Tue, 17 Jun 2008 11:43:17 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Hesse",
"Matthias",
"",
"I3S"
],
[
"Lebrun",
"Jerome",
"",
"I3S"
],
[
"Deneire",
"Luc",
"",
"I3S"
]
] |
new_dataset
| 0.99063 |
0806.3456
|
Hans Raj Tiwary
|
Khaled Elbassioni and Hans Raj Tiwary
|
On Computing the Vertex Centroid of a Polyhedron
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $\mathcal{P}$ be an $\mathcal{H}$-polytope in $\mathbb{R}^d$ with vertex
set $V$. The vertex centroid is defined as the average of the vertices in $V$.
We prove that computing the vertex centroid of an $\mathcal{H}$-polytope is
#P-hard. Moreover, we show that even just checking whether the vertex centroid
lies in a given halfspace is already #P-hard for $\mathcal{H}$-polytopes. We
also consider the problem of approximating the vertex centroid by finding a
point within an $\epsilon$ distance from it and prove this problem to be
#P-easy by showing that given an oracle for counting the number of vertices of
an $\mathcal{H}$-polytope, one can approximate the vertex centroid in
polynomial time. We also show that any algorithm approximating the vertex
centroid to \emph{any} ``sufficiently'' non-trivial (for example constant)
distance, can be used to construct a fully polynomial approximation scheme for
approximating the centroid and also an output-sensitive polynomial algorithm
for the Vertex Enumeration problem. Finally, we show that for unbounded
polyhedra the vertex centroid can not be approximated to a distance of
$d^{{1/2}-\delta}$ for any fixed constant $\delta>0$.
|
[
{
"version": "v1",
"created": "Fri, 20 Jun 2008 20:56:19 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Elbassioni",
"Khaled",
""
],
[
"Tiwary",
"Hans Raj",
""
]
] |
new_dataset
| 0.998681 |
0806.3708
|
Jocelyne Troccaz
|
S\'ebastien Martin (TIMC), Vincent Daanen (TIMC), Jocelyne Troccaz
(TIMC)
|
Atlas-Based Prostate Segmentation Using an Hybrid Registration
|
International Journal of Computer Assisted Radiology and Surgery
(2008) 000-999
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Purpose: This paper presents the preliminary results of a semi-automatic
method for prostate segmentation of Magnetic Resonance Images (MRI) which aims
to be incorporated in a navigation system for prostate brachytherapy. Methods:
The method is based on the registration of an anatomical atlas computed from a
population of 18 MRI exams onto a patient image. An hybrid registration
framework which couples an intensity-based registration with a robust
point-matching algorithm is used for both atlas building and atlas
registration. Results: The method has been validated on the same dataset that
the one used to construct the atlas using the "leave-one-out method". Results
gives a mean error of 3.39 mm and a standard deviation of 1.95 mm with respect
to expert segmentations. Conclusions: We think that this segmentation tool may
be a very valuable help to the clinician for routine quantitative image
exploitation.
|
[
{
"version": "v1",
"created": "Mon, 23 Jun 2008 15:43:28 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Martin",
"Sébastien",
"",
"TIMC"
],
[
"Daanen",
"Vincent",
"",
"TIMC"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
]
] |
new_dataset
| 0.957821 |
0806.4372
|
Stavros Nikolopoulos D.
|
Katerina Asdre and Stavros D. Nikolopoulos
|
The 1-fixed-endpoint Path Cover Problem is Polynomial on Interval Graph
| null | null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a variant of the path cover problem, namely, the
$k$-fixed-endpoint path cover problem, or kPC for short, on interval graphs.
Given a graph $G$ and a subset $\mathcal{T}$ of $k$ vertices of $V(G)$, a
$k$-fixed-endpoint path cover of $G$ with respect to $\mathcal{T}$ is a set of
vertex-disjoint paths $\mathcal{P}$ that covers the vertices of $G$ such that
the $k$ vertices of $\mathcal{T}$ are all endpoints of the paths in
$\mathcal{P}$. The kPC problem is to find a $k$-fixed-endpoint path cover of
$G$ of minimum cardinality; note that, if $\mathcal{T}$ is empty the stated
problem coincides with the classical path cover problem. In this paper, we
study the 1-fixed-endpoint path cover problem on interval graphs, or 1PC for
short, generalizing the 1HP problem which has been proved to be NP-complete
even for small classes of graphs. Motivated by a work of Damaschke, where he
left both 1HP and 2HP problems open for the class of interval graphs, we show
that the 1PC problem can be solved in polynomial time on the class of interval
graphs. The proposed algorithm is simple, runs in $O(n^2)$ time, requires
linear space, and also enables us to solve the 1HP problem on interval graphs
within the same time and space complexity.
|
[
{
"version": "v1",
"created": "Thu, 26 Jun 2008 18:13:31 GMT"
}
] | 2008-12-18T00:00:00 |
[
[
"Asdre",
"Katerina",
""
],
[
"Nikolopoulos",
"Stavros D.",
""
]
] |
new_dataset
| 0.99696 |
0812.2990
|
Frederic Mazoit
|
Fr\'ed\'eric Mazoit (LaBRI)
|
Tree-width of hypergraphs and surface duality
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In Graph Minor III, Robertson and Seymour conjecture that the tree-width of a
planar graph and that of its dual differ by at most one. We prove that given a
hypergraph H on a surface of Euler genus k, the tree-width of H^* is at most
the maximum of tw(H) + 1 + k and the maximum size of a hyperedge of H^*.
|
[
{
"version": "v1",
"created": "Tue, 16 Dec 2008 07:47:50 GMT"
}
] | 2008-12-17T00:00:00 |
[
[
"Mazoit",
"Frédéric",
"",
"LaBRI"
]
] |
new_dataset
| 0.999112 |
0812.2313
|
Jocelyne Troccaz
|
Pierre Mozer (TIMC, URObotics), Jocelyne Troccaz (TIMC), Dan
Stoianovici (URObotics)
|
Urologic robots and future directions
| null |
Current Opinion in Urology 19, 1 (2009) 114-9
|
10.1097/MOU.0b013e32831cc1ba
| null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
PURPOSE OF REVIEW: Robot-assisted laparoscopic surgery in urology has gained
immense popularity with the daVinci system, but a lot of research teams are
working on new robots. The purpose of this study is to review current urologic
robots and present future development directions. RECENT FINDINGS: Future
systems are expected to advance in two directions: improvements of remote
manipulation robots and developments of image-guided robots. SUMMARY: The final
goal of robots is to allow safer and more homogeneous outcomes with less
variability of surgeon performance, as well as new tools to perform tasks on
the basis of medical transcutaneous imaging, in a less invasive way, at lower
costs. It is expected that improvements for a remote system could be augmented
in reality, with haptic feedback, size reduction, and development of new tools
for natural orifice translumenal endoscopic surgery. The paradigm of
image-guided robots is close to clinical availability and the most advanced
robots are presented with end-user technical assessments. It is also notable
that the potential of robots lies much further ahead than the accomplishments
of the daVinci system. The integration of imaging with robotics holds a
substantial promise, because this can accomplish tasks otherwise impossible.
Image-guided robots have the potential to offer a paradigm shift.
|
[
{
"version": "v1",
"created": "Fri, 12 Dec 2008 08:38:23 GMT"
}
] | 2008-12-15T00:00:00 |
[
[
"Mozer",
"Pierre",
"",
"TIMC, URObotics"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
],
[
"Stoianovici",
"Dan",
"",
"URObotics"
]
] |
new_dataset
| 0.984449 |
0812.1951
|
Jerome Leroux
|
Alain Finkel (LSV), J\'er\^ome Leroux (LaBRI)
|
The convex hull of a regular set of integer vectors is polyhedral and
effectively computable
| null |
Information Processing Letters 96, 1 (2005) 30 - 35
|
10.1016/j.ipl.2005.04.004
| null |
cs.CG cs.DS cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Number Decision Diagrams (NDD) provide a natural finite symbolic
representation for regular set of integer vectors encoded as strings of digit
vectors (least or most significant digit first). The convex hull of the set of
vectors represented by a NDD is proved to be an effectively computable convex
polyhedron.
|
[
{
"version": "v1",
"created": "Wed, 10 Dec 2008 16:26:36 GMT"
}
] | 2008-12-13T00:00:00 |
[
[
"Finkel",
"Alain",
"",
"LSV"
],
[
"Leroux",
"Jérôme",
"",
"LaBRI"
]
] |
new_dataset
| 0.9873 |
0812.2014
|
Jerome Leroux
|
J\'er\^ome Leroux (LaBRI)
|
Convex Hull of Arithmetic Automata
| null |
Static Analysis, Valencia : Espagne (2008)
|
10.1007/978-3-540-69166-2_4
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Arithmetic automata recognize infinite words of digits denoting
decompositions of real and integer vectors. These automata are known expressive
and efficient enough to represent the whole set of solutions of complex linear
constraints combining both integral and real variables. In this paper, the
closed convex hull of arithmetic automata is proved rational polyhedral.
Moreover an algorithm computing the linear constraints defining these convex
set is provided. Such an algorithm is useful for effectively extracting
geometrical properties of the whole set of solutions of complex constraints
symbolically represented by arithmetic automata.
|
[
{
"version": "v1",
"created": "Wed, 10 Dec 2008 20:33:27 GMT"
}
] | 2008-12-11T00:00:00 |
[
[
"Leroux",
"Jérôme",
"",
"LaBRI"
]
] |
new_dataset
| 0.996434 |
0808.3453
|
Gilles Z\'emor
|
Alexander Barg and Arya Mazumdar and Gilles Z\'emor
|
Codes on hypergraphs
|
16 pages
|
Advances in Mathematics of Communications (AMC), Vol. 2, No 4,
(2008) pp. 433 - 450.
|
10.3934/amc.2008.2.433
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Codes on hypergraphs are an extension of the well-studied family of codes on
bipartite graphs. Bilu and Hoory (2004) constructed an explicit family of codes
on regular t-partite hypergraphs whose minimum distance improves earlier
estimates of the distance of bipartite-graph codes. They also suggested a
decoding algorithm for such codes and estimated its error-correcting
capability.
In this paper we study two aspects of hypergraph codes. First, we compute the
weight enumerators of several ensembles of such codes, establishing conditions
under which they attain the Gilbert-Varshamov bound and deriving estimates of
their distance. In particular, we show that this bound is attained by codes
constructed on a fixed bipartite graph with a large spectral gap.
We also suggest a new decoding algorithm of hypergraph codes that corrects a
constant fraction of errors, improving upon the algorithm of Bilu and Hoory.
|
[
{
"version": "v1",
"created": "Tue, 26 Aug 2008 08:30:14 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Aug 2008 08:53:08 GMT"
}
] | 2008-12-10T00:00:00 |
[
[
"Barg",
"Alexander",
""
],
[
"Mazumdar",
"Arya",
""
],
[
"Zémor",
"Gilles",
""
]
] |
new_dataset
| 0.99977 |
0808.3712
|
Michel Fliess
|
Michel Fliess (LIX, INRIA Saclay - Ile de France)
|
Critique du rapport signal \`a bruit en communications num\'eriques --
Questioning the signal to noise ratio in digital communications
| null |
ARIMA (Revue africaine d'informatique et de Math\'ematiques
appliqu\'ees) 9 (2008) 419-429
| null | null |
cs.IT math.IT math.PR math.RA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The signal to noise ratio, which plays such an important r\^ole in
information theory, is shown to become pointless for digital communications
where the demodulation is achieved via new fast estimation techniques.
Operational calculus, differential algebra, noncommutative algebra and
nonstandard analysis are the main mathematical tools.
|
[
{
"version": "v1",
"created": "Wed, 27 Aug 2008 14:05:38 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Dec 2008 15:04:53 GMT"
},
{
"version": "v3",
"created": "Wed, 10 Dec 2008 10:39:01 GMT"
}
] | 2008-12-10T00:00:00 |
[
[
"Fliess",
"Michel",
"",
"LIX, INRIA Saclay - Ile de France"
]
] |
new_dataset
| 0.989996 |
0801.4230
|
Simon Perdrix
|
Simon Perdrix
|
Quantum entanglement analysis based on abstract interpretation
|
13 pages
|
Proc. of 15th International Static Analysis Symposium (SAS 2008).
LNCS 5079, pp 270-282
|
10.1007/978-3-540-69166-2_18
| null |
cs.LO cs.PL quant-ph
| null |
Entanglement is a non local property of quantum states which has no classical
counterpart and plays a decisive role in quantum information theory. Several
protocols, like the teleportation, are based on quantum entangled states.
Moreover, any quantum algorithm which does not create entanglement can be
efficiently simulated on a classical computer. The exact role of the
entanglement is nevertheless not well understood. Since an exact analysis of
entanglement evolution induces an exponential slowdown, we consider
approximative analysis based on the framework of abstract interpretation. In
this paper, a concrete quantum semantics based on superoperators is associated
with a simple quantum programming language. The representation of entanglement,
i.e. the design of the abstract domain is a key issue. A representation of
entanglement as a partition of the memory is chosen. An abstract semantics is
introduced, and the soundness of the approximation is proven.
|
[
{
"version": "v1",
"created": "Mon, 28 Jan 2008 10:45:47 GMT"
}
] | 2008-12-08T00:00:00 |
[
[
"Perdrix",
"Simon",
""
]
] |
new_dataset
| 0.996689 |
0812.0706
|
Soubhik Chakraborty
|
Soubhik Chakraborty, Rayalla Ranganayakulu, Shivee Chauhan, Sandeep
Singh Solanki and Kartik Mahto
|
Which notes are Vadi-Samvadi in Raga Rageshree?
|
20 pages;04 figures
| null | null | null |
cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The notes which play the most important and second most important roles in
expressing a raga are called Vadi and Samvadi swars respectively in (North)
Indian Classical music. Like Bageshree, Bhairavi, Shankara, Hamir and Kalingra,
Rageshree is another controversial raga so far as the choice of Vadi-Samvadi
selection is concerned where there are two different opinions. In the present
work, a two minute vocal recording of raga Rageshree is subjected to a careful
statistical analysis. Our analysis is broken into three phases: first half,
middle half and last half. Under a multinomial model set up holding appreciably
in the first two phases, only one opinion is found acceptable. In the last
phase the distribution seems to be quasi multinomial, characterized by an
unstable nature of relative occurrence of pitch of all the notes and although
the note whose relative occurrence of pitch suddenly shoots is the Vadi swar
selected from our analysis of the first two phases, we take it as an outlier
demanding a separate treatment like any other in statistics. Selection of
Vadi-Samvadi notes in a quasi-multinomial set up is still an open research
problem. An interesting musical cocktail is proposed, however, embedding
several ideas like melodic property of notes, note combinations and pitch
movements between notes, using some weighted combination of psychological and
statistical stability of notes along with watching carefully the sudden shoot
of one or more notes whenever there is enough evidence that multinomial model
has broken down.
|
[
{
"version": "v1",
"created": "Wed, 3 Dec 2008 12:47:08 GMT"
}
] | 2008-12-04T00:00:00 |
[
[
"Chakraborty",
"Soubhik",
""
],
[
"Ranganayakulu",
"Rayalla",
""
],
[
"Chauhan",
"Shivee",
""
],
[
"Solanki",
"Sandeep Singh",
""
],
[
"Mahto",
"Kartik",
""
]
] |
new_dataset
| 0.999114 |
0812.0759
|
Gaurav Bhatnagar Mr.
|
R. Balasubramanian, Gaurav Bhatnagar
|
A new Contrast Based Image Fusion using Wavelet Packets
|
5 Pages, 10 Figures, 1 Table
|
Proc. of IEEE Conference on Applications of Intelligent Systems
(AIS 2008), March 13-15, 2008, Sonepat, India, pp. 141-145.
(ISBN:978-81-906531-0-7)
| null | null |
cs.IT cs.MM math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Image Fusion, a technique which combines complimentary information from
different images of the same scene so that the fused image is more suitable for
segmentation, feature extraction, object recognition and Human Visual System.
In this paper, a simple yet efficient algorithm is presented based on contrast
using wavelet packet decomposition. First, all the source images are decomposed
into low and high frequency sub-bands and then fusion of high frequency
sub-bands is done by the means of Directive Contrast. Now, inverse wavelet
packet transform is performed to reconstruct the fused image. The performance
of the algorithm is carried out by the comparison made between proposed and
existing algorithm.
|
[
{
"version": "v1",
"created": "Wed, 3 Dec 2008 17:29:19 GMT"
}
] | 2008-12-04T00:00:00 |
[
[
"Balasubramanian",
"R.",
""
],
[
"Bhatnagar",
"Gaurav",
""
]
] |
new_dataset
| 0.975423 |
0811.4681
|
Ga?tan Le Guelvouit
|
Ga\"etan Le Guelvouit, Teddy Furon, Fran\c{c}ois Cayre
|
The Good, the Bad, and the Ugly: three different approaches to break
their watermarking system
|
8 pages, 8 figures
|
Proc. IS&T/SPIE Electronic Imaging, vol. 6505, San Jose, CA, Jan.
2007
|
10.1117/12.703968
| null |
cs.GR cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Good is Blondie, a wandering gunman with a strong personal sense of
honor. The Bad is Angel Eyes, a sadistic hitman who always hits his mark. The
Ugly is Tuco, a Mexican bandit who's always only looking out for himself.
Against the backdrop of the BOWS contest, they search for a watermark in gold
buried in three images. Each knows only a portion of the gold's exact location,
so for the moment they're dependent on each other. However, none are
particularly inclined to share...
|
[
{
"version": "v1",
"created": "Fri, 28 Nov 2008 16:31:12 GMT"
}
] | 2008-12-01T00:00:00 |
[
[
"Guelvouit",
"Gaëtan Le",
""
],
[
"Furon",
"Teddy",
""
],
[
"Cayre",
"François",
""
]
] |
new_dataset
| 0.996582 |
0708.3019
|
Ananthanarayanan Chockalingam
|
D. Sreedhar, A. Chockalingam, B. Sundar Rajan
|
Single-Symbol ML Decodable Distributed STBCs for Partially-Coherent
Cooperative Networks
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Space-time block codes (STBCs) that are single-symbol decodable (SSD) in a
co-located multiple antenna setting need not be SSD in a distributed
cooperative communication setting. A relay network with N relays and a single
source-destination pair is called a partially-coherent relay channel (PCRC) if
the destination has perfect channel state information (CSI) of all the channels
and the relays have only the phase information of the source-to-relay channels.
In this paper, first, a new set of necessary and sufficient conditions for a
STBC to be SSD for co-located multiple antenna communication is obtained. Then,
this is extended to a set of necessary and sufficient conditions for a
distributed STBC (DSTBC) to be SSD for a PCRC, by identifying the additional
conditions. Using this, several SSD DSTBCs for PCRC are identified among the
known classes of STBCs. It is proved that even if a SSD STBC for a co-located
MIMO channel does not satisfy the additional conditions for the code to be SSD
for a PCRC, single-symbol decoding of it in a PCRC gives full-diversity and
only coding gain is lost. It is shown that when a DSTBC is SSD for a PCRC, then
arbitrary coordinate interleaving of the in-phase and quadrature-phase
components of the variables does not disturb its SSD property for PCRC.
Finally, it is shown that the possibility of {\em channel phase compensation}
operation at the relay nodes using partial CSI at the relays increases the
possible rate of SSD DSTBCs from $\frac{2}{N}$ when the relays do not have CSI
to 1/2, which is independent of N.
|
[
{
"version": "v1",
"created": "Wed, 22 Aug 2007 13:58:36 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Nov 2008 04:34:11 GMT"
}
] | 2008-11-29T00:00:00 |
[
[
"Sreedhar",
"D.",
""
],
[
"Chockalingam",
"A.",
""
],
[
"Rajan",
"B. Sundar",
""
]
] |
new_dataset
| 0.993657 |
0811.4061
|
Valery Pipin
|
Valery V. Pipin
|
Benchmarking the solar dynamo with Maxima
|
8 pages, 1 figure
| null | null | null |
cs.SE cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, Jouve et al(A&A, 2008) published the paper that presents the
numerical benchmark for the solar dynamo models. Here, I would like to show a
way how to get it with help of computer algebra system Maxima. This way was
used in our paper (Pipin & Seehafer, A&A 2008, in print) to test some new ideas
in the large-scale stellar dynamos. In the present paper I complement the
dynamo benchmark with the standard test that address the problem of the
free-decay modes in the sphere which is submerged in vacuum.
|
[
{
"version": "v1",
"created": "Tue, 25 Nov 2008 11:35:35 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Nov 2008 04:13:36 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"Pipin",
"Valery V.",
""
]
] |
new_dataset
| 0.998923 |
0811.4121
|
Sarad AV
|
Sankar K and Sarad AV
|
String Art: Circle Drawing Using Straight Lines
|
12 pages, code included
| null | null | null |
cs.GR cs.OH
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
An algorithm to generate the locus of a circle using the intersection points
of straight lines is proposed. The pixels on the circle are plotted independent
of one another and the operations involved in finding the locus of the circle
from the intersection of straight lines are parallelizable. Integer only
arithmetic and algorithmic optimizations are used for speedup. The proposed
algorithm makes use of an envelope to form a parabolic arc which is consequent
transformed into a circle. The use of parabolic arcs for the transformation
results in higher pixel errors as the radius of the circle to be drawn
increases. At its current state, the algorithm presented may be suitable only
for generating circles for string art.
|
[
{
"version": "v1",
"created": "Tue, 25 Nov 2008 17:12:22 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"K",
"Sankar",
""
],
[
"AV",
"Sarad",
""
]
] |
new_dataset
| 0.996418 |
cs/0111006
|
Robert Soliday
|
Robert Soliday (APS/ANL)
|
Proliferation of SDDS Support for Various Platforms and Languages
|
3 pages, 2 figures, submitted to ICALEPCS 2001
|
eConfC011127:THAP031,2001
| null |
THAP031
|
cs.DB
| null |
Since Self-Describing Data Sets (SDDS) were first introduced, the source code
has been ported to many different operating systems and various languages. SDDS
is now available in C, Tcl, Java, Fortran, and Python. All of these versions
are supported on Solaris, Linux, and Windows. The C version of SDDS is also
supported on VxWorks. With the recent addition of the Java port, SDDS can now
be deployed on virtually any operating system. Due to this proliferation, SDDS
files serve to link not only a collection of C programs, but programs and
scripts in many languages on different operating systems. The platform
independent binary feature of SDDS also facilitates portability among operating
systems. This paper presents an overview of various benefits of SDDS platform
interoperability.
|
[
{
"version": "v1",
"created": "Mon, 5 Nov 2001 18:14:16 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"Soliday",
"Robert",
"",
"APS/ANL"
]
] |
new_dataset
| 0.999136 |
cs/0111008
|
Xiaojiang Yu
|
X.J. Yu, Q. P. Wang, P.S. Xu
|
The Control of a Beamline Over Intranet
|
Poster at 8th International Conference on Accelerator and Large
experimental Physics Control Systems, San Jose, California, USA, November
2001, 3 pages, pdf, 1 jpeg figure
|
eConfC011127:THAP021,2001
| null | null |
cs.NI
| null |
The machines and beamlines controlled by VME industrial networks are very
popular in accelerator faculties. Recently new software technology, among of
which are Internet/Intranet application, Java language, and distributed
calculating environment, changes the control manner rapidly. A program based on
DCOM is composed to control of a variable included angle spherical grating
monochromator beamline at National Synchrotron Radiation Laboratory (NSRL) in
China. The control computer with a residential DCOM program is connected to
Intranet by LAN, over which the user-end-operating program located in another
computer sends driving beamline units' commands to the control computer. And
also a web page coded in Java, published by the WWW service running in the
control computer, is simply illustrated how to use web browser to query the
states of or to control the beamline units.
|
[
{
"version": "v1",
"created": "Tue, 6 Nov 2001 10:49:54 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"Yu",
"X. J.",
""
],
[
"Wang",
"Q. P.",
""
],
[
"Xu",
"P. S.",
""
]
] |
new_dataset
| 0.999607 |
cs/0304043
|
S. weinzierl
|
Stefan Weinzierl
|
gTybalt - a free computer algebra system
|
22 pages, 7 figures
|
Comput.Phys.Commun.156:180-198,2004
|
10.1016/S0010-4655(03)00468-5
| null |
cs.SC hep-ph
| null |
This article documents the free computer algebra system "gTybalt". The
program is build on top of other packages, among others GiNaC, TeXmacs and
Root. It offers the possibility of interactive symbolic calculations within the
C++ programming language. Mathematical formulae are visualized using TeX fonts.
|
[
{
"version": "v1",
"created": "Tue, 29 Apr 2003 18:22:47 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"Weinzierl",
"Stefan",
""
]
] |
new_dataset
| 0.999725 |
cs/0305062
|
Umer Farooq Khalid
|
Aamir Shafi, Umer Farooq, Saad Kiani, Maria Riaz, Anjum Shehzad,
Arshad Ali, Iosif Legrand, Harvey Newman
|
DIAMOnDS - DIstributed Agents for MObile & Dynamic Services
|
7 pages, 4 figures, CHEP03, La Jolla, California, March 24-28, 2003
|
ECONFC0303241:THAT003,2003
| null | null |
cs.DC
| null |
Distributed Services Architecture with support for mobile agents between
services, offer significantly improved communication and computational
flexibility. The uses of agents allow execution of complex operations that
involve large amounts of data to be processed effectively using distributed
resources. The prototype system Distributed Agents for Mobile and Dynamic
Services (DIAMOnDS), allows a service to send agents on its behalf, to other
services, to perform data manipulation and processing. Agents have been
implemented as mobile services that are discovered using the Jini Lookup
mechanism and used by other services for task management and communication.
Agents provide proxies for interaction with other services as well as specific
GUI to monitor and control the agent activity. Thus agents acting on behalf of
one service cooperate with other services to carry out a job, providing
inter-operation of loosely coupled services in a semi-autonomous way. Remote
file system access functionality has been incorporated by the agent framework
and allows services to dynamically share and browse the file system resources
of hosts, running the services. Generic database access functionality has been
implemented in the mobile agent framework that allows performing complex data
mining and processing operations efficiently in distributed system. A basic
data searching agent is also implemented that performs a query based search in
a file system. The testing of the framework was carried out on WAN by moving
Connectivity Test agents between AgentStations in CERN, Switzerland and NUST,
Pakistan.
|
[
{
"version": "v1",
"created": "Fri, 30 May 2003 11:48:57 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Jun 2003 11:56:46 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"Shafi",
"Aamir",
""
],
[
"Farooq",
"Umer",
""
],
[
"Kiani",
"Saad",
""
],
[
"Riaz",
"Maria",
""
],
[
"Shehzad",
"Anjum",
""
],
[
"Ali",
"Arshad",
""
],
[
"Legrand",
"Iosif",
""
],
[
"Newman",
"Harvey",
""
]
] |
new_dataset
| 0.998785 |
cs/0306009
|
Dimitri Bourilkov
|
A. Arbree, P. Avery, D. Bourilkov, R. Cavanaugh, G. Graham, S.
Katageri, J. Rodriguez, J. Voeckler, M. Wilde
|
Virtual Data in CMS Production
|
Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 5 pages, PDF. PSN TUAT011
|
ECONFC0303241:TUAT011,2003
| null | null |
cs.DC hep-ex
| null |
Initial applications of the GriPhyN Chimera Virtual Data System have been
performed within the context of CMS Production of Monte Carlo Simulated Data.
The GriPhyN Chimera system consists of four primary components: 1) a Virtual
Data Language, which is used to describe virtual data products, 2) a Virtual
Data Catalog, which is used to store virtual data entries, 3) an Abstract
Planner, which resolves all dependencies of a particular virtual data product
and forms a location and existence independent plan, 4) a Concrete Planner,
which maps an abstract, logical plan onto concrete, physical grid resources
accounting for staging in/out files and publishing results to a replica
location service. A CMS Workflow Planner, MCRunJob, is used to generate virtual
data products using the Virtual Data Language. Subsequently, a prototype
workflow manager, known as WorkRunner, is used to schedule the instantiation of
virtual data products across a grid.
|
[
{
"version": "v1",
"created": "Sat, 31 May 2003 21:07:57 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"Arbree",
"A.",
""
],
[
"Avery",
"P.",
""
],
[
"Bourilkov",
"D.",
""
],
[
"Cavanaugh",
"R.",
""
],
[
"Graham",
"G.",
""
],
[
"Katageri",
"S.",
""
],
[
"Rodriguez",
"J.",
""
],
[
"Voeckler",
"J.",
""
],
[
"Wilde",
"M.",
""
]
] |
new_dataset
| 0.999087 |
cs/0306012
|
Julius Hrivnac
|
Julius Hrivnac
|
GraXML - Modular Geometric Modeler
|
Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003. PSN THJT009
|
ECONFC0303241:THJT009,2003
| null | null |
cs.GR
| null |
Many entities managed by HEP Software Frameworks represent spatial
(3-dimensional) real objects. Effective definition, manipulation and
visualization of such objects is an indispensable functionality.
GraXML is a modular Geometric Modeling toolkit capable of processing
geometric data of various kinds (detector geometry, event geometry) from
different sources and delivering them in ways suitable for further use.
Geometric data are first modeled in one of the Generic Models. Those Models are
then used to populate powerful Geometric Model based on the Java3D technology.
While Java3D has been originally created just to provide visualization of 3D
objects, its light weight and high functionality allow an effective reuse as a
general geometric component. This is possible also thanks to a large overlap
between graphical and general geometric functionality and modular design of
Java3D itself. Its graphical functionalities also allow a natural visualization
of all manipulated elements.
All these techniques have been developed primarily (or only) for the Java
environment. It is, however, possible to interface them transparently to
Frameworks built in other languages, like for example C++.
The GraXML toolkit has been tested with data from several sources, as for
example ATLAS and ALICE detector description and ATLAS event data. Prototypes
for other sources, like Geometry Description Markup Language (GDML) exist too
and interface to any other source is easy to add.
|
[
{
"version": "v1",
"created": "Mon, 2 Jun 2003 09:04:18 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"Hrivnac",
"Julius",
""
]
] |
new_dataset
| 0.995257 |
cs/0306024
|
Alwin Brokmann
|
Alwin Brokmann
|
Monitoring Systems and Services
|
Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 3 pages pdf,PSN THET03
|
ECONFC0303241:THET003,2003
| null | null |
cs.OH
| null |
The DESY Computer Center is the home of O(1000) computers supplying a wide
range of different services Monitoring such a large installation is a
challenge. After a long time running a SNMP based commercial Network Management
System, the evaluation of a new System was started. There are a lot of
different commercial and freeware products on the market, but none of them
fully satisfied all our requirements. After re-valuating our original
requirements we selected NAGIOS as our monitoring and alarming tool. After a
successful test we are in production since autumn 2002 and are extending the
service to fully support a distributed monitoring and alarming.
|
[
{
"version": "v1",
"created": "Thu, 5 Jun 2003 10:07:19 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"Brokmann",
"Alwin",
""
]
] |
new_dataset
| 0.95467 |
cs/0306030
|
Andrew McNab
|
A. McNab
|
Grid-based access control for Unix environments, Filesystems and Web
Sites
|
Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 3 pages, LaTex. PSN TUBT008
|
ECONFC0303241:TUBT008,2003
| null | null |
cs.DC
| null |
The EU DataGrid has deployed a grid testbed at approximately 20 sites across
Europe, with several hundred registered users. This paper describes
authorisation systems produced by GridPP and currently used on the EU DataGrid
Testbed, including local Unix pool accounts and fine-grained access control
with Access Control Lists and Grid-aware filesystems, fileservers and web
developement environments.
|
[
{
"version": "v1",
"created": "Fri, 6 Jun 2003 10:45:43 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"McNab",
"A.",
""
]
] |
new_dataset
| 0.995797 |
cs/0306031
|
Riccardo Giannitrapani
|
Marco Frailis, Riccardo Giannitrapani
|
The FRED Event Display: an Extensible HepRep Client for GLAST
|
Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 5 pages, LaTeX, 3 eps figures. PSN
MOLT010
|
ECONFC0303241:MOLT010,2003
| null | null |
cs.GR
| null |
A new graphics client prototype for the HepRep protocol is presented. Based
on modern toolkits and high level languages (C++ and Ruby), Fred is an
experiment to test applicability of scripting facilities to the high energy
physics event display domain. Its flexible structure, extensibility and the use
of the HepRep protocol are key features for its use in the astroparticle
experiment GLAST.
|
[
{
"version": "v1",
"created": "Fri, 6 Jun 2003 12:34:53 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"Frailis",
"Marco",
""
],
[
"Giannitrapani",
"Riccardo",
""
]
] |
new_dataset
| 0.99672 |
cs/0306042
|
Ianna Osborne
|
George Alverson, Giulio Eulisse, Shahzad Muzaffar, Ianna Osborne,
Lassi A. Tuura, Lucas Taylor
|
IGUANA Architecture, Framework and Toolkit for Interactive Graphics
|
Presented at the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 6 pages LaTeX, 4 eps figures. PSN
MOLT008 More and higher res figs at
http://iguana.web.cern.ch/iguana/snapshot/main/gallery.html
|
ECONFC0303241:MOLT008,2003
| null | null |
cs.SE cs.GR
| null |
IGUANA is a generic interactive visualisation framework based on a C++
component model. It provides powerful user interface and visualisation
primitives in a way that is not tied to any particular physics experiment or
detector design. The article describes interactive visualisation tools built
using IGUANA for the CMS and D0 experiments, as well as generic GEANT4 and
GEANT3 applications. It covers features of the graphical user interfaces, 3D
and 2D graphics, high-quality vector graphics output for print media, various
textual, tabular and hierarchical data views, and integration with the
application through control panels, a command line and different
multi-threading models.
|
[
{
"version": "v1",
"created": "Tue, 10 Jun 2003 16:15:41 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"Alverson",
"George",
""
],
[
"Eulisse",
"Giulio",
""
],
[
"Muzaffar",
"Shahzad",
""
],
[
"Osborne",
"Ianna",
""
],
[
"Tuura",
"Lassi A.",
""
],
[
"Taylor",
"Lucas",
""
]
] |
new_dataset
| 0.993207 |
cs/0306080
|
Natalia M. Ratnikova
|
N. Ratnikova
|
BOA: Framework for Automated Builds
|
3 pages, 2 figures
|
ECONFC0303241:TUJT005,2003
| null | null |
cs.SE
| null |
Managing large-scale software products is a complex software engineering
task. The automation of the software development, release and distribution
process is most beneficial in the large collaborations, where the big number of
developers, multiple platforms and distributed environment are typical factors.
This paper describes Build and Output Analyzer framework and its components
that have been developed in CMS to facilitate software maintenance and improve
software quality. The system allows to generate, control and analyze various
types of automated software builds and tests, such as regular rebuilds of the
development code, software integration for releases and installation of the
existing versions.
|
[
{
"version": "v1",
"created": "Sat, 14 Jun 2003 00:07:06 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"Ratnikova",
"N.",
""
]
] |
new_dataset
| 0.993923 |
cs/0306133
|
Daniel Engh
|
D. Engh, S. Smallen, J. Gieraltowski, L. Fang, R. Gardner, D. Gannon,
R. Bramley
|
GRAPPA: Grid Access Portal for Physics Applications
|
Talk from the 2003 Computing in High Energy and Nuclear Physics
(CHEP03), La Jolla, Ca, USA, March 2003, 5 pages, LaTeX, 3 eps figures. PSN
TUCT006
|
ECONFC0303241:TUCT006,2003
| null | null |
cs.DC
| null |
Grappa is a Grid portal effort designed to provide physicists convenient
access to Grid tools and services. The ATLAS analysis and control framework,
Athena, was used as the target application. Grappa provides basic Grid
functionality such as resource configuration, credential testing, job
submission, job monitoring, results monitoring, and preliminary integration
with the ATLAS replica catalog system, MAGDA. Grappa uses Jython to combine the
ease of scripting with the power of java-based toolkits. This provides a
powerful framework for accessing diverse Grid resources with uniform
interfaces. The initial prototype system was based on the XCAT Science Portal
developed at the Indiana University Extreme Computing Lab and was demonstrated
by running Monte Carlo production on the U.S. ATLAS test-bed. The portal also
communicated with a European resource broker on WorldGrid as part of the joint
iVDGL-DataTAG interoperability project for the IST2002 and SC2002
demonstrations. The current prototype replaces the XCAT Science Portal with an
xbooks jetspeed portlet for managing user scripts.
|
[
{
"version": "v1",
"created": "Thu, 26 Jun 2003 17:09:07 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"Engh",
"D.",
""
],
[
"Smallen",
"S.",
""
],
[
"Gieraltowski",
"J.",
""
],
[
"Fang",
"L.",
""
],
[
"Gardner",
"R.",
""
],
[
"Gannon",
"D.",
""
],
[
"Bramley",
"R.",
""
]
] |
new_dataset
| 0.998241 |
0811.3449
|
William Gilreath
|
William F. Gilreath
|
Binar Shuffle Algorithm: Shuffling Bit by Bit
|
27-pages, watermarked
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Frequently, randomly organized data is needed to avoid an anomalous operation
of other algorithms and computational processes. An analogy is that a deck of
cards is ordered within the pack, but before a game of poker or solitaire the
deck is shuffled to create a random permutation. Shuffling is used to assure
that an aggregate of data elements for a sequence S is randomly arranged, but
avoids an ordered or partially ordered permutation.
Shuffling is the process of arranging data elements into a random
permutation. The sequence S as an aggregation of N data elements, there are N!
possible permutations. For the large number of possible permutations, two of
the possible permutations are for a sorted or ordered placement of data
elements--both an ascending and descending sorted permutation. Shuffling must
avoid inadvertently creating either an ascending or descending permutation.
Shuffling is frequently coupled to another algorithmic function --
pseudo-random number generation. The efficiency and quality of the shuffle is
directly dependent upon the random number generation algorithm utilized. A more
effective and efficient method of shuffling is to use parameterization to
configure the shuffle, and to shuffle into sub-arrays by utilizing the encoding
of the data elements. The binar shuffle algorithm uses the encoding of the data
elements and parameterization to avoid any direct coupling to a random number
generation algorithm, but still remain a linear O(N) shuffle algorithm.
|
[
{
"version": "v1",
"created": "Fri, 21 Nov 2008 01:45:50 GMT"
}
] | 2008-11-24T00:00:00 |
[
[
"Gilreath",
"William F.",
""
]
] |
new_dataset
| 0.995694 |
0811.3620
|
Stefano Zacchiroli
|
Ralf Treinen (PPS), Stefano Zacchiroli (PPS)
|
Solving package dependencies: from EDOS to Mancoosi
| null |
DebConf8, Argentine (2008)
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mancoosi (Managing the Complexity of the Open Source Infrastructure) is an
ongoing research project funded by the European Union for addressing some of
the challenges related to the "upgrade problem" of interdependent software
components of which Debian packages are prototypical examples. Mancoosi is the
natural continuation of the EDOS project which has already contributed tools
for distribution-wide quality assurance in Debian and other GNU/Linux
distributions. The consortium behind the project consists of several European
public and private research institutions as well as some commercial GNU/Linux
distributions from Europe and South America. Debian is represented by a small
group of Debian Developers who are working in the ranks of the involved
universities to drive and integrate back achievements into Debian. This paper
presents relevant results from EDOS in dependency management and gives an
overview of the Mancoosi project and its objectives, with a particular focus on
the prospective benefits for Debian.
|
[
{
"version": "v1",
"created": "Fri, 21 Nov 2008 19:45:50 GMT"
}
] | 2008-11-24T00:00:00 |
[
[
"Treinen",
"Ralf",
"",
"PPS"
],
[
"Zacchiroli",
"Stefano",
"",
"PPS"
]
] |
new_dataset
| 0.999187 |
0811.3621
|
Stefano Zacchiroli
|
Ralf Treinen (PPS), Stefano Zacchiroli (PPS)
|
Description of the CUDF Format
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This document contains several related specifications, together they describe
the document formats related to the solver competition which will be organized
by Mancoosi. In particular, this document describes: - DUDF (Distribution
Upgradeability Description Format), the document format to be used to submit
upgrade problem instances from user machines to a (distribution-specific)
database of upgrade problems; - CUDF (Common Upgradeability Description
Format), the document format used to encode upgrade problems, abstracting over
distribution-specific details. Solvers taking part in the competition will be
fed with input in CUDF format.
|
[
{
"version": "v1",
"created": "Fri, 21 Nov 2008 19:46:46 GMT"
}
] | 2008-11-24T00:00:00 |
[
[
"Treinen",
"Ralf",
"",
"PPS"
],
[
"Zacchiroli",
"Stefano",
"",
"PPS"
]
] |
new_dataset
| 0.999531 |
0811.3328
|
Justislav Bogevolnov V
|
Justislav Bogevolnov
|
chi2TeX Semi-automatic translation from chiwriter to LaTeX
|
8 pages, 8 figures in Russian
| null | null | null |
cs.SE cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Semi-automatic translation of math-filled book from obsolete ChiWriter format
to LaTeX. Is it possible? Idea of criterion whether to use automatic or hand
mode for translation. Illustrations.
|
[
{
"version": "v1",
"created": "Thu, 20 Nov 2008 12:49:12 GMT"
}
] | 2008-11-21T00:00:00 |
[
[
"Bogevolnov",
"Justislav",
""
]
] |
new_dataset
| 0.996865 |
0811.3140
|
J. F. J. Laros
|
Michael Hansen and Jeroen F. J. Laros
|
Desynched channels on IRCnet
|
13 pages, 3 figures, 2 algorithms
| null | null | null |
cs.NI cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we describe what a desynchronised channel on IRC is. We give
procedures on how to create such a channel and how to remove desynchronisation.
We explain which types of desynchronisation there are, what properties
desynchronised channels have, and which properties can be exploited.
|
[
{
"version": "v1",
"created": "Wed, 19 Nov 2008 15:43:50 GMT"
}
] | 2008-11-20T00:00:00 |
[
[
"Hansen",
"Michael",
""
],
[
"Laros",
"Jeroen F. J.",
""
]
] |
new_dataset
| 0.98814 |
0811.0436
|
Kees Middelburg
|
J. A. Bergstra, C. A. Middelburg
|
Instruction sequences for the production of processes
|
23 pages; acknowledgement corrected, reference updated
| null | null |
PRG0814
|
cs.PL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Single-pass instruction sequences under execution are considered to produce
behaviours to be controlled by some execution environment. Threads as
considered in thread algebra model such behaviours: upon each action performed
by a thread, a reply from its execution environment determines how the thread
proceeds. Threads in turn can be looked upon as producing processes as
considered in process algebra. We show that, by apposite choice of basic
instructions, all processes that can only be in a finite number of states can
be produced by single-pass instruction sequences.
|
[
{
"version": "v1",
"created": "Tue, 4 Nov 2008 07:24:12 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Nov 2008 10:08:03 GMT"
}
] | 2008-11-18T00:00:00 |
[
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] |
new_dataset
| 0.982504 |
0811.1878
|
Ivan Varzinczak
|
Ivan Varzinczak
|
Action Theory Evolution
|
64 pages, 19 figures
| null | null | null |
cs.AI cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Like any other logical theory, domain descriptions in reasoning about actions
may evolve, and thus need revision methods to adequately accommodate new
information about the behavior of actions. The present work is about changing
action domain descriptions in propositional dynamic logic. Its contribution is
threefold: first we revisit the semantics of action theory contraction that has
been done in previous work, giving more robust operators that express minimal
change based on a notion of distance between Kripke-models. Second we give
algorithms for syntactical action theory contraction and establish their
correctness w.r.t. our semantics. Finally we state postulates for action theory
contraction and assess the behavior of our operators w.r.t. them. Moreover, we
also address the revision counterpart of action theory change, showing that it
benefits from our semantics for contraction.
|
[
{
"version": "v1",
"created": "Wed, 12 Nov 2008 12:05:55 GMT"
}
] | 2008-11-13T00:00:00 |
[
[
"Varzinczak",
"Ivan",
""
]
] |
new_dataset
| 0.965084 |
0811.1914
|
Stephan Merz
|
Kaustuv C. Chaudhuri (MRI), Damien Doligez (INRIA Rocquencourt),
Leslie Lamport, Stephan Merz (INRIA Lorraine - LORIA)
|
A TLA+ Proof System
| null |
Knowledge Exchange: Automated Provers and Proof Assistants
(KEAPPA) (2008)
| null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe an extension to the TLA+ specification language with constructs
for writing proofs and a proof environment, called the Proof Manager (PM), to
checks those proofs. The language and the PM support the incremental
development and checking of hierarchically structured proofs. The PM translates
a proof into a set of independent proof obligations and calls upon a collection
of back-end provers to verify them. Different provers can be used to verify
different obligations. The currently supported back-ends are the tableau prover
Zenon and Isabelle/TLA+, an axiomatisation of TLA+ in Isabelle/Pure. The proof
obligations for a complete TLA+ proof can also be used to certify the theorem
in Isabelle/TLA+.
|
[
{
"version": "v1",
"created": "Wed, 12 Nov 2008 15:00:22 GMT"
}
] | 2008-11-13T00:00:00 |
[
[
"Chaudhuri",
"Kaustuv C.",
"",
"MRI"
],
[
"Doligez",
"Damien",
"",
"INRIA Rocquencourt"
],
[
"Lamport",
"Leslie",
"",
"INRIA Lorraine - LORIA"
],
[
"Merz",
"Stephan",
"",
"INRIA Lorraine - LORIA"
]
] |
new_dataset
| 0.995714 |
0811.1618
|
Chendong Li
|
Chendong Li
|
Airport Gate Assignment: New Model and Implementation
|
5 pages, 2 figures, 1 table. Accepted by ICOR 2008
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Airport gate assignment is of great importance in airport operations. In this
paper, we study the Airport Gate Assignment Problem (AGAP), propose a new model
and implement the model with Optimization Programming language (OPL). With the
objective to minimize the number of conflicts of any two adjacent aircrafts
assigned to the same gate, we build a mathematical model with logical
constraints and the binary constraints, which can provide an efficient
evaluation criterion for the Airlines to estimate the current gate assignment.
To illustrate the feasibility of the model we construct experiments with the
data obtained from Continental Airlines, Houston Gorge Bush Intercontinental
Airport IAH, which indicate that our model is both energetic and effective.
Moreover, we interpret experimental results, which further demonstrate that our
proposed model can provide a powerful tool for airline companies to estimate
the efficiency of their current work of gate assignment.
|
[
{
"version": "v1",
"created": "Tue, 11 Nov 2008 02:33:30 GMT"
}
] | 2008-11-12T00:00:00 |
[
[
"Li",
"Chendong",
""
]
] |
new_dataset
| 0.998201 |
0712.1658
|
Kees Middelburg
|
J. A. Bergstra, C. A. Middelburg
|
Program algebra with a jump-shift instruction
|
19 pages
|
Journal of Applied Logic, 6(4):553--563, 2008
|
10.1016/j.jal.2008.07.001
|
PRG0711
|
cs.PL
| null |
We study sequential programs that are instruction sequences with jump-shift
instructions in the setting of PGA (ProGram Algebra). Jump-shift instructions
preceding a jump instruction increase the position to jump to. The jump-shift
instruction is not found in programming practice. Its merit is that the
expressive power of PGA extended with the jump-shift instruction, is not
reduced if the reach of jump instructions is bounded. This is used to show that
there exists a finite-state execution mechanism that by making use of a counter
can produce each finite-state thread from some program that is a finite or
periodic infinite sequence of instructions from a finite set.
|
[
{
"version": "v1",
"created": "Tue, 11 Dec 2007 08:53:49 GMT"
}
] | 2008-11-11T00:00:00 |
[
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] |
new_dataset
| 0.993509 |
0802.3284
|
Hadrien M\'elot
|
V\'eronique Bruy\`ere, and Hadrien M\'elot
|
Tur\'an Graphs, Stability Number, and Fibonacci Index
|
11 pages, 3 figures
| null |
10.1007/978-3-540-85097-7_12
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Fibonacci index of a graph is the number of its stable sets. This
parameter is widely studied and has applications in chemical graph theory. In
this paper, we establish tight upper bounds for the Fibonacci index in terms of
the stability number and the order of general graphs and connected graphs.
Tur\'an graphs frequently appear in extremal graph theory. We show that Tur\'an
graphs and a connected variant of them are also extremal for these particular
problems.
|
[
{
"version": "v1",
"created": "Fri, 22 Feb 2008 11:22:50 GMT"
}
] | 2008-11-10T00:00:00 |
[
[
"Bruyère",
"Véronique",
""
],
[
"Mélot",
"Hadrien",
""
]
] |
new_dataset
| 0.995083 |
0811.0952
|
Mikko Malinen
|
Mikko Malinen
|
Raptor Codes and Cryptographic Issues
|
2 pages. Submitted to the IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper two cryptographic methods are introduced. In the first method
the presence of a certain size subgroup of persons can be checked for an action
to take place. For this we use fragments of Raptor codes delivered to the group
members. In the other method a selection of a subset of objects can be made
secret. Also, it can be proven afterwards, what the original selection was.
|
[
{
"version": "v1",
"created": "Thu, 6 Nov 2008 14:11:16 GMT"
}
] | 2008-11-07T00:00:00 |
[
[
"Malinen",
"Mikko",
""
]
] |
new_dataset
| 0.989774 |
0811.0964
|
Andreas Blass
|
Andreas Blass (University of Michigan) and Yuri Gurevich (Microsoft
Research)
|
One useful logic that defines its own truth
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Existential fixed point logic (EFPL) is a natural fit for some applications,
and the purpose of this talk is to attract attention to EFPL. The logic is also
interesting in its own right as it has attractive properties. One of those
properties is rather unusual: truth of formulas can be defined (given
appropriate syntactic apparatus) in the logic. We mentioned that property
elsewhere, and we use this opportunity to provide the proof.
|
[
{
"version": "v1",
"created": "Thu, 6 Nov 2008 15:09:43 GMT"
}
] | 2008-11-07T00:00:00 |
[
[
"Blass",
"Andreas",
"",
"University of Michigan"
],
[
"Gurevich",
"Yuri",
"",
"Microsoft\n Research"
]
] |
new_dataset
| 0.985571 |
0706.1002
|
Alexander Wolff
|
Xavier Goaoc, Jan Kratochvil, Yoshio Okamoto, Chan-Su Shin, Alexander
Wolff
|
Moving Vertices to Make Drawings Plane
|
This paper has been merged with http://arxiv.org/abs/0709.0170
| null | null | null |
cs.CG cs.CC cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A straight-line drawing $\delta$ of a planar graph $G$ need not be plane, but
can be made so by moving some of the vertices. Let shift$(G,\delta)$ denote the
minimum number of vertices that need to be moved to turn $\delta$ into a plane
drawing of $G$. We show that shift$(G,\delta)$ is NP-hard to compute and to
approximate, and we give explicit bounds on shift$(G,\delta)$ when $G$ is a
tree or a general planar graph. Our hardness results extend to
1BendPointSetEmbeddability, a well-known graph-drawing problem.
|
[
{
"version": "v1",
"created": "Thu, 7 Jun 2007 13:57:52 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Nov 2007 13:14:51 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Nov 2008 21:57:09 GMT"
}
] | 2008-11-06T00:00:00 |
[
[
"Goaoc",
"Xavier",
""
],
[
"Kratochvil",
"Jan",
""
],
[
"Okamoto",
"Yoshio",
""
],
[
"Shin",
"Chan-Su",
""
],
[
"Wolff",
"Alexander",
""
]
] |
new_dataset
| 0.999457 |
0809.1409
|
Anshuman Sinha
|
Anshuman Sinha, Haritha Nandela, Vijaya Balakrishna
|
Domain Specific Software Architecture for Design Center Automation
|
158 pages
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Domain specific software architecture aims at software reuse through
construction of domain architecture reference model. The constructed reference
model presents a set of individual components and their interaction points.
When starting on a new large software project, the design engineer starts with
pre-constructed model, which can be easily browsed and picks up opportunities
of use in the new solution design. This report discusses application of domain
reference design methods by deriving domain specific reference architecture for
a product ordering system in a design center. The product in this case is
instock and special order blinds from different manufacturers in a large supply
store. The development of mature domain specific reference software
architecture for this domain is not the objective of this report. However, this
report would like to capture the method used in one such process and that is
the primary concern of this report. This report lists subjective details of
such a process applied to the domain of ordering custom and instock blinds from
a large home construction and goods supply store. This report also describes
the detailed process of derivation of knowledge models, unified knowledge
models and the reference architecture for this domain. However, this domain
model is only partially complete which may not be used for any real
applications. This report is a result of a course project undertaken while
studying this methodology.
|
[
{
"version": "v1",
"created": "Mon, 8 Sep 2008 19:07:17 GMT"
}
] | 2008-11-06T00:00:00 |
[
[
"Sinha",
"Anshuman",
""
],
[
"Nandela",
"Haritha",
""
],
[
"Balakrishna",
"Vijaya",
""
]
] |
new_dataset
| 0.992158 |
0811.0719
|
Patricia Gautier
|
Xavier Polanco (INIST), Ivana Roche (INIST), Dominique Besagni (INIST)
|
Web Usage Analysis: New Science Indicators and Co-usage
| null |
S\'eminaire VSST 2006, Lille : France (2006)
| null | null |
cs.IR stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new type of statistical analysis of the science and technical information
(STI) in the Web context is produced. We propose a set of indicators about Web
users, visualized bibliographic records, and e-commercial transactions. In
addition, we introduce two Web usage factors. Finally, we give an overview of
the co-usage analysis. For these tasks, we introduce a computer based system,
called Miri@d, which produces descriptive statistical information about the Web
users' searching behaviour, and what is effectively used from a free access
digital bibliographical database. The system is conceived as a server of
statistical data which are carried out beforehand, and as an interactive server
for online statistical work. The results will be made available to analysts,
who can use this descriptive statistical information as raw data for their
indicator design tasks, and as input for multivariate data analysis, clustering
analysis, and mapping. Managers also can exploit the results in order to
improve management and decision-making.
|
[
{
"version": "v1",
"created": "Wed, 5 Nov 2008 13:00:52 GMT"
}
] | 2008-11-06T00:00:00 |
[
[
"Polanco",
"Xavier",
"",
"INIST"
],
[
"Roche",
"Ivana",
"",
"INIST"
],
[
"Besagni",
"Dominique",
"",
"INIST"
]
] |
new_dataset
| 0.965791 |
0810.5647
|
Gilles Villard
|
Gilles Villard (LIP)
|
Kaltofen's division-free determinant algorithm differentiated for matrix
adjoint computation
| null | null | null | null |
cs.SC cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Kaltofen has proposed a new approach in 1992 for computing matrix
determinants without divisions. The algorithm is based on a baby steps/giant
steps construction of Krylov subspaces, and computes the determinant as the
constant term of a characteristic polynomial. For matrices over an abstract
ring, by the results of Baur and Strassen, the determinant algorithm, actually
a straight-line program, leads to an algorithm with the same complexity for
computing the adjoint of a matrix. However, the latter adjoint algorithm is
obtained by the reverse mode of automatic differentiation, hence somehow is not
"explicit". We present an alternative (still closely related) algorithm for the
adjoint thatcan be implemented directly, we mean without resorting to an
automatic transformation. The algorithm is deduced by applying program
differentiation techniques "by hand" to Kaltofen's method, and is completely
decribed. As subproblem, we study the differentiation of programs that compute
minimum polynomials of lineraly generated sequences, and we use a lazy
polynomial evaluation mechanism for reducing the cost of Strassen's avoidance
of divisions in our case.
|
[
{
"version": "v1",
"created": "Fri, 31 Oct 2008 09:43:48 GMT"
}
] | 2008-11-03T00:00:00 |
[
[
"Villard",
"Gilles",
"",
"LIP"
]
] |
new_dataset
| 0.991336 |
0810.5763
|
Pablo Fierens
|
Pablo Ignacio Fierens
|
Number of wireless sensors needed to detect a wildfire
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The lack of extensive research in the application of inexpensive wireless
sensor nodes for the early detection of wildfires motivated us to investigate
the cost of such a network. As a first step, in this paper we present several
results which relate the time to detection and the burned area to the number of
sensor nodes in the region which is protected. We prove that the probability
distribution of the burned area at the moment of detection is approximately
exponential, given that some hypotheses hold: the positions of the sensor nodes
are independent random variables uniformly distributed and the number of sensor
nodes is large. This conclusion depends neither on the number of ignition
points nor on the propagation model of the fire.
|
[
{
"version": "v1",
"created": "Fri, 31 Oct 2008 19:11:42 GMT"
}
] | 2008-11-03T00:00:00 |
[
[
"Fierens",
"Pablo Ignacio",
""
]
] |
new_dataset
| 0.951885 |
0810.4993
|
Josep Rif\`a
|
J. Rifa, V. A. Zinoviev
|
New completely regular q-ary codes based on Kronecker products
|
Submitted to IT-IEEE. Theorem 1 in Section III was presented at the
2nd International Castle Meeting on Coding Theory and Applications (2ICMCTA),
Medina del Campo, Spain, September 2008.}}
| null | null | null |
cs.IT cs.DM math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For any integer $\rho \geq 1$ and for any prime power q, the explicit
construction of a infinite family of completely regular (and completely
transitive) q-ary codes with d=3 and with covering radius $\rho$ is given. The
intersection array is also computed. Under the same conditions, the explicit
construction of an infinite family of q-ary uniformly packed codes (in the wide
sense) with covering radius $\rho$, which are not completely regular, is also
given. In both constructions the Kronecker product is the basic tool that has
been used.
|
[
{
"version": "v1",
"created": "Tue, 28 Oct 2008 09:29:28 GMT"
}
] | 2008-10-29T00:00:00 |
[
[
"Rifa",
"J.",
""
],
[
"Zinoviev",
"V. A.",
""
]
] |
new_dataset
| 0.999677 |
0810.4451
|
Herv\'e Paulino
|
Herve Paulino and Luis Lopes
|
The Mob core language and abstract machine (rev 0.2)
|
33 pages
| null | null | null |
cs.PL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most current mobile agent systems are based on programming languages whose
semantics are difficult to prove correct as they lack an adequate underlying
formal theory. In recent years, the development of the theory of concurrent
systems, namely of process calculi, has allowed for the first time the modeling
of mobile agent systems.Languages directly based on process calculi are,
however, very low-level and it is desirable to provide the programmer with
higher level abstractions, while keeping the semantics of the base calculus.
In this technical report we present the syntax and the semantics of a
scripting language for programming mobile agents called Mob. We describe the
language's syntax and semantics. Mob is service-oriented, meaning that agents
act both as servers and as clients of services and that this coupling is done
dynamically at run-time. The language is implemented on top of a process
calculus which allows us to prove that the framework is sound by encoding its
semantics into the underlying calculus. This provides a form of language
security not available to other mobile agent languages developed using a more
ah-doc approach.
|
[
{
"version": "v1",
"created": "Fri, 24 Oct 2008 15:02:09 GMT"
}
] | 2008-10-27T00:00:00 |
[
[
"Paulino",
"Herve",
""
],
[
"Lopes",
"Luis",
""
]
] |
new_dataset
| 0.999095 |
0810.4249
|
Marco Kuhlmann
|
Marco Kuhlmann
|
Ogden's Lemma for Regular Tree Languages
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We motivate and prove a strong pumping lemma for regular tree languages. The
new lemma can be seen as the natural correspondent of Ogden's lemma for
context-free string languages.
|
[
{
"version": "v1",
"created": "Thu, 23 Oct 2008 19:43:26 GMT"
}
] | 2008-10-24T00:00:00 |
[
[
"Kuhlmann",
"Marco",
""
]
] |
new_dataset
| 0.999588 |
0806.4627
|
Thomas Hornung
|
Michael Schmidt, Thomas Hornung, Georg Lausen, Christoph Pinkel
|
SP2Bench: A SPARQL Performance Benchmark
|
Conference paper to appear in Proc. ICDE'09
| null | null | null |
cs.DB cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, the SPARQL query language for RDF has reached the W3C
recommendation status. In response to this emerging standard, the database
community is currently exploring efficient storage techniques for RDF data and
evaluation strategies for SPARQL queries. A meaningful analysis and comparison
of these approaches necessitates a comprehensive and universal benchmark
platform. To this end, we have developed SP^2Bench, a publicly available,
language-specific SPARQL performance benchmark. SP^2Bench is settled in the
DBLP scenario and comprises both a data generator for creating arbitrarily
large DBLP-like documents and a set of carefully designed benchmark queries.
The generated documents mirror key characteristics and social-world
distributions encountered in the original DBLP data set, while the queries
implement meaningful requests on top of this data, covering a variety of SPARQL
operator constellations and RDF access patterns. As a proof of concept, we
apply SP^2Bench to existing engines and discuss their strengths and weaknesses
that follow immediately from the benchmark results.
|
[
{
"version": "v1",
"created": "Mon, 30 Jun 2008 15:31:26 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Oct 2008 14:44:17 GMT"
}
] | 2008-10-21T00:00:00 |
[
[
"Schmidt",
"Michael",
""
],
[
"Hornung",
"Thomas",
""
],
[
"Lausen",
"Georg",
""
],
[
"Pinkel",
"Christoph",
""
]
] |
new_dataset
| 0.999484 |
0810.3332
|
Gheorghe Stefanescu
|
Cezara Dragoi and Gheorghe Stefanescu
|
A sound spatio-temporal Hoare logic for the verification of structured
interactive programs with registers and voices
|
21 pages, 8 figures, Invited submission for WADT'08 LNCS Proceedings
| null | null | null |
cs.PL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Interactive systems with registers and voices (shortly, "rv-systems") are a
model for interactive computing obtained closing register machines with respect
to a space-time duality transformation ("voices" are the time-dual counterparts
of "registers"). In the same vain, AGAPIA v0.1, a structured programming
language for rv-systems, is the space-time dual closure of classical while
programs (over a specific type of data). Typical AGAPIA programs describe open
processes located at various sites and having their temporal windows of
adequate reaction to the environment. The language naturally supports process
migration, structured interaction, and deployment of components on
heterogeneous machines.
In this paper a sound Hoare-like spatio-temporal logic for the verification
of AGAPIA v0.1 programs is introduced. As a case study, a formal verification
proof of a popular distributed termination detection protocol is presented.
|
[
{
"version": "v1",
"created": "Sun, 19 Oct 2008 00:05:20 GMT"
}
] | 2008-10-21T00:00:00 |
[
[
"Dragoi",
"Cezara",
""
],
[
"Stefanescu",
"Gheorghe",
""
]
] |
new_dataset
| 0.997105 |
0810.3468
|
Muthiah Annamalai
|
Muthiah Annamalai, Leela Velusamy
|
A Call-Graph Profiler for GNU Octave
|
6 pages, 2 figures, 1 table. Fix typos
| null | null | null |
cs.PF cs.PL cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We report the design and implementation of a call-graph profiler for GNU
Octave, a numerical computing platform. GNU Octave simplifies matrix
computation for use in modeling or simulation. Our work provides a call-graph
profiler, which is an improvement on the flat profiler. We elaborate design
constraints of building a profiler for numerical computation, and benchmark the
profiler by comparing it to the rudimentary timer start-stop (tic-toc)
measurements, for a similar set of programs. The profiler code provides clean
interfaces to internals of GNU Octave, for other (newer) profiling tools on GNU
Octave.
|
[
{
"version": "v1",
"created": "Mon, 20 Oct 2008 08:29:21 GMT"
}
] | 2008-10-21T00:00:00 |
[
[
"Annamalai",
"Muthiah",
""
],
[
"Velusamy",
"Leela",
""
]
] |
new_dataset
| 0.99921 |
0810.3564
|
Ligong Wang
|
Amos Lapidoth, Jeffrey H. Shapiro, Vinodh Venkatesan, Ligong Wang
|
The Poisson Channel at Low Input Powers
|
To be presented at IEEEI 2008, December 3-5 2008, Eilat, Israel
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The asymptotic capacity at low input powers of an average-power limited or an
average- and peak-power limited discrete-time Poisson channel is considered.
For a Poisson channel whose dark current is zero or decays to zero linearly
with its average input power $E$, capacity scales like $E\log\frac{1}{E}$ for
small $E$. For a Poisson channel whose dark current is a nonzero constant,
capacity scales, to within a constant, like $E\log\log\frac{1}{E}$ for small
$E$.
|
[
{
"version": "v1",
"created": "Mon, 20 Oct 2008 14:08:18 GMT"
}
] | 2008-10-21T00:00:00 |
[
[
"Lapidoth",
"Amos",
""
],
[
"Shapiro",
"Jeffrey H.",
""
],
[
"Venkatesan",
"Vinodh",
""
],
[
"Wang",
"Ligong",
""
]
] |
new_dataset
| 0.981548 |
0810.3641
|
Gerard Henry Edmond Duchamp
|
G\'erard Henry Edmond Duchamp (LIPN), Silvia Goodenough (LIPN), Karol
A. Penson (LPTMC)
|
Rational Hadamard products via Quantum Diagonal Operators
| null | null | null | null |
cs.SC math-ph math.CO math.MP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We use the remark that, through Bargmann-Fock representation, diagonal
operators of the Heisenberg-Weyl algebra are scalars for the Hadamard product
to give some properties (like the stability of periodic fonctions) of the
Hadamard product by a rational fraction. In particular, we provide through this
way explicit formulas for the multiplication table of the Hadamard product in
the algebra of rational functions in $\C[[z]]$.
|
[
{
"version": "v1",
"created": "Mon, 20 Oct 2008 19:16:29 GMT"
}
] | 2008-10-21T00:00:00 |
[
[
"Duchamp",
"Gérard Henry Edmond",
"",
"LIPN"
],
[
"Goodenough",
"Silvia",
"",
"LIPN"
],
[
"Penson",
"Karol A.",
"",
"LPTMC"
]
] |
new_dataset
| 0.999865 |
0810.3203
|
David Harvey
|
David Harvey
|
A cache-friendly truncated FFT
|
14 pages, 11 figures, uses algorithm2e package
| null | null | null |
cs.SC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe a cache-friendly version of van der Hoeven's truncated FFT and
inverse truncated FFT, focusing on the case of `large' coefficients, such as
those arising in the Schonhage--Strassen algorithm for multiplication in Z[x].
We describe two implementations and examine their performance.
|
[
{
"version": "v1",
"created": "Fri, 17 Oct 2008 17:36:27 GMT"
}
] | 2008-10-20T00:00:00 |
[
[
"Harvey",
"David",
""
]
] |
new_dataset
| 0.966086 |
0810.2953
|
Onur Ozan Koyluoglu
|
Onur Ozan Koyluoglu and Hesham El Gamal
|
On Power Control and Frequency Reuse in the Two User Cognitive Channel
|
Submitted to IEEE Transactions on Wireless Communications (revised on
October 16, 2008)
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers the generalized cognitive radio channel where the
secondary user is allowed to reuse the frequency during both the idle and
active periods of the primary user, as long as the primary rate remains the
same. In this setting, the optimal power allocation policy with single-input
single-output (SISO) primary and secondary channels is explored. Interestingly,
the offered gain resulting from the frequency reuse during the active periods
of the spectrum is shown to disappear in both the low and high signal-to-noise
ratio (SNR) regimes. We then argue that this drawback in the high SNR region
can be avoided by equipping both the primary and secondary transmitters with
multiple antennas. Finally, the scenario consisting of SISO primary and
multi-input multi-output (MIMO) secondary channels is investigated. Here, a
simple Zero-Forcing approach is shown to significantly outperform the
celebrated Decoding-Forwarding-Dirty Paper Coding strategy (especially in the
high SNR regime).
|
[
{
"version": "v1",
"created": "Thu, 16 Oct 2008 16:06:01 GMT"
}
] | 2008-10-17T00:00:00 |
[
[
"Koyluoglu",
"Onur Ozan",
""
],
[
"Gamal",
"Hesham El",
""
]
] |
new_dataset
| 0.99485 |
cs/0604088
|
Santanu Maiti Kumar
|
Santanu K. Maiti
|
How to Run Mathematica Batch-files in Background ?
|
7 pages, 1 figure
| null | null | null |
cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mathematica is a versatile equipment for doing numeric and symbolic
computations and it has wide spread applications in all branches of science.
Mathematica has a complete consistency to design it at every stage that gives
it multilevel capability and helps advanced usage evolve naturally. Mathematica
functions work for any precision of number and it can be easily computed with
symbols, represented graphically to get the best answer. Mathematica is a
robust software development that can be used in any popular operating systems
and it can be communicated with external programs by using proper mathlink
commands.
Sometimes it is quite desirable to run jobs in background of a computer which
can take considerable amount of time to finish, and this allows us to do work
on other tasks, while keeping the jobs running. Most of us are very familiar to
run jobs in background for the programs written in the languages like C, C++,
F77, F90, F95, etc. But the way of running jobs, written in a mathematica
notebook, in background is quite different from the conventional method. In
this article, we explore how to create a mathematica batch-file from a
mathematica notebook and run it in background. Here we concentrate our study
only for the Unix version, but one can run mathematica programs in background
for the Windows version as well by using proper mathematica batch-file.
|
[
{
"version": "v1",
"created": "Sun, 23 Apr 2006 09:39:02 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Oct 2008 10:54:54 GMT"
},
{
"version": "v3",
"created": "Fri, 17 Oct 2008 06:04:58 GMT"
}
] | 2008-10-17T00:00:00 |
[
[
"Maiti",
"Santanu K.",
""
]
] |
new_dataset
| 0.987561 |
0810.2666
|
Damien Chablat
|
Flavien Paccot (LASMEA), Philippe Lemoine (IRCCyN), Nicolas Andreff
(LASMEA), Damien Chablat (IRCCyN), Philippe Martinet (LASMEA)
|
A Vision-based Computed Torque Control for Parallel Kinematic Machines
| null |
IEEE International Conference on Robotics and Automation, Pasadena
: \'Etats-Unis d'Am\'erique (2008)
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a novel approach for parallel kinematic machine control
relying on a fast exteroceptive measure is implemented and validated on the
Orthoglide robot. This approach begins with rewriting the robot models as a
function of the only end-effector pose. It is shown that such an operation
reduces the model complexity. Then, this approach uses a classical Cartesian
space computed torque control with a fast exteroceptive measure, reducing the
control schemes complexity. Simulation results are given to show the expected
performance improvements and experiments prove the practical feasibility of the
approach.
|
[
{
"version": "v1",
"created": "Wed, 15 Oct 2008 11:14:15 GMT"
}
] | 2008-10-16T00:00:00 |
[
[
"Paccot",
"Flavien",
"",
"LASMEA"
],
[
"Lemoine",
"Philippe",
"",
"IRCCyN"
],
[
"Andreff",
"Nicolas",
"",
"LASMEA"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Martinet",
"Philippe",
"",
"LASMEA"
]
] |
new_dataset
| 0.982398 |
0810.2697
|
Anita Das
|
L. Sunil Chandran, Anita Das, Naveen Sivadasan
|
On the cubicity of bipartite graphs
|
7 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
{\it A unit cube in $k$-dimension (or a $k$-cube) is defined as the cartesian
product $R_1 \times R_2 \times ... \times R_k$, where each $R_i$ is a closed
interval on the real line of the form $[a_i, a_i+1]$. The {\it cubicity} of
$G$, denoted as $cub(G)$, is the minimum $k$ such that $G$ is the intersection
graph of a collection of $k$-cubes. Many NP-complete graph problems can be
solved efficiently or have good approximation ratios in graphs of low cubicity.
In most of these cases the first step is to get a low dimensional cube
representation of the given graph.
It is known that for a graph $G$, $cub(G) \leq \lfloor\frac{2n}{3}\rfloor$.
Recently it has been shown that for a graph $G$, $cub(G) \leq 4(\Delta + 1)\ln
n$, where $n$ and $\Delta$ are the number of vertices and maximum degree of
$G$, respectively. In this paper, we show that for a bipartite graph $G = (A
\cup B, E)$ with $|A| = n_1$, $|B| = n_2$, $n_1 \leq n_2$, and $\Delta' =
\min\{\Delta_A, \Delta_B\}$, where $\Delta_A = {max}_{a \in A}d(a)$ and
$\Delta_B = {max}_{b \in B}d(b)$, $d(a)$ and $d(b)$ being the degree of $a$ and
$b$ in $G$ respectively, $cub(G) \leq 2(\Delta'+2) \lceil \ln n_2 \rceil$. We
also give an efficient randomized algorithm to construct the cube
representation of $G$ in $3(\Delta'+2)\lceil \ln n_2 \rceil$ dimensions. The
reader may note that in general $\Delta'$ can be much smaller than $\Delta$.}
|
[
{
"version": "v1",
"created": "Wed, 15 Oct 2008 13:44:56 GMT"
}
] | 2008-10-16T00:00:00 |
[
[
"Chandran",
"L. Sunil",
""
],
[
"Das",
"Anita",
""
],
[
"Sivadasan",
"Naveen",
""
]
] |
new_dataset
| 0.988323 |
0810.1858
|
Anne Canteaut
|
Come Berbain (FT R&D), Olivier Billet (FT R&D), Anne Canteaut (INRIA
Rocquencourt), Nicolas Courtois, Henri Gilbert (FT R&D), Louis Goubin, Aline
Gouget, Louis Granboulan, Cedric Lauradoux (INRIA Rocquencourt), Marine
Minier (INRIA Rocquencourt), Thomas Pornin, Herve Sibert
|
SOSEMANUK: a fast software-oriented stream cipher
| null |
New Stream Cipher Designs - The eSTREAM finalists (2008) 98-118
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding
to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is
variable between 128 and 256 bits. It ac- commodates a 128-bit initial value.
Any key length is claimed to achieve 128-bit security. The Sosemanuk cipher
uses both some basic design principles from the stream cipher SNOW 2.0 and some
transformations derived from the block cipher SERPENT. Sosemanuk aims at
improv- ing SNOW 2.0 both from the security and from the efficiency points of
view. Most notably, it uses a faster IV-setup procedure. It also requires a
reduced amount of static data, yielding better performance on several
architectures.
|
[
{
"version": "v1",
"created": "Fri, 10 Oct 2008 11:53:53 GMT"
}
] | 2008-10-13T00:00:00 |
[
[
"Berbain",
"Come",
"",
"FT R&D"
],
[
"Billet",
"Olivier",
"",
"FT R&D"
],
[
"Canteaut",
"Anne",
"",
"INRIA\n Rocquencourt"
],
[
"Courtois",
"Nicolas",
"",
"FT R&D"
],
[
"Gilbert",
"Henri",
"",
"FT R&D"
],
[
"Goubin",
"Louis",
"",
"INRIA Rocquencourt"
],
[
"Gouget",
"Aline",
"",
"INRIA Rocquencourt"
],
[
"Granboulan",
"Louis",
"",
"INRIA Rocquencourt"
],
[
"Lauradoux",
"Cedric",
"",
"INRIA Rocquencourt"
],
[
"Minier",
"Marine",
"",
"INRIA Rocquencourt"
],
[
"Pornin",
"Thomas",
""
],
[
"Sibert",
"Herve",
""
]
] |
new_dataset
| 0.993535 |
0810.1316
|
Victor Yodaiken
|
Victor Yodaiken
|
The meaning of concurrent programs
|
Technical report on using recursive functions for the low level
semantics of concurrent systems
| null | null | null |
cs.DM cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The semantics of assignment and mutual exclusion in concurrent and
multi-core/multi-processor systems is presented with attention to low level
architectural features in an attempt to make the presentation realistic.
Recursive functions on event sequences are used to define state dependent
functions and variables in ordinary (non-formal-method) algebra.
|
[
{
"version": "v1",
"created": "Tue, 7 Oct 2008 23:03:29 GMT"
}
] | 2008-10-09T00:00:00 |
[
[
"Yodaiken",
"Victor",
""
]
] |
new_dataset
| 0.987787 |
0810.1513
|
Ijaz Haider Naqvi
|
Ijaz Haider Naqvi (IETR), Tanguy P\'erennou (LAAS)
|
A DCCP Congestion Control Mechanism for Wired- cum-Wireless Environments
| null |
IEEE Wireless Communications and Networking Conference, Hong-Kong
(2007)
|
10.1109/WCNC.2007.715
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Existing transport protocols, be it TCP, SCTP or DCCP, do not provide an
efficient congestion control mechanism for heterogeneous wired-cum-wireless
networks. Solutions involving implicit loss discrimination schemes have been
proposed but were never implemented. Appropriate mechanisms can dramatically
improve bandwidth usage over the Internet, especially for multimedia transport
based on partial reliability. In this paper we have implemented and evaluated a
congestion control mechanism that implicitly discriminates congestion and
wireless losses in the datagram congestion control protocol (DCCP) congestion
control identification (CCID) framework. The new CCID was implemented as a NS-2
module. Comparisons were made with the TCP-like CCID and showed that the
bandwidth utilization was improved by more than 30% and up to 50% in
significant setups.
|
[
{
"version": "v1",
"created": "Wed, 8 Oct 2008 19:46:24 GMT"
}
] | 2008-10-09T00:00:00 |
[
[
"Naqvi",
"Ijaz Haider",
"",
"IETR"
],
[
"Pérennou",
"Tanguy",
"",
"LAAS"
]
] |
new_dataset
| 0.99861 |
cs/0701194
|
Andrij Rovenchak
|
Solomija Buk and Andrij Rovenchak
|
Menzerath-Altmann Law for Syntactic Structures in Ukrainian
|
8 pages; submitted to the Proceedings of the International scientific
conference on Modern Methods in Linguistics held in honour of the anniversary
of Prof. Gabriel L. Altmann (October 23rd and 24th, 2006, Budmerice Castle,
Slovakia)
|
Glottotheory. Vol. 1, No. 1, pp 10-17 (2008)
| null | null |
cs.CL
| null |
In the paper, the definition of clause suitable for an automated processing
of a Ukrainian text is proposed. The Menzerath-Altmann law is verified on the
sentence level and the parameters for the dependences of the clause length
counted in words and syllables on the sentence length counted in clauses are
calculated for "Perekhresni Stezhky" ("The Cross-Paths"), a novel by Ivan
Franko.
|
[
{
"version": "v1",
"created": "Tue, 30 Jan 2007 16:58:07 GMT"
}
] | 2008-10-09T00:00:00 |
[
[
"Buk",
"Solomija",
""
],
[
"Rovenchak",
"Andrij",
""
]
] |
new_dataset
| 0.998378 |
0810.1199
|
Pascal Vaillant
|
Pascal Vaillant
|
Une grammaire formelle du cr\'eole martiniquais pour la g\'en\'eration
automatique
|
In French. 10 pages, 4 figures, LaTeX 2e using EPSF and custom
package Taln2003.sty (JC/PZ, ATALA). Proceedings of the 10th annual
French-speaking conference on Natural Language Processing: `Traitement
Automatique des Langues Naturelles' (TALN 2003), Batz-sur-mer, France, 10-14
June 2003
|
Actes de la 10eme conference annuelle sur le Traitement
Automatique des Langues Naturelles (TALN 2003), p. 255-264. Batz-sur-mer,
France, 10-14 juin 2003
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this article, some first elements of a computational modelling of the
grammar of the Martiniquese French Creole dialect are presented. The sources of
inspiration for the modelling is the functional description given by Damoiseau
(1984), and Pinalie's & Bernabe's (1999) grammar manual. Based on earlier works
in text generation (Vaillant, 1997), a unification grammar formalism, namely
Tree Adjoining Grammars (TAG), and a modelling of lexical functional categories
based on syntactic and semantic properties, are used to implement a grammar of
Martiniquese Creole which is used in a prototype of text generation system. One
of the main applications of the system could be its use as a tool software
supporting the task of learning Creole as a second language. -- Nous
pr\'esenterons dans cette communication les premiers travaux de mod\'elisation
informatique d'une grammaire de la langue cr\'eole martiniquaise, en nous
inspirant des descriptions fonctionnelles de Damoiseau (1984) ainsi que du
manuel de Pinalie & Bernab\'e (1999). Prenant appui sur des travaux
ant\'erieurs en g\'en\'eration de texte (Vaillant, 1997), nous utilisons un
formalisme de grammaires d'unification, les grammaires d'adjonction d'arbres
(TAG d'apr\`es l'acronyme anglais), ainsi qu'une mod\'elisation de cat\'egories
lexicales fonctionnelles \`a base syntaxico-s\'emantique, pour mettre en oeuvre
une grammaire du cr\'eole martiniquais utilisable dans une maquette de
syst\`eme de g\'en\'eration automatique. L'un des int\'er\^ets principaux de ce
syst\`eme pourrait \^etre son utilisation comme logiciel outil pour l'aide \`a
l'apprentissage du cr\'eole en tant que langue seconde.
|
[
{
"version": "v1",
"created": "Tue, 7 Oct 2008 14:40:19 GMT"
}
] | 2008-10-08T00:00:00 |
[
[
"Vaillant",
"Pascal",
""
]
] |
new_dataset
| 0.998898 |
0810.0763
|
Pedram Pad
|
Pedram Pad, Mahdi Soltanolkotabi, Saeed Hadikhanlou, Arash Enayati,
and Farokh Marvasti
|
Errorless Codes for Over-loaded CDMA with Active User Detection
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce a new class of codes for over-loaded synchronous
wireless CDMA systems which increases the number of users for a fixed number of
chips without introducing any errors. In addition these codes support active
user detection. We derive an upper bound on the number of users with a fixed
spreading factor. Also we propose an ML decoder for a subclass of these codes
that is computationally implementable. Although for our simulations we consider
a scenario that is worse than what occurs in practice, simulation results
indicate that this coding/decoding scheme is robust against additive noise. As
an example, for 64 chips and 88 users we propose a coding/decoding scheme that
can obtain an arbitrary small probability of error which is computationally
feasible and can detect active users. Furthermore, we prove that for this to be
possible the number of users cannot be beyond 230.
|
[
{
"version": "v1",
"created": "Sat, 4 Oct 2008 12:24:39 GMT"
}
] | 2008-10-07T00:00:00 |
[
[
"Pad",
"Pedram",
""
],
[
"Soltanolkotabi",
"Mahdi",
""
],
[
"Hadikhanlou",
"Saeed",
""
],
[
"Enayati",
"Arash",
""
],
[
"Marvasti",
"Farokh",
""
]
] |
new_dataset
| 0.987402 |
0709.0259
|
Chien-Hwa Hwang
|
Chien-Hwa Hwang and Shih-Chang Chen
|
Spectrum Sensing in Wideband OFDM Cognitive Radios
|
30 pages, 7 figures, submitted to IEEE Transactions on Signal
Processing, Aug. 2007
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, detection of the primary user (PU) signal in an orthogonal
frequency division multiplexing (OFDM) based cognitive radio (CR) system is
addressed. According to the prior knowledge of the PU signal known to the
detector, three detection algorithms based on the Neyman-Pearson philosophy are
proposed. In the first case, a Gaussian PU signal with completely known
probability density function (PDF) except for its received power is considered.
The frequency band that the PU signal resides is also assumed known. Detection
is performed individually at each OFDM sub-carrier possibly interfered by the
PU signal, and the results are then combined to form a final decision. In the
second case, the sub-carriers that the PU signal resides are known.
Observations from all possibly interfered sub-carriers are considered jointly
to exploit the fact that the presence of a PU signal interferers all of them
simultaneously. In the last case, it is assumed no PU signal prior knowledge is
available. The detection is involved with a search of the interfered band. The
proposed detector is able to detect an abrupt power change when tracing along
the frequency axis.
|
[
{
"version": "v1",
"created": "Mon, 3 Sep 2007 15:16:20 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Oct 2008 05:04:22 GMT"
}
] | 2008-10-06T00:00:00 |
[
[
"Hwang",
"Chien-Hwa",
""
],
[
"Chen",
"Shih-Chang",
""
]
] |
new_dataset
| 0.962277 |
0802.2723
|
Kenneth Mackenthun Jr.
|
Kenneth M. Mackenthun Jr
|
On strongly controllable group codes and mixing group shifts: solvable
groups, translation nets, and algorithms
|
Improved algorithm included and paper rewritten; 26 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The branch group of a strongly controllable group code is a shift group. We
show that a shift group can be characterized in a very simple way. In addition
it is shown that if a strongly controllable group code is labeled with Latin
squares, a strongly controllable Latin group code, then the shift group is
solvable. Moreover the mathematical structure of a Latin square (as a
translation net) and the shift group of a strongly controllable Latin group
code are closely related. Thus a strongly controllable Latin group code can be
viewed as a natural extension of a Latin square to a sequence space. Lastly we
construct shift groups. We show that it is sufficient to construct a simpler
group, the state group of a shift group. We give an algorithm to find the state
group, and from this it is easy to construct a stronlgy controllable Latin
group code.
|
[
{
"version": "v1",
"created": "Tue, 19 Feb 2008 21:45:59 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Oct 2008 02:48:01 GMT"
}
] | 2008-10-06T00:00:00 |
[
[
"Mackenthun",
"Kenneth M.",
"Jr"
]
] |
new_dataset
| 0.997139 |
0806.2360
|
Alexey Tarasov S
|
Alexey S Tarasov
|
Existence of a polyhedron which does not have a non-overlapping
pseudo-edge unfolding
|
24 pages, 20 figuers, minor grammatical changes
| null | null | null |
cs.CG
|
http://creativecommons.org/licenses/by/3.0/
|
There exists a surface of a convex polyhedron P and a partition L of P into
geodesic convex polygons such that there are no connected "edge" unfoldings of
P without self-intersections (whose spanning tree is a subset of the edge
skeleton of L).
|
[
{
"version": "v1",
"created": "Sat, 14 Jun 2008 06:57:50 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Sep 2008 14:01:57 GMT"
},
{
"version": "v3",
"created": "Mon, 6 Oct 2008 10:48:45 GMT"
}
] | 2008-10-06T00:00:00 |
[
[
"Tarasov",
"Alexey S",
""
]
] |
new_dataset
| 0.963415 |
0809.3357
|
Sushmita Ruj
|
Sushmita Ruj and Bimal Roy
|
More on Combinatorial Batch Codes
| null | null | null | null |
cs.CR cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Paterson, Stinson and Wei \cite{PSW} introduced Combinatorial batch codes,
which are combinatorial description of Batch code. Batch codes were first
presented by Ishai, Kushilevita, Ostrovsky and Sahai \cite{IKOS} in STOC'04. In
this paper we answer some of the questions put forward by Paterson, Stinson and
Wei and give some results for the general case $t>1$ which were not studied by
the authors.
|
[
{
"version": "v1",
"created": "Fri, 19 Sep 2008 12:16:14 GMT"
}
] | 2008-10-01T00:00:00 |
[
[
"Ruj",
"Sushmita",
""
],
[
"Roy",
"Bimal",
""
]
] |
new_dataset
| 0.988064 |
0809.4821
|
Jean-Marie Vanherpe
|
Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO)
|
On Fan Raspaud Conjecture
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A conjecture of Fan and Raspaud [3] asserts that every bridgeless cubic graph
con-tains three perfect matchings with empty intersection. Kaiser and Raspaud
[6] sug-gested a possible approach to this problem based on the concept of a
balanced join in an embedded graph. We give here some new results concerning
this conjecture and prove that a minimum counterexample must have at least 32
vertices.
|
[
{
"version": "v1",
"created": "Sun, 28 Sep 2008 05:56:06 GMT"
}
] | 2008-09-30T00:00:00 |
[
[
"Fouquet",
"Jean-Luc",
"",
"LIFO"
],
[
"Vanherpe",
"Jean-Marie",
"",
"LIFO"
]
] |
new_dataset
| 0.973753 |
0809.4882
|
Aleksandrs Slivkins
|
Robert Kleinberg, Aleksandrs Slivkins and Eli Upfal
|
Multi-Armed Bandits in Metric Spaces
|
16 pages, 0 figures
| null | null | null |
cs.DS cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a multi-armed bandit problem, an online algorithm chooses from a set of
strategies in a sequence of trials so as to maximize the total payoff of the
chosen strategies. While the performance of bandit algorithms with a small
finite strategy set is quite well understood, bandit problems with large
strategy sets are still a topic of very active investigation, motivated by
practical applications such as online auctions and web advertisement. The goal
of such research is to identify broad and natural classes of strategy sets and
payoff functions which enable the design of efficient solutions. In this work
we study a very general setting for the multi-armed bandit problem in which the
strategies form a metric space, and the payoff function satisfies a Lipschitz
condition with respect to the metric. We refer to this problem as the
"Lipschitz MAB problem". We present a complete solution for the multi-armed
problem in this setting. That is, for every metric space (L,X) we define an
isometry invariant which bounds from below the performance of Lipschitz MAB
algorithms for X, and we present an algorithm which comes arbitrarily close to
meeting this bound. Furthermore, our technique gives even better results for
benign payoff functions.
|
[
{
"version": "v1",
"created": "Mon, 29 Sep 2008 01:58:13 GMT"
}
] | 2008-09-30T00:00:00 |
[
[
"Kleinberg",
"Robert",
""
],
[
"Slivkins",
"Aleksandrs",
""
],
[
"Upfal",
"Eli",
""
]
] |
new_dataset
| 0.988255 |
0809.5009
|
Juyul Lee
|
Juyul Lee and Nihar Jindal
|
Delay Constrained Scheduling over Fading Channels: Optimal Policies for
Monomial Energy-Cost Functions
|
submitted to the IEEE ICC 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A point-to-point discrete-time scheduling problem of transmitting $B$
information bits within $T$ hard delay deadline slots is considered assuming
that the underlying energy-bit cost function is a convex monomial. The
scheduling objective is to minimize the expected energy expenditure while
satisfying the deadline constraint based on information about the unserved
bits, channel state/statistics, and the remaining time slots to the deadline.
At each time slot, the scheduling decision is made without knowledge of future
channel state, and thus there is a tension between serving many bits when the
current channel is good versus leaving too many bits for the deadline. Under
the assumption that no other packet is scheduled concurrently and no outage is
allowed, we derive the optimal scheduling policy. Furthermore, we also
investigate the dual problem of maximizing the number of transmitted bits over
$T$ time slots when subject to an energy constraint.
|
[
{
"version": "v1",
"created": "Mon, 29 Sep 2008 16:27:27 GMT"
}
] | 2008-09-30T00:00:00 |
[
[
"Lee",
"Juyul",
""
],
[
"Jindal",
"Nihar",
""
]
] |
new_dataset
| 0.972991 |
0809.4484
|
Lane A. Hemaspaandra
|
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, Joerg
Rothe
|
Llull and Copeland Voting Computationally Resist Bribery and Control
|
This 2008/9/28 version is the same as both the 2008/9/25 version at
arxiv.org and the 2008/9/25 revision of URCS TR-2008-933, except the present
version corrects a minor typo in the penultimate paragraph of Section 3
| null | null |
URCS-TR-2008-933
|
cs.GT cs.CC cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The only systems previously known to be resistant to all the standard control
types were highly artificial election systems created by hybridization. We
study a parameterized version of Copeland voting, denoted by Copeland^\alpha,
where the parameter \alpha is a rational number between 0 and 1 that specifies
how ties are valued in the pairwise comparisons of candidates. We prove that
Copeland^{0.5}, the system commonly referred to as "Copeland voting," provides
full resistance to constructive control, and we prove the same for
Copeland^\alpha, for all rational \alpha, 0 < \alpha < 1. Copeland voting is
the first natural election system proven to have full resistance to
constructive control. We also prove that both Copeland^1 (Llull elections) and
Copeland^0 are resistant to all standard types of constructive control other
than one variant of addition of candidates. Moreover, we show that for each
rational \alpha, 0 \leq \alpha \leq 1, Copeland^\alpha voting is fully
resistant to bribery attacks, and we establish fixed-parameter tractability of
bounded-case control for Copeland^\alpha. We also study Copeland^\alpha
elections under more flexible models such as microbribery and extended control
and we integrate the potential irrationality of voter preferences into many of
our results.
|
[
{
"version": "v1",
"created": "Thu, 25 Sep 2008 19:49:38 GMT"
},
{
"version": "v2",
"created": "Sun, 28 Sep 2008 04:25:35 GMT"
}
] | 2008-09-29T00:00:00 |
[
[
"Faliszewski",
"Piotr",
""
],
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
new_dataset
| 0.962638 |
0708.4164
|
Gilles Z\'emor
|
Philippe Gaborit and Gilles Zemor
|
Asymptotic improvement of the Gilbert-Varshamov bound for linear codes
|
Submitted to IEEE Transactions on Information Theory
|
IEEE Transactions on Information Theory, IT-54, No. 9 (2008) pp.
3865--3872.
|
10.1109/TIT.2008.928288
| null |
cs.IT math.IT
| null |
The Gilbert-Varshamov bound states that the maximum size A_2(n,d) of a binary
code of length n and minimum distance d satisfies A_2(n,d) >= 2^n/V(n,d-1)
where V(n,d) stands for the volume of a Hamming ball of radius d. Recently
Jiang and Vardy showed that for binary non-linear codes this bound can be
improved to A_2(n,d) >= cn2^n/V(n,d-1) for c a constant and d/n <= 0.499. In
this paper we show that certain asymptotic families of linear binary [n,n/2]
random double circulant codes satisfy the same improved Gilbert-Varshamov
bound.
|
[
{
"version": "v1",
"created": "Thu, 30 Aug 2007 14:05:17 GMT"
}
] | 2008-09-26T00:00:00 |
[
[
"Gaborit",
"Philippe",
""
],
[
"Zemor",
"Gilles",
""
]
] |
new_dataset
| 0.961267 |
0809.4395
|
Rudi Ball
|
Rudi Ball
|
Content Sharing for Mobile Devices
|
98 page, Masters Dissertation, 64 figures, September 2007
| null | null | null |
cs.DC cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The miniaturisation of computing devices has seen computing devices become
increasingly pervasive in society. With this increased pervasiveness, the
technologies of small computing devices have also improved. Mobile devices are
now capable of capturing various forms of multimedia and able to communicate
wirelessly using increasing numbers of communication techniques. The owners and
creators of local content are motivated to share this content in ever
increasing volume; the conclusion has been that social networks sites are
seeing a revolution in the sharing of information between communities of
people. As load on centralised systems increases, we present a novel
decentralised peer-to-peer approach dubbed the Market Contact Protocol (MCP) to
achieve cost effective, scalable and efficient content sharing using
opportunistic networking (pocket switched networking), incentive,
context-awareness, social contact and mobile devices. Within the report we
describe how the MCP is simulated with a superimposed geographic framework on
top of the JiST (Java in Simulation Time) framework to evaluate and measure its
capability to share content between massively mobile peers. The MCP is shown in
conclusion to be a powerful means by which to share content in a massively
mobile ad-hoc environment.
|
[
{
"version": "v1",
"created": "Thu, 25 Sep 2008 12:58:40 GMT"
}
] | 2008-09-26T00:00:00 |
[
[
"Ball",
"Rudi",
""
]
] |
new_dataset
| 0.998424 |
0807.1543
|
Xiaohu Shang
|
Xiaohu Shang, Biao Chen, Gerhard Kramer, H. Vincent Poor
|
On the Capacity of MIMO Interference Channels
|
8 pages, 2 figures, submitted to Allerton 2008
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The capacity region of a multiple-input-multiple-output interference channel
(MIMO IC) where the channel matrices are square and invertible is studied. The
capacity region for strong interference is established where the definition of
strong interference parallels that of scalar channels. Moreover, the sum-rate
capacity for Z interference, noisy interference, and mixed interference is
established. These results generalize known results for the scalar Gaussian IC.
|
[
{
"version": "v1",
"created": "Thu, 10 Jul 2008 00:39:06 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Sep 2008 19:40:13 GMT"
}
] | 2008-09-25T00:00:00 |
[
[
"Shang",
"Xiaohu",
""
],
[
"Chen",
"Biao",
""
],
[
"Kramer",
"Gerhard",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
new_dataset
| 0.976374 |
0809.4149
|
Hossein Bahramgiri
|
Hossein Bahramgiri and Farshad Lahouti
|
Block Network Error Control Codes and Syndrome-based Complete Maximum
Likelihood Decoding
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, network error control coding is studied for robust and
efficient multicast in a directed acyclic network with imperfect links. The
block network error control coding framework, BNEC, is presented and the
capability of the scheme to correct a mixture of symbol errors and packet
erasures and to detect symbol errors is studied. The idea of syndrome-based
decoding and error detection is introduced for BNEC, which removes the effect
of input data and hence decreases the complexity. Next, an efficient
three-stage syndrome-based BNEC decoding scheme for network error correction is
proposed, in which prior to finding the error values, the position of the edge
errors are identified based on the error spaces at the receivers. In addition
to bounded-distance decoding schemes for error correction up to the refined
Singleton bound, a complete decoding scheme for BNEC is also introduced.
Specifically, it is shown that using the proposed syndrome-based complete
decoding, a network error correcting code with redundancy order d for receiver
t, can correct d-1 random additive errors with a probability sufficiently close
to 1, if the field size is sufficiently large. Also, a complete maximum
likelihood decoding scheme for BNEC is proposed. As the probability of error in
different network edges is not equal in general, and given the equivalency of
certain edge errors within the network at a particular receiver, the number of
edge errors, assessed in the refined Singleton bound, is not a sufficient
statistic for ML decoding.
|
[
{
"version": "v1",
"created": "Wed, 24 Sep 2008 10:38:22 GMT"
}
] | 2008-09-25T00:00:00 |
[
[
"Bahramgiri",
"Hossein",
""
],
[
"Lahouti",
"Farshad",
""
]
] |
new_dataset
| 0.999236 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.