id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
0804.3881
Icius Committee
Widyawardana Adiprawita, Adang Suwandi Ahmad, and Jaka Semibiring
Automated Flight Test and System Identification for Rotary Wing Small Aerial Platform using Frequency Responses Analysis
Uploaded by ICIUS2007 Conference Organizer on behalf of the author(s). 7 pages, 15 figures
Proceedings of the International Conference on Intelligent Unmanned System (ICIUS 2007), Bali, Indonesia, October 24-25, 2007, Paper No. ICIUS2007-A009
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes an autopilot system that can be used to control the small scale rotorcraft during the flight test for linear-frequency-domain system identification. The input frequency swept is generated automatically as part of the autopilot control command. Therefore the bandwidth coverage and consistency of the frequency swept is guaranteed to produce high quality data for system identification. Beside that we can set the safety parameter during the flight test (maximum roll or pitch value, minimum altitude, etc) so the safety of the whole flight test is guaranteed. This autopilot for automated flight test will be tested using hardware in the loop simulator for hover flight condition.
[ { "version": "v1", "created": "Thu, 24 Apr 2008 10:07:34 GMT" } ]
2008-04-25T00:00:00
[ [ "Adiprawita", "Widyawardana", "" ], [ "Ahmad", "Adang Suwandi", "" ], [ "Semibiring", "Jaka", "" ] ]
new_dataset
0.994409
0804.3507
Diego Ruano
Fernando Hernando, Diego Ruano
Sixteen New Linear Codes With Plotkin Sum
Submitted to IEEE Trans. Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sixteen new linear codes are presented: three of them improve the lower bounds on the minimum distance for a linear code and the rest are an explicit construction of unknown codes attaining the lower bounds on the minimum distance. They are constructed using the Plotkin sum of two linear codes, also called $(u|u+v)$ construction. The computations have been achieved using an exhaustiv search.
[ { "version": "v1", "created": "Tue, 22 Apr 2008 11:51:22 GMT" } ]
2008-04-23T00:00:00
[ [ "Hernando", "Fernando", "" ], [ "Ruano", "Diego", "" ] ]
new_dataset
0.997298
0804.3259
Rui Zhang
Rui Zhang, Mehdi Mohseni, and John M. Cioffi
On Multiuser Power Region of Fading Multiple-Access Channel with Multiple Antennas
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is concerned with the fading MIMO-MAC with multiple receive antennas at the base station (BS) and multiple transmit antennas at each mobile terminal (MT). Two multiple-access techniques are considered for scheduling transmissions from each MT to the BS at the same frequency, which are space-division multiple-access (SDMA) and time-division multiple-access (TDMA). For SDMA, all MTs transmit simultaneously to the BS and their individual signals are resolved at the BS via multiple receive antennas while for TDMA, each MT transmits independently to the BS during mutually orthogonal time slots. It is assumed that the channel-state information (CSI) of the fading channel from each MT to the BS is unknown at each MT transmitter, but is perfectly known at the BS receiver. Thereby, the BS can acquire the long-term channel-distribution information (CDI) for each MT. This paper extends the well-known transmit-covariance feedback scheme for the point-to-point fading MIMO channel to the fading MIMO-MAC, whereby the BS jointly optimizes the transmit signal covariance matrices for all MTs based on their CDI, and then sends each transmit covariance matrix back to the corresponding MT via a feedback channel. The main goal of this paper is to characterize the so-called multiuser power region under the multiuser transmit-covariance feedback scheme for both SDMA and TDMA. The power region is defined as the constitution of all user transmit power-tuples that can achieve reliable transmissions for a given set of user target rates. Simulation results show that SDMA can achieve substantial power savings over TDMA for the fading MIMO-MAC. Moreover, this paper demonstrates the usefulness of the multiuser power region for maintaining proportionally-fair power consumption among the MTs.
[ { "version": "v1", "created": "Mon, 21 Apr 2008 10:13:39 GMT" } ]
2008-04-22T00:00:00
[ [ "Zhang", "Rui", "" ], [ "Mohseni", "Mehdi", "" ], [ "Cioffi", "John M.", "" ] ]
new_dataset
0.996833
0706.4161
Maurice Margenstern
Maurice Margenstern
The Domino Problem of the Hyperbolic Plane Is Undecidable
18 pages, This is a synthesis of previous deposits
The Bulletin of EATCS, 93(Oct.), (2007), 220-237
null
null
cs.CG cs.DM
null
In this paper, we prove that the general tiling problem of the hyperbolic plane is undecidable by proving a slightly stronger version using only a regular polygon as the basic shape of the tiles. The problem was raised by a paper of Raphael Robinson in 1971, in his famous simplified proof that the general tiling problem is undecidable for the Euclidean plane, initially proved by Robert Berger in 1966.
[ { "version": "v1", "created": "Thu, 28 Jun 2007 09:16:19 GMT" } ]
2008-04-19T00:00:00
[ [ "Margenstern", "Maurice", "" ] ]
new_dataset
0.978616
0801.1300
Igor Razgon
Igor Razgon and Barry O'Sullivan
Almost 2-SAT is Fixed-Parameter Tractable
This new version fixes the bug found by Somnath Sikdar in the proof of Claim 8. In the repaired version the modification of the Almost 2-SAT problem called 2-SLASAT is no longer needed and only the modification called 2-ASLASAT remains relevant. Hence the whole manuscript is updated so that the 2-SLASAT problem is not mentioned there anymore
null
null
null
cs.DS cs.CG cs.LO
null
We consider the following problem. Given a 2-CNF formula, is it possible to remove at most $k$ clauses so that the resulting 2-CNF formula is satisfiable? This problem is known to different research communities in Theoretical Computer Science under the names 'Almost 2-SAT', 'All-but-$k$ 2-SAT', '2-CNF deletion', '2-SAT deletion'. The status of fixed-parameter tractability of this problem is a long-standing open question in the area of Parameterized Complexity. We resolve this open question by proposing an algorithm which solves this problem in $O(15^k*k*m^3)$ and thus we show that this problem is fixed-parameter tractable.
[ { "version": "v1", "created": "Tue, 8 Jan 2008 19:04:14 GMT" }, { "version": "v2", "created": "Wed, 9 Jan 2008 19:24:05 GMT" }, { "version": "v3", "created": "Mon, 18 Feb 2008 15:14:49 GMT" }, { "version": "v4", "created": "Fri, 18 Apr 2008 14:07:04 GMT" } ]
2008-04-18T00:00:00
[ [ "Razgon", "Igor", "" ], [ "O'Sullivan", "Barry", "" ] ]
new_dataset
0.959686
0804.2699
Dennis Huo
Ian Christopher, Dennis Huo, and Bryan Jacobs
A Critique of a Polynomial-time SAT Solver Devised by Sergey Gubin
null
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper refutes the validity of the polynomial-time algorithm for solving satisfiability proposed by Sergey Gubin. Gubin introduces the algorithm using 3-SAT and eventually expands it to accept a broad range of forms of the Boolean satisfiability problem. Because 3-SAT is NP-complete, the algorithm would have implied P = NP, had it been correct. Additionally, this paper refutes the correctness of his polynomial-time reduction of SAT to 2-SAT.
[ { "version": "v1", "created": "Wed, 16 Apr 2008 23:00:51 GMT" } ]
2008-04-18T00:00:00
[ [ "Christopher", "Ian", "" ], [ "Huo", "Dennis", "" ], [ "Jacobs", "Bryan", "" ] ]
new_dataset
0.960405
0708.2309
Dmitri Krioukov
Dmitri Krioukov, kc claffy, Kevin Fall, Arthur Brady
On Compact Routing for the Internet
This is a significantly revised, journal version of cs/0508021
ACM SIGCOMM Computer Communication Review (CCR), v.37, n.3, p.41-52, 2007
10.1145/1273445.1273450
null
cs.NI
null
While there exist compact routing schemes designed for grids, trees, and Internet-like topologies that offer routing tables of sizes that scale logarithmically with the network size, we demonstrate in this paper that in view of recent results in compact routing research, such logarithmic scaling on Internet-like topologies is fundamentally impossible in the presence of topology dynamics or topology-independent (flat) addressing. We use analytic arguments to show that the number of routing control messages per topology change cannot scale better than linearly on Internet-like topologies. We also employ simulations to confirm that logarithmic routing table size scaling gets broken by topology-independent addressing, a cornerstone of popular locator-identifier split proposals aiming at improving routing scaling in the presence of network topology dynamics or host mobility. These pessimistic findings lead us to the conclusion that a fundamental re-examination of assumptions behind routing models and abstractions is needed in order to find a routing architecture that would be able to scale ``indefinitely.''
[ { "version": "v1", "created": "Fri, 17 Aug 2007 02:37:20 GMT" } ]
2008-04-16T00:00:00
[ [ "Krioukov", "Dmitri", "" ], [ "claffy", "kc", "" ], [ "Fall", "Kevin", "" ], [ "Brady", "Arthur", "" ] ]
new_dataset
0.999529
0804.2058
Zhang Shengli
Zhang Shengli, Soung chang Liew and Lu Lu
Physical Layer Network Coding Over Finite And Infinite Fields
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Direct application of network coding at the physical layer - physical layer network coding (PNC) - is a promising technique for two-way relay wireless networks. In a two-way relay network, relay nodes are used to relay two-way information flows between pairs of end nodes. This paper proposes a precise definition for PNC. Specifically, in PNC, a relay node does not decode the source information from the two ends separately, but rather directly maps the combined signals received simultaneously to a signal to be relayed. Based on this definition, PNC can be further sub-classed into two categories - PNCF (PNC over finite field) and PNCI (PNC over infinite field) - according to whether the network-code field (or groups, rings) adopted is finite or infinite. For each of PNCF and PNCI, we consider two specific estimation techniques for dealing with noise in the mapping process. The performance of the four schemes is investigated by means of analysis and simulation, assuming symbol-level synchronization only.
[ { "version": "v1", "created": "Sun, 13 Apr 2008 11:43:24 GMT" } ]
2008-04-15T00:00:00
[ [ "Shengli", "Zhang", "" ], [ "Liew", "Soung chang", "" ], [ "Lu", "Lu", "" ] ]
new_dataset
0.998778
0802.3437
Yuri Borissov Ph.D.
Yuri L. Borissov
On Cusick-Cheon's Conjecture About Balanced Boolean Functions in the Cosets of the Binary Reed-Muller Code
3 pages, Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is proved an amplification of Cusick-Cheon's conjecture on balanced Boolean functions in the cosets of the binary Reed-Muller code RM(k,m) of order k and length 2^m, in the cases where k = 1 or k >= (m-1)/2.
[ { "version": "v1", "created": "Sat, 23 Feb 2008 11:08:06 GMT" }, { "version": "v2", "created": "Mon, 14 Apr 2008 09:17:12 GMT" } ]
2008-04-14T00:00:00
[ [ "Borissov", "Yuri L.", "" ] ]
new_dataset
0.99964
cs/0601009
Tobias Koch
Tobias Koch, Amos Lapidoth
Gaussian Fading is the Worst Fading
Presented at the IEEE International Symposium on Information Theory (ISIT) 2006; replaced with version that appears in the proceedings
null
null
null
cs.IT math.IT
null
The capacity of peak-power limited, single-antenna, non-coherent, flat-fading channels with memory is considered. The emphasis is on the capacity pre-log, i.e., on the limiting ratio of channel capacity to the logarithm of the signal-to-noise ratio (SNR), as the SNR tends to infinity. It is shown that, among all stationary and ergodic fading processes of a given spectral distribution function whose law has no mass point at zero, the Gaussian process gives rise to the smallest pre-log.
[ { "version": "v1", "created": "Thu, 5 Jan 2006 18:47:49 GMT" }, { "version": "v2", "created": "Mon, 14 Apr 2008 12:33:46 GMT" } ]
2008-04-14T00:00:00
[ [ "Koch", "Tobias", "" ], [ "Lapidoth", "Amos", "" ] ]
new_dataset
0.976731
cs/0510070
Desmond Lun
Desmond S. Lun, Muriel Medard, Ralf Koetter, Michelle Effros
On Coding for Reliable Communication over Packet Networks
33 pages, 6 figures; revised appendix
Physical Communication, vol. 1, no. 1, pp. 3-20, March 2008.
10.1016/j.phycom.2008.01.006
null
cs.IT cs.NI math.IT
null
We present a capacity-achieving coding scheme for unicast or multicast over lossy packet networks. In the scheme, intermediate nodes perform additional coding yet do not decode nor even wait for a block of packets before sending out coded packets. Rather, whenever they have a transmission opportunity, they send out coded packets formed from random linear combinations of previously received packets. All coding and decoding operations have polynomial complexity. We show that the scheme is capacity-achieving as long as packets received on a link arrive according to a process that has an average rate. Thus, packet losses on a link may exhibit correlation in time or with losses on other links. In the special case of Poisson traffic with i.i.d. losses, we give error exponents that quantify the rate of decay of the probability of error with coding delay. Our analysis of the scheme shows that it is not only capacity-achieving, but that the propagation of packets carrying "innovative" information follows the propagation of jobs through a queueing network, and therefore fluid flow models yield good approximations. We consider networks with both lossy point-to-point and broadcast links, allowing us to model both wireline and wireless packet networks.
[ { "version": "v1", "created": "Sun, 23 Oct 2005 22:42:43 GMT" }, { "version": "v2", "created": "Tue, 2 May 2006 14:27:13 GMT" }, { "version": "v3", "created": "Tue, 2 Jan 2007 22:20:04 GMT" } ]
2008-04-11T00:00:00
[ [ "Lun", "Desmond S.", "" ], [ "Medard", "Muriel", "" ], [ "Koetter", "Ralf", "" ], [ "Effros", "Michelle", "" ] ]
new_dataset
0.995887
0804.1490
Jean-Claude Belfiore
Maya Badr and Jean-Claude Belfiore
Distributed Space-Time Block Codes for the MIMO Multiple Access Channel
5 pages, 6 figures, accepted to ISIT 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, the Multiple transmit antennas Multiple Access Channel is considered. A construction of a family of distributed space-time codes for this channel is proposed. No Channel Side Information at the transmitters is assumed and users are not allowed to cooperate together. It is shown that the proposed code achieves the Diversity Multiplexing Tradeoff of the channel. As an example, we consider the two-user MIMO-MAC channel. Simulation results show the significant gain offered by the new coding scheme compared to an orthogonal transmission scheme, e.g. time sharing.
[ { "version": "v1", "created": "Wed, 9 Apr 2008 14:13:28 GMT" } ]
2008-04-10T00:00:00
[ [ "Badr", "Maya", "" ], [ "Belfiore", "Jean-Claude", "" ] ]
new_dataset
0.999392
0804.1493
Jean-Claude Belfiore
Maya Badr and Jean-Claude Belfiore
Distributed Space Time Codes for the Amplify-and-Forward Multiple-Access Relay Channel
5 pages, 7 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we present a construction of a family of space-time block codes for a Multi-Access Amplify-and- Forward Relay channel with two users and a single half-duplex relay. It is assumed that there is no Channel Side Information at the transmitters and that they are not allowed to cooperate together. Using the Diversity Multiplexing Tradeoff as a tool to evaluate the performance, we prove that the proposed scheme is optimal in some sense. Moreover, we provide numerical results which show that the new scheme outperforms the orthogonal transmission scheme, e. g. time sharing and offers a significant gain.
[ { "version": "v1", "created": "Wed, 9 Apr 2008 14:34:41 GMT" } ]
2008-04-10T00:00:00
[ [ "Badr", "Maya", "" ], [ "Belfiore", "Jean-Claude", "" ] ]
new_dataset
0.999702
0804.0980
Ananthanarayanan Chockalingam
K. Vishnu Vardhan, Saif K. Mohammed, A. Chockalingam, and B. Sundar Rajan
Large MIMO Detection: A Low-Complexity Detector at High Spectral Efficiencies
Parts of this paper appeared in IEEE JSAC Special Issue on Multiuser Detection in Advanced Communication Systems and Networks, vol. 26, no. 3, pp. 473-485, April 2008, and accepted in IEEE ICC'2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider large MIMO systems, where by `{\em large}' we mean number of transmit and receive antennas of the order of tens to hundreds. Such large MIMO systems will be of immense interest because of the very high spectral efficiencies possible in such systems. We present a low-complexity detector which achieves uncoded near-exponential diversity performance for hundreds of antennas (i.e., achieves near SISO AWGN performance in a large MIMO fading environment) with an average per-bit complexity of just $O(N_tN_r)$, where $N_t$ and $N_r$ denote the number of transmit and receive antennas, respectively. With an outer turbo code, the proposed detector achieves good coded bit error performance as well. For example, in a 600 transmit and 600 receive antennas V-BLAST system with a high spectral efficiency of 200 bps/Hz (using BPSK and rate-1/3 turbo code), our simulation results show that the proposed detector performs close to within about 4.6 dB from theoretical capacity. We also adopt the proposed detector for the low-complexity decoding of high-rate non-orthogonal space-time block codes (STBC) from division algebras (DA). For example, we have decoded the $16\times 16$ full-rate non-orthogonal STBC from DA using the proposed detector and show that it performs close to within about 5.5 dB of the capacity using 4-QAM and rate-3/4 turbo code at a spectral efficiency of 24 bps/Hz. The practical feasibility of the proposed high-performance low-complexity detector could potentially trigger wide interest in the implementation of large MIMO systems. In large MC-CDMA systems with hundreds of users, the proposed detector is shown to achieve near single-user performance at an average per-bit complexity linear in number of users, which is quite appealing for its use in practical CDMA systems.
[ { "version": "v1", "created": "Mon, 7 Apr 2008 08:50:23 GMT" } ]
2008-04-08T00:00:00
[ [ "Vardhan", "K. Vishnu", "" ], [ "Mohammed", "Saif K.", "" ], [ "Chockalingam", "A.", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.992658
0804.0986
Sebastien Collette
Zachary Abel, David Charlton, Sebastien Collette, Erik D. Demaine, Martin L. Demaine, Stefan Langerman, Joseph O'Rourke, Val Pinciu and Godfried Toussaint
Cauchy's Arm Lemma on a Growing Sphere
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a variant of Cauchy's Lemma, proving that when a convex chain on one sphere is redrawn (with the same lengths and angles) on a larger sphere, the distance between its endpoints increases. The main focus of this work is a comparison of three alternate proofs, to show the links between Toponogov's Comparison Theorem, Legendre's Theorem and Cauchy's Arm Lemma.
[ { "version": "v1", "created": "Mon, 7 Apr 2008 08:49:47 GMT" } ]
2008-04-08T00:00:00
[ [ "Abel", "Zachary", "" ], [ "Charlton", "David", "" ], [ "Collette", "Sebastien", "" ], [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Langerman", "Stefan", "" ], [ "O'Rourke", "Joseph", "" ], [ "Pinciu", "Val", "" ], [ "Toussaint", "Godfried", "" ] ]
new_dataset
0.999372
0804.0659
Boris Skoric
Boris Skoric
Steganography from weak cryptography
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a problem setting which we call ``the freedom fighters' problem''. It subtly differs from the prisoners' problem. We propose a steganographic method that allows Alice and Bob to fool Wendy the warden in this setting. Their messages are hidden in encryption keys. The recipient has no prior knowledge of these keys, and has to cryptanalyze ciphertexts in order to recover them. We show an example of the protocol and give a partial security analysis.
[ { "version": "v1", "created": "Fri, 4 Apr 2008 07:50:44 GMT" } ]
2008-04-07T00:00:00
[ [ "Skoric", "Boris", "" ] ]
new_dataset
0.952369
0802.4325
Mirela Damian
Mirela Damian
A Simple Yao-Yao-Based Spanner of Bounded Degree
7 pages, 5 figures
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is a standing open question to decide whether the Yao-Yao structure for unit disk graphs (UDGs) is a length spanner of not. This question is highly relevant to the topology control problem for wireless ad hoc networks. In this paper we make progress towards resolving this question by showing that the Yao-Yao structure is a length spanner for UDGs of bounded aspect ratio. We also propose a new local algorithm, called Yao-Sparse-Sink, based on the Yao-Sink method introduced by Li, Wan, Wang and Frieder, that computes a (1+e)-spanner of bounded degree for a given UDG and for given e > 0. The Yao-Sparse-Sink method enables an efficient local computation of sparse sink trees. Finally, we show that all these structures for UDGs -- Yao, Yao-Yao, Yao-Sink and Yao-Sparse-Sink -- have arbitrarily large weight.
[ { "version": "v1", "created": "Fri, 29 Feb 2008 14:39:59 GMT" }, { "version": "v2", "created": "Fri, 4 Apr 2008 14:40:40 GMT" } ]
2008-04-04T00:00:00
[ [ "Damian", "Mirela", "" ] ]
new_dataset
0.997432
0804.0539
Valentin Savin
Ghassan M. Kraidy, Valentin Savin
Irregular turbo code design for the binary erasure channel
6 pages, submitted Turbo-Symposium 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the design of irregular turbo codes for the binary erasure channel is investigated. An analytic expression of the erasure probability of punctured recursive systematic convolutional codes is derived. This exact expression will be used to track the density evolution of turbo codes over the erasure channel, that will allow for the design of capacity-approaching irregular turbo codes. Next, we propose a graph-optimal interleaver for irregular turbo codes. Simulation results for different coding rates is shown at the end.
[ { "version": "v1", "created": "Thu, 3 Apr 2008 12:31:08 GMT" } ]
2008-04-04T00:00:00
[ [ "Kraidy", "Ghassan M.", "" ], [ "Savin", "Valentin", "" ] ]
new_dataset
0.997364
cs/0610027
Ranko Lazic
Stephane Demri and Ranko Lazic
LTL with the Freeze Quantifier and Register Automata
29 pages
null
null
null
cs.LO cs.CC
null
A data word is a sequence of pairs of a letter from a finite alphabet and an element from an infinite set, where the latter can only be compared for equality. To reason about data words, linear temporal logic is extended by the freeze quantifier, which stores the element at the current word position into a register, for equality comparisons deeper in the formula. By translations from the logic to alternating automata with registers and then to faulty counter automata whose counters may erroneously increase at any time, and from faulty and error-free counter automata to the logic, we obtain a complete complexity table for logical fragments defined by varying the set of temporal operators and the number of registers. In particular, the logic with future-time operators and 1 register is decidable but not primitive recursive over finite data words. Adding past-time operators or 1 more register, or switching to infinite data words, cause undecidability.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 15:47:22 GMT" }, { "version": "v2", "created": "Wed, 13 Feb 2008 17:52:00 GMT" }, { "version": "v3", "created": "Thu, 3 Apr 2008 16:31:15 GMT" } ]
2008-04-03T00:00:00
[ [ "Demri", "Stephane", "" ], [ "Lazic", "Ranko", "" ] ]
new_dataset
0.999884
0804.0074
Jaap-Henk Hoepman
Jaap-Henk Hoepman
Private Handshakes
null
n F. Stajano, editor, 4th Eur. Symp. on Security and Privacy in Ad hoc and Sensor Networks, LNCS 4572, pages 31-42, Cambridge, UK, June 2-3 2007
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Private handshaking allows pairs of users to determine which (secret) groups they are both a member of. Group membership is kept secret to everybody else. Private handshaking is a more private form of secret handshaking, because it does not allow the group administrator to trace users. We extend the original definition of a handshaking protocol to allow and test for membership of multiple groups simultaneously. We present simple and efficient protocols for both the single group and multiple group membership case. Private handshaking is a useful tool for mutual authentication, demanded by many pervasive applications (including RFID) for privacy. Our implementations are efficient enough to support such usually resource constrained scenarios.
[ { "version": "v1", "created": "Tue, 1 Apr 2008 06:01:53 GMT" } ]
2008-04-02T00:00:00
[ [ "Hoepman", "Jaap-Henk", "" ] ]
new_dataset
0.99038
cs/0608068
Ke Liu
Ke Liu, Nael Abu-Ghazaleh
The Aligned-Coordinated Geographical Routing for Multihop Wireless Networks
null
ijsnet 2008
null
null
cs.NI cs.DC
null
The stateless, low overhead and distributed nature of the Geographic routing protocols attract a lot of research attentions recently. Since the geographic routing would face void problems, leading to complementary routing such as perimeter routing which degrades the performance of geographic routing, most research works are focus on optimizing this complementary part of geographic routing to improve it. The greedy forwarding part of geographic routing provides an optimal routing performance in terms of path stretch. If the geographic routing could adapt the greedy forwarding more, its performance would be enhanced much more than to optimize the complementary routing such as perimeter routings. Our work is the first time to do so. The aligned physical coordinate is used to do the greedy forwarding routing decision which would lead more greedy forwarding. We evaluate our design to most geographic routing protocols, showing it helps much and maintain the stateless nature of geographic routing.
[ { "version": "v1", "created": "Wed, 16 Aug 2006 17:06:37 GMT" } ]
2008-03-28T00:00:00
[ [ "Liu", "Ke", "" ], [ "Abu-Ghazaleh", "Nael", "" ] ]
new_dataset
0.99826
cs/0608069
Ke Liu
Ke Liu, Nael Abu-Ghazaleh, Kyoung-Don Kang
JiTS: Just-in-Time Scheduling for Real-Time Sensor Data Dissemination
null
PerCom 2006
null
null
cs.NI cs.DC cs.PF
null
We consider the problem of real-time data dissemination in wireless sensor networks, in which data are associated with deadlines and it is desired for data to reach the sink(s) by their deadlines. To this end, existing real-time data dissemination work have developed packet scheduling schemes that prioritize packets according to their deadlines. In this paper, we first demonstrate that not only the scheduling discipline but also the routing protocol has a significant impact on the success of real-time sensor data dissemination. We show that the shortest path routing using the minimum number of hops leads to considerably better performance than Geographical Forwarding, which has often been used in existing real-time data dissemination work. We also observe that packet prioritization by itself is not enough for real-time data dissemination, since many high priority packets may simultaneously contend for network resources, deteriorating the network performance. Instead, real-time packets could be judiciously delayed to avoid severe contention as long as their deadlines can be met. Based on this observation, we propose a Just-in-Time Scheduling (JiTS) algorithm for scheduling data transmissions to alleviate the shortcomings of the existing solutions. We explore several policies for non-uniformly delaying data at different intermediate nodes to account for the higher expected contention as the packet gets closer to the sink(s). By an extensive simulation study, we demonstrate that JiTS can significantly improve the deadline miss ratio and packet drop ratio compared to existing approaches in various situations. Notably, JiTS improves the performance requiring neither lower layer support nor synchronization among the sensor nodes.
[ { "version": "v1", "created": "Wed, 16 Aug 2006 17:21:40 GMT" } ]
2008-03-28T00:00:00
[ [ "Liu", "Ke", "" ], [ "Abu-Ghazaleh", "Nael", "" ], [ "Kang", "Kyoung-Don", "" ] ]
new_dataset
0.957781
0803.3658
Yeow Meng Chee
Yeow Meng Chee, Son Hoang Dau, Alan C. H. Ling, and San Ling
The Sizes of Optimal q-Ary Codes of Weight Three and Distance Four: A Complete Solution
5 pages
IEEE Transactions on Information Theory, vol. 54, no. 3, pp. 1291-1295, 2008
10.1109/TIT.2007.915885
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This correspondence introduces two new constructive techniques to complete the determination of the sizes of optimal q-ary codes of constant weight three and distance four.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 02:33:51 GMT" } ]
2008-03-27T00:00:00
[ [ "Chee", "Yeow Meng", "" ], [ "Dau", "Son Hoang", "" ], [ "Ling", "Alan C. H.", "" ], [ "Ling", "San", "" ] ]
new_dataset
0.999603
0803.3670
Mathew Francis
L. Sunil Chandran, Mathew C. Francis, Naveen Sivadasan
On the cubicity of AT-free graphs and circular-arc graphs
9 pages, 0 figures
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A unit cube in $k$ dimensions ($k$-cube) is defined as the the Cartesian product $R_1\times R_2\times...\times R_k$ where $R_i$(for $1\leq i\leq k$) is a closed interval of the form $[a_i,a_i+1]$ on the real line. A graph $G$ on $n$ nodes is said to be representable as the intersection of $k$-cubes (cube representation in $k$ dimensions) if each vertex of $G$ can be mapped to a $k$-cube such that two vertices are adjacent in $G$ if and only if their corresponding $k$-cubes have a non-empty intersection. The \emph{cubicity} of $G$ denoted as $\cubi(G)$ is the minimum $k$ for which $G$ can be represented as the intersection of $k$-cubes. We give an $O(bw\cdot n)$ algorithm to compute the cube representation of a general graph $G$ in $bw+1$ dimensions given a bandwidth ordering of the vertices of $G$, where $bw$ is the \emph{bandwidth} of $G$. As a consequence, we get $O(\Delta)$ upper bounds on the cubicity of many well-known graph classes such as AT-free graphs, circular-arc graphs and co-comparability graphs which have $O(\Delta)$ bandwidth. Thus we have: 1) $\cubi(G)\leq 3\Delta-1$, if $G$ is an AT-free graph. 2) $\cubi(G)\leq 2\Delta+1$, if $G$ is a circular-arc graph. 3) $\cubi(G)\leq 2\Delta$, if $G$ is a co-comparability graph. Also for these graph classes, there are constant factor approximation algorithms for bandwidth computation that generate orderings of vertices with $O(\Delta)$ width. We can thus generate the cube representation of such graphs in $O(\Delta)$ dimensions in polynomial time.
[ { "version": "v1", "created": "Wed, 26 Mar 2008 07:11:20 GMT" } ]
2008-03-27T00:00:00
[ [ "Chandran", "L. Sunil", "" ], [ "Francis", "Mathew C.", "" ], [ "Sivadasan", "Naveen", "" ] ]
new_dataset
0.984884
0803.3435
Tomas Rokicki
Tomas Rokicki
Twenty-Five Moves Suffice for Rubik's Cube
null
null
null
null
cs.SC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How many moves does it take to solve Rubik's Cube? Positions are known that require 20 moves, and it has already been shown that there are no positions that require 27 or more moves; this is a surprisingly large gap. This paper describes a program that is able to find solutions of length 20 or less at a rate of more than 16 million positions a second. We use this program, along with some new ideas and incremental improvements in other techniques, to show that there is no position that requires 26 moves.
[ { "version": "v1", "created": "Mon, 24 Mar 2008 19:37:09 GMT" } ]
2008-03-25T00:00:00
[ [ "Rokicki", "Tomas", "" ] ]
new_dataset
0.979445
0708.2804
Yi Hong Dr
Ezio Biglieri, Yi Hong, Emanuele Viterbo
On Fast-Decodable Space-Time Block Codes
submitted to IEEE trans IT
null
null
null
cs.IT math.IT
null
We focus on full-rate, fast-decodable space-time block codes (STBCs) for 2x2 and 4x2 multiple-input multiple-output (MIMO) transmission. We first derive conditions for reduced-complexity maximum-likelihood decoding, and apply them to a unified analysis of two families of 2x2 STBCs that were recently proposed. In particular, we describe a reduced-complexity sphere decoding algorithm suitable for QAM signal constellations. Next, we derive a novel reduced-complexity 4x2 STBC, and show that it outperforms all previously known codes with certain constellations.
[ { "version": "v1", "created": "Tue, 21 Aug 2007 10:57:59 GMT" }, { "version": "v2", "created": "Tue, 18 Mar 2008 14:58:25 GMT" } ]
2008-03-18T00:00:00
[ [ "Biglieri", "Ezio", "" ], [ "Hong", "Yi", "" ], [ "Viterbo", "Emanuele", "" ] ]
new_dataset
0.994747
0803.0845
Evain Laurent
Laurent Evain
Knapsack cryptosystems built on NP-hard instance
20 pages
null
null
null
cs.CR cs.CC cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct three public key knapsack cryptosystems. Standard knapsack cryptosystems hide easy instances of the knapsack problem and have been broken. The systems considered in the article face this problem: They hide a random (possibly hard) instance of the knapsack problem. We provide both complexity results (size of the key, time needed to encypher/decypher...) and experimental results. Security results are given for the second cryptosystem (the fastest one and the one with the shortest key). Probabilistic polynomial reductions show that finding the private key is as difficult as factorizing a product of two primes. We also consider heuristic attacks. First, the density of the cryptosystem can be chosen arbitrarily close to one, discarding low density attacks. Finally, we consider explicit heuristic attacks based on the LLL algorithm and we prove that with respect to these attacks, the public key is as secure as a random key.
[ { "version": "v1", "created": "Thu, 6 Mar 2008 12:20:35 GMT" } ]
2008-03-17T00:00:00
[ [ "Evain", "Laurent", "" ] ]
new_dataset
0.995377
0803.1716
Lokman Meho
Lokman I. Meho and Yvonne Rogers
Citation Counting, Citation Ranking, and h-Index of Human-Computer Interaction Researchers: A Comparison between Scopus and Web of Science
35 pages, 9 tables, 3 figures, accepted for publication in the Journal of the American Society for Information Science and Technology
null
null
null
cs.HC cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study examines the differences between Scopus and Web of Science in the citation counting, citation ranking, and h-index of 22 top human-computer interaction (HCI) researchers from EQUATOR--a large British Interdisciplinary Research Collaboration project. Results indicate that Scopus provides significantly more coverage of HCI literature than Web of Science, primarily due to coverage of relevant ACM and IEEE peer-reviewed conference proceedings. No significant differences exist between the two databases if citations in journals only are compared. Although broader coverage of the literature does not significantly alter the relative citation ranking of individual researchers, Scopus helps distinguish between the researchers in a more nuanced fashion than Web of Science in both citation counting and h-index. Scopus also generates significantly different maps of citation networks of individual scholars than those generated by Web of Science. The study also presents a comparison of h-index scores based on Google Scholar with those based on the union of Scopus and Web of Science. The study concludes that Scopus can be used as a sole data source for citation-based research and evaluation in HCI, especially if citations in conference proceedings are sought and that h scores should be manually calculated instead of relying on system calculations.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 08:09:19 GMT" } ]
2008-03-13T00:00:00
[ [ "Meho", "Lokman I.", "" ], [ "Rogers", "Yvonne", "" ] ]
new_dataset
0.977116
0803.1751
Grenville Croll
John Nash, Andy Adler, Neil Smith
TellTable Spreadsheet Audit: from Technical Possibility to Operating Prototype
11 pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2004 45-55ISBN 1 902724 94 1
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
At the 2003 EuSpRIG meeting, we presented a framework and software infrastructure to generate and analyse an audit trail for a spreadsheet file. This report describes the results of a pilot implementation of this software (now called TellTable; see www.telltable.com), along with developments in the server infrastructure and availability, extensions to other "Office Suite" files, integration of the audit tool into the server interface, and related developments, licensing and reports. We continue to seek collaborators and partners in what is primarily an open-source project with some shared-source components.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 11:36:41 GMT" } ]
2008-03-13T00:00:00
[ [ "Nash", "John", "" ], [ "Adler", "Andy", "" ], [ "Smith", "Neil", "" ] ]
new_dataset
0.971687
0803.1807
Valentin Savin
Ghassan M. Kraidy and Valentin Savin
Minimum-Delay Decoding of Turbo-Codes for Upper-Layer FEC
5 pages, submitted SPAWC08
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate the decoding of parallel turbo codes over the binary erasure channel suited for upper-layer error correction. The proposed algorithm performs on-the-fly decoding, i.e. it starts decoding as soon as the first symbols are received. This algorithm compares with the iterative decoding of codes defined on graphs, in that it propagates in the trellises of the turbo code by removing transitions in the same way edges are removed in a bipartite graph under message-passing decoding. Performance comparison with LDPC codes for different coding rates is shown.
[ { "version": "v1", "created": "Wed, 12 Mar 2008 16:22:28 GMT" } ]
2008-03-13T00:00:00
[ [ "Kraidy", "Ghassan M.", "" ], [ "Savin", "Valentin", "" ] ]
new_dataset
0.994578
0706.3523
Olivier Finkel
Dominique Lecomte (UMR 7586), Olivier Finkel (LIP)
There Exist some Omega-Powers of Any Borel Rank
To appear in the Proceedings of the 16th EACSL Annual Conference on Computer Science and Logic, CSL 2007, Lausanne, Switzerland, September 11-15, 2007, Lecture Notes in Computer Science, (c) Springer, 2007
Dans Proceedings of the 16th EACSL Annual Conference on Computer Science and Logic, CSL 2007, - 16th EACSL Annual Conference on Computer Science and Logic, CSL 2007, September 11-15, 2007, Lausanne : Suisse
null
null
cs.LO cs.CC math.LO
null
Omega-powers of finitary languages are languages of infinite words (omega-languages) in the form V^omega, where V is a finitary language over a finite alphabet X. They appear very naturally in the characterizaton of regular or context-free omega-languages. Since the set of infinite words over a finite alphabet X can be equipped with the usual Cantor topology, the question of the topological complexity of omega-powers of finitary languages naturally arises and has been posed by Niwinski (1990), Simonnet (1992) and Staiger (1997). It has been recently proved that for each integer n > 0, there exist some omega-powers of context free languages which are Pi^0_n-complete Borel sets, that there exists a context free language L such that L^omega is analytic but not Borel, and that there exists a finitary language V such that V^omega is a Borel set of infinite rank. But it was still unknown which could be the possible infinite Borel ranks of omega-powers. We fill this gap here, proving the following very surprising result which shows that omega-powers exhibit a great topological complexity: for each non-null countable ordinal alpha, there exist some Sigma^0_alpha-complete omega-powers, and some Pi^0_alpha-complete omega-powers.
[ { "version": "v1", "created": "Mon, 25 Jun 2007 16:03:36 GMT" } ]
2008-03-12T00:00:00
[ [ "Lecomte", "Dominique", "", "UMR 7586" ], [ "Finkel", "Olivier", "", "LIP" ] ]
new_dataset
0.999189
0803.1500
Dean Krafft
Dean B. Krafft, Aaron Birkland, Ellen J. Cramer
NCore: Architecture and Implementation of a Flexible, Collaborative Digital Library
11 pages, to appear in JCDL 2008
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
NCore is an open source architecture and software platform for creating flexible, collaborative digital libraries. NCore was developed by the National Science Digital Library (NSDL) project, and it serves as the central technical infrastructure for NSDL. NCore consists of a central Fedora-based digital repository, a specific data model, an API, and a set of backend services and frontend tools that create a new model for collaborative, contributory digital libraries. This paper describes NCore, presents and analyzes its architecture, tools and services; and reports on the experience of NSDL in building and operating a major digital library on it over the past year and the experience of the Digital Library for Earth Systems Education in porting their existing digital library and tools to the NCore platform.
[ { "version": "v1", "created": "Mon, 10 Mar 2008 21:06:31 GMT" } ]
2008-03-12T00:00:00
[ [ "Krafft", "Dean B.", "" ], [ "Birkland", "Aaron", "" ], [ "Cramer", "Ellen J.", "" ] ]
new_dataset
0.992503
0803.1217
Li Chen
Li Chen
Hsiao-Code Check Matrices and Recursively Balanced Matrices
8 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The key step of generating the well-known Hsiao code is to construct a {0,1}-check-matrix in which each column contains the same odd-number of 1's and each row contains the same number of 1's or differs at most by one for the number of 1's. We also require that no two columns are identical in the matrix. The author solved this problem in 1986 by introducing a type of recursively balanced matrices. However, since the paper was published in Chinese, the solution for such an important problem was not known by international researchers in coding theory. In this note, we focus on how to practically generate the check matrix of Hsiao codes. We have modified the original algorithm to be more efficient and effective. We have also corrected an error in algorithm analysis presented in the earlier paper. The result shows that the algorithm attained optimum in average cases if a divide-and-conquer technique must be involved in the algorithm.
[ { "version": "v1", "created": "Sat, 8 Mar 2008 06:00:03 GMT" } ]
2008-03-11T00:00:00
[ [ "Chen", "Li", "" ] ]
new_dataset
0.998946
0710.0871
Grenville Croll
Grenville J. Croll, Raymond J. Butler
Spreadsheets in Clinical Medicine
10 Pages including references
Proc. European Spreadsheet Risks Int. Grp. 2006 7-16
null
null
cs.CY
null
There is overwhelming evidence that the continued and widespread use of untested spreadsheets in business gives rise to regular, significant and unexpected financial losses. Whilst this is worrying, it is perhaps a relatively minor concern compared with the risks arising from the use of poorly constructed and/or untested spreadsheets in medicine, a practice that is already occurring. This article is intended as a warning that the use of poorly constructed and/or untested spreadsheets in clinical medicine cannot be tolerated. It supports this warning by reporting on potentially serious weaknesses found while testing a limited number of publicly available clinical spreadsheets.
[ { "version": "v1", "created": "Wed, 3 Oct 2007 19:23:55 GMT" } ]
2008-03-10T00:00:00
[ [ "Croll", "Grenville J.", "" ], [ "Butler", "Raymond J.", "" ] ]
new_dataset
0.991678
0803.0011
Grenville Croll
Keith Bishop
Qtier-Rapor: Managing Spreadsheet Systems & Improving Corporate Performance, Compliance and Governance
12 Pages, 6 Colour Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 33-44 ISBN:1-905617-08-9
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Much of what EuSpRIG discusses is concerned with the integrity of individual spreadsheets. In businesses, interlocking spreadsheets are regularly used to fill functional gaps in core administrative systems. The growth and deployment of such integrated spreadsheet SYSTEMS raises the scale of issues to a whole new level. The correct management of spreadsheet systems is necessary to ensure that the business achieves its goals of improved performance and good corporate governance, within the constraints of legislative compliance - poor management will deliver the opposite. This paper is an anatomy of the real-life issues of the commercial use of spreadsheets in business, and demonstrates how Qtier-Rapor has been used to instil best practice in the use of integrated commercial spreadsheet systems.
[ { "version": "v1", "created": "Fri, 29 Feb 2008 21:39:29 GMT" } ]
2008-03-10T00:00:00
[ [ "Bishop", "Keith", "" ] ]
new_dataset
0.998353
0803.0015
Grenville Croll
Simon Murphy
EuSpRIG 2006 Commercial Spreadsheet Review
8 Pages, 9 Colour Diagrams
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2006 45-52 ISBN:1-905617-08-9
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This management summary provides an outline of a commercial spreadsheet review process. The aim of this process is to ensure remedial or enhancement work can safely be undertaken on a spreadsheet with a commercially acceptable level of risk of introducing new errors.
[ { "version": "v1", "created": "Fri, 29 Feb 2008 21:49:18 GMT" } ]
2008-03-10T00:00:00
[ [ "Murphy", "Simon", "" ] ]
new_dataset
0.978586
0803.1096
Valentin Savin
Valentin Savin
Algebraic-geometric codes from vector bundles and their decoding
5 pages, submitted to ISIT08
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Algebraic-geometric codes can be constructed by evaluating a certain set of functions on a set of distinct rational points of an algebraic curve. The set of functions that are evaluated is the linear space of a given divisor or, equivalently, the set of section of a given line bundle. Using arbitrary rank vector bundles on algebraic curves, we propose a natural generalization of the above construction. Our codes can also be seen as interleaved versions of classical algebraic-geometric codes. We show that the algorithm of Brown, Minder and Shokrollahi can be extended to this new class of codes and it corrects any number of errors up to $t^{*} - g/2$, where $t^{*}$ is the designed correction capacity of the code and $g$ is the curve genus.
[ { "version": "v1", "created": "Fri, 7 Mar 2008 14:14:10 GMT" } ]
2008-03-10T00:00:00
[ [ "Savin", "Valentin", "" ] ]
new_dataset
0.996859
0711.0557
Takao Inoue
Takao Inoue and Robert W. Heath Jr
Kerdock Codes for Limited Feedback Precoded MIMO Systems
A correction is made in Eq.(22), first matrix S0
null
null
null
cs.IT math.IT
null
A codebook based limited feedback strategy is a practical way to obtain partial channel state information at the transmitter in a precoded multiple-input multiple-output (MIMO) wireless system. Conventional codebook designs use Grassmannian packing, equiangular frames, vector quantization, or Fourier based constructions. While the capacity and error rate performance of conventional codebook constructions have been extensively investigated, constructing these codebooks is notoriously difficult relying on techniques such as nonlinear search or iterative algorithms. Further, the resulting codebooks may not have a systematic structure to facilitate storage of the codebook and low search complexity. In this paper, we propose a new systematic codebook design based on Kerdock codes and mutually unbiased bases. The proposed Kerdock codebook consists of multiple mutually unbiased unitary bases matrices with quaternary entries and the identity matrix. We propose to derive the beamforming and precoding codebooks from this base codebook, eliminating the requirement to store multiple codebooks. The propose structure requires little memory to store and, as we show, the quaternary structure facilitates codeword search. We derive the chordal distance for two antenna and four antenna codebooks, showing that the proposed codebooks compare favorably with prior designs. Monte Carlo simulations are used to compare achievable rates and error rates for different codebooks sizes.
[ { "version": "v1", "created": "Mon, 5 Nov 2007 01:28:35 GMT" }, { "version": "v2", "created": "Fri, 7 Mar 2008 14:35:36 GMT" } ]
2008-03-07T00:00:00
[ [ "Inoue", "Takao", "" ], [ "Heath", "Robert W.", "Jr" ] ]
new_dataset
0.999654
0803.0632
Alexandros Dimakis
Alexandros G. Dimakis, P. Brighten Godfrey, Yunnan Wu, Martin J. Wainwright, Kannan Ramchandran
Network Coding for Distributed Storage Systems
null
null
null
EECS 14546
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed storage systems provide reliable access to data through redundancy spread over individually unreliable nodes. Application scenarios include data centers, peer-to-peer storage systems, and storage in wireless networks. Storing data using an erasure code, in fragments spread across nodes, requires less redundancy than simple replication for the same level of reliability. However, since fragments must be periodically replaced as nodes fail, a key question is how to generate encoded fragments in a distributed way while transferring as little data as possible across the network. For an erasure coded system, a common practice to repair from a node failure is for a new node to download subsets of data stored at a number of surviving nodes, reconstruct a lost coded block using the downloaded data, and store it at the new node. We show that this procedure is sub-optimal. We introduce the notion of regenerating codes, which allow a new node to download \emph{functions} of the stored data from the surviving nodes. We show that regenerating codes can significantly reduce the repair bandwidth. Further, we show that there is a fundamental tradeoff between storage and repair bandwidth which we theoretically characterize using flow arguments on an appropriately constructed graph. By invoking constructive results in network coding, we introduce regenerating codes that can achieve any point in this optimal tradeoff.
[ { "version": "v1", "created": "Wed, 5 Mar 2008 11:05:08 GMT" } ]
2008-03-06T00:00:00
[ [ "Dimakis", "Alexandros G.", "" ], [ "Godfrey", "P. Brighten", "" ], [ "Wu", "Yunnan", "" ], [ "Wainwright", "Martin J.", "" ], [ "Ramchandran", "Kannan", "" ] ]
new_dataset
0.976779
0802.4057
Andrea Masini
Andrea Masini, Luca Vigan\`o, Margherita Zorzi
A Qualitative Modal Representation of Quantum Register Transformations
null
null
null
null
cs.LO
null
We introduce two modal natural deduction systems that are suitable to represent and reason about transformations of quantum registers in an abstract, qualitative, way. Quantum registers represent quantum systems, and can be viewed as the structure of quantum data for quantum operations. Our systems provide a modal framework for reasoning about operations on quantum registers (unitary transformations and measurements), in terms of possible worlds (as abstractions of quantum registers) and accessibility relations between these worlds. We give a Kripke--style semantics that formally describes quantum register transformations and prove the soundness and completeness of our systems with respect to this semantics.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 17:43:23 GMT" }, { "version": "v2", "created": "Wed, 5 Mar 2008 11:10:41 GMT" } ]
2008-03-05T00:00:00
[ [ "Masini", "Andrea", "" ], [ "Viganò", "Luca", "" ], [ "Zorzi", "Margherita", "" ] ]
new_dataset
0.999807
cs/0607118
Naohi Eguchi
Toshiyasu Arai and Naohi Eguchi
A new function algebra of EXPTIME functions by safe nested recursion
null
null
null
null
cs.CC
null
Bellantoni and Cook have given a function-algebra characterization of the polynomial-time computable functions via an unbounded recursion scheme which is called safe recursion. Inspired by their work, we characterize the exponential-time computable functions with the use of a safe variant of nested recursion.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 06:34:53 GMT" }, { "version": "v2", "created": "Wed, 5 Mar 2008 11:55:07 GMT" } ]
2008-03-05T00:00:00
[ [ "Arai", "Toshiyasu", "" ], [ "Eguchi", "Naohi", "" ] ]
new_dataset
0.988974
0803.0053
M Sabu THAMPI
Sabu M. Thampi, K. Chandra Sekaran
Mobile Agents for Content-Based WWW Distributed Image Retrieval
null
null
null
null
cs.DC cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
At present, the de-facto standard for providing contents in the Internet is the World Wide Web. A technology, which is now emerging on the Web, is Content-Based Image Retrieval (CBIR). CBIR applies methods and algorithms from computer science to analyse and index images based on their visual content. Mobile agents push the flexibility of distributed systems to their limits since not only computations are dynamically distributed but also the code that performs them. The current commercial applet-based methodologies for accessing image database systems offer limited flexibility, scalability and robustness. In this paper the author proposes a new framework for content-based WWW distributed image retrieval based on Java-based mobile agents. The implementation of the framework shows that its performance is comparable to, and in some cases outperforms, the current approach.
[ { "version": "v1", "created": "Sat, 1 Mar 2008 08:27:59 GMT" } ]
2008-03-04T00:00:00
[ [ "Thampi", "Sabu M.", "" ], [ "Sekaran", "K. Chandra", "" ] ]
new_dataset
0.99147
0803.0197
Radu Arsinte
Radu Arsinte, Attila Ferencz, Costin Miron
DSP Based System for Real time Voice Synthesis Applications Development
4 pages, 3 figures, SPECOM' 96 Conference
Proceedings of SPECOM' 96 Conference, 1996, St. Petersburg, Russia
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes an experimental system designed for development of real time voice synthesis applications. The system is composed from a DSP coprocessor card, equipped with an TMS320C25 or TMS320C50 chip, voice acquisition module (ADDA2),host computer (IBM-PC compatible), software specific tools.
[ { "version": "v1", "created": "Mon, 3 Mar 2008 09:04:46 GMT" } ]
2008-03-04T00:00:00
[ [ "Arsinte", "Radu", "" ], [ "Ferencz", "Attila", "" ], [ "Miron", "Costin", "" ] ]
new_dataset
0.991885
0803.0241
Ariel Daliot
Ariel Daliot, Danny Dolev, and Hanna Parnas
Self-Stabilizing Pulse Synchronization Inspired by Biological Pacemaker Networks
This is the full and revised version. A previous (obsolete) version appeared as TR2003-1, The Hebrew University of Jerusalem, 2003
In Proceedings of the Sixth Symposium on Self-Stabilizing Systems (SSS'03), San Francisco, June 2003. See also LNCS 2704
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define the ``Pulse Synchronization'' problem that requires nodes to achieve tight synchronization of regular pulse events, in the settings of distributed computing systems. Pulse-coupled synchronization is a phenomenon displayed by a large variety of biological systems, typically overcoming a high level of noise. Inspired by such biological models, a robust and self-stabilizing Byzantine pulse synchronization algorithm for distributed computer systems is presented. The algorithm attains near optimal synchronization tightness while tolerating up to a third of the nodes exhibiting Byzantine behavior concurrently. Pulse synchronization has been previously shown to be a powerful building block for designing algorithms in this severe fault model. We have previously shown how to stabilize general Byzantine algorithms, using pulse synchronization. To the best of our knowledge there is no other scheme to do this without the use of synchronized pulses.
[ { "version": "v1", "created": "Mon, 3 Mar 2008 13:46:45 GMT" }, { "version": "v2", "created": "Tue, 4 Mar 2008 18:07:32 GMT" } ]
2008-03-04T00:00:00
[ [ "Daliot", "Ariel", "" ], [ "Dolev", "Danny", "" ], [ "Parnas", "Hanna", "" ] ]
new_dataset
0.99463
0803.0316
Sandor P. Fekete
Erik D. Demaine, Martin L. Demaine, Sandor P. Fekete, Mashhood Ishaque, Eynat Rafalin, Robert T. Schweller and Diane Souvaine
Staged Self-Assembly:Nanomanufacture of Arbitrary Shapes with O(1) Glues
22 pages, 15 figures, 1table, PDFLatex; conference version in Proceedings of the 13th International Meeting on DNA Computing (DNA13), 2007, pp. 46-55, full version to appear in Natural Computing
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce staged self-assembly of Wang tiles, where tiles can be added dynamically in sequence and where intermediate constructions can be stored for later mixing. This model and its various constraints and performance measures are motivated by a practical nanofabrication scenario through protein-based bioengineering. Staging allows us to break through the traditional lower bounds in tile self-assembly by encoding the shape in the staging algorithm instead of the tiles. All of our results are based on the practical assumption that only a constant number of glues, and thus only a constant number of tiles, can be engineered, as each new glue type requires significant biochemical research and experiments. Under this assumption, traditional tile self-assembly cannot even manufacture an n*n square; in contrast, we show how staged assembly enables manufacture of arbitrary orthogonal shapes in a variety of precise formulations of the model.
[ { "version": "v1", "created": "Mon, 3 Mar 2008 20:20:52 GMT" } ]
2008-03-04T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Fekete", "Sandor P.", "" ], [ "Ishaque", "Mashhood", "" ], [ "Rafalin", "Eynat", "" ], [ "Schweller", "Robert T.", "" ], [ "Souvaine", "Diane", "" ] ]
new_dataset
0.997732
0802.4131
Sudhakar Sahoo
Birendra Kumar Nayak (1), Sudhakar Sahoo (2)
Language of Boolean functions its Grammar and Machine
5 pages, two tables, presented in Orissa Mathematical Society Conference, January, 2008
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper an algorithm is designed which generates in-equivalent Boolean functions of any number of variables from the four Boolean functions of single variable. The grammar for such set of Boolean function is provided. The Turing Machine that accepts such set is constructed.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 06:21:49 GMT" } ]
2008-02-29T00:00:00
[ [ "Nayak", "Birendra Kumar", "" ], [ "Sahoo", "Sudhakar", "" ] ]
new_dataset
0.992117
0802.3974
Vladimir Lapshin A
Vladimir Lapshin
Syntax diagrams as a formalism for representation of syntactic relations of formal languages
10 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The new approach to representation of syntax of formal languages-- a formalism of syntax diagrams is offered. Syntax diagrams look a convenient language for the description of syntactic relations in the languages having nonlinear representation of texts, for example, for representation of syntax lows of the language of structural chemical formulas. The formalism of neighbourhood grammar is used to describe the set of correct syntax constructs. The neighbourhood the grammar consists of a set of families of "neighbourhoods"-- the diagrams defined for each symbol of the language's alphabet. The syntax diagram is correct if each symbol is included into this diagram together with some neighbourhood. In other words, correct diagrams are needed to be covered by elements of the neighbourhood grammar. Thus, the grammar of formal language can be represented as system of the covers defined for each correct syntax diagram.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 08:59:58 GMT" }, { "version": "v2", "created": "Thu, 28 Feb 2008 09:28:59 GMT" } ]
2008-02-28T00:00:00
[ [ "Lapshin", "Vladimir", "" ] ]
new_dataset
0.99817
0802.4079
Salah A. Aly
Salah A. Aly
Families of LDPC Codes Derived from Nonprimitive BCH Codes and Cyclotomic Cosets
Private comments are welcome
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low-density parity check (LDPC) codes are an important class of codes with many applications. Two algebraic methods for constructing regular LDPC codes are derived -- one based on nonprimitive narrow-sense BCH codes and the other directly based on cyclotomic cosets. The constructed codes have high rates and are free of cycles of length four; consequently, they can be decoded using standard iterative decoding algorithms. The exact dimension and bounds for the minimum distance and stopping distance are derived. These constructed codes can be used to derive quantum error-correcting codes.
[ { "version": "v1", "created": "Wed, 27 Feb 2008 20:44:41 GMT" } ]
2008-02-28T00:00:00
[ [ "Aly", "Salah A.", "" ] ]
new_dataset
0.99864
0802.3419
N. Prasanth Anthapadmanabhan
N. Prasanth Anthapadmanabhan and Alexander Barg
Randomized Frameproof Codes: Fingerprinting Plus Validation Minus Tracing
5 pages, To appear in the Proceedings of Conference on Information Sciences and Systems (CISS), Princeton, NJ, Mar 2008
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose randomized frameproof codes for content protection, which arise by studying a variation of the Boneh-Shaw fingerprinting problem. In the modified system, whenever a user tries to access his fingerprinted copy, the fingerprint is submitted to a validation algorithm to verify that it is indeed permissible before the content can be executed. We show an improvement in the achievable rates compared to deterministic frameproof codes and traditional fingerprinting codes. For coalitions of an arbitrary fixed size, we construct randomized frameproof codes which have an $O(n^2)$ complexity validation algorithm and probability of error $\exp(-\Omega(n)),$ where $n$ denotes the length of the fingerprints. Finally, we present a connection between linear frameproof codes and minimal vectors for size-2 coalitions.
[ { "version": "v1", "created": "Sat, 23 Feb 2008 03:16:19 GMT" } ]
2008-02-26T00:00:00
[ [ "Anthapadmanabhan", "N. Prasanth", "" ], [ "Barg", "Alexander", "" ] ]
new_dataset
0.996163
0802.3490
Ying Jun Zhang Ph.D.
Jing Ma and Ying Jun Zhang
On capacity of wireless ad hoc networks with MIMO MMSE receivers
null
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Widely adopted at home, business places, and hot spots, wireless ad-hoc networks are expected to provide broadband services parallel to their wired counterparts in near future. To address this need, MIMO techniques, which are capable of offering several-fold increase in capacity, hold significant promise. Most previous work on capacity analysis of ad-hoc networks is based on an implicit assumption that each node has only one antenna. Core to the analysis therein is the characterization of a geometric area, referred to as the exclusion region, which quantizes the amount of spatial resource occupied by a link. When multiple antennas are deployed at each node, however, multiple links can transmit in the vicinity of each other simultaneously, as interference can now be suppressed by spatial signal processing. As such, a link no longer exclusively occupies a geometric area, making the concept of "exclusion region" not applicable any more. In this paper, we investigate link-layer throughput capacity of MIMO ad-hoc networks. In contrast to previous work, the amount of spatial resource occupied by each link is characterized by the actual interference it imposes on other links. To calculate the link-layer capacity, we first derive the probability distribution of post-detection SINR at a receiver. The result is then used to calculate the number of active links and the corresponding data rates that can be sustained within an area. Our analysis will serve as a guideline for the design of medium access protocols for MIMO ad-hoc networks. To the best of knowledge, this paper is the first attempt to characterize the capacity of MIMO ad-hoc networks by considering the actual PHY-layer signal and interference model.
[ { "version": "v1", "created": "Sun, 24 Feb 2008 05:00:21 GMT" } ]
2008-02-26T00:00:00
[ [ "Ma", "Jing", "" ], [ "Zhang", "Ying Jun", "" ] ]
new_dataset
0.997662
0802.3038
EDA Publishing Association
Fei Duan, Jiwei Jiao, Yucai Wang, Ying Zhang, Binwei Mi, Jinpeng Li, Jian Zhu, Yuelin Wang
A Novel X-Axis Tuning Fork Gyroscope with "8 Vertical Springs-Proofmass" Structure on (111)-Silicon
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
A novel x-axis tuning fork MEMS gyroscope with "8 vertical springs-proofmass" structure for Coriolis effect detection is presented. Compared with the common single-plane springs, the 8 vertical springs, symmetrically located at the top and bottom sides, more stably suspend the large thick proofmass featuring large capacitance variation and low mechanical noise. A bulk-micromachining technology is applied to obtain the large proofmass and twins-like dual beams. During the fabrication process, the dimensions of the 8 vertical springs are precisely confined by thermal oxide protected limit trenches (LTs) sidewalls and the extreme slowly etched (111)-planes; therefore a small mismatch of less than 30 Hz is achieved before tuning. Initial test shows a sensitivity of 0.15mV/(deg/s) and rate resolution around 0.1deg/s under atmosphere pressure.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:10:45 GMT" } ]
2008-02-22T00:00:00
[ [ "Duan", "Fei", "" ], [ "Jiao", "Jiwei", "" ], [ "Wang", "Yucai", "" ], [ "Zhang", "Ying", "" ], [ "Mi", "Binwei", "" ], [ "Li", "Jinpeng", "" ], [ "Zhu", "Jian", "" ], [ "Wang", "Yuelin", "" ] ]
new_dataset
0.999732
0802.3040
EDA Publishing Association
D. Grogg, Nicoleta Diana Badila-Ciressan, Adrian Mihai Ionescu
Fabrication of MEMS Resonators in Thin SOI
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
A simple and fast process for micro-electromechanical (MEM) resonators with deep sub-micron transduction gaps in thin SOI is presented in this paper. Thin SOI wafers are important for advanced CMOS technology and thus are evaluated as resonator substrates for future co-integration with CMOS circuitry on a single chip. As the transduction capacitance scales with the resonator thickness, it is important to fabricate deep sub-micron trenches in order to achieve a good capacitive coupling. Through the combination of conventional UV-lithography and focused ion beam (FIB) milling the process needs only two lithography steps, enabling therefore a way for fast prototyping of MEM-resonators. Different FIB parameters and etching parameters are compared in this paper and their effect on the process are reported.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:12:11 GMT" } ]
2008-02-22T00:00:00
[ [ "Grogg", "D.", "" ], [ "Badila-Ciressan", "Nicoleta Diana", "" ], [ "Ionescu", "Adrian Mihai", "" ] ]
new_dataset
0.996043
0802.3041
EDA Publishing Association
Veronika Tim\'ar-Horv\'ath, L\'aszl\'o Juh\'asz, Andr\'as Vass-V\'arnai, Gergely Perlaky
Usage of Porous Al2O3 Layers for RH Sensing
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
At the Department of Electron Devices a cheap, more or less CMOS process compatible capacitive type RH sensor has been developed. Capacitive sensors are based on dielectric property changes of thin films upon water vapour uptake which depends on the surrounding media's relative humidity content. Because of the immense surface-to-volume ratio and the abundant void fraction, very high sensitivities can be obtained with porous ceramics. One of the ceramics to be used is porous Al2O3, obtained by electrochemical oxidation of aluminium under anodic bias. The average pore sizes are between 6...9 nm. In our paper we intend to demonstrate images representing the influence of the technological parameters on the porous structure and the device sensitivity.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:12:21 GMT" } ]
2008-02-22T00:00:00
[ [ "Timár-Horváth", "Veronika", "" ], [ "Juhász", "László", "" ], [ "Vass-Várnai", "András", "" ], [ "Perlaky", "Gergely", "" ] ]
new_dataset
0.997694
0802.3043
EDA Publishing Association
Jyh-Cheng Yu, Huang-Yao Lin
Liquid Density Sensing Using Resonant Flexural Plate Wave Device with Sol-Gel PZT Thin Films
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
This paper presents the design, fabrication and preliminary experimental results of a flexure plate wave (FPW) resonator using sol-gel derived lead zirconate titanates (PZT) thin films. The resonator adopts a two-port structure with reflecting grates on the composite membrane of PZT and SiNx. The design of the reflecting grate is derived from a SAW resonator model using COM theory to produce a sharp resonant peak. The comparison between the mass and the viscosity effects from the theoretical expression illustrates the applications and the constraints of the proposed device in liquid sensing. Multiple coatings of sol-gel derived PZT films are adopted because of the cost advantage and the high electromechanical coupling effect over other piezoelectric films. The fabrication issues of the proposed material structure are addressed. Theoretical estimations of the mass and the viscosity effects are compared with the experimental results. The resonant frequency has a good linear correlation with the density of low viscosity liquids, which demonstrate the feasibility of the proposed device.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:13:48 GMT" } ]
2008-02-22T00:00:00
[ [ "Yu", "Jyh-Cheng", "" ], [ "Lin", "Huang-Yao", "" ] ]
new_dataset
0.999139
0802.3047
EDA Publishing Association
C. Saha, T. O'Donnell, J. Godsell, L. Carlioz, N. Wang, P. Mccloskey, S. Beeby, J. Tudor, Russel Torah
Step-up converter for electromagnetic vibrational energy scavenger
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
This paper introduces a voltage multiplier (VM) circuit which can step up a minimum voltage of 150 mV (peak). The operation and characteristics of this converter circuit are described. The voltage multiplier circuit is also tested with micro and macro scale electromagnetic vibrational generators and the effect of the VM on the optimum load conditions of the electromagnetic generator is presented. The measured results show that 85% efficiency can be achieved from this VM circuit at a power level of 18 ?W.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:16:59 GMT" } ]
2008-02-22T00:00:00
[ [ "Saha", "C.", "" ], [ "O'Donnell", "T.", "" ], [ "Godsell", "J.", "" ], [ "Carlioz", "L.", "" ], [ "Wang", "N.", "" ], [ "Mccloskey", "P.", "" ], [ "Beeby", "S.", "" ], [ "Tudor", "J.", "" ], [ "Torah", "Russel", "" ] ]
new_dataset
0.996521
0802.3050
EDA Publishing Association
J.-C. Crebier (G2ELab), Y. Lembeye (G2ELab), H. Raisigel (G2ELab), O. Deleage (G2ELab), J. Delamare (G2ELab), O. Cugat (G2ELab)
High Efficiency 3-Phase Cmos Rectifier with Step Up and Regulated
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
This paper presents several design issues related to the monolithic integration of a 3-phase AC to DC low voltage, low power rectifier for 3-phase micro source electrical conditioning. Reduced input voltage operation (down to 1V), high efficiency, and output voltage regulations are implemented, based on commercially available CMOS technology. Global design and system issues are detailed. The management of start-up sequences under self supplied conditions as well as output voltage regulations are specifically addressed. Simulation results, practical implementation and validation are presented. They are based on the association of three micro elements : a 3-phase micro-generator, a stand alone 3-phase AC to DC integrated rectifier, and an output voltage conditioner based on a commercially available IC.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:18:23 GMT" } ]
2008-02-22T00:00:00
[ [ "Crebier", "J. -C.", "", "G2ELab" ], [ "Lembeye", "Y.", "", "G2ELab" ], [ "Raisigel", "H.", "", "G2ELab" ], [ "Deleage", "O.", "", "G2ELab" ], [ "Delamare", "J.", "", "G2ELab" ], [ "Cugat", "O.", "", "G2ELab" ] ]
new_dataset
0.992595
0802.3053
EDA Publishing Association
D. Szente-Varga, D. Horvath, M. Rencz
Ni-MH battery modelling for ambient intelligence applications
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
Mobile devices, like sensor networks and MEMS actuators use mobile power supplies to ensure energy for their operation. These are mostly batteries. The lifetime of the devices depends on the power consumption and on the quality and capacitance of the battery. Though the integrated circuits and their power consumption improve continually, their clock frequency also increases with the time, and the resultant power consumption seems not to vary, or slightly increase. On the other hand, the properties of batteries are developing much slower, necessitating the optimization of their usage on system level.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:19:51 GMT" } ]
2008-02-22T00:00:00
[ [ "Szente-Varga", "D.", "" ], [ "Horvath", "D.", "" ], [ "Rencz", "M.", "" ] ]
new_dataset
0.998808
0802.3056
EDA Publishing Association
T.-H. Lin, H. Yang, Ruey Fang Shyu, C.-K. Chao
New Horizontal Frustum Optical Waveguide Fabrication Using UV Proximity Printing
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
This paper presents a novel method to fabricate the horizontal frustum structure as a planar optical waveguide by using the proximity printing technique. A horizontal frustum optical waveguide with a both lateral and vertical taper structure was produced. The orthogonal and inclined masks with the diffraction effect were employed in lithography process. This method can precisely control each horizontal frustum optical waveguide geometric profile in the fabrication process. The horizontal frustum optical waveguide and its array with the same inclined angle were generated. The beam propagation simulation software (BPM_CAD) was used to modeling the optical performance. The simulation results reveal that the mode profile matched into horizontal frustum optical waveguide and fiber from the laser diode. The optical loss of horizontal hemi-frustum structure of optical waveguides was less than 0.2dB. The horizontal hemifrustum waveguide will be used for fiber coupling on boards for further optical communication systems.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:21:31 GMT" } ]
2008-02-22T00:00:00
[ [ "Lin", "T. -H.", "" ], [ "Yang", "H.", "" ], [ "Shyu", "Ruey Fang", "" ], [ "Chao", "C. -K.", "" ] ]
new_dataset
0.998999
0802.3060
EDA Publishing Association
T. Sterken, Geert Altena, P. Fiorini, R. Puers
Characterisation of an Electrostatic Vibration Harvester
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
Harvesting energy from ambient vibration is proposed as an alternative to storage based power supplies for autonomous systems. The system presented converts the mechanical energy of a vibration into electrical energy by means of a variable capacitor, which is polarized by an electret. A lumped element model is used to study the generator and design a prototype. The device has been micromachined in silicon, based on a two-wafer process. The prototype was successfully tested, both using an external polarization source and an electret.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:23:04 GMT" } ]
2008-02-22T00:00:00
[ [ "Sterken", "T.", "" ], [ "Altena", "Geert", "" ], [ "Fiorini", "P.", "" ], [ "Puers", "R.", "" ] ]
new_dataset
0.989541
0802.3062
EDA Publishing Association
P. Bruschi, V. Nurra
An Integrated Circuit Compatible Compact Package for Thermal Gas Flowmeters
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
An original packaging method suitable for integrated thermal mass flow sensors is presented. The method consists in the application of a plastic transparent adapter to the chip surface. The adapter is sealed to the chip surface by means of a thermal procedure. By this approach it is possible to selectively convey the fluid flow to reduced chip areas, avoiding contact with the pads. Fabrication and testing of a very compact flow sensor is described.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:23:39 GMT" } ]
2008-02-22T00:00:00
[ [ "Bruschi", "P.", "" ], [ "Nurra", "V.", "" ] ]
new_dataset
0.999438
0802.3063
EDA Publishing Association
A.M. Paracha (ESYCOM-Esiee), Ph. Basset (ESYCOM-Esiee), F. Marty (ESYCOM-Esiee), A. Vaisman Chasin (ESYCOM-Esiee), P. Poulichet (ESYCOM-Esiee), T. Bourouina (ESYCOM-Esiee)
A High Power Density Electrostatic Vibration-to-Electric Energy Converter Based On An In-Plane Overlap Plate (IPOP) Mechanism
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
In this paper, design, fabrication and characterization issues of a bulk silicon-based, vibration powered, electric energy generator are addressed. The converter is based on an In-Plane Overlap Plate (IPOP) configuration [1]. Measurements have shown that with a theoretically lossless electronics and a starting voltage of 5 V, power density of 58 $\mu$W/cm3 is achievable at the resonance frequency of 290 Hz. It can be further improved by reducing the parasitic capacitance, which can be achieved by silicon etching, but a considerable mass is lost. In [2], it is shown that 19% of mass reduction improves power density from 12.95 $\mu$W/cm3 to 59 $\mu$W/cm3. Hence an enhancement in fabrication process is proposed, which is termed as Backside DRIE. It helps in increasing power density without loosing an important quantity of mass. Simulations have shown that 2.5% of mass removal improves power density up to 76.71 $\mu$W/cm3. Initial simulation results and problems of associated electronics are also discussed.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:24:47 GMT" } ]
2008-02-22T00:00:00
[ [ "Paracha", "A. M.", "", "ESYCOM-Esiee" ], [ "Basset", "Ph.", "", "ESYCOM-Esiee" ], [ "Marty", "F.", "", "ESYCOM-Esiee" ], [ "Chasin", "A. Vaisman", "", "ESYCOM-Esiee" ], [ "Poulichet", "P.", "", "ESYCOM-Esiee" ], [ "Bourouina", "T.", "", "ESYCOM-Esiee" ] ]
new_dataset
0.998928
0802.3065
EDA Publishing Association
J. Jakovenko, M. Husak, T. Lalinskytfh, M. Drzik, G. Vanko
Design and Modeling of Micromechanical GaAs based Hot Plate for Gas Sensors
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
For modern Gas sensors, high sensitivity and low power are expected. This paper discusses design, simulation and fabrication of new Micromachined Thermal Converters (MTCs) based on GaAs developed for Gas sensors. Metal oxide gas sensors generally work in high temperature mode that is required for chemical reactions to be performed between molecules of the specified gas and the surface of sensing material. There is a low power consumption required to obtain the operation temperatures in the range of 200 to 500 oC. High thermal isolation of these devices solves consumption problem and can be made by designing of free standing micromechanical hot plates. Mechanical stability and a fast thermal response are especially significant parameters that can not be neglected. These characteristics can be achieved with new concept of GaAs thermal converter.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:25:46 GMT" } ]
2008-02-22T00:00:00
[ [ "Jakovenko", "J.", "" ], [ "Husak", "M.", "" ], [ "Lalinskytfh", "T.", "" ], [ "Drzik", "M.", "" ], [ "Vanko", "G.", "" ] ]
new_dataset
0.957965
0802.3070
EDA Publishing Association
H.K. Ma, B.R. Hou, H.Y. Wu, C.Y. Lin, J.J. Gao, M.C. Kou
Development and Application of a Diaphragm Micro-Pump with Piezoelectric Device
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
In this study, a new type of thin, compact, and light weighed diaphragm micro-pump has been successfully developed to actuate the liquid by the vibration of a diaphragm. The micro-diaphragm pump with two valves is fabricated in an aluminum case by using highly accurate CNC machine, and the cross-section dimension is 5mm x 8mm. Both valves and diaphragm are manufactured from PDMS. The amplitude of vibration by a piezoelectric device produces an oscillating flow which may change the chamber volume by changing the curvature of a diaphragm. Several experimental set-ups for performance test in a single micro-diaphragm pump, isothermal flow open system, and a closed liquid cooling system is designed and implemented. The performance of one-side actuating micro-diaphragm pump is affected by the design of check valves, diaphragm, piezoelectric device, chamber volume, input voltage and frequency. The measured maximum flow rate of present design is 72 ml/min at zero total pump head in the range of operation frequency 70-180 Hz.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:28:46 GMT" } ]
2008-02-22T00:00:00
[ [ "Ma", "H. K.", "" ], [ "Hou", "B. R.", "" ], [ "Wu", "H. Y.", "" ], [ "Lin", "C. Y.", "" ], [ "Gao", "J. J.", "" ], [ "Kou", "M. C.", "" ] ]
new_dataset
0.976527
0802.3074
EDA Publishing Association
G.-J. Wang, K.-H. Ho, C.-C. Hsueh
Biodegradable Polylactic Acid (PLA) Microstructures for Scaffold Applications
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
In this research, we present a simple and cost effective soft lithographic process to fabricate PLA scaffolds for tissue engineering. In which, the negative photoresist JSR THB-120N was spun on a glass subtract followed by conventional UV lithographic processes to fabricate the master to cast the PDMS elastomeric mold. A thin poly(vinyl alcohol) (PVA) layer was used as a mode release such that the PLA scaffold can be easily peeled off. The PLA precursor solution was then cast onto the PDMS mold to form the PLA microstructures. After evaporating the solvent, the PLA microstructures can be easily peeled off from the PDMS mold. Experimental results show that the desired microvessels scaffold can be successfully transferred to the biodegradable polymer PLA.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:32:51 GMT" } ]
2008-02-22T00:00:00
[ [ "Wang", "G. -J.", "" ], [ "Ho", "K. -H.", "" ], [ "Hsueh", "C. -C.", "" ] ]
new_dataset
0.997113
0802.3078
EDA Publishing Association
S. Soulimane (LETI), F. Casset (LETI), F. Chapuis (LETI), P.-L. Charvet (LETI), M. a\"id (LETI)
Tuneable Capacitor based on dual picks profile of the sacrificial layer
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
In this paper, we present a novel dual gap tuneable capacitor process based on the profile of the sacrificial layer. This profile involves a tri-layer photo-resist process with only one mask level. This realization is based on a special profile of the sacrificial layer designed by two picks. The mechanism of the sacrificial layer realisation is dependent on resist thickness, resist formulation (viscosity, type of polymer and/or solvent, additives...), design of the patterned layer (size or width) and the conditions under which this layer is prepared: thermal treatment, etch back processes... In this communication we demonstrate influence of the later parameters and discuss how a dual pick profile was achieved.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:35:51 GMT" } ]
2008-02-22T00:00:00
[ [ "Soulimane", "S.", "", "LETI" ], [ "Casset", "F.", "", "LETI" ], [ "Chapuis", "F.", "", "LETI" ], [ "Charvet", "P. -L.", "", "LETI" ], [ "aïd", "M.", "", "LETI" ] ]
new_dataset
0.998277
0802.3081
EDA Publishing Association
Z. Jian, Y. Yuanwei, Z. Yong, Chen Chen, J. Shixing
A High-Q Microwave MEMS Resonator
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
A High-Q microwave (K band) MEMS resonator is presented, which empolys substrate integrated waveguide (SIW) and micromachined via-hole arrays by ICP process. Nonradiation dielectric waveguide (NRD) is formed by metal filled via-hole arrays and grounded planes. The three dimensional (3D) high resistivity silicon substrate filled cavity resonator is fed by current probes using CPW line. This monolithic resonator results in low cost, high performance and easy integration with planar cicuits. The measured quality factor is beyond 180 and the resonance frequency is 21GHz.It shows a good agreement with the simulation results. The chip size is only 4.7mm x 4.6mm x 0.5mm. Finally, as an example of applications, a filter using two SIW resonators is designed.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:38:12 GMT" } ]
2008-02-22T00:00:00
[ [ "Jian", "Z.", "" ], [ "Yuanwei", "Y.", "" ], [ "Yong", "Z.", "" ], [ "Chen", "Chen", "" ], [ "Shixing", "J.", "" ] ]
new_dataset
0.999111
0802.3088
EDA Publishing Association
M. Bedani, F. Carozza, R. Gaddi, A. Gnudi, B. Margesin, F. Giacomozzi
A Reconfigurable Impedance Matching Network Employing RF-MEMS Switches
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
We propose the design of a reconfigurable impedance matching network for the lower RF frequency band, based on a developed RF-MEMS technology. The circuit is composed of RF-MEMS ohmic relays, metal-insulator-metal (MIM) capacitors and suspended spiral inductors, all integrated on a high resistivity Silicon substrate. The presented circuit is well-suited for all applications requiring adaptive impedance matching between two in principle unknown cascaded RF-circuits. The fabrication and testing of a monolithic integrated prototype in RF-MEMS technology from ITC-irst is currently underway.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:42:02 GMT" } ]
2008-02-22T00:00:00
[ [ "Bedani", "M.", "" ], [ "Carozza", "F.", "" ], [ "Gaddi", "R.", "" ], [ "Gnudi", "A.", "" ], [ "Margesin", "B.", "" ], [ "Giacomozzi", "F.", "" ] ]
new_dataset
0.995018
0802.3092
EDA Publishing Association
R. Levy (ONERA - Mfe), A. Dupret (ONERA - Mfe), H. Mathias (ONERA - Mfe), J.-P. Gilles (ONERA - Mfe), F. Parrain (ONERA - Mfe), B. Eisenbeis (IEF), S. Megherbi (IEF)
Noise and thermal stability of vibrating micro-gyrometers preamplifiers
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
The preamplifier is a critical component of gyrometer's electronics. Indeed the resolution of the sensor is limited by its signal to noise ratio, and the gyrometer's thermal stability is limited by its gain drift. In this paper, five different kinds of preamplifiers are presented and compared. Finally, the design of an integrated preamplifier is shown in order to increase the gain stability while reducing its noise and size.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:42:54 GMT" } ]
2008-02-22T00:00:00
[ [ "Levy", "R.", "", "ONERA - Mfe" ], [ "Dupret", "A.", "", "ONERA - Mfe" ], [ "Mathias", "H.", "", "ONERA -\n Mfe" ], [ "Gilles", "J. -P.", "", "ONERA - Mfe" ], [ "Parrain", "F.", "", "ONERA - Mfe" ], [ "Eisenbeis", "B.", "", "IEF" ], [ "Megherbi", "S.", "", "IEF" ] ]
new_dataset
0.987867
0802.3093
EDA Publishing Association
N. Abel\'e, D. Grogg, C. Hibert, F. Casset (LETI), P. Ancey (LETI), A. Ionescu
0-level Vacuum Packaging RT Process for MEMS Resonators
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
A new Room Temperature (RT) 0-level vacuum package is demonstrated in this work, using amorphous silicon (aSi) as sacrificial layer and SiO2 as structural layer. The process is compatible with most of MEMS resonators and Resonant Suspended-Gate MOSFET [1] fabrication processes. This paper presents a study on the influence of releasing hole dimensions on the releasing time and hole clogging. It discusses mass production compatibility in terms of packaging stress during back-end plastic injection process. The packaging is done at room temperature making it fully compatible with IC-processed wafers and avoiding any subsequent degradation of the active devices.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:43:06 GMT" } ]
2008-02-22T00:00:00
[ [ "Abelé", "N.", "", "LETI" ], [ "Grogg", "D.", "", "LETI" ], [ "Hibert", "C.", "", "LETI" ], [ "Casset", "F.", "", "LETI" ], [ "Ancey", "P.", "", "LETI" ], [ "Ionescu", "A.", "" ] ]
new_dataset
0.995713
0802.3099
EDA Publishing Association
E. Pajot-Augy (NOPA)
Nanobiosensors based on individual olfactory receptors
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
In the SPOT-NOSED European project, nanoscale sensing elements bearing olfactory receptors and grafted onto functionalized gold substrates are used as odorant detectors to develop a new concept of nanobioelectronic nose, through sensitive impedancemetric measurement of single receptor conformational change upon ligand binding, with a better specificity and lower detection threshold than traditional physical sensors.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:44:35 GMT" } ]
2008-02-22T00:00:00
[ [ "Pajot-Augy", "E.", "", "NOPA" ] ]
new_dataset
0.998639
0802.3104
EDA Publishing Association
M.C. Hsieh, D.K. Jair, Y.K. Fang, C.S. Lin
Design and Fabrication of the Suspended High-Q Spiral Inductors with X-Beams
Submitted on behalf of EDA Publishing Association (http://irevues.inist.fr/EDA-Publishing)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2007, Stresa, lago Maggiore : Italie (2007)
null
null
cs.OH
null
In this paper, deep sub-micron CMOS process compatible high Q on chip spiral inductors with air gap structure were designed and fabricated. In the design the electromagnetic were used for electrical-characteristics and maximum mechanical strength, respectively. The copper wires were capped with electroless Ni plating to prevent the copper from oxidizing. A Si3N4/ SiO2 X-beam was designed to increase the mechanical strength of the inductor in air gap. The enhancement of maximum mechanical strength of a spiral inductor with X-beams is more than 4500 times. Among these structures, the measured maximum quality factor (Q) of the suspending inductor and frequency at maximum Q are improved from 5.2 and 1.6GHz of conventional spiral inductor to 7.3 and 2.1 GHz, respectively.
[ { "version": "v1", "created": "Thu, 21 Feb 2008 13:45:51 GMT" } ]
2008-02-22T00:00:00
[ [ "Hsieh", "M. C.", "" ], [ "Jair", "D. K.", "" ], [ "Fang", "Y. K.", "" ], [ "Lin", "C. S.", "" ] ]
new_dataset
0.991957
0802.2845
Pascal Weil
Eric Colin De Verdi\`ere (LIENS), Alexander Schrijver (CWI)
Shortest Vertex-Disjoint Two-Face Paths in Planar Graphs
null
Dans Proceedings of the 25th Annual Symposium on the Theoretical Aspects of Computer Science - STACS 2008, Bordeaux : France (2008)
null
null
cs.DS math.CO
null
Let $G$ be a directed planar graph of complexity $n$, each arc having a nonnegative length. Let $s$ and $t$ be two distinct faces of $G$; let $s_1,...,s_k$ be vertices incident with $s$; let $t_1,...,t_k$ be vertices incident with $t$. We give an algorithm to compute $k$ pairwise vertex-disjoint paths connecting the pairs $(s_i,t_i)$ in $G$, with minimal total length, in $O(kn\log n)$ time.
[ { "version": "v1", "created": "Wed, 20 Feb 2008 14:20:48 GMT" } ]
2008-02-21T00:00:00
[ [ "De Verdière", "Eric Colin", "", "LIENS" ], [ "Schrijver", "Alexander", "", "CWI" ] ]
new_dataset
0.995331
cs/0211004
Wolfgang Faber
Nicola Leone, Gerald Pfeifer, Wolfgang Faber, Thomas Eiter, Georg Gottlob, Simona Perri, Francesco Scarcello
The DLV System for Knowledge Representation and Reasoning
56 pages, 9 figures, 6 tables
ACM Transactions on Computational Logic 7(3):499-562, 2006
10.1145/1149114.1149117
null
cs.AI cs.LO cs.PL
null
This paper presents the DLV system, which is widely considered the state-of-the-art implementation of disjunctive logic programming, and addresses several aspects. As for problem solving, we provide a formal definition of its kernel language, function-free disjunctive logic programs (also known as disjunctive datalog), extended by weak constraints, which are a powerful tool to express optimization problems. We then illustrate the usage of DLV as a tool for knowledge representation and reasoning, describing a new declarative programming methodology which allows one to encode complex problems (up to $\Delta^P_3$-complete problems) in a declarative fashion. On the foundational side, we provide a detailed analysis of the computational complexity of the language of DLV, and by deriving new complexity results we chart a complete picture of the complexity of this language and important fragments thereof. Furthermore, we illustrate the general architecture of the DLV system which has been influenced by these results. As for applications, we overview application front-ends which have been developed on top of DLV to solve specific knowledge representation tasks, and we briefly describe the main international projects investigating the potential of the system for industrial exploitation. Finally, we report about thorough experimentation and benchmarking, which has been carried out to assess the efficiency of the system. The experimental results confirm the solidity of DLV and highlight its potential for emerging application areas like knowledge management and information integration.
[ { "version": "v1", "created": "Mon, 4 Nov 2002 15:18:04 GMT" }, { "version": "v2", "created": "Fri, 22 Aug 2003 22:22:39 GMT" }, { "version": "v3", "created": "Wed, 10 Sep 2003 18:01:29 GMT" } ]
2008-02-21T00:00:00
[ [ "Leone", "Nicola", "" ], [ "Pfeifer", "Gerald", "" ], [ "Faber", "Wolfgang", "" ], [ "Eiter", "Thomas", "" ], [ "Gottlob", "Georg", "" ], [ "Perri", "Simona", "" ], [ "Scarcello", "Francesco", "" ] ]
new_dataset
0.999248
0802.2528
Nitish Korula
Chandra Chekuri, Nitish Korula
Min-Cost 2-Connected Subgraphs With k Terminals
18 pages, 3 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the k-2VC problem, we are given an undirected graph G with edge costs and an integer k; the goal is to find a minimum-cost 2-vertex-connected subgraph of G containing at least k vertices. A slightly more general version is obtained if the input also specifies a subset S \subseteq V of terminals and the goal is to find a subgraph containing at least k terminals. Closely related to the k-2VC problem, and in fact a special case of it, is the k-2EC problem, in which the goal is to find a minimum-cost 2-edge-connected subgraph containing k vertices. The k-2EC problem was introduced by Lau et al., who also gave a poly-logarithmic approximation for it. No previous approximation algorithm was known for the more general k-2VC problem. We describe an O(\log n \log k) approximation for the k-2VC problem.
[ { "version": "v1", "created": "Mon, 18 Feb 2008 18:34:28 GMT" } ]
2008-02-19T00:00:00
[ [ "Chekuri", "Chandra", "" ], [ "Korula", "Nitish", "" ] ]
new_dataset
0.999622
0802.1790
Silvano Di Zenzo
Silvano Di Zenzo
SAT Has No Wizards
19 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An (encoded) decision problem is a pair (E, F) where E=words that encode instances of the problem, F=words to be accepted. We use "strings" in a technical sense. With an NP problem (E, F) we associate the "logogram" of F relative to E, which conveys structural information on E, F, and how F is embedded in E. The kernel Ker(P) of a program P that solves (E, F) consists of those strings in the logogram that are used by P. There are relations between Ker(P) and the complexity of P. We develop an application to SAT that relies upon a property of internal independence of SAT. We show that SAT cannot have in its logogram strings serving as collective certificates. As consequence, all programs that solve SAT have same kernel.
[ { "version": "v1", "created": "Wed, 13 Feb 2008 14:43:40 GMT" } ]
2008-02-14T00:00:00
[ [ "Di Zenzo", "Silvano", "" ] ]
new_dataset
0.984839
0802.1699
Prajakta Nimbhorkar
Nutan Limaye, Meena Mahajan, Prajakta Nimbhorkar
Longest paths in Planar DAGs in Unambiguous Logspace
null
null
null
null
cs.CC
http://creativecommons.org/licenses/by-nc-sa/3.0/
We show via two different algorithms that finding the length of the longest path in planar directed acyclic graph (DAG) is in unambiguous logspace UL, and also in the complement class co-UL. The result extends to toroidal DAGs as well.
[ { "version": "v1", "created": "Tue, 12 Feb 2008 20:08:39 GMT" } ]
2008-02-13T00:00:00
[ [ "Limaye", "Nutan", "" ], [ "Mahajan", "Meena", "" ], [ "Nimbhorkar", "Prajakta", "" ] ]
new_dataset
0.972964
0802.1393
Clement Jonquet
Cl\'ement Jonquet (LIRMM), Stefano A. Cerri (LIRMM)
Les Agents comme des interpr\'eteurs Scheme : Sp\'ecification dynamique par la communication
null
Dans 14\`eme Congr\`es Francophone AFRIF-AFIA de Reconnaissance des Formes et Intelligence Artificielle - RFIA'04, Toulouse : France (2004)
null
null
cs.MA cs.AI
null
We proposed in previous papers an extension and an implementation of the STROBE model, which regards the Agents as Scheme interpreters. These Agents are able to interpret messages in a dedicated environment including an interpreter that learns from the current conversation therefore representing evolving meta-level Agent's knowledge. When the Agent's interpreter is a nondeterministic one, the dialogues may consist of subsequent refinements of specifications in the form of constraint sets. The paper presents a worked out example of dynamic service generation - such as necessary on Grids - by exploiting STROBE Agents equipped with a nondeterministic interpreter. It shows how enabling dynamic specification of a problem. Then it illustrates how these principles could be effective for other applications. Details of the implementation are not provided here, but are available.
[ { "version": "v1", "created": "Mon, 11 Feb 2008 08:55:46 GMT" } ]
2008-02-12T00:00:00
[ [ "Jonquet", "Clément", "", "LIRMM" ], [ "Cerri", "Stefano A.", "", "LIRMM" ] ]
new_dataset
0.994284
0801.4746
W Saba
Walid S. Saba
Concerning Olga, the Beautiful Little Street Dancer (Adjectives as Higher-Order Polymorphic Functions)
6 pages
null
null
null
cs.CL cs.LO
null
In this paper we suggest a typed compositional seman-tics for nominal compounds of the form [Adj Noun] that models adjectives as higher-order polymorphic functions, and where types are assumed to represent concepts in an ontology that reflects our commonsense view of the world and the way we talk about it in or-dinary language. In addition to [Adj Noun] compounds our proposal seems also to suggest a plausible explana-tion for well known adjective ordering restrictions.
[ { "version": "v1", "created": "Wed, 30 Jan 2008 19:40:45 GMT" }, { "version": "v2", "created": "Thu, 31 Jan 2008 17:10:22 GMT" }, { "version": "v3", "created": "Fri, 1 Feb 2008 01:34:55 GMT" }, { "version": "v4", "created": "Mon, 4 Feb 2008 22:36:04 GMT" }, { "version": "v5", "created": "Sun, 10 Feb 2008 08:26:02 GMT" } ]
2008-02-10T00:00:00
[ [ "Saba", "Walid S.", "" ] ]
new_dataset
0.998182
0802.0835
Rossano Venturini
Paolo Ferragina, Igor Nitto and Rossano Venturini
Bit-Optimal Lempel-Ziv compression
null
null
null
null
cs.DS cs.IT math.IT
null
One of the most famous and investigated lossless data-compression scheme is the one introduced by Lempel and Ziv about 40 years ago. This compression scheme is known as "dictionary-based compression" and consists of squeezing an input string by replacing some of its substrings with (shorter) codewords which are actually pointers to a dictionary of phrases built as the string is processed. Surprisingly enough, although many fundamental results are nowadays known about upper bounds on the speed and effectiveness of this compression process and references therein), ``we are not aware of any parsing scheme that achieves optimality when the LZ77-dictionary is in use under any constraint on the codewords other than being of equal length'' [N. Rajpoot and C. Sahinalp. Handbook of Lossless Data Compression, chapter Dictionary-based data compression. Academic Press, 2002. pag. 159]. Here optimality means to achieve the minimum number of bits in compressing each individual input string, without any assumption on its generating source. In this paper we provide the first LZ-based compressor which computes the bit-optimal parsing of any input string in efficient time and optimal space, for a general class of variable-length codeword encodings which encompasses most of the ones typically used in data compression and in the design of search engines and compressed indexes.
[ { "version": "v1", "created": "Wed, 6 Feb 2008 16:31:54 GMT" } ]
2008-02-07T00:00:00
[ [ "Ferragina", "Paolo", "" ], [ "Nitto", "Igor", "" ], [ "Venturini", "Rossano", "" ] ]
new_dataset
0.983121
cs/0702060
Gwenael Richomme
Gw\'ena\"el Richomme (LaRIA)
A local balance property of episturmian words
null
null
null
LaRIA-LRR-2007-02
cs.DM
null
We prove that episturmian words and Arnoux-Rauzy sequences can be characterized using a local balance property. We also give a new characterization of epistandard words and show that the set of finite words that are not factors of an episturmian word is not context-free.
[ { "version": "v1", "created": "Sat, 10 Feb 2007 09:48:42 GMT" }, { "version": "v2", "created": "Thu, 7 Feb 2008 08:30:05 GMT" } ]
2008-02-07T00:00:00
[ [ "Richomme", "Gwénaël", "", "LaRIA" ] ]
new_dataset
0.99579
0802.0552
Vincent Gramoli
Vincent Gramoli (INRIA Futurs), Michel Raynal (IRISA)
Timed Quorum System for Large-Scale and Dynamic Environments
null
Dans 11th International Conference On Principles Of Distributed Systems 4878 (2007) 429--442
null
null
cs.DC cs.NI
null
This paper presents Timed Quorum System (TQS), a new quorum system especially suited for large-scale and dynamic systems. TQS requires that two quorums intersect with high probability if they are used in the same small period of time. It proposed an algorithm that implements TQS and that verifies probabilistic atomicity: a consistency criterion that requires each operation to respect atomicity with high probability. This TQS implementation has quorum of size O(\sqrt{nD}) and expected access time of O(log \sqrt{nD}) message delays, where n measures the size of the system and D is a required parameter to handle dynamism.
[ { "version": "v1", "created": "Tue, 5 Feb 2008 07:09:08 GMT" } ]
2008-02-06T00:00:00
[ [ "Gramoli", "Vincent", "", "INRIA Futurs" ], [ "Raynal", "Michel", "", "IRISA" ] ]
new_dataset
0.997481
0802.0580
Frans Willems
Frans M.J. Willems
Rotated and Scaled Alamouti Coding
Submitted to ISIT 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Repetition-based retransmission is used in Alamouti-modulation [1998] for $2\times 2$ MIMO systems. We propose to use instead of ordinary repetition so-called "scaled repetition" together with rotation. It is shown that the rotated and scaled Alamouti code has a hard-decision performance which is only slightly worse than that of the Golden code [2005], the best known $2\times 2$ space-time code. Decoding the Golden code requires an exhaustive search over all codewords, while our rotated and scaled Alamouti code can be decoded with an acceptable complexity however.
[ { "version": "v1", "created": "Tue, 5 Feb 2008 10:12:48 GMT" } ]
2008-02-06T00:00:00
[ [ "Willems", "Frans M. J.", "" ] ]
new_dataset
0.996916
cs/0609146
Karunakaran Murali Krishnan
K. Murali Krishnan, Rajdeep Singh, L. Sunil Chandran and Priti Shankar
A Combinatorial Family of Near Regular LDPC Codes
5 pages 3 figures
ISIT 2007
null
null
cs.IT math.IT
null
An elementary combinatorial Tanner graph construction for a family of near-regular low density parity check codes achieving high girth is presented. The construction allows flexibility in the choice of design parameters like rate, average degree, girth and block length of the code and yields an asymptotic family. The complexity of constructing codes in the family grows only quadratically with the block length.
[ { "version": "v1", "created": "Tue, 26 Sep 2006 17:20:43 GMT" } ]
2008-02-06T00:00:00
[ [ "Krishnan", "K. Murali", "" ], [ "Singh", "Rajdeep", "" ], [ "Chandran", "L. Sunil", "" ], [ "Shankar", "Priti", "" ] ]
new_dataset
0.996422
0802.0487
Marius Zimand
Cristian Calude, Marius Zimand
Algorithmically independent sequences
null
null
null
null
cs.IT cs.SE math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two objects are independent if they do not affect each other. Independence is well-understood in classical information theory, but less in algorithmic information theory. Working in the framework of algorithmic information theory, the paper proposes two types of independence for arbitrary infinite binary sequences and studies their properties. Our two proposed notions of independence have some of the intuitive properties that one naturally expects. For example, for every sequence $x$, the set of sequences that are independent (in the weaker of the two senses) with $x$ has measure one. For both notions of independence we investigate to what extent pairs of independent sequences, can be effectively constructed via Turing reductions (from one or more input sequences). In this respect, we prove several impossibility results. For example, it is shown that there is no effective way of producing from an arbitrary sequence with positive constructive Hausdorff dimension two sequences that are independent (even in the weaker type of independence) and have super-logarithmic complexity. Finally, a few conjectures and open questions are discussed.
[ { "version": "v1", "created": "Mon, 4 Feb 2008 20:32:07 GMT" } ]
2008-02-05T00:00:00
[ [ "Calude", "Cristian", "" ], [ "Zimand", "Marius", "" ] ]
new_dataset
0.962861
cs/9301107
null
Lawrence C. Paulson
A Formulation of the Simple Theory of Types (for Isabelle)
null
published in P. Martin-L\"of & G. Mints (editors), COLOG-88: International Conf. in Computer Logic (Springer LNCS 417, 1990), 246-274
null
null
cs.LO
null
Simple type theory is formulated for use with the generic theorem prover Isabelle. This requires explicit type inference rules. There are function, product, and subset types, which may be empty. Descriptions (the eta-operator) introduce the Axiom of Choice. Higher-order logic is obtained through reflection between formulae and terms of type bool. Recursive types and functions can be formally constructed. Isabelle proof procedures are described. The logic appears suitable for general mathematics as well as computational problems.
[ { "version": "v1", "created": "Tue, 31 Oct 2000 00:00:00 GMT" } ]
2008-02-03T00:00:00
[ [ "Paulson", "Lawrence C.", "" ] ]
new_dataset
0.971175
cs/9301115
Maggie McLoughlin
Donald E. Knuth
Context-free multilanguages
Abstract added by Greg Kuperberg
Theoretical Studies in Computer Science, Ginsburg Festschrift
null
Knuth migration 11/2004 1991
cs.DS
null
This article is a sketch of ideas that were once intended to appear in the author's famous series, "The Art of Computer Programming". He generalizes the notion of a context-free language from a set to a multiset of words over an alphabet. The idea is to keep track of the number of ways to parse a string. For example, "fruit flies like a banana" can famously be parsed in two ways; analogous examples in the setting of programming languages may yet be important in the future. The treatment is informal but essentially rigorous.
[ { "version": "v1", "created": "Sun, 1 Dec 1991 00:00:00 GMT" } ]
2008-02-03T00:00:00
[ [ "Knuth", "Donald E.", "" ] ]
new_dataset
0.995414
0801.4423
Manas Tungare
Manas Tungare, Manuel Perez-Quinones
It's Not What You Have, But How You Use It: Compromises in Mobile Device Use
null
null
null
null
cs.HC
null
As users begin to use many more devices for personal information management (PIM) than just the traditional desktop computer, it is essential for HCI researchers to understand how these devices are being used in the wild and their roles in users' information environments. We conducted a study of 220 knowledge workers about their devices, the activities they performed on each, and the groups of devices used together. Our findings indicate that several devices are often used in groups; integrated multi-function portable devices have begun to replace single-function devices for communication (e.g. email and IM). Users use certain features opportunistically because they happen to be carrying a multi-function device with them. The use of multiple devices and multi-function devices is fraught with compromises as users must choose and make trade-offs among various factors.
[ { "version": "v1", "created": "Tue, 29 Jan 2008 04:42:26 GMT" } ]
2008-01-30T00:00:00
[ [ "Tungare", "Manas", "" ], [ "Perez-Quinones", "Manuel", "" ] ]
new_dataset
0.992797
0801.4355
Jocelyne Troccaz
Jean-Jacques Banihachemi (TIMC), Eric Boidard (TIMC), Jean-Luc Bosson (TIMC, CHU-Grenoble CIC), Luc Bressollette, Ivan Bricault (TIMC, CHU-Grenoble radio), Philippe Cinquin (TIMC), Gilbert Ferretti (CHU-Grenoble radio), Maud Marchal (TIMC), Thomas Martinelli (CHU-Grenoble radio), Alexandre Moreau-Gaudry (CHU-Grenoble CIC), Franck Pelissier, Christian Roux, Dominique Saragaglia, Pierre Thorel, Jocelyne Troccaz (TIMC), Adriana Vilchis (TIMC)
TER: A Robot for Remote Ultrasonic Examination: Experimental Evaluations
null
Telesurgery, Springer Verlag (Ed.) (2008) 91-99
null
null
cs.OH cs.RO
null
This chapter: o Motivates the clinical use of robotic tele-echography o Introduces the TER system o Describes technical and clinical evaluations performed with TER
[ { "version": "v1", "created": "Mon, 28 Jan 2008 18:39:41 GMT" } ]
2008-01-29T00:00:00
[ [ "Banihachemi", "Jean-Jacques", "", "TIMC" ], [ "Boidard", "Eric", "", "TIMC" ], [ "Bosson", "Jean-Luc", "", "TIMC, CHU-Grenoble CIC" ], [ "Bressollette", "Luc", "", "TIMC, CHU-Grenoble\n radio" ], [ "Bricault", "Ivan", "", "TIMC, CHU-Grenoble\n radio" ], [ "Cinquin", "Philippe", "", "TIMC" ], [ "Ferretti", "Gilbert", "", "CHU-Grenoble radio" ], [ "Marchal", "Maud", "", "TIMC" ], [ "Martinelli", "Thomas", "", "CHU-Grenoble radio" ], [ "Moreau-Gaudry", "Alexandre", "", "CHU-Grenoble CIC" ], [ "Pelissier", "Franck", "", "TIMC" ], [ "Roux", "Christian", "", "TIMC" ], [ "Saragaglia", "Dominique", "", "TIMC" ], [ "Thorel", "Pierre", "", "TIMC" ], [ "Troccaz", "Jocelyne", "", "TIMC" ], [ "Vilchis", "Adriana", "", "TIMC" ] ]
new_dataset
0.988531
0709.3692
Ming-xue Liao
Ming-xue Liao, Zhi-hua Fan
Deadlock Detection in Basic Models of MPI Synchronization Communication Programs
accepted by Acta Electronica Sinica (in Chinese)
null
null
null
cs.DC
null
A model of MPI synchronization communication programs is presented and its three basic simplified models are also defined. A series of theorems and methods for deciding whether deadlocks will occur among the three models are given and proved strictly. These theories and methods for simple models' deadlock detection are the necessary base for real MPI program deadlock detection. The methods are based on a static analysis through programs and with runtime detection in necessary cases and they are able to determine before compiling whether it will be deadlocked for two of the three basic models. For another model, some deadlock cases can be found before compiling and others at runtime. Our theorems can be used to prove the correctness of currently popular MPI program deadlock detection algorithms. Our methods may decrease codes that those algorithms need to change to MPI source or profiling interface and may detects deadlocks ahead of program execution, thus the overheads can be reduced greatly.
[ { "version": "v1", "created": "Mon, 24 Sep 2007 06:02:29 GMT" }, { "version": "v2", "created": "Mon, 28 Jan 2008 08:07:23 GMT" } ]
2008-01-28T00:00:00
[ [ "Liao", "Ming-xue", "" ], [ "Fan", "Zhi-hua", "" ] ]
new_dataset
0.962205
0801.3908
Jakob Vo{\ss}
Jakob Voss
Encoding changing country codes for the Semantic Web with ISO 3166 and SKOS
Accepted to appear in the proceedings of the 2nd International Con- ference on Metadata and Semantics Research (MTSR 2007)
null
null
null
cs.IR
null
This paper shows how authority files can be encoded for the Semantic Web with the Simple Knowledge Organisation System (SKOS). In particular the application of SKOS for encoding the structure, management, and utilization of country codes as defined in ISO 3166 is demonstrated. The proposed encoding gives a use case for SKOS that includes features that have only been discussed little so far, such as multiple notations, nested concept schemes, changes by versioning.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 10:40:27 GMT" } ]
2008-01-28T00:00:00
[ [ "Voss", "Jakob", "" ] ]
new_dataset
0.996486
0801.3930
Jaap-Henk Hoepman
Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur
Crossing Borders: Security and Privacy Issues of the European e-Passport
null
1st Int. Workshop on Security, LNCS 4266, pages 152-167, Kyoto, Japan, October 23-24 2006
null
null
cs.CR cs.CY
null
The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show which borders need to be crossed to improve the security and the privacy protection of the next generation of e-passports. In particular we discuss attacks on Basic Access Control due to the low entropy of the data from which the access keys are derived, we sketch the European proposals for Extended Access Control and the weaknesses in that scheme, and show how fundamentally different design decisions can make e-passports more secure.
[ { "version": "v1", "created": "Fri, 25 Jan 2008 12:17:52 GMT" } ]
2008-01-28T00:00:00
[ [ "Hoepman", "Jaap-Henk", "" ], [ "Hubbers", "Engelbert", "" ], [ "Jacobs", "Bart", "" ], [ "Oostdijk", "Martijn", "" ], [ "Schreur", "Ronny Wichers", "" ] ]
new_dataset
0.998983
0801.0931
Ryuhei Mori
Ryuhei Mori, Kenta Kasai, Tomoharu Shibuya, and Kohichi Sakaniwa
The Asymptotic Bit Error Probability of LDPC Codes for the Binary Erasure Channel with Finite Iteration Number
5 pages, 6 figures, correcting errors in Theorem 1 and poor English
null
null
null
cs.IT math.IT
null
We consider communication over the binary erasure channel (BEC) using low-density parity-check (LDPC) code and belief propagation (BP) decoding. The bit error probability for infinite block length is known by density evolution and it is well known that a difference between the bit error probability at finite iteration number for finite block length $n$ and for infinite block length is asymptotically $\alpha/n$, where $\alpha$ is a specific constant depending on the degree distribution, the iteration number and the erasure probability. Our main result is to derive an efficient algorithm for calculating $\alpha$ for regular ensembles. The approximation using $\alpha$ is accurate for $(2,r)$-regular ensembles even in small block length.
[ { "version": "v1", "created": "Mon, 7 Jan 2008 09:40:41 GMT" }, { "version": "v2", "created": "Wed, 23 Jan 2008 12:37:13 GMT" } ]
2008-01-23T00:00:00
[ [ "Mori", "Ryuhei", "" ], [ "Kasai", "Kenta", "" ], [ "Shibuya", "Tomoharu", "" ], [ "Sakaniwa", "Kohichi", "" ] ]
new_dataset
0.996024
0706.3848
Vlady Ravelomanana
Jean Cardinal (ULB), Vlady Ravelomanana (LIPN), Mario Valencia-Pabon (LIPN)
Minimum Sum Edge Colorings of Multicycles
null
null
null
null
cs.DM
null
In the minimum sum edge coloring problem, we aim to assign natural numbers to edges of a graph, so that adjacent edges receive different numbers, and the sum of the numbers assigned to the edges is minimum. The {\em chromatic edge strength} of a graph is the minimum number of colors required in a minimum sum edge coloring of this graph. We study the case of multicycles, defined as cycles with parallel edges, and give a closed-form expression for the chromatic edge strength of a multicycle, thereby extending a theorem due to Berge. It is shown that the minimum sum can be achieved with a number of colors equal to the chromatic index. We also propose simple algorithms for finding a minimum sum edge coloring of a multicycle. Finally, these results are generalized to a large family of minimum cost coloring problems.
[ { "version": "v1", "created": "Tue, 26 Jun 2007 14:43:15 GMT" }, { "version": "v2", "created": "Tue, 22 Jan 2008 13:36:41 GMT" } ]
2008-01-22T00:00:00
[ [ "Cardinal", "Jean", "", "ULB" ], [ "Ravelomanana", "Vlady", "", "LIPN" ], [ "Valencia-Pabon", "Mario", "", "LIPN" ] ]
new_dataset
0.969624
0801.3024
Josep Rif\`a
J. Pujol, J. Rif\'a, F. I. Solov'eva
Construction of Z4-linear Reed-Muller codes
Paper submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
New quaternary Plotkin constructions are given and are used to obtain new families of quaternary codes. The parameters of the obtained codes, such as the length, the dimension and the minimum distance are studied. Using these constructions new families of quaternary Reed-Muller codes are built with the peculiarity that after using the Gray map the obtained Z4-linear codes have the same parameters and fundamental properties as the codes in the usual binary linear Reed-Muller family. To make more evident the duality relationships in the constructed families the concept of Kronecker inner product is introduced.
[ { "version": "v1", "created": "Sat, 19 Jan 2008 10:14:40 GMT" } ]
2008-01-22T00:00:00
[ [ "Pujol", "J.", "" ], [ "Rifá", "J.", "" ], [ "Solov'eva", "F. I.", "" ] ]
new_dataset
0.999255
0801.1362
An-Ping Li
An-Ping Li
A new key exchange cryptosystem
A revision
null
null
null
cs.CR
null
In this paper, we will present a new key exchange cryptosystem based on linear algebra, which take less operations but weaker in security than Diffie-Hellman's one.
[ { "version": "v1", "created": "Wed, 9 Jan 2008 11:16:25 GMT" }, { "version": "v2", "created": "Thu, 10 Jan 2008 01:34:15 GMT" }, { "version": "v3", "created": "Sun, 20 Jan 2008 07:15:00 GMT" } ]
2008-01-20T00:00:00
[ [ "Li", "An-Ping", "" ] ]
new_dataset
0.997324
0801.2175
Johannes Gro{\ss}e
Johannes Gro{\ss}e
MathPSfrag 2: Convenient LaTeX Labels in Mathematica
9 pages, package can be found at http://wwwth.mppmu.mpg.de/members/jgrosse/mathpsfrag/
null
null
null
cs.GR
null
This article introduces the next version of MathPSfrag. MathPSfrag is a Mathematica package that during export automatically replaces all expressions in a plot by corresponding LaTeX commands. The new version can also produce LaTeX independent images; e.g., PDF files for inclusion in pdfLaTeX. Moreover from these files a preview is generated and shown within Mathematica.
[ { "version": "v1", "created": "Tue, 15 Jan 2008 18:34:44 GMT" } ]
2008-01-16T00:00:00
[ [ "Große", "Johannes", "" ] ]
new_dataset
0.998084
0801.2092
Sergei Vyshenski
S. V. Vyshenski, P. V. Grigoriev, Yu. Yu. Dubenskaya
Model for synchronizer of marked pairs in fork-join network
15 pages, 3 figures, in Russian
null
null
null
cs.DM
null
We introduce a model for synchronizer of marked pairs, which is a node for joining results of parallel processing in two-branch fork-join queueing network. A distribution for number of jobs in the synchronizer is obtained. Calculations are performed assuming that: arrivals to the network form a Poisson process, each branch operates like an M/M/N queueing system. It is shown that a mean quantity of jobs in the synchronizer is bounded below by the value, defined by parameters of the network (which contains the synchronizer) and does not depend upon performance and particular properties of the synchronizer. A domain of network parameters is found, where the flow of jobs departing from the synchronizer does not manifest a statistically significant difference from the Poisson type, despite the correlation between job flows from both branches of the fork-join network.
[ { "version": "v1", "created": "Mon, 14 Jan 2008 15:34:18 GMT" } ]
2008-01-15T00:00:00
[ [ "Vyshenski", "S. V.", "" ], [ "Grigoriev", "P. V.", "" ], [ "Dubenskaya", "Yu. Yu.", "" ] ]
new_dataset
0.954717
cs/0610114
Hans-Rudolf Thomann
Hans-Rudolf Thomann
Instant Computing - A New Computation Paradigm
Final version, 34 pages. Theorem 3 generalized and strengthened. Review results implemented. Typos corrected
null
null
null
cs.CC cs.CR quant-ph
null
Voltage peaks on a conventional computer's power lines allow for the well-known dangerous DPA attacks. We show that measurement of a quantum computer's transient state during a computational step reveals information about a complete computation of arbitrary length, which can be extracted by repeated probing, if the computer is suitably programmed. Instant computing, as we name this mode of operation, recognizes for any total or partial recursive function arguments lying in the domain of definition and yields their function value with arbitrary small error probability in probabilistic linear time. This implies recognition of (not necessarily recursively enumerable) complements of recursively enumerable sets and the solution of the halting problem. Future quantum computers are shown to be likely to allow for instant computing, and some consequences are pointed out.
[ { "version": "v1", "created": "Thu, 19 Oct 2006 14:11:38 GMT" }, { "version": "v2", "created": "Fri, 11 Jan 2008 09:14:29 GMT" }, { "version": "v3", "created": "Sat, 12 Jan 2008 11:12:40 GMT" } ]
2008-01-12T00:00:00
[ [ "Thomann", "Hans-Rudolf", "" ] ]
new_dataset
0.951874
0711.1016
Florian Widmann
Pietro Abate, Rajeev Gor\'e and Florian Widmann
An On-the-fly Tableau-based Decision Procedure for PDL-Satisfiability
26 pages, longer version of article in Methods for Modalities 2007; improved readability of proofs
null
null
null
cs.LO
null
We present a tableau-based algorithm for deciding satisfiability for propositional dynamic logic (PDL) which builds a finite rooted tree with ancestor loops and passes extra information from children to parents to separate good loops from bad loops during backtracking. It is easy to implement, with potential for parallelisation, because it constructs a pseudo-model ``on the fly'' by exploring each tableau branch independently. But its worst-case behaviour is 2EXPTIME rather than EXPTIME. A prototype implementation in the TWB (http://twb.rsise.anu.edu.au) is available.
[ { "version": "v1", "created": "Wed, 7 Nov 2007 06:11:13 GMT" }, { "version": "v2", "created": "Tue, 8 Jan 2008 05:23:26 GMT" } ]
2008-01-08T00:00:00
[ [ "Abate", "Pietro", "" ], [ "Goré", "Rajeev", "" ], [ "Widmann", "Florian", "" ] ]
new_dataset
0.998589
0801.0949
Jad Saklawi
Paul C. Attie
On the Refinement of Liveness Properties of Distributed Systems
54 pages, 12 figures
null
null
null
cs.LO
null
We present a new approach for reasoning about liveness properties of distributed systems, represented as automata. Our approach is based on simulation relations, and requires reasoning only over finite execution fragments. Current simulation-relation based methods for reasoning about liveness properties of automata require reasoning over entire executions, since they involve a proof obligation of the form: if a concrete and abstract execution ``correspond'' via the simulation, and the concrete execution is live, then so is the abstract execution. Our contribution consists of (1) a formalism for defining liveness properties, (2) a proof method for liveness properties based on that formalism, and (3) two expressive completeness results: firstly, our formalism can express any liveness property which satisfies a natural ``robustness'' condition, and secondly, our formalism can express any liveness property at all, provided that history variables can be used
[ { "version": "v1", "created": "Mon, 7 Jan 2008 11:55:03 GMT" } ]
2008-01-08T00:00:00
[ [ "Attie", "Paul C.", "" ] ]
new_dataset
0.969569