id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0801.0337
|
Brian Whitworth
|
Brian Whitworth
|
The Physical World as a Virtual Reality
|
The argument that virtual reality information simulations may be
relevant to modern physics theory is a little outside the mainstream, but
even people in Physics now consider this possibility, e.g. Svozil
| null | null |
CDMTCS0316
|
cs.OH
| null |
This paper explores the idea that the universe is a virtual reality created
by information processing, and relates this strange idea to the findings of
modern physics about the physical world. The virtual reality concept is
familiar to us from online worlds, but our world as a virtual reality is
usually a subject for science fiction rather than science. Yet logically the
world could be an information simulation running on a multi-dimensional
space-time screen. Indeed, if the essence of the universe is information,
matter, charge, energy and movement could be aspects of information, and the
many conservation laws could be a single law of information conservation. If
the universe were a virtual reality, its creation at the big bang would no
longer be paradoxical, as every virtual system must be booted up. It is
suggested that whether the world is an objective reality or a virtual reality
is a matter for science to resolve. Modern information science can suggest how
core physical properties like space, time, light, matter and movement could
derive from information processing. Such an approach could reconcile relativity
and quantum theories, with the former being how information processing creates
space-time, and the latter how it creates energy and matter.
|
[
{
"version": "v1",
"created": "Wed, 2 Jan 2008 05:04:27 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Jan 2008 08:00:28 GMT"
}
] | 2008-01-05T00:00:00 |
[
[
"Whitworth",
"Brian",
""
]
] |
new_dataset
| 0.998565 |
0801.0092
|
Kerry Soileau
|
Kerry Michael Soileau
|
Nash bargaining with a nondeterministic threat
|
Added solution algorithm
| null | null | null |
cs.GT
| null |
We consider bargaining problems which involve two participants, with a
nonempty closed, bounded convex bargaining set of points in the real plane
representing all realizable bargains. We also assume that there is no definite
threat or disagreement point which will provide the default bargain if the
players cannot agree on some point in the bargaining set. However, there is a
nondeterministic threat: if the players fail to agree on a bargain, one of them
will be chosen at random with equal probability, and that chosen player will
select any realizable bargain as the solution, subject to a reasonable
restriction.
|
[
{
"version": "v1",
"created": "Sat, 29 Dec 2007 21:39:31 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Jan 2008 00:58:21 GMT"
}
] | 2008-01-04T00:00:00 |
[
[
"Soileau",
"Kerry Michael",
""
]
] |
new_dataset
| 0.989799 |
0801.0535
|
Olivier Finkel
|
Olivier Finkel (ELM)
|
An omega-Power of a Finitary Language Which is a Borel Set of Infinite
Rank
| null |
Fundamenta Informaticae 62 (3-4) (2004) 333-342
| null | null |
cs.LO math.LO
| null |
Omega-powers of finitary languages are omega languages in the form V^omega,
where V is a finitary language over a finite alphabet X. Since the set of
infinite words over X can be equipped with the usual Cantor topology, the
question of the topological complexity of omega-powers naturally arises and has
been raised by Niwinski, by Simonnet, and by Staiger. It has been recently
proved that for each integer n > 0, there exist some omega-powers of context
free languages which are Pi^0_n-complete Borel sets, and that there exists a
context free language L such that L^omega is analytic but not Borel. But the
question was still open whether there exists a finitary language V such that
V^omega is a Borel set of infinite rank. We answer this question in this paper,
giving an example of a finitary language whose omega-power is Borel of infinite
rank.
|
[
{
"version": "v1",
"created": "Thu, 3 Jan 2008 14:49:23 GMT"
}
] | 2008-01-04T00:00:00 |
[
[
"Finkel",
"Olivier",
"",
"ELM"
]
] |
new_dataset
| 0.998716 |
0801.0575
|
Manik Lal Das
|
Manik Lal Das
|
A Flexible and Secure Remote Systems Authentication Scheme Using Smart
Cards
| null |
Published in the Transactions on Electronics, Computer and
Communication, 1(2):78-82, 2006
| null | null |
cs.CR
| null |
The paper presents an authentication scheme for remote systems using smart
card. The scheme prevents the scenario of many logged in users with the same
login identity, and does not require password/verifier table to validate the
users' login request. The scheme provides a user-friendly password change
option, and withstands the replay, impersonation, stolen-verifier, guessing,
and denial-of-service attacks.
|
[
{
"version": "v1",
"created": "Thu, 3 Jan 2008 18:21:35 GMT"
}
] | 2008-01-04T00:00:00 |
[
[
"Das",
"Manik Lal",
""
]
] |
new_dataset
| 0.995884 |
0801.0581
|
Zouheir Rezki Mr.
|
Z. Rezki, David Haccoun and Fran\c{c}ois Gagnon
|
Capacity of The Discrete-Time Non-Coherent Memoryless Rayleigh Fading
Channels at Low SNR
|
26 pages, 5 figues, submitted to IEEE Trans. on Information Theory,
Septembre 2007
| null | null | null |
cs.IT math.IT
| null |
The capacity of a discrete-time memoryless channel, in which successive
symbols fade independently, and where the channel state information (CSI) is
neither available at the transmitter nor at the receiver, is considered at low
SNR. We derive a closed form expression of the optimal capacity-achieving input
distribution at low signal-to-noise ratio (SNR) and give the exact capacity of
a non-coherent channel at low SNR. The derived relations allow to better
understanding the capacity of non-coherent channels at low SNR and bring an
analytical answer to the peculiar behavior of the optimal input distribution
observed in a previous work by Abou Faycal, Trott and Shamai. Then, we compute
the non-coherence penalty and give a more precise characterization of the
sub-linear term in SNR. Finally, in order to better understand how the optimal
input varies with SNR, upper and lower bounds on the capacity-achieving input
are given.
|
[
{
"version": "v1",
"created": "Thu, 3 Jan 2008 19:37:47 GMT"
}
] | 2008-01-04T00:00:00 |
[
[
"Rezki",
"Z.",
""
],
[
"Haccoun",
"David",
""
],
[
"Gagnon",
"François",
""
]
] |
new_dataset
| 0.997174 |
0801.0102
|
Michael Baer
|
Michael B. Baer
|
Reserved-Length Prefix Coding
|
5 pages, submitted to ISIT 2008
| null | null | null |
cs.IT cs.DS math.IT
| null |
Huffman coding finds an optimal prefix code for a given probability mass
function. Consider situations in which one wishes to find an optimal code with
the restriction that all codewords have lengths that lie in a user-specified
set of lengths (or, equivalently, no codewords have lengths that lie in a
complementary set). This paper introduces a polynomial-time dynamic programming
algorithm that finds optimal codes for this reserved-length prefix coding
problem. This has applications to quickly encoding and decoding lossless codes.
In addition, one modification of the approach solves any quasiarithmetic prefix
coding problem, while another finds optimal codes restricted to the set of
codes with g codeword lengths for user-specified g (e.g., g=2).
|
[
{
"version": "v1",
"created": "Sun, 30 Dec 2007 00:14:24 GMT"
}
] | 2008-01-03T00:00:00 |
[
[
"Baer",
"Michael B.",
""
]
] |
new_dataset
| 0.999784 |
0712.4341
|
Yongming Li
|
Yongming Li
|
Finite Automata Based on Quantum Logic and Their Determinization
| null | null | null | null |
cs.LO
| null |
We give the quantum subset construction of orthomodular lattice-valued finite
automata, then we show the equivalence between orthomodular lattice-valued
finite automata, orthomodular lattice-valued deterministic finite automata and
orthomodular lattice-valued finite automata with empty string-moves. Based on
these equivalences, we study the algebraic operations on orthomodular
lattice-valued regular languages, then we establish Kleene theorem in the frame
of quantum logic.
|
[
{
"version": "v1",
"created": "Fri, 28 Dec 2007 11:48:44 GMT"
}
] | 2007-12-31T00:00:00 |
[
[
"Li",
"Yongming",
""
]
] |
new_dataset
| 0.998292 |
0712.4215
|
Sahbi Sidhom
|
Bel G. Raggad (PU - Seidenberg School of CS & IS), Sahbi Sidhom
(LORIA)
|
Cyberspace security: How to develop a security strategy
| null |
Dans V. International conference Cyberspace 2007 (2007)
| null | null |
cs.OH
| null |
Despite all visible dividers, the Internet is getting us closer and closer,
but with a great price. Our security is the price. The international community
is fully aware of the urgent need to secure the cyberspace as you see the
multiplication of security standards and national schemes interpreting them
beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some
countries, including the Security Big Six (SB6), are equipped with their
security books and may feel relatively safe; this remains a wrong sense of
security as long as they share their networks with entities of less security.
The standards impose security best practices and system specifications for the
development of information security management systems. Partners beyond borders
have to be secure as this is only possible if all entities connected to the
partnership remain secure. Unfortunately, there is no way to verify the
continuous security of partners without periodic security auditing and
certification, and members who do not comply should be barred from the
partnership. This concept also applies to the cyber space or the electronic
society. In order to clean our society from cyber crimes and cyber terrorism we
need to impose strict security policies and enforce them in a cooperative
manner. The paper discusses a country's effort in the development of a national
security strategy given its security economic intelligence position, its
security readiness, and its adverse exposure.
|
[
{
"version": "v1",
"created": "Thu, 27 Dec 2007 11:05:51 GMT"
}
] | 2007-12-28T00:00:00 |
[
[
"Raggad",
"Bel G.",
"",
"PU - Seidenberg School of CS & IS"
],
[
"Sidhom",
"Sahbi",
"",
"LORIA"
]
] |
new_dataset
| 0.954408 |
0712.3830
|
Tom Schrijvers
|
Tom Schrijvers, Bart Demoen, David S. Warren
|
TCHR: a framework for tabled CLP
|
Accepted for publication in Theory and Practice of Logic Programming
| null | null | null |
cs.PL
| null |
Tabled Constraint Logic Programming is a powerful execution mechanism for
dealing with Constraint Logic Programming without worrying about fixpoint
computation. Various applications, e.g in the fields of program analysis and
model checking, have been proposed. Unfortunately, a high-level system for
developing new applications is lacking, and programmers are forced to resort to
complicated ad hoc solutions.
This papers presents TCHR, a high-level framework for tabled Constraint Logic
Programming. It integrates in a light-weight manner Constraint Handling Rules
(CHR), a high-level language for constraint solvers, with tabled Logic
Programming. The framework is easily instantiated with new application-specific
constraint domains. Various high-level operations can be instantiated to
control performance. In particular, we propose a novel, generalized technique
for compacting answer sets.
|
[
{
"version": "v1",
"created": "Wed, 26 Dec 2007 15:28:16 GMT"
}
] | 2007-12-27T00:00:00 |
[
[
"Schrijvers",
"Tom",
""
],
[
"Demoen",
"Bart",
""
],
[
"Warren",
"David S.",
""
]
] |
new_dataset
| 0.999192 |
0712.3299
|
Jocelyne Troccaz
|
Jocelyne Troccaz (TIMC)
|
Computer- and robot-assisted urological surgery
| null |
Progr\`es en urologie : journal de l'Association fran\c{c}aise
d'urologie et de la Soci\'et\'e fran\c{c}aise d'urologie 16, 2 (2006) 112-20
| null | null |
cs.OH cs.RO
| null |
The author reviews the computer and robotic tools available to urologists to
help in diagnosis and technical procedures. The first part concerns the
contribution of robotics and presents several systems at various stages of
development (laboratory prototypes, systems under validation or marketed
systems). The second part describes image fusion tools and navigation systems
currently under development or evaluation. Several studies on computerized
simulation of urological procedures are also presented.
|
[
{
"version": "v1",
"created": "Wed, 19 Dec 2007 22:09:18 GMT"
}
] | 2007-12-21T00:00:00 |
[
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
]
] |
new_dataset
| 0.992124 |
0712.3128
|
Bob Diertens
|
Bob Diertens
|
Software (Re-)Engineering with PSF III: an IDE for PSF
| null | null | null |
prg0708
|
cs.SE
| null |
We describe the design of an integrated development environment (IDE) for
PSF. In the software engineering process we used process algebra in the form of
PSF for the specification of the architecture of the IDE. This specification is
refined to a PSF specification of the IDE system as a ToolBus application, by
applying vertical and horizontal implementation techniques. We implemented the
various tools as specified and connected them with a ToolBus script extracted
from the system specification.
|
[
{
"version": "v1",
"created": "Wed, 19 Dec 2007 09:46:23 GMT"
}
] | 2007-12-20T00:00:00 |
[
[
"Diertens",
"Bob",
""
]
] |
new_dataset
| 0.997579 |
0712.0811
|
Radim Ba\v{c}a Ing.
|
R.Baca, V.Snasel, J.Platos, M.Kratky, E.El-Qawasmeh
|
The Fast Fibonacci Decompression Algorithm
| null | null | null | null |
cs.PF cs.OH
| null |
Data compression has been widely applied in many data processing areas.
Compression methods use variable-size codes with the shorter codes assigned to
symbols or groups of symbols that appear in the data frequently. Fibonacci
coding, as a representative of these codes, is used for compressing small
numbers. Time consumption of a decompression algorithm is not usually as
important as the time of a compression algorithm. However, efficiency of the
decompression may be a critical issue in some cases. For example, a real-time
compression of tree data structures follows this issue. Tree's pages are
decompressed during every reading from a secondary storage into the main
memory. In this case, the efficiency of a decompression algorithm is extremely
important. We have developed a Fast Fibonacci decompression for this purpose.
Our approach is up to $3.5\times$ faster than the original implementation.
|
[
{
"version": "v1",
"created": "Wed, 5 Dec 2007 19:55:16 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Dec 2007 08:05:54 GMT"
}
] | 2007-12-19T00:00:00 |
[
[
"Baca",
"R.",
""
],
[
"Snasel",
"V.",
""
],
[
"Platos",
"J.",
""
],
[
"Kratky",
"M.",
""
],
[
"El-Qawasmeh",
"E.",
""
]
] |
new_dataset
| 0.977665 |
0712.1803
|
Jerome Galtier
|
Jerome Galtier (INRIA Sophia Antipolis)
|
Tournament MAC with Constant Size Congestion Window for WLAN
| null | null | null | null |
cs.NI
| null |
In the context of radio distributed networks, we present a generalized
approach for the Medium Access Control (MAC) with fixed congestion window. Our
protocol is quite simple to analyze and can be used in a lot of different
situations. We give mathematical evidence showing that our performance is
tight, in the sense that no protocol with fixed congestion window can do
better. We also place ourselves in the WiFi/WiMAX framework, and show
experimental results enlightening collision reduction of 14% to 21% compared to
the best known other methods. We show channel capacity improvement, and
fairness considerations.
|
[
{
"version": "v1",
"created": "Tue, 11 Dec 2007 19:43:44 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Dec 2007 09:59:55 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Dec 2007 11:54:52 GMT"
}
] | 2007-12-19T00:00:00 |
[
[
"Galtier",
"Jerome",
"",
"INRIA Sophia Antipolis"
]
] |
new_dataset
| 0.994959 |
cs/0412103
|
Shujun Li Dr.
|
Chengqing Li, Shujun Li, Dan Zhang and Guanrong Chen
|
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic
Cipher
|
LNCS style, 7 pages, 1 figure (6 sub-figures)
|
Lecture Notes in Computer Science, vol. 3497, pp. 630-636, 2005
|
10.1007/11427445_103
| null |
cs.CR cs.NE nlin.CD
| null |
In ISNN'04, a novel symmetric cipher was proposed, by combining a chaotic
signal and a clipped neural network (CNN) for encryption. The present paper
analyzes the security of this chaotic cipher against chosen-plaintext attacks,
and points out that this cipher can be broken by a chosen-plaintext attack.
Experimental analyses are given to support the feasibility of the proposed
attack.
|
[
{
"version": "v1",
"created": "Thu, 23 Dec 2004 10:33:18 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Sep 2005 10:59:20 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Dec 2007 11:27:09 GMT"
}
] | 2007-12-19T00:00:00 |
[
[
"Li",
"Chengqing",
""
],
[
"Li",
"Shujun",
""
],
[
"Zhang",
"Dan",
""
],
[
"Chen",
"Guanrong",
""
]
] |
new_dataset
| 0.996692 |
0712.2552
|
Yeow Meng Chee
|
Yeow Meng Chee, Alan C. H. Ling, San Ling, and Hao Shen
|
The PBD-Closure of Constant-Composition Codes
|
8 pages
|
IEEE Transactions on Information Theory, vol. 53, No. 8, August
2007, pp. 2685-2692
|
10.1109/TIT.2007.901175
| null |
cs.IT cs.DM math.CO math.IT
| null |
We show an interesting PBD-closure result for the set of lengths of
constant-composition codes whose distance and size meet certain conditions. A
consequence of this PBD-closure result is that the size of optimal
constant-composition codes can be determined for infinite families of parameter
sets from just a single example of an optimal code. As an application, the size
of several infinite families of optimal constant-composition codes are derived.
In particular, the problem of determining the size of optimal
constant-composition codes having distance four and weight three is solved for
all lengths sufficiently large. This problem was previously unresolved for odd
lengths, except for lengths seven and eleven.
|
[
{
"version": "v1",
"created": "Sun, 16 Dec 2007 01:02:12 GMT"
}
] | 2007-12-18T00:00:00 |
[
[
"Chee",
"Yeow Meng",
""
],
[
"Ling",
"Alan C. H.",
""
],
[
"Ling",
"San",
""
],
[
"Shen",
"Hao",
""
]
] |
new_dataset
| 0.99938 |
0712.2605
|
Grenville Croll
|
Grenville J. Croll
|
Some A Priori Torah Decryption Principles
|
11 Pages. Presented at the 2nd conference of the Int. Torah Codes
Society, Jerusalem, Israel, 5th June 2000
|
Proc. ANPA Cambridge, UK, 2007
| null | null |
cs.CR
| null |
The author proposes, a priori, a simple set of principles that can be
developed into a range of algorithms by which means the Torah might be decoded.
It is assumed that the Torah is some form of transposition cipher with the
unusual property that the plain text of the Torah may also be the cipher text
of one or more other documents written in Biblical Hebrew. The decryption
principles are based upon the use of Equidistant Letter Sequences (ELS) and the
notions of Message Length, Dimensionality, Euclidean Dimension, Topology, Read
Direction, Skip Distance and offset. The principles can be applied recursively
and define numerous large subsets of the 304,807! theoretically possible
permutations of the characters of the Torah.
|
[
{
"version": "v1",
"created": "Mon, 17 Dec 2007 00:56:32 GMT"
}
] | 2007-12-18T00:00:00 |
[
[
"Croll",
"Grenville J.",
""
]
] |
new_dataset
| 0.996898 |
0712.2630
|
Juan J. Merelo Pr.
|
Nestor Zorzano, Daniel Merino, J.L.J. Laredo, J.P. Sevilla, Pablo
Garcia, J.J. Merelo
|
Evolving XSLT stylesheets
|
First draft, preparing for WCCI 2008
| null | null | null |
cs.NE cs.PL
| null |
This paper introduces a procedure based on genetic programming to evolve XSLT
programs (usually called stylesheets or logicsheets). XSLT is a general
purpose, document-oriented functional language, generally used to transform XML
documents (or, in general, solve any problem that can be coded as an XML
document). The proposed solution uses a tree representation for the stylesheets
as well as diverse specific operators in order to obtain, in the studied cases
and a reasonable time, a XSLT stylesheet that performs the transformation.
Several types of representation have been compared, resulting in different
performance and degree of success.
|
[
{
"version": "v1",
"created": "Mon, 17 Dec 2007 19:59:42 GMT"
}
] | 2007-12-18T00:00:00 |
[
[
"Zorzano",
"Nestor",
""
],
[
"Merino",
"Daniel",
""
],
[
"Laredo",
"J. L. J.",
""
],
[
"Sevilla",
"J. P.",
""
],
[
"Garcia",
"Pablo",
""
],
[
"Merelo",
"J. J.",
""
]
] |
new_dataset
| 0.979875 |
0712.2661
|
Gregory Gutin
|
P. Balister, S. Gerke, G. Gutin, A. Johnstone, J. Reddington, E.
Scott, A. Soleimanfallah, A. Yeo
|
Algorithms for Generating Convex Sets in Acyclic Digraphs
| null | null | null | null |
cs.DM cs.DS
| null |
A set $X$ of vertices of an acyclic digraph $D$ is convex if $X\neq
\emptyset$ and there is no directed path between vertices of $X$ which contains
a vertex not in $X$. A set $X$ is connected if $X\neq \emptyset$ and the
underlying undirected graph of the subgraph of $D$ induced by $X$ is connected.
Connected convex sets and convex sets of acyclic digraphs are of interest in
the area of modern embedded processor technology. We construct an algorithm
$\cal A$ for enumeration of all connected convex sets of an acyclic digraph $D$
of order $n$. The time complexity of $\cal A$ is $O(n\cdot cc(D))$, where
$cc(D)$ is the number of connected convex sets in $D$. We also give an optimal
algorithm for enumeration of all (not just connected) convex sets of an acyclic
digraph $D$ of order $n$. In computational experiments we demonstrate that our
algorithms outperform the best algorithms in the literature.
Using the same approach as for $\cal A$, we design an algorithm for
generating all connected sets of a connected undirected graph $G$. The
complexity of the algorithm is $O(n\cdot c(G)),$ where $n$ is the order of $G$
and $c(G)$ is the number of connected sets of $G.$ The previously reported
algorithm for connected set enumeration is of running time $O(mn\cdot c(G))$,
where $m$ is the number of edges in $G.$
|
[
{
"version": "v1",
"created": "Mon, 17 Dec 2007 09:18:57 GMT"
}
] | 2007-12-18T00:00:00 |
[
[
"Balister",
"P.",
""
],
[
"Gerke",
"S.",
""
],
[
"Gutin",
"G.",
""
],
[
"Johnstone",
"A.",
""
],
[
"Reddington",
"J.",
""
],
[
"Scott",
"E.",
""
],
[
"Soleimanfallah",
"A.",
""
],
[
"Yeo",
"A.",
""
]
] |
new_dataset
| 0.95362 |
0712.2678
|
Gregory Gutin
|
P. Balister, S. Gerke, G. Gutin
|
Convex sets in acyclic digraphs
| null | null | null | null |
cs.DM
| null |
A non-empty set $X$ of vertices of an acyclic digraph is called connected if
the underlying undirected graph induced by $X$ is connected and it is called
convex if no two vertices of $X$ are connected by a directed path in which some
vertices are not in $X$. The set of convex sets (connected convex sets) of an
acyclic digraph $D$ is denoted by $\sco(D)$ ($\scc(D)$) and its size by
$\co(D)$ ($\cc(D)$). Gutin, Johnstone, Reddington, Scott, Soleimanfallah, and
Yeo (Proc. ACiD'07) conjectured that the sum of the sizes of all (connected)
convex sets in $D$ equals $\Theta(n \cdot \co(D))$ ($\Theta(n \cdot \cc(D))$)
where $n$ is the order of $D$.
In this paper we exhibit a family of connected acyclic digraphs with
$\sum_{C\in \sco(D)}|C| = o(n\cdot \co(D))$ and $\sum_{C\in \scc(D)}|C| =
o(n\cdot \cc(D))$. We also show that the number of connected convex sets of
order $k$ in any connected acyclic digraph of order $n$ is at least $n-k+1$.
This is a strengthening of a theorem by Gutin and Yeo.
|
[
{
"version": "v1",
"created": "Mon, 17 Dec 2007 10:52:47 GMT"
}
] | 2007-12-18T00:00:00 |
[
[
"Balister",
"P.",
""
],
[
"Gerke",
"S.",
""
],
[
"Gutin",
"G.",
""
]
] |
new_dataset
| 0.996081 |
0712.2255
|
Ian T Foster
|
Ian Foster
|
Human-Machine Symbiosis, 50 Years On
| null | null | null | null |
cs.DC cs.CE cs.HC
| null |
Licklider advocated in 1960 the construction of computers capable of working
symbiotically with humans to address problems not easily addressed by humans
working alone. Since that time, many of the advances that he envisioned have
been achieved, yet the time spent by human problem solvers in mundane
activities remains large. I propose here four areas in which improved tools can
further advance the goal of enhancing human intellect: services, provenance,
knowledge communities, and automation of problem-solving protocols.
|
[
{
"version": "v1",
"created": "Thu, 13 Dec 2007 23:00:37 GMT"
}
] | 2007-12-17T00:00:00 |
[
[
"Foster",
"Ian",
""
]
] |
new_dataset
| 0.983526 |
0712.1875
|
Michel Fliess
|
Michel Fliess (INRIA Futurs)
|
Critique du rapport signal \`a bruit en th\'eorie de l'information -- A
critical appraisal of the signal to noise ratio in information theory
| null | null | null | null |
cs.IT math.IT math.LO math.PR math.RA quant-ph
| null |
The signal to noise ratio, which plays such an important role in information
theory, is shown to become pointless in digital communications where - symbols
are modulating carriers, which are solutions of linear differential equations
with polynomial coefficients, - demodulations is achieved thanks to new
algebraic estimation techniques. Operational calculus, differential algebra and
nonstandard analysis are the main mathematical tools.
|
[
{
"version": "v1",
"created": "Wed, 12 Dec 2007 07:20:54 GMT"
}
] | 2007-12-13T00:00:00 |
[
[
"Fliess",
"Michel",
"",
"INRIA Futurs"
]
] |
new_dataset
| 0.99872 |
0712.1167
|
Felipe Fran\c{c}a
|
Leandro A. J. Marzulo, Felipe M. G. Fran\c{c}a and V\'itor Santos
Costa
|
Transactional WaveCache: Towards Speculative and Out-of-Order DataFlow
Execution of Memory Operations
|
Submitted to ACM International Conference on Computing Frontiers
2008, http://www.computingfrontiers.org/, 20 pages
| null | null | null |
cs.AR cs.DC
| null |
The WaveScalar is the first DataFlow Architecture that can efficiently
provide the sequential memory semantics required by imperative languages. This
work presents an alternative memory ordering mechanism for this architecture,
the Transaction WaveCache. Our mechanism maintains the execution order of
memory operations within blocks of code, called Waves, but adds the ability to
speculatively execute, out-of-order, operations from different waves. This
ordering mechanism is inspired by progress in supporting Transactional
Memories. Waves are considered as atomic regions and executed as nested
transactions. If a wave has finished the execution of all its memory
operations, as soon as the previous waves are committed, it can be committed.
If a hazard is detected in a speculative Wave, all the following Waves
(children) are aborted and re-executed. We evaluate the WaveCache on a set
artificial benchmarks. If the benchmark does not access memory often, we could
achieve speedups of around 90%. Speedups of 33.1% and 24% were observed on more
memory intensive applications, and slowdowns up to 16% arise if memory
bandwidth is a bottleneck. For an application full of WAW, WAR and RAW hazards,
a speedup of 139.7% was verified.
|
[
{
"version": "v1",
"created": "Fri, 7 Dec 2007 15:59:37 GMT"
}
] | 2007-12-10T00:00:00 |
[
[
"Marzulo",
"Leandro A. J.",
""
],
[
"França",
"Felipe M. G.",
""
],
[
"Costa",
"Vítor Santos",
""
]
] |
new_dataset
| 0.980448 |
0709.4497
|
Fedor Manin
|
Fedor Manin
|
The complexity of nonrepetitive edge coloring of graphs
| null | null | null | null |
cs.CC cs.DM
| null |
A squarefree word is a sequence $w$ of symbols such that there are no strings
$x, y$, and $z$ for which $w=xyyz$. A nonrepetitive coloring of a graph is an
edge coloring in which the sequence of colors along any open path is
squarefree. We show that determining whether a graph $G$ has a nonrepetitive
$k$-coloring is $\Sigma_2^p$-complete. When we restrict to paths of lengths at
most $n$, the problem becomes NP-complete for fixed $n$.
|
[
{
"version": "v1",
"created": "Thu, 27 Sep 2007 20:56:42 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Dec 2007 22:05:37 GMT"
}
] | 2007-12-07T00:00:00 |
[
[
"Manin",
"Fedor",
""
]
] |
new_dataset
| 0.987261 |
0712.0554
|
Mathieu Couture
|
Prosenjit Bose, Paz Carmi, Mathieu Couture, Anil Maheshwari, Pat
Morin, Michiel Smid
|
Spanners of Complete $k$-Partite Geometric Graphs
| null | null | null | null |
cs.CG
| null |
We address the following problem: Given a complete $k$-partite geometric
graph $K$ whose vertex set is a set of $n$ points in $\mathbb{R}^d$, compute a
spanner of $K$ that has a ``small'' stretch factor and ``few'' edges. We
present two algorithms for this problem. The first algorithm computes a
$(5+\epsilon)$-spanner of $K$ with O(n) edges in $O(n \log n)$ time. The second
algorithm computes a $(3+\epsilon)$-spanner of $K$ with $O(n \log n)$ edges in
$O(n \log n)$ time. The latter result is optimal: We show that for any $2 \leq
k \leq n - \Theta(\sqrt{n \log n})$, spanners with $O(n \log n)$ edges and
stretch factor less than 3 do not exist for all complete $k$-partite geometric
graphs.
|
[
{
"version": "v1",
"created": "Tue, 4 Dec 2007 16:14:07 GMT"
}
] | 2007-12-05T00:00:00 |
[
[
"Bose",
"Prosenjit",
""
],
[
"Carmi",
"Paz",
""
],
[
"Couture",
"Mathieu",
""
],
[
"Maheshwari",
"Anil",
""
],
[
"Morin",
"Pat",
""
],
[
"Smid",
"Michiel",
""
]
] |
new_dataset
| 0.996795 |
0712.0139
|
Tetsuo Kurosaki
|
Tetsuo Kurosaki
|
Direct definition of a ternary infinite square-free sequence
|
9 pages, 1 figures, to appear in Information Processing Letters
| null |
10.1016/j.ipl.2007.11.012
| null |
cs.DM
| null |
We propose a new ternary infinite (even full-infinite) square-free sequence.
The sequence is defined both by an iterative method and by a direct definition.
Both definitions are analogous to those of the Thue-Morse sequence. The direct
definition is given by a deterministic finite automaton with output. In short,
the sequence is automatic.
|
[
{
"version": "v1",
"created": "Sun, 2 Dec 2007 13:25:01 GMT"
}
] | 2007-12-04T00:00:00 |
[
[
"Kurosaki",
"Tetsuo",
""
]
] |
new_dataset
| 0.999101 |
cs/0506011
|
Peter Sin
|
Peter Sin and Qing Xiang
|
On the dimensions of certain LDPC codes based on q-regular bipartite
graphs
|
3 pages corrected typos: in inequality (2) changed a minus sign to
plus v3.corrected 2 typos in Lemma 3.5 and added Journal-ref
|
IEEE Trans. Information Theory, 52 (8), (2006), 3735-3737
| null | null |
cs.IT cs.DM math.IT
| null |
An explicit construction of a family of binary LDPC codes called LU(3,q),
where q is a power of a prime, was recently given. A conjecture was made for
the dimensions of these codes when q is odd. The conjecture is proved in this
note. The proof involves the geometry of a 4-dimensional symplectic vector
space and the action of the symplectic group and its subgroups.
|
[
{
"version": "v1",
"created": "Sun, 5 Jun 2005 11:44:10 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Sep 2005 03:21:42 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Dec 2007 19:32:30 GMT"
}
] | 2007-12-04T00:00:00 |
[
[
"Sin",
"Peter",
""
],
[
"Xiang",
"Qing",
""
]
] |
new_dataset
| 0.999661 |
0711.3274
|
EDA Publishing Association
|
M.-A. Polosky, E.-J. Garcia
|
Microsystem Product Development
|
Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
| null | null |
cs.OH
| null |
Over the last decade the successful design and fabrication of complex MEMS
(MicroElectroMechanical Systems), optical circuits and ASICs have been
demonstrated. Packaging and integration processes have lagged behind MEMS
research but are rapidly maturing. As packaging processes evolve, a new
challenge presents itself, microsystem product development. Product development
entails the maturation of the design and all the processes needed to
successfully produce a product. Elements such as tooling design, fixtures,
gages, testers, inspection, work instructions, process planning, etc., are
often overlooked as MEMS engineers concentrate on design, fabrication and
packaging processes. Thorough, up-front planning of product development efforts
is crucial to the success of any project.
|
[
{
"version": "v1",
"created": "Wed, 21 Nov 2007 08:18:26 GMT"
}
] | 2007-11-29T00:00:00 |
[
[
"Polosky",
"M. -A.",
""
],
[
"Garcia",
"E. -J.",
""
]
] |
new_dataset
| 0.95765 |
0711.3284
|
EDA Publishing Association
|
Tsung-Hung Lin, Hsiharng Yang, Ching-Kong Chao
|
Concave Microlens Array Mold Fabrication in Photoresist Using UV
Proximity Printing
|
Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
| null | null |
cs.OH
| null |
This paper presents a simple and effective method to fabricate a
polydimethyl-siloxane (PDMS) microlens array with a high fill factor, which
utilizes the UV proximity printing and photoresist replication methods. The
concave microlens array mold was made using a printing gap in lithography
process, which utilizes optical diffraction of UV light to deflect away from
the aperture edges and produces a certain exposure in the photoresist material
outside the aperture edges. This method can precisely control the geometric
profile of concave microlens array. The experimental results showed that the
concave micro-lens array in photoresist could be formed automatically when the
printing gap ranged from 240 micron to 720 micron. High fill factor microlens
array can be produced, when the control pitch distance between the adjacent
apertures of the concave microlens array was decreased to the aperture size.
|
[
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:21:50 GMT"
}
] | 2007-11-29T00:00:00 |
[
[
"Lin",
"Tsung-Hung",
""
],
[
"Yang",
"Hsiharng",
""
],
[
"Chao",
"Ching-Kong",
""
]
] |
new_dataset
| 0.959388 |
0711.3292
|
EDA Publishing Association
|
X.-C. Shan, Z.-F. Wang, R. Maeda, Y.F. Sun, M. Wu, J.S. Hua
|
A Silicon-Based Micro Gas Turbine Engine for Power Generation
|
Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
| null | null |
cs.OH
| null |
This paper reports on our research in developing a micro power generation
system based on gas turbine engine and piezoelectric converter. The micro gas
turbine engine consists of a micro combustor, a turbine and a centrifugal
compressor. Comprehensive simulation has been implemented to optimal the
component design. We have successfully demonstrated a silicon-based micro
combustor, which consists of seven layers of silicon structures. A
hairpin-shaped design is applied to the fuel/air recirculation channel. The
micro combustor can sustain a stable combustion with an exit temperature as
high as 1600 K. We have also successfully developed a micro turbine device,
which is equipped with enhanced micro air-bearings and driven by compressed
air. A rotation speed of 15,000 rpm has been demonstrated during lab test. In
this paper, we will introduce our research results major in the development of
micro combustor and micro turbine test device.
|
[
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:37:07 GMT"
}
] | 2007-11-29T00:00:00 |
[
[
"Shan",
"X. -C.",
""
],
[
"Wang",
"Z. -F.",
""
],
[
"Maeda",
"R.",
""
],
[
"Sun",
"Y. F.",
""
],
[
"Wu",
"M.",
""
],
[
"Hua",
"J. S.",
""
]
] |
new_dataset
| 0.982991 |
0711.3304
|
EDA Publishing Association
|
Gou-Jen Wang, Yi-Chin Lin, Gwo-Sen Lin
|
A Novel Contact Resistance Model of Anisotropic Conductive Film for FPD
Packaging
|
Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
| null | null |
cs.OH
| null |
In this research, a novel contact resistance model for the flat panel display
(FPD) packaging based on the within layer parallel and between layers series
resistance concepts was proposed. The FJ2530 anisotropic conductive films (ACF)
by Sony Inc. containing the currently smallest 3micron conductive particles was
used to conduct the experiments to verify the accuracy of the proposed model.
Calculated resistance of the chip-on-glass (COG) packaging by the proposed
model is 0.163\Omega. It is found that the gold bump with 0.162\Omega
resistance play the major role of the overall resistance. Although the
predicted resistance by the proposed model is only one third of the
experimentally measured value, it has been three-fold improvement compared to
the existing models.
|
[
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:48:35 GMT"
}
] | 2007-11-29T00:00:00 |
[
[
"Wang",
"Gou-Jen",
""
],
[
"Lin",
"Yi-Chin",
""
],
[
"Lin",
"Gwo-Sen",
""
]
] |
new_dataset
| 0.988073 |
0711.3313
|
EDA Publishing Association
|
Yi Chiu, Chiung-Ting Kuo, Yu-Shan Chu
|
Design and Fabrication of a Micro Electrostatic Vibration-to-Electricity
Energy Converter
|
Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
| null | null |
cs.OH
| null |
This paper presents a micro electrostatic vibration-toelectricity energy
converter. For the 3.3 V supply voltage and 1cm2 chip area constraints, optimal
design parameters were found from theoretical calculation and Simulink
simulation. In the current design, the output power is 200 $\mu$W/cm2 for the
optimal load of 8 M\Omega. The device was fabricated in a silicon-on-insulator
(SOI) wafer. Mechanical and electrical measurements were conducted. Residual
particles caused shortage of the variable capacitor and the output power could
not be measured. Device design and fabrication processes are being refined.
|
[
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:58:42 GMT"
}
] | 2007-11-29T00:00:00 |
[
[
"Chiu",
"Yi",
""
],
[
"Kuo",
"Chiung-Ting",
""
],
[
"Chu",
"Yu-Shan",
""
]
] |
new_dataset
| 0.999103 |
0711.3329
|
EDA Publishing Association
|
Ruey-Fang Shyu, Hsiharng Yang, Wen-Ren Tsai, Jhy-Cherng Tsai
|
Micro-Ball Lens Array Fabrication in Photoresist Using Ptfe Hydrophobic
Effect
|
Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
| null | null |
cs.OH
| null |
This paper presents a simple method to fabricate micro-ball lens and its
array. The key technology is to use the hydrophobic characteristics of
polyterafluoroethylene (PTFE) substrate. High contact angle between melted
photoresist pattern and PTFE can generate micro-ball lens and its array. PTFE
thin film was spun onto a silicon wafer and dried in oven. Photoresist AZ4620
was used to pattern micro-columns with different diameters 60, 70 and 80
$\mu$m. A thermal reflow process then was applied to melt these micro-column
patterns resulted in micro-ball lens array. The achieved micro-ball lens array
with diameter 98 $\mu$m was fabricated using 80 $\mu$m in diameter patterns.
This method provides a simple fabrication process and low material cost.
|
[
{
"version": "v1",
"created": "Wed, 21 Nov 2007 10:17:24 GMT"
}
] | 2007-11-29T00:00:00 |
[
[
"Shyu",
"Ruey-Fang",
""
],
[
"Yang",
"Hsiharng",
""
],
[
"Tsai",
"Wen-Ren",
""
],
[
"Tsai",
"Jhy-Cherng",
""
]
] |
new_dataset
| 0.998485 |
0711.3334
|
EDA Publishing Association
|
Chao-Heng Chien, Hui-Min Yu
|
Fabrication of Switches on Polymer-Based by Hot Embossing
|
Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions)
|
Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
| null | null |
cs.OH
| null |
In MEMS technology, most of the devices are fabricated on glass or silicon
substrate. However, this research presents a novel manufacture method that is
derived from conventional hot embossing technology to fabricate the
electrostatic switches on polymer material. The procedures of fabrication
involve the metal deposition, photolithography, electroplating, hot embossing
and hot embed techniques. The fundamental concept of the hot embed technology
is that the temperature should be increased above Tg of polymer, and the
polymer becomes plastic and viscous and could be molded. According to the
fundamental concept, the metal layer on the silicon/glass substrate could be
embedded into polymer material during the hot embossing process. Afterward, the
metal layer is bonded together with the polymer after removing the substrate in
the de-embossing step. Finally, the electrostatic switch is fabricated on
polymethylmethacrylate(PMMA) material to demonstrate the novel method.
|
[
{
"version": "v1",
"created": "Wed, 21 Nov 2007 10:27:32 GMT"
}
] | 2007-11-29T00:00:00 |
[
[
"Chien",
"Chao-Heng",
""
],
[
"Yu",
"Hui-Min",
""
]
] |
new_dataset
| 0.992467 |
0711.4444
|
Laurent Hascoet
|
Moulay Hicham Tber (INRIA Sophia Antipolis), Laurent Hascoet (INRIA
Sophia Antipolis, SEMA), Arthur Vidard (INRIA Rh\^one-Alpes / LJK Laboratoire
Jean Kuntzmann), Benjamin Dauvergne (INRIA Sophia Antipolis)
|
Building the Tangent and Adjoint codes of the Ocean General Circulation
Model OPA with the Automatic Differentiation tool TAPENADE
| null | null | null | null |
cs.MS cs.CE
| null |
The ocean general circulation model OPA is developed by the LODYC team at
Paris VI university. OPA has recently undergone a major rewriting, migrating to
FORTRAN95, and its adjoint code needs to be rebuilt. For earlier versions, the
adjoint of OPA was written by hand at a high development cost. We use the
Automatic Differentiation tool TAPENADE to build mechanicaly the tangent and
adjoint codes of OPA. We validate the differentiated codes by comparison with
divided differences, and also with an identical twin experiment. We apply
state-of-the-art methods to improve the performance of the adjoint code. In
particular we implement the Griewank and Walther's binomial checkpointing
algorithm which gives us an optimal trade-off between time and memory
consumption. We apply a specific strategy to differentiate the iterative linear
solver that comes from the implicit time stepping scheme
|
[
{
"version": "v1",
"created": "Wed, 28 Nov 2007 08:04:18 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Nov 2007 09:09:27 GMT"
}
] | 2007-11-29T00:00:00 |
[
[
"Tber",
"Moulay Hicham",
"",
"INRIA Sophia Antipolis"
],
[
"Hascoet",
"Laurent",
"",
"INRIA\n Sophia Antipolis, SEMA"
],
[
"Vidard",
"Arthur",
"",
"INRIA Rhône-Alpes / LJK Laboratoire\n Jean Kuntzmann"
],
[
"Dauvergne",
"Benjamin",
"",
"INRIA Sophia Antipolis"
]
] |
new_dataset
| 0.996905 |
0711.4516
|
Jocelyne Troccaz
|
Philippe Merloz (CHU-Grenoble ortho-traumato), Jocelyne Troccaz
(TIMC), Herv\'e Vouaillat (CHU-Grenoble ortho-traumato), Christian Vasile
(CHU-Grenoble ortho-traumato), J\'er\^ome Tonetti (CHU-Grenoble
ortho-traumato), Ahmad Eid (CHU-Grenoble ortho-traumato), St\'ephane Plaweski
(CHU-Grenoble ortho-traumato)
|
Fluoroscopy-based navigation system in spine surgery
| null |
Proceedings of the Institution of Mechanical Engineers. Part H,
Journal of Engineering in Medicine 221, 7 (2007) 813-20
| null | null |
cs.OH
| null |
The variability in width, height, and spatial orientation of a spinal pedicle
makes pedicle screw insertion a delicate operation. The aim of the current
paper is to describe a computer-assisted surgical navigation system based on
fluoroscopic X-ray image calibration and three-dimensional optical localizers
in order to reduce radiation exposure while increasing accuracy and reliability
of the surgical procedure for pedicle screw insertion. Instrumentation using
transpedicular screw fixation was performed: in a first group, a conventional
surgical procedure was carried out with 26 patients (138 screws); in a second
group, a navigated surgical procedure (virtual fluoroscopy) was performed with
26 patients (140 screws). Evaluation of screw placement in every case was done
by using plain X-rays and post-operative computer tomography scan. A 5 per cent
cortex penetration (7 of 140 pedicle screws) occurred for the computer-assisted
group. A 13 per cent penetration (18 of 138 pedicle screws) occurred for the
non computer-assisted group. The radiation running time for each vertebra level
(two screws) reached 3.5 s on average in the computer-assisted group and 11.5 s
on average in the non computer-assisted group. The operative time for two
screws on the same vertebra level reaches 10 min on average in the non
computer-assisted group and 11.9 min on average in the computer-assisted group.
The fluoroscopy-based (two-dimensional) navigation system for pedicle screw
insertion is a safe and reliable procedure for surgery in the lower thoracic
and lumbar spine.
|
[
{
"version": "v1",
"created": "Wed, 28 Nov 2007 15:19:15 GMT"
}
] | 2007-11-29T00:00:00 |
[
[
"Merloz",
"Philippe",
"",
"CHU-Grenoble ortho-traumato"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
],
[
"Vouaillat",
"Hervé",
"",
"CHU-Grenoble ortho-traumato"
],
[
"Vasile",
"Christian",
"",
"CHU-Grenoble ortho-traumato"
],
[
"Tonetti",
"Jérôme",
"",
"CHU-Grenoble\n ortho-traumato"
],
[
"Eid",
"Ahmad",
"",
"CHU-Grenoble ortho-traumato"
],
[
"Plaweski",
"Stéphane",
"",
"CHU-Grenoble ortho-traumato"
]
] |
new_dataset
| 0.999628 |
0706.1751
|
Maximilien Gadouleau
|
Maximilien Gadouleau and Zhiyuan Yan
|
MacWilliams Identity for Codes with the Rank Metric
|
25 pages, submitted to EURASIP Journal on Wireless Communications
| null | null | null |
cs.IT math.IT
| null |
The MacWilliams identity, which relates the weight distribution of a code to
the weight distribution of its dual code, is useful in determining the weight
distribution of codes. In this paper, we derive the MacWilliams identity for
linear codes with the rank metric, and our identity has a different form than
that by Delsarte. Using our MacWilliams identity, we also derive related
identities for rank metric codes. These identities parallel the binomial and
power moment identities derived for codes with the Hamming metric.
|
[
{
"version": "v1",
"created": "Tue, 12 Jun 2007 17:38:47 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Jul 2007 17:56:07 GMT"
},
{
"version": "v3",
"created": "Wed, 28 Nov 2007 03:36:59 GMT"
}
] | 2007-11-28T00:00:00 |
[
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
] |
new_dataset
| 0.999689 |
0711.4309
|
Giandomenico Sica
|
Ruqian Lu
|
Knowware: the third star after Hardware and Software
|
109 pages, ISBN 978-88-7699-095-3 (Printed edition), ISBN
978-88-7699-096-0 (Electronic edition), printed edition available on Amazon
and on Lulu.com
|
"Publishing studies" book series, edited by Giandomenico Sica,
ISSN 1973-6061 (Printed edition), ISSN 1973-6053 (Electronic edition)
| null | null |
cs.SE cs.AI cs.CY
| null |
This book proposes to separate knowledge from software and to make it a
commodity that is called knowware. The architecture, representation and
function of Knowware are discussed. The principles of knowware engineering and
its three life cycle models: furnace model, crystallization model and spiral
model are proposed and analyzed. Techniques of software/knowware co-engineering
are introduced. A software component whose knowledge is replaced by knowware is
called mixware. An object and component oriented development schema of mixware
is introduced. In particular, the tower model and ladder model for mixware
development are proposed and discussed. Finally, knowledge service and knowware
based Web service are introduced and compared with Web service. In summary,
knowware, software and hardware should be considered as three equally important
underpinnings of IT industry.
Ruqian Lu is a professor of computer science of the Institute of Mathematics,
Academy of Mathematics and System Sciences. He is a fellow of Chinese Academy
of Sciences. His research interests include artificial intelligence, knowledge
engineering and knowledge based software engineering. He has published more
than 100 papers and 10 books. He has won two first class awards from the
Academia Sinica and a National second class prize from the Ministry of Science
and Technology. He has also won the sixth Hua Loo-keng Mathematics Prize.
|
[
{
"version": "v1",
"created": "Tue, 27 Nov 2007 17:36:35 GMT"
}
] | 2007-11-28T00:00:00 |
[
[
"Lu",
"Ruqian",
""
]
] |
new_dataset
| 0.996414 |
0711.3959
|
Frederic Maffray
|
Fr\'ed\'eric Maffray (LGS), Meriem Mechebbek
|
On b-perfect chordal graphs
| null | null | null | null |
cs.DM
| null |
The b-chromatic number of a graph G is the largest integer k such that G has
a coloring of the vertices in k color classes such that every color class
contains a vertex that has a neighbour in all other color classes. We
characterize the class of chordal graphs for which the b-chromatic number is
equal to the chromatic number for every induced subgraph.
|
[
{
"version": "v1",
"created": "Mon, 26 Nov 2007 07:39:19 GMT"
}
] | 2007-11-27T00:00:00 |
[
[
"Maffray",
"Frédéric",
"",
"LGS"
],
[
"Mechebbek",
"Meriem",
""
]
] |
new_dataset
| 0.992279 |
0711.3983
|
Ted Hurley
|
Ted Hurley
|
Self-dual, dual-containing and related quantum codes from group rings
| null | null | null | null |
cs.IT math.IT math.RA
| null |
Classes of self-dual codes and dual-containing codes are constructed. The
codes are obtained within group rings and, using an isomorphism between group
rings and matrices, equivalent codes are obtained in matrix form. Distances and
other properties are derived by working within the group ring. Quantum codes
are constructed from the dual-containing codes.
|
[
{
"version": "v1",
"created": "Mon, 26 Nov 2007 11:36:56 GMT"
}
] | 2007-11-27T00:00:00 |
[
[
"Hurley",
"Ted",
""
]
] |
new_dataset
| 0.999816 |
0711.3500
|
Shiguo Lian
|
Shiguo Lian
|
Secure Fractal Image Coding
|
21 pages, 8 figures. To be submitted
| null | null | null |
cs.MM cs.CR
| null |
In recent work, various fractal image coding methods are reported, which
adopt the self-similarity of images to compress the size of images. However,
till now, no solutions for the security of fractal encoded images have been
provided. In this paper, a secure fractal image coding scheme is proposed and
evaluated, which encrypts some of the fractal parameters during fractal
encoding, and thus, produces the encrypted and encoded image. The encrypted
image can only be recovered by the correct key. To keep secure and efficient,
only the suitable parameters are selected and encrypted through in-vestigating
the properties of various fractal parameters, including parameter space,
parameter distribu-tion and parameter sensitivity. The encryption process does
not change the file format, keeps secure in perception, and costs little time
or computational resources. These properties make it suitable for secure image
encoding or transmission.
|
[
{
"version": "v1",
"created": "Thu, 22 Nov 2007 03:53:29 GMT"
}
] | 2007-11-26T00:00:00 |
[
[
"Lian",
"Shiguo",
""
]
] |
new_dataset
| 0.97713 |
0711.3629
|
Ted Hurley
|
Ted Hurley
|
Convolutional codes from units in matrix and group rings
| null | null | null | null |
cs.IT math.IT math.RA
| null |
A general method for constructing convolutional codes from units in Laurent
series over matrix rings is presented. Using group ring as matrix rings, this
forms a basis for in-depth exploration of convolutional codes from group ring
encoding, wherein the ring in the group ring is itself a group ring. The method
is used to algebraically construct series of convolutional codes. Algebraic
methods are used to compute free distances and to construct convolutional codes
to prescribed distances.
|
[
{
"version": "v1",
"created": "Thu, 22 Nov 2007 18:02:27 GMT"
}
] | 2007-11-26T00:00:00 |
[
[
"Hurley",
"Ted",
""
]
] |
new_dataset
| 0.998925 |
0711.3375
|
Loredana Afanasiev
|
Loredana Afanasiev, Torsten Grust, Maarten Marx, Jan Rittinger, Jens
Teubner
|
An Inflationary Fixed Point Operator in XQuery
|
11 pages, 10 figures, 2 tables
| null | null | null |
cs.DB
| null |
We introduce a controlled form of recursion in XQuery, inflationary fixed
points, familiar in the context of relational databases. This imposes
restrictions on the expressible types of recursion, but we show that
inflationary fixed points nevertheless are sufficiently versatile to capture a
wide range of interesting use cases, including the semantics of Regular XPath
and its core transitive closure construct.
While the optimization of general user-defined recursive functions in XQuery
appears elusive, we will describe how inflationary fixed points can be
efficiently evaluated, provided that the recursive XQuery expressions exhibit a
distributivity property. We show how distributivity can be assessed both,
syntactically and algebraically, and provide experimental evidence that XQuery
processors can substantially benefit during inflationary fixed point
evaluation.
|
[
{
"version": "v1",
"created": "Wed, 21 Nov 2007 13:22:15 GMT"
}
] | 2007-11-22T00:00:00 |
[
[
"Afanasiev",
"Loredana",
""
],
[
"Grust",
"Torsten",
""
],
[
"Marx",
"Maarten",
""
],
[
"Rittinger",
"Jan",
""
],
[
"Teubner",
"Jens",
""
]
] |
new_dataset
| 0.998599 |
0711.3452
|
Eric Laporte
|
Eric Laporte (IGM-LabInfo)
|
In memoriam Maurice Gross
|
8 pages
|
Archives of Control Sciences 15, 3 (2005) 257-278
| null | null |
cs.CL
| null |
Maurice Gross (1934-2001) was both a great linguist and a pioneer in natural
language processing. This article is written in homage to his memory
|
[
{
"version": "v1",
"created": "Wed, 21 Nov 2007 20:38:29 GMT"
}
] | 2007-11-22T00:00:00 |
[
[
"Laporte",
"Eric",
"",
"IGM-LabInfo"
]
] |
new_dataset
| 0.999245 |
cs/0610105
|
Vitaly Shmatikov
|
Arvind Narayanan and Vitaly Shmatikov
|
How To Break Anonymity of the Netflix Prize Dataset
| null | null | null | null |
cs.CR cs.DB
| null |
We present a new class of statistical de-anonymization attacks against
high-dimensional micro-data, such as individual preferences, recommendations,
transaction records and so on. Our techniques are robust to perturbation in the
data and tolerate some mistakes in the adversary's background knowledge.
We apply our de-anonymization methodology to the Netflix Prize dataset, which
contains anonymous movie ratings of 500,000 subscribers of Netflix, the world's
largest online movie rental service. We demonstrate that an adversary who knows
only a little bit about an individual subscriber can easily identify this
subscriber's record in the dataset. Using the Internet Movie Database as the
source of background knowledge, we successfully identified the Netflix records
of known users, uncovering their apparent political preferences and other
potentially sensitive information.
|
[
{
"version": "v1",
"created": "Wed, 18 Oct 2006 06:03:41 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Nov 2007 05:13:06 GMT"
}
] | 2007-11-22T00:00:00 |
[
[
"Narayanan",
"Arvind",
""
],
[
"Shmatikov",
"Vitaly",
""
]
] |
new_dataset
| 0.998214 |
0711.2811
|
Annie Bouyer
|
Gilles Halin (CRAI), Sylvain Kubicki (CRAI)
|
Une approche par les mod\`eles pour le suivi de l'activit\'e de
construction d'un b\^atiment. Bat'iViews : une interface multi-vues
orient\'ee gestion de chantier
| null | null | null | null |
cs.HC
| null |
Cooperation between actors in design and construction activities in
architecture is an essential stake nowadays. In professional practices the
actors involved in construction projects use numerous tools. The project is
unique but the "views" that actors manipulate are various and sometimes
fundamentally different. Their common characteristic is that they partially
represent the cooperation context through a specific point of view.
"Bat'iViews" suggests to the actors a multi-view interface of the context and
enables to navigate through the different views. This proposition is based on a
model-driven approach. We distinguish between "context modelling" and modelling
of concepts represented in each "businessview". A model integrative
infrastructure allows us to develop the prototype and to manage user
interaction through the definition of models' transformations.
|
[
{
"version": "v1",
"created": "Sun, 18 Nov 2007 19:10:18 GMT"
}
] | 2007-11-20T00:00:00 |
[
[
"Halin",
"Gilles",
"",
"CRAI"
],
[
"Kubicki",
"Sylvain",
"",
"CRAI"
]
] |
new_dataset
| 0.983186 |
0711.2844
|
Xueliang Li
|
Xueliang Li, Wenli Zhou
|
Dynamic 3-Coloring of Claw-free Graphs
|
13 pages
| null | null | null |
cs.DM cs.CC
| null |
A {\it dynamic $k$-coloring} of a graph $G$ is a proper $k$-coloring of the
vertices of $G$ such that every vertex of degree at least 2 in $G$ will be
adjacent to vertices with at least 2 different colors. The smallest number $k$
for which a graph $G$ can have a dynamic $k$-coloring is the {\it dynamic
chromatic number}, denoted by $\chi_d(G)$. In this paper, we investigate the
dynamic 3-colorings of claw-free graphs. First, we prove that it is
$NP$-complete to determine if a claw-free graph with maximum degree 3 is
dynamically 3-colorable. Second, by forbidding a kind of subgraphs, we find a
reasonable subclass of claw-free graphs with maximum degree 3, for which the
dynamically 3-colorable problem can be solved in linear time. Third, we give a
linear time algorithm to recognize this subclass of graphs, and a linear time
algorithm to determine whether it is dynamically 3-colorable. We also give a
linear time algorithm to color the graphs in the subclass by 3 colors.
|
[
{
"version": "v1",
"created": "Mon, 19 Nov 2007 05:56:01 GMT"
}
] | 2007-11-20T00:00:00 |
[
[
"Li",
"Xueliang",
""
],
[
"Zhou",
"Wenli",
""
]
] |
new_dataset
| 0.994886 |
0711.2671
|
Himanshu Thapliyal
|
Himanshu Thapliyal, Hamid R. Arabnia, Rajnish Bajpai, Kamal K. Sharma
|
Combined Integer and Variable Precision (CIVP) Floating Point
Multiplication Architecture for FPGAs
|
Published in Proceedings of the 2007 International Conference on
Parallel and Distributed Processing Techniques and Applications (PDPTA'07),
Las Vegas, U.S.A, June 2007, Volume 1, pp. 449-450.(CSREA Press)
| null | null | null |
cs.AR
| null |
In this paper, we propose an architecture/methodology for making FPGAs
suitable for integer as well as variable precision floating point
multiplication. The proposed work will of great importance in applications
which requires variable precision floating point multiplication such as
multi-media processing applications. In the proposed architecture/methodology,
we propose the replacement of existing 18x18 bit and 25x18 bit dedicated
multipliers in FPGAs with dedicated 24x24 bit and 24x9 bit multipliers,
respectively. We have proved that our approach of providing the dedicated 24x24
bit and 24x9 bit multipliers in FPGAs will make them efficient for performing
integer as well as single precision, double precision, and Quadruple precision
floating point multiplications.
|
[
{
"version": "v1",
"created": "Fri, 16 Nov 2007 20:18:32 GMT"
}
] | 2007-11-19T00:00:00 |
[
[
"Thapliyal",
"Himanshu",
""
],
[
"Arabnia",
"Hamid R.",
""
],
[
"Bajpai",
"Rajnish",
""
],
[
"Sharma",
"Kamal K.",
""
]
] |
new_dataset
| 0.990483 |
0708.2571
|
Milton Chowdhury
|
M. M. Chowdhury
|
On the Security of the Cha-Ko-Lee-Han-Cheon Braid Group Public Key
Cryptosystem
| null | null | null | null |
cs.CR
| null |
We show that a number of cryptographic protocols using non-commutative
semigroups including the Cha-Ko-Lee-Han-Cheon braid group public-key
cryptosystem and related public-key cryptosystems such as the Shpilrain-Ushakov
public-key cryptosystems are based on the MSCSP.
|
[
{
"version": "v1",
"created": "Mon, 20 Aug 2007 00:47:15 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Aug 2007 12:58:05 GMT"
},
{
"version": "v3",
"created": "Thu, 23 Aug 2007 02:54:51 GMT"
},
{
"version": "v4",
"created": "Fri, 24 Aug 2007 00:56:05 GMT"
},
{
"version": "v5",
"created": "Thu, 15 Nov 2007 22:28:36 GMT"
}
] | 2007-11-16T00:00:00 |
[
[
"Chowdhury",
"M. M.",
""
]
] |
new_dataset
| 0.989552 |
0711.2383
|
Barbara Cerato
|
Barbara Cerato, Guido Masera and Emanuele Viterbo
|
Decoding the Golden Code: a VLSI design
|
25 pages, 10 figures
| null | null | null |
cs.AR
| null |
The recently proposed Golden code is an optimal space-time block code for 2 X
2 multiple-input multiple-output (MIMO) systems. The aim of this work is the
design of a VLSI decoder for a MIMO system coded with the Golden code. The
architecture is based on a rearrangement of the sphere decoding algorithm that
achieves maximum-likelihood (ML) decoding performance. Compared to other
approaces, the proposed solution exhibits an inherent flexibility in terms of
modulation schemes QAM modulation size and this makes our architecture
particularly suitable for adaptive modulation schemes.
|
[
{
"version": "v1",
"created": "Thu, 15 Nov 2007 11:55:30 GMT"
}
] | 2007-11-16T00:00:00 |
[
[
"Cerato",
"Barbara",
""
],
[
"Masera",
"Guido",
""
],
[
"Viterbo",
"Emanuele",
""
]
] |
new_dataset
| 0.983228 |
0711.2478
|
Vasileios Barmpoutis
|
Vasileios Barmpoutis, Gary F. Dargush
|
A Compact Self-organizing Cellular Automata-based Genetic Algorithm
|
24 pages, 18 figures, Submitted to Evolutionary Computation
| null | null | null |
cs.NE cs.AI
| null |
A Genetic Algorithm (GA) is proposed in which each member of the population
can change schemata only with its neighbors according to a rule. The rule
methodology and the neighborhood structure employ elements from the Cellular
Automata (CA) strategies. Each member of the GA population is assigned to a
cell and crossover takes place only between adjacent cells, according to the
predefined rule. Although combinations of CA and GA approaches have appeared
previously, here we rely on the inherent self-organizing features of CA, rather
than on parallelism. This conceptual shift directs us toward the evolution of
compact populations containing only a handful of members. We find that the
resulting algorithm can search the design space more efficiently than
traditional GA strategies due to its ability to exploit mutations within this
compact self-organizing population. Consequently, premature convergence is
avoided and the final results often are more accurate. In order to reinforce
the superior mutation capability, a re-initialization strategy also is
implemented. Ten test functions and two benchmark structural engineering truss
design problems are examined in order to demonstrate the performance of the
method.
|
[
{
"version": "v1",
"created": "Thu, 15 Nov 2007 18:19:39 GMT"
}
] | 2007-11-16T00:00:00 |
[
[
"Barmpoutis",
"Vasileios",
""
],
[
"Dargush",
"Gary F.",
""
]
] |
new_dataset
| 0.960299 |
0711.2112
|
Michel Grabisch
|
Michel Grabisch (CES), Christophe Labreuche (TRT)
|
Bi-capacities -- Part II: the Choquet integral
| null |
Fuzzy Sets and Systems (2005) 237-259
| null | null |
cs.DM cs.GT
| null |
Bi-capacities arise as a natural generalization of capacities (or fuzzy
measures) in a context of decision making where underlying scales are bipolar.
They are able to capture a wide variety of decision behaviours, encompassing
models such as Cumulative Prospect Theory (CPT). The aim of this paper in two
parts is to present the machinery behind bi-capacities, and thus remains on a
rather theoretical level, although some parts are firmly rooted in decision
theory, notably cooperative game theory. The present second part focuses on the
definition of Choquet integral. We give several expressions of it, including an
expression w.r.t. the M\"obius transform. This permits to express the Choquet
integral for 2-additive bi-capacities w.r.t. the interaction index.
|
[
{
"version": "v1",
"created": "Wed, 14 Nov 2007 06:11:57 GMT"
}
] | 2007-11-15T00:00:00 |
[
[
"Grabisch",
"Michel",
"",
"CES"
],
[
"Labreuche",
"Christophe",
"",
"TRT"
]
] |
new_dataset
| 0.998304 |
0711.2050
|
Hacene Belbachir
|
Kenza Guenda
|
Two Families of Quantum Codes Derived from Cyclic Codes
| null | null | null | null |
cs.IT math.IT
| null |
We characterize the affine-invariant maximal extended cyclic codes. Then by
the CSS construction, we derive from these codes a family of pure quantum
codes. Also for ordnq even, a new family of degenerate quantum stabilizer codes
is derived from the classical duadic codes. This answer an open problem asked
by Aly et al.
|
[
{
"version": "v1",
"created": "Tue, 13 Nov 2007 19:06:43 GMT"
}
] | 2007-11-14T00:00:00 |
[
[
"Guenda",
"Kenza",
""
]
] |
new_dataset
| 0.998229 |
cs/0509023
|
Benjamin Leveque
|
Kathie Cameron (WLU), Jack Edmonds (EP INSTITUTE), Benjamin
L\'ev\^eque (LGS), Fr\'ed\'eric Maffray (LGS)
|
Coloring vertices of a graph or finding a Meyniel obstruction
| null | null | null | null |
cs.DM
| null |
A Meyniel obstruction is an odd cycle with at least five vertices and at most
one chord. A graph is Meyniel if and only if it has no Meyniel obstruction as
an induced subgraph. Here we give a O(n^2) algorithm that, for any graph, finds
either a clique and coloring of the same size or a Meyniel obstruction. We also
give a O(n^3) algorithm that, for any graph, finds either aneasily recognizable
strong stable set or a Meyniel obstruction.
|
[
{
"version": "v1",
"created": "Thu, 8 Sep 2005 15:26:02 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Oct 2005 07:26:32 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Nov 2007 14:35:47 GMT"
}
] | 2007-11-13T00:00:00 |
[
[
"Cameron",
"Kathie",
"",
"WLU"
],
[
"Edmonds",
"Jack",
"",
"EP INSTITUTE"
],
[
"Lévêque",
"Benjamin",
"",
"LGS"
],
[
"Maffray",
"Frédéric",
"",
"LGS"
]
] |
new_dataset
| 0.999711 |
0704.2282
|
Wim H. Hesselink
|
W.H. Hesselink and J.C. Hummelen and H.T. Jonkman and H.G. Reker and
G.R. Renardel de Lavalette and M.H. van der Veen
|
Kekul\'e Cells for Molecular Computation
|
Also on chemistry (unsaturated polycyclic hydrocarbons)
| null | null | null |
cs.OH cs.DM
| null |
The configurations of single and double bonds in polycyclic hydrocarbons are
abstracted as Kekul\'e states of graphs. Sending a so-called soliton over an
open channel between ports (external nodes) of the graph changes the Kekul\'e
state and therewith the set of open channels in the graph. This switching
behaviour is proposed as a basis for molecular computation. The proposal is
highly speculative but may have tremendous impact.
Kekul\'e states with the same boundary behaviour (port assignment) can be
regarded as equivalent. This gives rise to the abstraction of Kekul\'e cells.
The basic theory of Kekul\'e states and Kekul\'e cells is developed here, up to
the classification of Kekul\'e cells with $\leq 4$ ports. To put the theory in
context, we generalize Kekul\'e states to semi-Kekul\'e states, which form the
solutions of a linear system of equations over the field of the bits 0 and 1.
We briefly study so-called omniconjugated graphs, in which every port
assignment of the right signature has a Kekul\'e state. Omniconjugated graphs
may be useful as connectors between computational elements. We finally
investigate some examples with potentially useful switching behaviour.
|
[
{
"version": "v1",
"created": "Wed, 18 Apr 2007 07:44:33 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Nov 2007 09:16:22 GMT"
}
] | 2007-11-08T00:00:00 |
[
[
"Hesselink",
"W. H.",
""
],
[
"Hummelen",
"J. C.",
""
],
[
"Jonkman",
"H. T.",
""
],
[
"Reker",
"H. G.",
""
],
[
"de Lavalette",
"G. R. Renardel",
""
],
[
"van der Veen",
"M. H.",
""
]
] |
new_dataset
| 0.991613 |
0711.0917
|
Jan Wielemaker
|
Jan Wielemaker, Zhisheng Huang and Lourens van der Meij
|
SWI-Prolog and the Web
|
31 pages, 24 figures and 2 tables. To appear in Theory and Practice
of Logic Programming (TPLP)
| null | null | null |
cs.PL cs.SC
| null |
Where Prolog is commonly seen as a component in a Web application that is
either embedded or communicates using a proprietary protocol, we propose an
architecture where Prolog communicates to other components in a Web application
using the standard HTTP protocol. By avoiding embedding in external Web servers
development and deployment become much easier. To support this architecture, in
addition to the transfer protocol, we must also support parsing, representing
and generating the key Web document types such as HTML, XML and RDF.
This paper motivates the design decisions in the libraries and extensions to
Prolog for handling Web documents and protocols. The design has been guided by
the requirement to handle large documents efficiently. The described libraries
support a wide range of Web applications ranging from HTML and XML documents to
Semantic Web RDF processing.
To appear in Theory and Practice of Logic Programming (TPLP)
|
[
{
"version": "v1",
"created": "Tue, 6 Nov 2007 16:22:39 GMT"
}
] | 2007-11-07T00:00:00 |
[
[
"Wielemaker",
"Jan",
""
],
[
"Huang",
"Zhisheng",
""
],
[
"van der Meij",
"Lourens",
""
]
] |
new_dataset
| 0.997977 |
0711.0048
|
Lee Naish
|
Lee Naish
|
Declarative Diagnosis of Floundering
|
12 pages, 0 figures, uses llncs.sty In Proceedings of the 17th
Workshop on Logic-based methods in Programming Environments, Eds. Patricia
Hill and Wim Vanhoof, pp 48-60, September 2007, Porto, Portugal
| null | null | null |
cs.PL cs.SE
| null |
Many logic programming languages have delay primitives which allow
coroutining. This introduces a class of bug symptoms -- computations can
flounder when they are intended to succeed or finitely fail. For concurrent
logic programs this is normally called deadlock. Similarly, constraint logic
programs can fail to invoke certain constraint solvers because variables are
insufficiently instantiated or constrained. Diagnosing such faults has received
relatively little attention to date. Since delay primitives affect the
procedural but not the declarative view of programs, it may be expected that
debugging would have to consider the often complex details of interleaved
execution. However, recent work on semantics has suggested an alternative
approach. In this paper we show how the declarative debugging paradigm can be
used to diagnose unexpected floundering, insulating the user from the
complexities of the execution.
Keywords: logic programming, coroutining, delay, debugging, floundering,
deadlock, constraints
|
[
{
"version": "v1",
"created": "Thu, 1 Nov 2007 01:40:50 GMT"
}
] | 2007-11-06T00:00:00 |
[
[
"Naish",
"Lee",
""
]
] |
new_dataset
| 0.976169 |
0711.0345
|
Wim Vanhoof
|
Roberto Bagnara, Patricia Hill, Enea Zaffanella
|
A Prolog-based Environment for Reasoning about Programming Languages
(Extended abstract)
|
Paper presented at the 17th Workshop on Logic-based Methods in
Programming Environments (WLPE2007)
| null | null | null |
cs.PL cs.SE
| null |
ECLAIR is a Prolog-based prototype system aiming to provide a functionally
complete environment for the study, development and evaluation of programming
language analysis and implementation tools. In this paper, we sketch the
overall structure of the system, outlining the main methodologies and
technologies underlying its components. We also discuss the appropriateness of
Prolog as the implementation language for the system: besides highlighting its
strengths, we also point out a few potential weaknesses, hinting at possible
solutions.
|
[
{
"version": "v1",
"created": "Fri, 2 Nov 2007 16:40:10 GMT"
}
] | 2007-11-06T00:00:00 |
[
[
"Bagnara",
"Roberto",
""
],
[
"Hill",
"Patricia",
""
],
[
"Zaffanella",
"Enea",
""
]
] |
new_dataset
| 0.974587 |
0711.0618
|
Wim Vanhoof
|
Jan Wielemaker, Anjo Anjewierden
|
PIDoc: Wiki style Literate Programming for Prolog
|
Paper presented at the 17th Workshop on Logic-based Methods in
Programming Environments (WLPE2007)
| null | null | null |
cs.PL cs.SE
| null |
This document introduces PlDoc, a literate programming system for Prolog.
Starting point for PlDoc was minimal distraction from the programming task and
maximal immediate reward, attempting to seduce the programmer to use the
system. Minimal distraction is achieved using structured comments that are as
closely as possible related to common Prolog documentation practices. Immediate
reward is provided by a web interface powered from the Prolog development
environment that integrates searching and browsing application and system
documentation. When accessed from localhost, it is possible to go from
documentation shown in a browser to the source code displayed in the user's
editor of choice.
|
[
{
"version": "v1",
"created": "Mon, 5 Nov 2007 12:13:12 GMT"
}
] | 2007-11-06T00:00:00 |
[
[
"Wielemaker",
"Jan",
""
],
[
"Anjewierden",
"Anjo",
""
]
] |
new_dataset
| 0.998983 |
0711.0666
|
Bouselmi Ghazi
|
Ghazi Bouselmi (INRIA Lorraine - LORIA), Dominique Fohr (INRIA
Lorraine - LORIA), Irina Illina (INRIA Lorraine - LORIA), Jean-Paul Haton
(INRIA Lorraine - LORIA)
|
Discriminative Phoneme Sequences Extraction for Non-Native Speaker's
Origin Classification
| null |
Dans ISSPA, International Symposium on Signal Processing and its
Applications (2007)
| null | null |
cs.CL
| null |
In this paper we present an automated method for the classification of the
origin of non-native speakers. The origin of non-native speakers could be
identified by a human listener based on the detection of typical pronunciations
for each nationality. Thus we suppose the existence of several phoneme
sequences that might allow the classification of the origin of non-native
speakers. Our new method is based on the extraction of discriminative sequences
of phonemes from a non-native English speech database. These sequences are used
to construct a probabilistic classifier for the speakers' origin. The existence
of discriminative phone sequences in non-native speech is a significant result
of this work. The system that we have developed achieved a significant correct
classification rate of 96.3% and a significant error reduction compared to some
other tested techniques.
|
[
{
"version": "v1",
"created": "Mon, 5 Nov 2007 15:20:47 GMT"
}
] | 2007-11-06T00:00:00 |
[
[
"Bouselmi",
"Ghazi",
"",
"INRIA Lorraine - LORIA"
],
[
"Fohr",
"Dominique",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Illina",
"Irina",
"",
"INRIA Lorraine - LORIA"
],
[
"Haton",
"Jean-Paul",
"",
"INRIA Lorraine - LORIA"
]
] |
new_dataset
| 0.999309 |
0711.0692
|
Jean-Yves Marion
|
Anne Bonfante (INRIA Lorraine - LORIA), Jean-Yves Marion (INRIA
Lorraine - LORIA)
|
On the defence notion
| null |
Journal in Computer Virology 3, 4 (2007) 247-251
|
10.1007/s11416-007-0058-9
| null |
cs.CR
| null |
'Trojan horses', 'logic bombs', 'armoured viruses' and 'cryptovirology' are
terms recalling war gears. In fact, concepts of attack and defence drive the
world of computer virology, which looks like a war universe in an information
society. This war has several shapes, from invasions of a network by worms, to
military and industrial espionage ...
|
[
{
"version": "v1",
"created": "Mon, 5 Nov 2007 17:02:25 GMT"
}
] | 2007-11-06T00:00:00 |
[
[
"Bonfante",
"Anne",
"",
"INRIA Lorraine - LORIA"
],
[
"Marion",
"Jean-Yves",
"",
"INRIA\n Lorraine - LORIA"
]
] |
new_dataset
| 0.999769 |
0704.2778
|
Brooke Shrader
|
Brooke Shrader and Anthony Ephremides
|
Random Access Broadcast: Stability and Throughput Analysis
|
19 pages, 5 figures. Submitted as correspondence to IEEE Transactions
on Information Theory, Sept 2006. Revised April 2007
|
IEEE Transactions on Information Theory, vol. 53, no. 8, pp.
2915-2921, August 2007.
| null | null |
cs.IT math.IT
| null |
A wireless network in which packets are broadcast to a group of receivers
through use of a random access protocol is considered in this work. The
relation to previous work on networks of interacting queues is discussed and
subsequently, the stability and throughput regions of the system are analyzed
and presented. A simple network of two source nodes and two destination nodes
is considered first. The broadcast service process is analyzed assuming a
channel that allows for packet capture and multipacket reception. In this small
network, the stability and throughput regions are observed to coincide. The
same problem for a network with N sources and M destinations is considered
next. The channel model is simplified in that multipacket reception is no
longer permitted. Bounds on the stability region are developed using the
concept of stability rank and the throughput region of the system is compared
to the bounds. Our results show that as the number of destination nodes
increases, the stability and throughput regions diminish. Additionally, a
previous conjecture that the stability and throughput regions coincide for a
network of arbitrarily many sources is supported for a broadcast scenario by
the results presented in this work.
|
[
{
"version": "v1",
"created": "Fri, 20 Apr 2007 19:17:43 GMT"
}
] | 2007-11-05T00:00:00 |
[
[
"Shrader",
"Brooke",
""
],
[
"Ephremides",
"Anthony",
""
]
] |
new_dataset
| 0.986376 |
0710.5893
|
Paul Hurley
|
Paul Hurley, Ted Hurley
|
Codes from Zero-divisors and Units in Group Rings
| null | null | null | null |
cs.IT math.IT
| null |
We describe and present a new construction method for codes using encodings
from group rings. They consist primarily of two types: zero-divisor and
unit-derived codes. Previous codes from group rings focused on ideals; for
example cyclic codes are ideals in the group ring over a cyclic group. The
fresh focus is on the encodings themselves, which only under very limited
conditions result in ideals. We use the result that a group ring is isomorphic
to a certain well-defined ring of matrices, and thus every group ring element
has an associated matrix. This allows matrix algebra to be used as needed in
the study and production of codes, enabling the creation of standard generator
and check matrices. Group rings are a fruitful source of units and
zero-divisors from which new codes result. Many code properties, such as being
LDPC or self-dual, may be expressed as properties within the group ring thus
enabling the construction of codes with these properties. The methods are
general enabling the construction of codes with many types of group rings.
There is no restriction on the ring and thus codes over the integers, over
matrix rings or even over group rings themselves are possible and fruitful.
|
[
{
"version": "v1",
"created": "Wed, 31 Oct 2007 15:57:31 GMT"
}
] | 2007-11-01T00:00:00 |
[
[
"Hurley",
"Paul",
""
],
[
"Hurley",
"Ted",
""
]
] |
new_dataset
| 0.999873 |
0710.4780
|
Jesus M. Almendros-Jimenez Dr.
|
J. M. Almendros-Jim\'enez and A. Becerra-Ter\'on and F. J.
Enciso-Ba\~nos
|
Querying XML Documents in Logic Programming
| null | null | null | null |
cs.PL cs.DB
| null |
Extensible Markup Language (XML) is a simple, very flexible text format
derived from SGML. Originally designed to meet the challenges of large-scale
electronic publishing, XML is also playing an increasingly important role in
the exchange of a wide variety of data on the Web and elsewhere. XPath language
is the result of an effort to provide address parts of an XML document. In
support of this primary purpose, it becomes in a query language against an XML
document. In this paper we present a proposal for the implementation of the
XPath language in logic programming. With this aim we will describe the
representation of XML documents by means of a logic program. Rules and facts
can be used for representing the document schema and the XML document itself.
In particular, we will present how to index XML documents in logic programs:
rules are supposed to be stored in main memory, however facts are stored in
secondary memory by using two kind of indexes: one for each XML tag, and other
for each group of terminal items. In addition, we will study how to query by
means of the XPath language against a logic program representing an XML
document. It evolves the specialization of the logic program with regard to the
XPath expression. Finally, we will also explain how to combine the indexing and
the top-down evaluation of the logic program. To appear in Theory and Practice
of Logic Programming (TPLP)"
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 10:45:08 GMT"
}
] | 2007-10-26T00:00:00 |
[
[
"Almendros-Jiménez",
"J. M.",
""
],
[
"Becerra-Terón",
"A.",
""
],
[
"Enciso-Baños",
"F. J.",
""
]
] |
new_dataset
| 0.999743 |
0710.4499
|
Colm \'O D\'unlaing
|
Colm O. Dunlaing and Natalie Schluter
|
Remarks on Jurdzinski and Lorys' proof that palindromes are not a
Church-Rosser language
|
15 pages
| null | null |
TCDMATH 07-10
|
cs.LO
| null |
In 2002 Jurdzinski and Lorys settled a long-standing conjecture that
palindromes are not a Church-Rosser language. Their proof required a
sophisticated theory about computation graphs of 2-stack automata. We present
their proof in terms of 1-tape Turing machines.We also provide an alternative
proof of Buntrock and Otto's result that the set of non-square bitstrings,
which is context-free, is not Church-Rosser.
|
[
{
"version": "v1",
"created": "Wed, 24 Oct 2007 15:40:32 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Oct 2007 10:15:54 GMT"
}
] | 2007-10-25T00:00:00 |
[
[
"Dunlaing",
"Colm O.",
""
],
[
"Schluter",
"Natalie",
""
]
] |
new_dataset
| 0.995543 |
0710.4046
|
Alfonso Martinez
|
Alfonso Martinez, Albert Guillen i Fabregas, Giuseppe Caire, and Frans
Willems
|
Bit-interleaved coded modulation in the wideband regime
|
Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
The wideband regime of bit-interleaved coded modulation (BICM) in Gaussian
channels is studied. The Taylor expansion of the coded modulation capacity for
generic signal constellations at low signal-to-noise ratio (SNR) is derived and
used to determine the corresponding expansion for the BICM capacity. Simple
formulas for the minimum energy per bit and the wideband slope are given. BICM
is found to be suboptimal in the sense that its minimum energy per bit can be
larger than the corresponding value for coded modulation schemes. The minimum
energy per bit using standard Gray mapping on M-PAM or M^2-QAM is given by a
simple formula and shown to approach -0.34 dB as M increases. Using the low SNR
expansion, a general trade-off between power and bandwidth in the wideband
regime is used to show how a power loss can be traded off against a bandwidth
gain.
|
[
{
"version": "v1",
"created": "Mon, 22 Oct 2007 13:07:28 GMT"
}
] | 2007-10-23T00:00:00 |
[
[
"Martinez",
"Alfonso",
""
],
[
"Fabregas",
"Albert Guillen i",
""
],
[
"Caire",
"Giuseppe",
""
],
[
"Willems",
"Frans",
""
]
] |
new_dataset
| 0.978464 |
cs/0509079
|
Peter Jung
|
Peter Jung, Gerhard Wunder
|
The WSSUS Pulse Design Problem in Multicarrier Transmission
|
24 pages (onecolumn,draft), 4 figures, accepted for publication in
the IEEE Transactions on Communications
|
IEEE Trans. on Comm., 2007, 55(10), 1918-1928
|
10.1109/TCOMM.2007.906427
| null |
cs.IT math.IT
| null |
Optimal link adaption to the scattering function of wide sense stationary
uncorrelated mobile communication channels is still an unsolved problem despite
its importance for next-generation system design. In multicarrier transmission
such link adaption is performed by pulse shaping, i.e. by properly adjusting
the transmit and receive filters. For example pulse shaped Offset--QAM systems
have been recently shown to have superior performance over standard cyclic
prefix OFDM (while operating at higher spectral efficiency).In this paper we
establish a general mathematical framework for joint transmitter and receiver
pulse shape optimization for so-called Weyl--Heisenberg or Gabor signaling with
respect to the scattering function of the WSSUS channel. In our framework the
pulse shape optimization problem is translated to an optimization problem over
trace class operators which in turn is related to fidelity optimization in
quantum information processing. By convexity relaxation the problem is shown to
be equivalent to a \emph{convex constraint quasi-convex maximization problem}
thereby revealing the non-convex nature of the overall WSSUS pulse design
problem. We present several iterative algorithms for optimization providing
applicable results even for large--scale problem constellations. We show that
with transmitter-side knowledge of the channel statistics a gain of $3 - 6$dB
in $\SINR$ can be expected.
|
[
{
"version": "v1",
"created": "Tue, 27 Sep 2005 08:05:30 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Jan 2007 11:46:28 GMT"
}
] | 2007-10-23T00:00:00 |
[
[
"Jung",
"Peter",
""
],
[
"Wunder",
"Gerhard",
""
]
] |
new_dataset
| 0.998047 |
cs/9906001
|
Lane A. Hemaspaandra
|
Russell Bent, Michael Schear, Lane A. Hemaspaandra, Gabriel Istrate
|
On Bounded-Weight Error-Correcting Codes
|
10 pages, 3 tables
| null | null | null |
cs.IT math.IT
| null |
This paper computationally obtains optimal bounded-weight, binary,
error-correcting codes for a variety of distance bounds and dimensions. We
compare the sizes of our codes to the sizes of optimal constant-weight, binary,
error-correcting codes, and evaluate the differences.
|
[
{
"version": "v1",
"created": "Tue, 1 Jun 1999 18:24:00 GMT"
}
] | 2007-10-15T00:00:00 |
[
[
"Bent",
"Russell",
""
],
[
"Schear",
"Michael",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Istrate",
"Gabriel",
""
]
] |
new_dataset
| 0.996969 |
0710.1924
|
Mohsen Ravanbakhsh
|
Mohsen Ravanbakhsh, Yasin Abbasi-Yadkori, Maghsoud Abbaspour, Hamid
Sarbazi-Azad
|
A Heuristic Routing Mechanism Using a New Addressing Scheme
|
8 pages, because of lack of space journal reference just contains the
reference to the proceeding
|
Proceedings of First International Conference on Bio Inspired
models of Networks, Information and Computing Systems (BIONETICS), Cavalese,
Italy, December 2006
| null | null |
cs.NI cs.AI
| null |
Current methods of routing are based on network information in the form of
routing tables, in which routing protocols determine how to update the tables
according to the network changes. Despite the variability of data in routing
tables, node addresses are constant. In this paper, we first introduce the new
concept of variable addresses, which results in a novel framework to cope with
routing problems using heuristic solutions. Then we propose a heuristic routing
mechanism based on the application of genes for determination of network
addresses in a variable address network and describe how this method flexibly
solves different problems and induces new ideas in providing integral solutions
for variety of problems. The case of ad-hoc networks is where simulation
results are more supportive and original solutions have been proposed for
issues like mobility.
|
[
{
"version": "v1",
"created": "Wed, 10 Oct 2007 04:29:24 GMT"
}
] | 2007-10-11T00:00:00 |
[
[
"Ravanbakhsh",
"Mohsen",
""
],
[
"Abbasi-Yadkori",
"Yasin",
""
],
[
"Abbaspour",
"Maghsoud",
""
],
[
"Sarbazi-Azad",
"Hamid",
""
]
] |
new_dataset
| 0.997654 |
0710.2018
|
Yingbin Liang
|
Yingbin Liang, Anelia Somekh-Baruch, H. Vincent Poor, Shlomo Shamai
(Shitz), and Sergio Verdu
|
Cognitive Interference Channels with Confidential Messages
|
To appear in Proc. of forty-fifth annual Allerton conference on
communication, control, and computing, Allerton house, Monticello, IL, USA
| null | null | null |
cs.IT math.IT
| null |
The cognitive interference channel with confidential messages is studied.
Similarly to the classical two-user interference channel, the cognitive
interference channel consists of two transmitters whose signals interfere at
the two receivers. It is assumed that there is a common message source (message
1) known to both transmitters, and an additional independent message source
(message 2) known only to the cognitive transmitter (transmitter 2). The
cognitive receiver (receiver 2) needs to decode both messages, while the
non-cognitive receiver (receiver 1) should decode only the common message.
Furthermore, message 2 is assumed to be a confidential message which needs to
be kept as secret as possible from receiver 1, which is viewed as an
eavesdropper with regard to message 2. The level of secrecy is measured by the
equivocation rate. A single-letter expression for the capacity-equivocation
region of the discrete memoryless cognitive interference channel is established
and is further explicitly derived for the Gaussian case. Moreover,
particularizing the capacity-equivocation region to the case without a secrecy
constraint, establishes a new capacity theorem for a class of interference
channels, by providing a converse theorem.
|
[
{
"version": "v1",
"created": "Wed, 10 Oct 2007 16:34:03 GMT"
}
] | 2007-10-11T00:00:00 |
[
[
"Liang",
"Yingbin",
"",
"Shitz"
],
[
"Somekh-Baruch",
"Anelia",
"",
"Shitz"
],
[
"Poor",
"H. Vincent",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
],
[
"Verdu",
"Sergio",
""
]
] |
new_dataset
| 0.997973 |
0710.1842
|
Frank Ruskey
|
Frank Ruskey and Aaron Williams
|
An explicit universal cycle for the (n-1)-permutations of an n-set
| null | null | null | null |
cs.DM cs.DS
| null |
We show how to construct an explicit Hamilton cycle in the directed Cayley
graph Cay({\sigma_n, sigma_{n-1}} : \mathbb{S}_n), where \sigma_k = (1 2 >...
k). The existence of such cycles was shown by Jackson (Discrete Mathematics,
149 (1996) 123-129) but the proof only shows that a certain directed graph is
Eulerian, and Knuth (Volume 4 Fascicle 2, Generating All Tuples and
Permutations (2005)) asks for an explicit construction. We show that a simple
recursion describes our Hamilton cycle and that the cycle can be generated by
an iterative algorithm that uses O(n) space. Moreover, the algorithm produces
each successive edge of the cycle in constant time; such algorithms are said to
be loopless.
|
[
{
"version": "v1",
"created": "Tue, 9 Oct 2007 18:06:05 GMT"
}
] | 2007-10-10T00:00:00 |
[
[
"Ruskey",
"Frank",
""
],
[
"Williams",
"Aaron",
""
]
] |
new_dataset
| 0.997245 |
0710.1325
|
Ashish Khisti
|
Ashish Khisti and Gregory Wornell
|
The MIMOME Channel
|
In Proceedings of the 45th Annual Allerton Conference on
Communication, Control, and Computing, October 2007, 8 pages
| null | null | null |
cs.IT math.IT
| null |
The MIMOME channel is a Gaussian wiretap channel in which the sender,
receiver, and eavesdropper all have multiple antennas. We characterize the
secrecy capacity as the saddle-value of a minimax problem. Among other
implications, our result establishes that a Gaussian distribution maximizes the
secrecy capacity characterization of Csisz{\'a}r and K{\"o}rner when applied to
the MIMOME channel. We also determine a necessary and sufficient condition for
the secrecy capacity to be zero. Large antenna array analysis of this condition
reveals several useful insights into the conditions under which secure
communication is possible.
|
[
{
"version": "v1",
"created": "Fri, 5 Oct 2007 22:25:19 GMT"
}
] | 2007-10-09T00:00:00 |
[
[
"Khisti",
"Ashish",
""
],
[
"Wornell",
"Gregory",
""
]
] |
new_dataset
| 0.999144 |
0710.1589
|
Guangwen Li
|
Guangwen Li, Guangzeng Feng
|
Fast Reliability-based Algorithm of Finding Minimum-weight Codewords for
LDPC Codes
|
8 pages, 1 table
| null | null | null |
cs.IT math.IT
| null |
Despite the NP hardness of acquiring minimum distance $d_m$ for linear codes
theoretically, in this paper we propose one experimental method of finding
minimum-weight codewords, the weight of which is equal to $d_m$ for LDPC codes.
One existing syndrome decoding method, called serial belief propagation (BP)
with ordered statistic decoding (OSD), is adapted to serve our purpose. We hold
the conjecture that among many candidate error patterns in OSD reprocessing,
modulo 2 addition of the lightest error pattern with one of the left error
patterns may generate a light codeword. When the decoding syndrome changes to
all-zero state, the lightest error pattern reduces to all-zero, the lightest
non-zero error pattern is a valid codeword to update lightest codeword list.
Given sufficient codewords sending, the survived lightest codewords are
likely to be the target. Compared with existing techniques, our method
demonstrates its efficiency in the simulation of several interested LDPC codes.
|
[
{
"version": "v1",
"created": "Mon, 8 Oct 2007 16:59:11 GMT"
}
] | 2007-10-09T00:00:00 |
[
[
"Li",
"Guangwen",
""
],
[
"Feng",
"Guangzeng",
""
]
] |
new_dataset
| 0.971582 |
0710.0903
|
L.T. Handoko
|
I. Firmansyah, B. Hermanto and L.T. Handoko
|
Control and Monitoring System for Modular Wireless Robot
|
4 pages, Proceeding of the Industrial Electronics Seminar 2007
| null | null | null |
cs.RO
| null |
We introduce our concept on the modular wireless robot consisting of three
main modules : main unit, data acquisition and data processing modules. We have
developed a generic prototype with an integrated control and monitoring system
to enhance its flexibility, and to enable simple operation through a web-based
interface accessible wirelessly. In present paper, we focus on the
microcontroller based hardware to enable data acquisition and remote mechanical
control.
|
[
{
"version": "v1",
"created": "Wed, 3 Oct 2007 23:05:29 GMT"
}
] | 2007-10-05T00:00:00 |
[
[
"Firmansyah",
"I.",
""
],
[
"Hermanto",
"B.",
""
],
[
"Handoko",
"L. T.",
""
]
] |
new_dataset
| 0.998238 |
0710.0925
|
Kimikazu Kato
|
Hidetoshi Muta and Kimikazu Kato
|
Degeneracy of Angular Voronoi Diagram
|
8 pages, 11 figures, 1 table, presented at 4th International
Symposium on Voronoi Diagrams in Science and Engineering (ISVD07)
| null | null | null |
cs.CG
| null |
Angular Voronoi diagram was introduced by Asano et al. as fundamental
research for a mesh generation. In an angular Voronoi diagram, the edges are
curves of degree three. From view of computational robustness we need to treat
the curves carefully, because they might have a singularity.
We enumerate all the possible types of curves that appear as an edge of an
angular Voronoi diagram, which tells us what kind of degeneracy is possible and
tells us necessity of considering a singularity for computational robustness.
|
[
{
"version": "v1",
"created": "Thu, 4 Oct 2007 05:05:06 GMT"
}
] | 2007-10-05T00:00:00 |
[
[
"Muta",
"Hidetoshi",
""
],
[
"Kato",
"Kimikazu",
""
]
] |
new_dataset
| 0.99908 |
0710.0789
|
Ying Jun Zhang Ph.D.
|
Ying Jun Zhang, Peng Xuan Zheng, Soung Chang Liew
|
Wireless Local Area Networks with Multiple-Packet Reception Capability
| null | null | null | null |
cs.PF cs.NI
| null |
Thanks to its simplicity and cost efficiency, wireless local area network
(WLAN) enjoys unique advantages in providing high-speed and low-cost wireless
services in hot spots and indoor environments. Traditional WLAN
medium-access-control (MAC) protocols assume that only one station can transmit
at a time: simultaneous transmissions of more than one station causes the
destruction of all packets involved. By exploiting recent advances in PHY-layer
multiuser detection (MUD) techniques, it is possible for a receiver to receive
multiple packets simultaneously. This paper argues that such multipacket
reception (MPR) capability can greatly enhance the capacity of future WLANs. In
addition, it provides the MAC-layer and PHY-layer designs needed to achieve the
improved capacity. First, to demonstrate MUD/MPR as a powerful
capacity-enhancement technique, we prove a "super-linearity" result, which
states that the system throughput per unit cost increases as the MPR capability
increases. Second, we show that the commonly deployed binary exponential
backoff (BEB) algorithm in today's WLAN MAC may not be optimal in an MPR
system, and that the optimal backoff factor increases with the MPR capability:
the number of packets that can be received simultaneously. Third, based on the
above insights, we design a joint MAC-PHY layer protocol for an IEEE
802.11-like WLAN that incorporates advanced PHY-layer blind detection and MUD
techniques to implement MPR
|
[
{
"version": "v1",
"created": "Wed, 3 Oct 2007 13:46:01 GMT"
}
] | 2007-10-04T00:00:00 |
[
[
"Zhang",
"Ying Jun",
""
],
[
"Zheng",
"Peng Xuan",
""
],
[
"Liew",
"Soung Chang",
""
]
] |
new_dataset
| 0.996854 |
0710.0539
|
Anthony A. Ruffa
|
Anthony A. Ruffa
|
A Novel Solution to the ATT48 Benchmark Problem
| null | null | null | null |
cs.DS cs.CC
| null |
A solution to the benchmark ATT48 Traveling Salesman Problem (from the
TSPLIB95 library) results from isolating the set of vertices into ten
open-ended zones with nine lengthwise boundaries. In each zone, a
minimum-length Hamiltonian Path (HP) is found for each combination of boundary
vertices, leading to an approximation for the minimum-length Hamiltonian Cycle
(HC). Determination of the optimal HPs for subsequent zones has the effect of
automatically filtering out non-optimal HPs from earlier zones. Although the
optimal HC for ATT48 involves only two crossing edges between all zones (with
one exception), adding inter-zone edges can accommodate more complex problems.
|
[
{
"version": "v1",
"created": "Tue, 2 Oct 2007 14:26:33 GMT"
}
] | 2007-10-03T00:00:00 |
[
[
"Ruffa",
"Anthony A.",
""
]
] |
new_dataset
| 0.998547 |
0710.0232
|
Maurice Margenstern
|
Maurice Margenstern
|
Constructing a uniform plane-filling path in the ternary heptagrid of
the hyperbolic plane
| null | null | null | null |
cs.CG cs.DM
| null |
In this paper, we distinguish two levels for the plane-filling property. We
consider a simple and a strong one. In this paper, we give the construction
which proves that the simple plane-filling property also holds for the
hyperbolic plane. The plane-filling property was established for the Euclidean
plane by J. Kari, in 1994, in the strong version.
|
[
{
"version": "v1",
"created": "Mon, 1 Oct 2007 08:42:03 GMT"
}
] | 2007-10-02T00:00:00 |
[
[
"Margenstern",
"Maurice",
""
]
] |
new_dataset
| 0.977397 |
0709.4466
|
K Sivakumar
|
Taikun Cheng, Krishnamoorthy Sivakumar, Benjamin J. Belzer
|
Serially Concatenated IRA Codes
|
Forty-Fifth Annual Allerton Conference on Communication, Control, and
Computing, 2007, 4 pages, 4 figures
| null | null | null |
cs.IT math.IT
| null |
We address the error floor problem of low-density parity check (LDPC) codes
on the binary-input additive white Gaussian noise (AWGN) channel, by
constructing a serially concatenated code consisting of two systematic
irregular repeat accumulate (IRA) component codes connected by an interleaver.
The interleaver is designed to prevent stopping-set error events in one of the
IRA codes from propagating into stopping set events of the other code.
Simulations with two 128-bit rate 0.707 IRA component codes show that the
proposed architecture achieves a much lower error floor at higher SNRs,
compared to a 16384-bit rate 1/2 IRA code, but incurs an SNR penalty of about 2
dB at low to medium SNRs. Experiments indicate that the SNR penalty can be
reduced at larger blocklengths.
|
[
{
"version": "v1",
"created": "Thu, 27 Sep 2007 18:38:09 GMT"
}
] | 2007-09-28T00:00:00 |
[
[
"Cheng",
"Taikun",
""
],
[
"Sivakumar",
"Krishnamoorthy",
""
],
[
"Belzer",
"Benjamin J.",
""
]
] |
new_dataset
| 0.997647 |
0709.4048
|
P. Oscar Boykin
|
P. Oscar Boykin, Jesse S. A. Bridgewater, Joseph S. Kong, Kamen M.
Lozev, Behnam A. Rezaei, Vwani P. Roychowdhury
|
A Symphony Conducted by Brunet
|
13 pages, 11 figures
| null | null | null |
cs.DC cs.NI
| null |
We introduce BruNet, a general P2P software framework which we use to produce
the first implementation of Symphony, a 1-D Kleinberg small-world architecture.
Our framework is designed to easily implement and measure different P2P
protocols over different transport layers such as TCP or UDP. This paper
discusses our implementation of the Symphony network, which allows each node to
keep $k \le \log N$ shortcut connections and to route to any other node with a
short average delay of $O(\frac{1}{k}\log^2 N)$. %This provides a continuous
trade-off between node degree and routing latency. We present experimental
results taken from several PlanetLab deployments of size up to 1060 nodes.
These succes sful deployments represent some of the largest PlanetLab
deployments of P2P overlays found in the literature, and show our
implementation's robustness to massive node dynamics in a WAN environment.
|
[
{
"version": "v1",
"created": "Tue, 25 Sep 2007 22:09:17 GMT"
}
] | 2007-09-27T00:00:00 |
[
[
"Boykin",
"P. Oscar",
""
],
[
"Bridgewater",
"Jesse S. A.",
""
],
[
"Kong",
"Joseph S.",
""
],
[
"Lozev",
"Kamen M.",
""
],
[
"Rezaei",
"Behnam A.",
""
],
[
"Roychowdhury",
"Vwani P.",
""
]
] |
new_dataset
| 0.9987 |
0709.3554
|
Mirela Damian
|
Mirela Damian, Robin Flatland, Joseph O'Rourke and Suneeta Ramaswami
|
A New Lower Bound on Guard Placement for Wireless Localization
|
4 pages, 3 figures
| null | null | null |
cs.CG cs.CC
| null |
The problem of wireless localization asks to place and orient stations in the
plane, each of which broadcasts a unique key within a fixed angular range, so
that each point in the plane can determine whether it is inside or outside a
given polygonal region. The primary goal is to minimize the number of stations.
In this paper we establish a lower bound of 2n/3 - 1 stations for polygons in
general position, for the case in which the placement of stations is restricted
to polygon vertices, improving upon the existing n/2 lower bound.
|
[
{
"version": "v1",
"created": "Sat, 22 Sep 2007 00:35:28 GMT"
}
] | 2007-09-25T00:00:00 |
[
[
"Damian",
"Mirela",
""
],
[
"Flatland",
"Robin",
""
],
[
"O'Rourke",
"Joseph",
""
],
[
"Ramaswami",
"Suneeta",
""
]
] |
new_dataset
| 0.972656 |
0709.2833
|
B.Sundar Rajan
|
G. Susinder Rajan and B. Sundar Rajan
|
Distributed Space Time Codes with Low Decoding Complexity for
Asynchronous Relay Networks
|
A technical report of DRDO-IISc Programme on Advanced Research in
Mathematical Engineering, Indian Institute of Science, Bangalore, India
| null | null |
TR-PME-2007-09
|
cs.IT math.IT
| null |
Recently Li and Xia have proposed a transmission scheme for wireless relay
networks based on the Alamouti space time code and orthogonal frequency
division multiplexing to combat the effect of timing errors at the relay nodes.
This transmission scheme is amazingly simple and achieves a diversity order of
two for any number of relays. Motivated by its simplicity, this scheme is
extended to a more general transmission scheme that can achieve full
cooperative diversity for any number of relays. The conditions on the
distributed space time code (DSTC) structure that admit its application in the
proposed transmission scheme are identified and it is pointed out that the
recently proposed full diversity four group decodable DSTCs from precoded
co-ordinate interleaved orthogonal designs and extended Clifford algebras
satisfy these conditions. It is then shown how differential encoding at the
source can be combined with the proposed transmission scheme to arrive at a new
transmission scheme that can achieve full cooperative diversity in asynchronous
wireless relay networks with no channel information and also no timing error
knowledge at the destination node. Finally, four group decodable distributed
differential space time codes applicable in this new transmission scheme for
power of two number of relays are also provided.
|
[
{
"version": "v1",
"created": "Tue, 18 Sep 2007 14:14:59 GMT"
}
] | 2007-09-19T00:00:00 |
[
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] |
new_dataset
| 0.996195 |
0709.1056
|
Stephane Norte
|
Stephane Norte
|
A Sudoku Game for People with Motor Impairments
|
7 pages, 5 figures
| null | null | null |
cs.HC cs.CY
| null |
Computer games are motivating and beneficial in learning different
educational skills. Most people use their fingers, hands, and arms when using a
computer game. However, for people with motor disabilities this task can be a
barrier. We present a new Sudoku game for people whose motion is impaired,
called Sudoku 4ALL. With this special interface a person can control the game
with the voice or with a single switch. Our research aims to cautiously search
for issues that might be appropriate for computational support and to build
enabling technologies that increase individuals' functional independence in a
game environment.
|
[
{
"version": "v1",
"created": "Fri, 7 Sep 2007 11:59:22 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Sep 2007 13:26:17 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Sep 2007 21:08:35 GMT"
}
] | 2007-09-18T00:00:00 |
[
[
"Norte",
"Stephane",
""
]
] |
new_dataset
| 0.996021 |
cs/0605052
|
Yufang Xi
|
Yufang Xi and Edmund M. Yeh
|
Node-Based Optimal Power Control, Routing, and Congestion Control in
Wireless Networks
|
Full paper with 8 figures. Submitted to IEEE Transactions on
Information Theory
| null | null | null |
cs.NI
| null |
We present a unified analytical framework within which power control, rate
allocation, routing, and congestion control for wireless networks can be
optimized in a coherent and integrated manner. We consider a multi-commodity
flow model with an interference-limited physical-layer scheme in which power
control and routing variables are chosen to minimize the sum of convex link
costs reflecting, for instance, queuing delay. Distributed network algorithms
where joint power control and routing are performed on a node-by-node basis are
presented. We show that with appropriately chosen parameters, these algorithms
iteratively converge to the global optimum from any initial point with finite
cost. Next, we study refinements of the algorithms for more accurate link
capacity models, and extend the results to wireless networks where the
physical-layer achievable rate region is given by an arbitrary convex set, and
the link costs are strictly quasiconvex. Finally, we demonstrate that
congestion control can be seamlessly incorporated into our framework, so that
algorithms developed for power control and routing can naturally be extended to
optimize user input rates.
|
[
{
"version": "v1",
"created": "Thu, 11 May 2006 21:15:31 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Sep 2007 15:15:15 GMT"
}
] | 2007-09-18T00:00:00 |
[
[
"Xi",
"Yufang",
""
],
[
"Yeh",
"Edmund M.",
""
]
] |
new_dataset
| 0.996013 |
0709.2252
|
Mathias Boc
|
Mathias Boc, Anne Fladenmuller and Marcelo dias de Amorim
|
Otiy: Loactors tracking nodes
| null | null | null | null |
cs.NI
| null |
We propose Otiy, a node-centric location service that limits the impact of
location updates generate by mobile nodes in IEEE802.11-based wireless mesh
networks. Existing location services use node identifiers to determine the
locator (aka anchor) that is responsible for keeping track of a node's
location. Such a strategy can be inefficient because: (i) identifiers give no
clue on the node's mobility and (ii) locators can be far from the
source/destination shortest path, which increases both location delays and
bandwidth consumption. To solve these issues, Otiy introduces a new strategy
that identifies nodes to play the role of locators based on the likelihood of a
destination to be close to these nodes- i.e., locators are identified depending
on the mobility pattern of nodes. Otiy relies on the cyclic mobility patterns
of nodes and creates a slotted agenda composed of a set of predicted locations,
defined according to the past and present patterns of mobility. Correspondent
nodes fetch this agenda only once and use it as a reference for identifying
which locators are responsible for the node at different points in time. Over a
period of about one year, the weekly proportion of nodes having at least 50% of
exact location predictions is in average about 75%. This proportion increases
by 10% when nodes also consider their closeness to the locator from only what
they know about the network.
|
[
{
"version": "v1",
"created": "Fri, 14 Sep 2007 10:21:45 GMT"
}
] | 2007-09-17T00:00:00 |
[
[
"Boc",
"Mathias",
""
],
[
"Fladenmuller",
"Anne",
""
],
[
"de Amorim",
"Marcelo dias",
""
]
] |
new_dataset
| 0.969993 |
cs/0611030
|
Ambedkar Dukkipati
|
Ambedkar Dukkipati
|
Nonextensive Pythagoras' Theorem
|
19 pages
| null | null | null |
cs.IT math.IT
| null |
Kullback-Leibler relative-entropy, in cases involving distributions resulting
from relative-entropy minimization, has a celebrated property reminiscent of
squared Euclidean distance: it satisfies an analogue of the Pythagoras'
theorem. And hence, this property is referred to as Pythagoras' theorem of
relative-entropy minimization or triangle equality and plays a fundamental role
in geometrical approaches of statistical estimation theory like information
geometry. Equvalent of Pythagoras' theorem in the generalized nonextensive
formalism is established in (Dukkipati at el., Physica A, 361 (2006) 124-138).
In this paper we give a detailed account of it.
|
[
{
"version": "v1",
"created": "Tue, 7 Nov 2006 16:10:43 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Sep 2007 11:41:20 GMT"
}
] | 2007-09-12T00:00:00 |
[
[
"Dukkipati",
"Ambedkar",
""
]
] |
new_dataset
| 0.975614 |
0709.0409
|
Damien Chablat
|
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN), Maher Baili
(IRCCyN)
|
A DH-parameter based condition for 3R orthogonal manipulators to have 4
distinct inverse kinematic solutions
| null |
Journal of Mechanical Design 127 (2005) 150-155
| null | null |
cs.RO
| null |
Positioning 3R manipulators may have two or four inverse kinematic solutions
(IKS). This paper derives a necessary and sufficient condition for 3R
positioning manipulators with orthogonal joint axes to have four distinct IKS.
We show that the transition between manipulators with 2 and 4 IKS is defined by
the set of manipulators with a quadruple root of their inverse kinematics. The
resulting condition is explicit and states that the last link length of the
manipulator must be greater than a quantity that depends on three of its
remaining DH-parameters. This result is of interest for the design of new
manipulators.
|
[
{
"version": "v1",
"created": "Tue, 4 Sep 2007 12:27:14 GMT"
}
] | 2007-09-05T00:00:00 |
[
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Baili",
"Maher",
"",
"IRCCyN"
]
] |
new_dataset
| 0.997207 |
0707.1057
|
Sudhir Kumar Singh
|
Sudhir Kumar Singh, Vwani P. Roychowdhury, Himawan Gunadhi, Behnam A.
Rezaei
|
For-profit mediators in sponsored search advertising
|
6 pages
| null | null | null |
cs.GT
| null |
A mediator is a well-known construct in game theory, and is an entity that
plays on behalf of some of the agents who choose to use its services, while the
rest of the agents participate in the game directly. We initiate a game
theoretic study of sponsored search auctions, such as those used by Google and
Yahoo!, involving {\em incentive driven} mediators. We refer to such mediators
as {\em for-profit} mediators, so as to distinguish them from mediators
introduced in prior work, who have no monetary incentives, and are driven by
the altruistic goal of implementing certain desired outcomes. We show that in
our model, (i) players/advertisers can improve their payoffs by choosing to use
the services of the mediator, compared to directly participating in the
auction; (ii) the mediator can obtain monetary benefit by managing the
advertising burden of its group of advertisers; and (iii) the payoffs of the
mediator and the advertisers it plays for are compatible with the incentive
constraints from the advertisers who do dot use its services. A simple
intuition behind the above result comes from the observation that the mediator
has more information about and more control over the bid profile than any
individual advertiser, allowing her to reduce the payments made to the
auctioneer, while still maintaining incentive constraints. Further, our results
indicate that there are significant opportunities for diversification in the
internet economy and we should expect it to continue to develop richer
structure, with room for different types of agents to coexist.
|
[
{
"version": "v1",
"created": "Sat, 7 Jul 2007 03:18:26 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Sep 2007 12:19:30 GMT"
}
] | 2007-09-03T00:00:00 |
[
[
"Singh",
"Sudhir Kumar",
""
],
[
"Roychowdhury",
"Vwani P.",
""
],
[
"Gunadhi",
"Himawan",
""
],
[
"Rezaei",
"Behnam A.",
""
]
] |
new_dataset
| 0.996551 |
0708.3721
|
Marc Daumas
|
Marc Daumas (LIRMM, Eliaus), David Lester (UNIVERSITY of Manchester),
C\'esar Mu\~noz (NIA)
|
Verified Real Number Calculations: A Library for Interval Arithmetic
| null | null | null | null |
cs.MS cs.LO
| null |
Real number calculations on elementary functions are remarkably difficult to
handle in mechanical proofs. In this paper, we show how these calculations can
be performed within a theorem prover or proof assistant in a convenient and
highly automated as well as interactive way. First, we formally establish upper
and lower bounds for elementary functions. Then, based on these bounds, we
develop a rational interval arithmetic where real number calculations take
place in an algebraic setting. In order to reduce the dependency effect of
interval arithmetic, we integrate two techniques: interval splitting and taylor
series expansions. This pragmatic approach has been developed, and formally
verified, in a theorem prover. The formal development also includes a set of
customizable strategies to automate proofs involving explicit calculations over
real numbers. Our ultimate goal is to provide guaranteed proofs of numerical
properties with minimal human theorem-prover interaction.
|
[
{
"version": "v1",
"created": "Tue, 28 Aug 2007 07:14:29 GMT"
}
] | 2007-08-29T00:00:00 |
[
[
"Daumas",
"Marc",
"",
"LIRMM, Eliaus"
],
[
"Lester",
"David",
"",
"UNIVERSITY of Manchester"
],
[
"Muñoz",
"César",
"",
"NIA"
]
] |
new_dataset
| 0.984625 |
0708.3740
|
Noelle Carbonell
|
J\'er\^ome Simonin (INRIA Rocquencourt / INRIA Lorraine - LORIA),
Marius Hategan (INRIA Rocquencourt / INRIA Lorraine - LORIA), No\"elle
Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA)
|
Plate-forme Magicien d'Oz pour l'\'etude de l'apport des ACAs \`a
l'interaction
| null |
Dans Actes du Second Workshop sur les Agents Conversationnels
anim\'es - Second Workshop sur les Agents Conversationnels anim\'es, Toulouse
: France (2007)
| null | null |
cs.HC
| null |
In order to evaluate the contribution of Embodied (Animated) Conversational
Agents (ECAs) to the effectiveness and usability of human-computer interaction,
we developed a software platform meant to collect usage data. This platform,
which implements the wizard of Oz paradigm, makes it possible to simulate user
interfaces integrating ACAs for any Windows software application. It can also
save and "replay" a rich interaction trace including user and system events,
screen captures, users' speech and eye fixations. This platform has been used
to assess users' subjective judgements and reactions to a multimodal online
help system meant to facilitate the use of software for the general public
(Flash). The online help system is embodied using a 3D talking head (developed
by FT R&D) which "says" oral help messages illustrated with Flash screen
copies.
|
[
{
"version": "v1",
"created": "Tue, 28 Aug 2007 09:56:05 GMT"
}
] | 2007-08-29T00:00:00 |
[
[
"Simonin",
"Jérôme",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Hategan",
"Marius",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Carbonell",
"Noëlle",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
]
] |
new_dataset
| 0.995451 |
0708.3505
|
Noelle Carbonell
|
Daniel Gepner (INRIA Rocquencourt / INRIA Lorraine - LORIA),
J\'er\^ome Simonin (INRIA Rocquencourt / INRIA Lorraine - LORIA), No\"elle
Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA)
|
Gaze as a Supplementary Modality for Interacting with Ambient
Intelligence Environments
|
10 pages
|
Dans Universal Access to Ambient Interaction, Springer-Verlag,
LNCS-LNAI Series, number 4555 - 12th International Conference on
Human-Computer Interaction (HCI Internatinal 2007), Beijing : China (2007)
| null | null |
cs.HC
| null |
We present our current research on the implementation of gaze as an efficient
and usable pointing modality supplementary to speech, for interacting with
augmented objects in our daily environment or large displays, especially
immersive virtual reality environments, such as reality centres and caves. We
are also addressing issues relating to the use of gaze as the main interaction
input modality. We have designed and developed two operational user interfaces:
one for providing motor-disabled users with easy gaze-based access to map
applications and graphical software; the other for iteratively testing and
improving the usability of gaze-contingent displays.
|
[
{
"version": "v1",
"created": "Sun, 26 Aug 2007 18:53:41 GMT"
}
] | 2007-08-28T00:00:00 |
[
[
"Gepner",
"Daniel",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Simonin",
"Jérôme",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Carbonell",
"Noëlle",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
]
] |
new_dataset
| 0.998518 |
0708.3580
|
Noelle Carbonell
|
No\"elle Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA)
|
Ambient Multimodality: an Asset for Developing Universal Access to the
Information Society
| null |
3rd International Conference on Universal Access in Human-Computer
Interaction, Las Vegas : \'Etats-Unis d'Am\'erique (2005)
| null | null |
cs.HC
| null |
The paper tries to point out the benefits that can be derived from research
advances in the implementation of concepts such as ambient intelligence (AmI)
and ubiquitous or pervasive computing for promoting Universal Access (UA) to
the Information Society, that is, for contributing to enable everybody,
especially Physically Disabled (PD) people, to have easy access to all
computing resources and information services that the coming worldwide
Information Society will soon make available to the general public. Following
definitions of basic concepts relating to multimodal interaction, the
significant contribution of multimodality to developing UA is briefly argued.
Then, a short state of the art in AmI research is presented. In the last
section we bring out the potential contribution of advances in AmI research and
technology to the improvement of computer access for PD people. This claim is
supported by the following observations: (i) most projects aiming at
implementing AmI focus on the design of new interaction modalities and flexible
multimodal user interfaces which may facilitate PD users' computer access ;
(ii) targeted applications will support users in a wide range of daily
activities which will be performed simultaneously with supporting computing
tasks; therefore, users will be placed in contexts where they will be
confronted with similar difficulties to those encountered by PD users; (iii)
AmI applications being intended for the general public, a wide range of new
interaction devices and flexible processing software will be available, making
it possible to provide PD users with human-computer facilities tailored to
their specific needs at reasonable expense..
|
[
{
"version": "v1",
"created": "Mon, 27 Aug 2007 12:11:56 GMT"
}
] | 2007-08-28T00:00:00 |
[
[
"Carbonell",
"Noëlle",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
]
] |
new_dataset
| 0.993164 |
0708.3613
|
Damien Chablat
|
Anatoly Pashkevich (Robotic Laboratory), Damien Chablat (IRCCyN),
Philippe Wenger (IRCCyN)
|
Kinematics and Workspace Analysis of a Three-Axis Parallel Manipulator:
the Orthoglide
| null |
Robotica 24, 1 (2006) 39-49
| null | null |
cs.RO
| null |
The paper addresses kinematic and geometrical aspects of the Orthoglide, a
three-DOF parallel mechanism. This machine consists of three fixed linear
joints, which are mounted orthogonally, three identical legs and a mobile
platform, which moves in the Cartesian x-y-z space with fixed orientation. New
solutions to solve inverse/direct kinematics are proposed and we perform a
detailed workspace and singularity analysis, taking into account specific joint
limit constraints.
|
[
{
"version": "v1",
"created": "Mon, 27 Aug 2007 14:05:34 GMT"
}
] | 2007-08-28T00:00:00 |
[
[
"Pashkevich",
"Anatoly",
"",
"Robotic Laboratory"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] |
new_dataset
| 0.997952 |
0708.3166
|
Achmad Benny Mutiara
|
A. B. Mutiara and T. A. Sabastian
|
Web Server Benchmark Application WiiBench using Erlang/OTP R11 and
Fedora-Core Linux 5.0
| null | null | null | null |
cs.NI
| null |
As the web grows and the amount of traffics on the web server increase,
problems related to performance begin to appear. Some of the problems, such as
the number of users that can access the server simultaneously, the number of
requests that can be handled by the server per second (requests per second) to
bandwidth consumption and hardware utilization like memories and CPU. To give
better quality of service (\textbf{\textit{QoS}}), web hosting providers and
also the system administrators and network administrators who manage the server
need a benchmark application to measure the capabilities of their servers.
Later, the application intends to work under Linux/Unix -- like platforms and
built using Erlang/OTP R11 as a concurrent oriented language under Fedora Core
Linux 5.0. \textbf{\textit{WiiBench}} is divided into two main parts, the
controller section and the launcher section. Controller is the core of the
application. It has several duties, such as read the benchmark scenario file,
configure the program based on the scenario, initialize the launcher section,
gather the benchmark results from local and remote Erlang node where the
launcher runs and write them in a log file (later the log file will be used to
generate a report page for the sysadmin). Controller also has function as a
timer which act as timing for user inters arrival to the server. Launcher
generates a number of users based on the scenario, initialize them and start
the benchmark by sending requests to the web server. The clients also gather
the benchmark result and send them to the controller.
|
[
{
"version": "v1",
"created": "Thu, 23 Aug 2007 12:25:50 GMT"
}
] | 2007-08-24T00:00:00 |
[
[
"Mutiara",
"A. B.",
""
],
[
"Sabastian",
"T. A.",
""
]
] |
new_dataset
| 0.999669 |
0708.2732
|
Yingbin Liang
|
Yingbin Liang and H. Vincent Poor
|
Secrecy Capacity Region of Binary and Gaussian Multiple Access Channels
|
In Proceedings of the 44th Annual Allerton Conference on
Communication, Control and Computing, University of Illinois, Monticello, IL,
September 27-29, 2006
| null | null | null |
cs.IT math.IT
| null |
A generalized multiple access channel (GMAC) with one confidential message
set is studied, where two users (users 1 and 2) attempt to transmit common
information to a destination, and user 1 also has confidential information
intended for the destination. Moreover, user 1 wishes to keep its confidential
information as secret as possible from user 2. A deterministic GMAC is first
studied, and the capacity-equivocation region and the secrecy capacity region
are obtained. Two main classes of the GMAC are then studied: the binary GMAC
and the Gaussian GMAC. For both channels, the capacity-equivocation region and
the secrecy capacity region are established.
|
[
{
"version": "v1",
"created": "Mon, 20 Aug 2007 20:53:10 GMT"
}
] | 2007-08-22T00:00:00 |
[
[
"Liang",
"Yingbin",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
new_dataset
| 0.958086 |
0708.2432
|
Oliver Knill
|
Oliver Knill and Jose Ramirez-Herran
|
A structure from motion inequality
|
15 pages, 22 figures
| null | null | null |
cs.CV cs.AI
| null |
We state an elementary inequality for the structure from motion problem for m
cameras and n points. This structure from motion inequality relates space
dimension, camera parameter dimension, the number of cameras and number points
and global symmetry properties and provides a rigorous criterion for which
reconstruction is not possible with probability 1. Mathematically the
inequality is based on Frobenius theorem which is a geometric incarnation of
the fundamental theorem of linear algebra. The paper also provides a general
mathematical formalism for the structure from motion problem. It includes the
situation the points can move while the camera takes the pictures.
|
[
{
"version": "v1",
"created": "Sat, 18 Aug 2007 14:36:28 GMT"
}
] | 2007-08-21T00:00:00 |
[
[
"Knill",
"Oliver",
""
],
[
"Ramirez-Herran",
"Jose",
""
]
] |
new_dataset
| 0.975555 |
0708.2336
|
Dominik Scheder
|
Dominik Scheder
|
Unsatisfiable Linear k-CNFs Exist, for every k
|
11 pages
| null | null | null |
cs.DM cs.CC cs.LO
| null |
We call a CNF formula linear if any two clauses have at most one variable in
common. Let Linear k-SAT be the problem of deciding whether a given linear
k-CNF formula is satisfiable. Here, a k-CNF formula is a CNF formula in which
every clause has size exactly k. It was known that for k >= 3, Linear k-SAT is
NP-complete if and only if an unsatisfiable linear k-CNF formula exists, and
that they do exist for k >= 4. We prove that unsatisfiable linear k-CNF
formulas exist for every k. Let f(k) be the minimum number of clauses in an
unsatisfiable linear k-CNF formula. We show that f(k) is Omega(k2^k) and
O(4^k*k^4), i.e., minimum size unsatisfiable linear k-CNF formulas are
significantly larger than minimum size unsatisfiable k-CNF formulas. Finally,
we prove that, surprisingly, linear k-CNF formulas do not allow for a larger
fraction of clauses to be satisfied than general k-CNF formulas.
|
[
{
"version": "v1",
"created": "Fri, 17 Aug 2007 09:44:21 GMT"
}
] | 2007-08-20T00:00:00 |
[
[
"Scheder",
"Dominik",
""
]
] |
new_dataset
| 0.994052 |
cs/0611155
|
Deepak Sridhara
|
Christine A. Kelley, Deepak Sridhara, and Joachim Rosenthal
|
Zig-zag and Replacement Product Graphs and LDPC Codes
|
Submitted to Journal of Advances in Mathematics of Communications,
Aug. 2007
| null | null | null |
cs.IT math.IT
| null |
The performance of codes defined from graphs depends on the expansion
property of the underlying graph in a crucial way. Graph products, such as the
zig-zag product and replacement product provide new infinite families of
constant degree expander graphs. The paper investigates the use of zig-zag and
replacement product graphs for the construction of codes on graphs. A
modification of the zig-zag product is also introduced, which can operate on
two unbalanced biregular bipartite graphs.
|
[
{
"version": "v1",
"created": "Thu, 30 Nov 2006 03:36:22 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Aug 2007 13:06:44 GMT"
}
] | 2007-08-20T00:00:00 |
[
[
"Kelley",
"Christine A.",
""
],
[
"Sridhara",
"Deepak",
""
],
[
"Rosenthal",
"Joachim",
""
]
] |
new_dataset
| 0.999006 |
0708.2270
|
Tan Wong
|
Saravanan Vijayakumaran, Tan F. Wong and Tat M. Lok
|
Capacity of the Degraded Half-Duplex Relay Channel
|
10 pages, 2 figures
| null | null | null |
cs.IT math.IT
| null |
A discrete memoryless half-duplex relay channel is constructed from a
broadcast channel from the source to the relay and destination and a multiple
access channel from the source and relay to the destination. When the relay
listens, the channel operates in the broadcast mode. The channel switches to
the multiple access mode when the relay transmits. If the broadcast component
channel is physically degraded, the half-duplex relay channel will also be
referred to as physically degraded. The capacity of this degraded half-duplex
relay channel is examined. It is shown that the block Markov coding suggested
in the seminal paper by Cover and El Gamal can be modified to achieve capacity
for the degraded half-duplex relay channel. In the code construction, the
listen-transmit schedule of the relay is made to depend on the message to be
sent and hence the schedule carries information itself. If the schedule is
restricted to be deterministic, it is shown that the capacity can be achieved
by a simple management of information flows across the broadcast and multiple
access component channels.
|
[
{
"version": "v1",
"created": "Thu, 16 Aug 2007 19:36:03 GMT"
}
] | 2007-08-17T00:00:00 |
[
[
"Vijayakumaran",
"Saravanan",
""
],
[
"Wong",
"Tan F.",
""
],
[
"Lok",
"Tat M.",
""
]
] |
new_dataset
| 0.999792 |
0708.1343
|
Heide Gluesing-Luerssen
|
Heide Gluesing-Luerssen, Fai-Lung Tsang
|
A Matrix Ring Description for Cyclic Convolutional Codes
| null | null | null | null |
cs.IT math.IT math.RA
| null |
In this paper, we study convolutional codes with a specific cyclic structure.
By definition, these codes are left ideals in a certain skew polynomial ring.
Using that the skew polynomial ring is isomorphic to a matrix ring we can
describe the algebraic parameters of the codes in a more accessible way. We
show that the existence of such codes with given algebraic parameters can be
reduced to the solvability of a modified rook problem. It is our strong belief
that the rook problem is always solvable, and we present solutions in
particular cases.
|
[
{
"version": "v1",
"created": "Thu, 9 Aug 2007 21:35:15 GMT"
}
] | 2007-08-13T00:00:00 |
[
[
"Gluesing-Luerssen",
"Heide",
""
],
[
"Tsang",
"Fai-Lung",
""
]
] |
new_dataset
| 0.990088 |
0708.1078
|
Jianwen Zhang
|
Marc A. Armand, Jianwen Zhang
|
Nearly MDS expander codes with reduced alphabet size
| null | null | null | null |
cs.IT math.IT
| null |
Recently, Roth and Skachek proposed two methods for constructing nearly
maximum-distance separable (MDS) expander codes. We show that through the
simple modification of using mixed-alphabet codes derived from MDS codes as
constituent codes in their code designs, one can obtain nearly MDS codes of
significantly smaller alphabet size, albeit at the expense of a (very slight)
reduction in code rate.
|
[
{
"version": "v1",
"created": "Wed, 8 Aug 2007 10:45:51 GMT"
}
] | 2007-08-09T00:00:00 |
[
[
"Armand",
"Marc A.",
""
],
[
"Zhang",
"Jianwen",
""
]
] |
new_dataset
| 0.999103 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.