id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
cs/0607095
Hyundong Shin
Hyundong Shin, Moe Z. Win
Gallager's Exponent for MIMO Channels: A Reliability-Rate Tradeoff
Submitted to the IEEE Transactions on Communications
null
null
null
cs.IT math.IT
null
In this paper, we derive Gallager's random coding error exponent for multiple-input multiple-output (MIMO) channels, assuming no channel-state information (CSI) at the transmitter and perfect CSI at the receiver. This measure gives insight into a fundamental tradeoff between the communication reliability and information rate of MIMO channels, enabling to determine the required codeword length to achieve a prescribed error probability at a given rate below the channel capacity. We quantify the effects of the number of antennas, channel coherence time, and spatial fading correlation on the MIMO exponent. In addition, general formulae for the ergodic capacity and the cutoff rate in the presence of spatial correlation are deduced from the exponent expressions. These formulae are applicable to arbitrary structures of transmit and receive correlation, encompassing all the previously known results as special cases of our expressions.
[ { "version": "v1", "created": "Thu, 20 Jul 2006 06:56:02 GMT" } ]
2007-07-13T00:00:00
[ [ "Shin", "Hyundong", "" ], [ "Win", "Moe Z.", "" ] ]
new_dataset
0.981929
cs/0607132
Ludo M.G.M. Tolhuizen
R. Ahlswede, H. Aydinian, L.H. Khachatrian and L.M.G.M. Tolhuizen
On q-ary codes correcting all unidirectional errors of a limited magnitude
22 pages,no figures. Accepted for publication of Journal of Armenian Academy of Sciences, special issue dedicated to Rom Varshamov
null
null
null
cs.IT math.IT
null
We consider codes over the alphabet Q={0,1,..,q-1}intended for the control of unidirectional errors of level l. That is, the transmission channel is such that the received word cannot contain both a component larger than the transmitted one and a component smaller than the transmitted one. Moreover, the absolute value of the difference between a transmitted component and its received version is at most l. We introduce and study q-ary codes capable of correcting all unidirectional errors of level l. Lower and upper bounds for the maximal size of those codes are presented. We also study codes for this aim that are defined by a single equation on the codeword coordinates(similar to the Varshamov-Tenengolts codes for correcting binary asymmetric errors). We finally consider the problem of detecting all unidirectional errors of level l.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 15:51:31 GMT" } ]
2007-07-13T00:00:00
[ [ "Ahlswede", "R.", "" ], [ "Aydinian", "H.", "" ], [ "Khachatrian", "L. H.", "" ], [ "Tolhuizen", "L. M. G. M.", "" ] ]
new_dataset
0.966036
cs/0609046
Chih-Chun Wang
Chih-Chun Wang (1), Sanjeev R. Kulkarni (2), H. Vincent Poor (2) ((1) Purdue University, (2) Princeton University)
Exhausting Error-Prone Patterns in LDPC Codes
submitted to IEEE Trans. Information Theory
null
null
null
cs.IT cs.DS math.IT
null
It is proved in this work that exhaustively determining bad patterns in arbitrary, finite low-density parity-check (LDPC) codes, including stopping sets for binary erasure channels (BECs) and trapping sets (also known as near-codewords) for general memoryless symmetric channels, is an NP-complete problem, and efficient algorithms are provided for codes of practical short lengths n~=500. By exploiting the sparse connectivity of LDPC codes, the stopping sets of size <=13 and the trapping sets of size <=11 can be efficiently exhaustively determined for the first time, and the resulting exhaustive list is of great importance for code analysis and finite code optimization. The featured tree-based narrowing search distinguishes this algorithm from existing ones for which inexhaustive methods are employed. One important byproduct is a pair of upper bounds on the bit-error rate (BER) & frame-error rate (FER) iterative decoding performance of arbitrary codes over BECs that can be evaluated for any value of the erasure probability, including both the waterfall and the error floor regions. The tightness of these upper bounds and the exhaustion capability of the proposed algorithm are proved when combining an optimal leaf-finding module with the tree-based search. These upper bounds also provide a worst-case-performance guarantee which is crucial to optimizing LDPC codes for extremely low error rate applications, e.g., optical/satellite communications. Extensive numerical experiments are conducted that include both randomly and algebraically constructed LDPC codes, the results of which demonstrate the superior efficiency of the exhaustion algorithm and its significant value for finite length code optimization.
[ { "version": "v1", "created": "Mon, 11 Sep 2006 00:50:16 GMT" } ]
2007-07-13T00:00:00
[ [ "Wang", "Chih-Chun", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.989569
cs/0609094
Igal Sason
Gil Wiechman and Igal Sason
An Improved Sphere-Packing Bound Targeting Codes of Short to Moderate Block Lengths and Applications
To be presented in the 44th Allerton conference, 27-29 September 2006. The full paper version was submitted to the IEEE Trans. on Information Theory, August 2006 (see http://www.ee.technion.ac.il/people/sason/ISP.pdf)
null
null
null
cs.IT math.IT
null
This paper derives an improved sphere-packing (ISP) bound targeting codes of short to moderate block lengths. We first review the 1967 sphere-packing (SP67) bound for discrete memoryless channels, and a recent improvement by Valembois and Fossorier. These concepts are used for the derivation of a new lower bound on the decoding error probability (referred to as the ISP bound) which is uniformly tighter than the SP67 bound and its recent improved version. Under a mild condition, the ISP bound is applicable to general memoryless channels, and some of its applications are exemplified. Its tightness is studied by comparing it with bounds on the ML decoding error probability. It is exemplified that the ISP bound suggests an interesting alternative to the 1959 sphere-packing (SP59) bound of Shannon for the Gaussian channel, especially for digital modulations of high spectral efficiency.
[ { "version": "v1", "created": "Sun, 17 Sep 2006 21:21:46 GMT" } ]
2007-07-13T00:00:00
[ [ "Wiechman", "Gil", "" ], [ "Sason", "Igal", "" ] ]
new_dataset
0.987459
cs/0610012
N Rajesh Pillai
N Rajesh Pillai, Yogesh Kumar
On Shift Sequences for Interleaved Construction of Sequence Sets with Low Correlation
Corrected typos. Added special case for v=2 for second problem
null
null
null
cs.IT math.IT
null
Construction of signal sets with low correlation property is of interest to designers of CDMA systems. One of the preferred ways of constructing such sets is the interleaved construction which uses two sequences a and b with 2-level autocorrelation and a shift sequence e. The shift sequence has to satisfy certain conditions for the resulting signal set to have low correlation properties. This article shows that the conditions reported in literature are too strong and gives a version which results in more number of shift sequences. An open problem on the existence of shift sequences for attaining an interleaved set with maximum correlation value bounded by v+2 is also taken up and solved.
[ { "version": "v1", "created": "Wed, 4 Oct 2006 05:07:42 GMT" }, { "version": "v2", "created": "Thu, 21 Jun 2007 09:30:42 GMT" } ]
2007-07-13T00:00:00
[ [ "Pillai", "N Rajesh", "" ], [ "Kumar", "Yogesh", "" ] ]
new_dataset
0.997644
cs/0610151
Anant Sahai
Anant Sahai
Anytime coding on the infinite bandwidth AWGN channel: A sequential semi-orthogonal optimal code
12 pages, 6 figures, submitted to IT Transactions
null
null
null
cs.IT math.IT
null
It is well known that orthogonal coding can be used to approach the Shannon capacity of the power-constrained AWGN channel without a bandwidth constraint. This correspondence describes a semi-orthogonal variation of pulse position modulation that is sequential in nature -- bits can be ``streamed across'' without having to buffer up blocks of bits at the transmitter. ML decoding results in an exponentially small probability of error as a function of tolerated receiver delay and thus eventually a zero probability of error on every transmitted bit. In the high-rate regime, a matching upper bound is given on the delay error exponent. We close with some comments on the case with feedback and the connections to the capacity per unit cost problem.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 10:01:38 GMT" } ]
2007-07-13T00:00:00
[ [ "Sahai", "Anant", "" ] ]
new_dataset
0.984387
cs/0611112
Ali Pusane
Daniel J. Costello Jr., and G. David Forney Jr
Channel Coding: The Road to Channel Capacity
null
null
null
null
cs.IT math.IT
null
Starting from Shannon's celebrated 1948 channel coding theorem, we trace the evolution of channel coding from Hamming codes to capacity-approaching codes. We focus on the contributions that have led to the most significant improvements in performance vs. complexity for practical applications, particularly on the additive white Gaussian noise (AWGN) channel. We discuss algebraic block codes, and why they did not prove to be the way to get to the Shannon limit. We trace the antecedents of today's capacity-approaching codes: convolutional codes, concatenated codes, and other probabilistic coding schemes. Finally, we sketch some of the practical applications of these codes.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 01:10:58 GMT" } ]
2007-07-13T00:00:00
[ [ "Costello", "Daniel J.", "Jr." ], [ "Forney", "G. David", "Jr" ] ]
new_dataset
0.992035
cs/0611121
Matthieu Bloch
Matthieu Bloch, Joao Barros, Miguel R. D. Rodrigues and Steven W. McLaughlin
Wireless Information-Theoretic Security - Part II: Practical Implementation
25 pages, 11 figures, submitted to Special Issue of IEEE Trans. on Info. Theory on Information Theoretic Security
null
null
null
cs.IT math.IT
null
In Part I of this two-part paper on confidential communication over wireless channels, we studied the fundamental security limits of quasi-static fading channels from the point of view of outage secrecy capacity with perfect and imperfect channel state information. In Part II, we develop a practical secret key agreement protocol for Gaussian and quasi-static fading wiretap channels. The protocol uses a four-step procedure to secure communications: establish common randomness via an opportunistic transmission, perform message reconciliation, establish a common key via privacy amplification, and use of the key. We introduce a new reconciliation procedure that uses multilevel coding and optimized low density parity check codes which in some cases comes close to achieving the secrecy capacity limits established in Part I. Finally, we develop new metrics for assessing average secure key generation rates and show that our protocol is effective in secure key renewal.
[ { "version": "v1", "created": "Fri, 24 Nov 2006 04:54:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Bloch", "Matthieu", "" ], [ "Barros", "Joao", "" ], [ "Rodrigues", "Miguel R. D.", "" ], [ "McLaughlin", "Steven W.", "" ] ]
new_dataset
0.967463
cs/0611129
Neri Merhav
Neri Merhav
Shannon's secrecy system with informed receivers and its application to systematic coding for wiretapped channels
null
null
null
null
cs.IT math.IT
null
Shannon's secrecy system is studied in a setting, where both the legitimate decoder and the wiretapper have access to side information sequences correlated to the source, but the wiretapper receives both the coded information and the side information via channels that are more noisy than the respective channels of the legitmate decoder, which in turn, also shares a secret key with the encoder. A single--letter characterization is provided for the achievable region in the space of five figures of merit: the equivocation at the wiretapper, the key rate, the distortion of the source reconstruction at the legitimate receiver, the bandwidth expansion factor of the coded channels, and the average transmission cost (generalized power). Beyond the fact that this is an extension of earlier studies, it also provides a framework for studying fundamental performance limits of systematic codes in the presence of a wiretap channel. The best achievable performance of systematic codes is then compared to that of a general code in several respects, and a few examples are given.
[ { "version": "v1", "created": "Sun, 26 Nov 2006 09:34:45 GMT" } ]
2007-07-13T00:00:00
[ [ "Merhav", "Neri", "" ] ]
new_dataset
0.978184
cs/0611156
K Vinodh
Petros Elia, K. Vinodh, M. Anand and P. Vijay Kumar
D-MG Tradeoff and Optimal Codes for a Class of AF and DF Cooperative Communication Protocols
17 pages, 5 figures
null
null
null
cs.IT math.IT
null
We consider cooperative relay communication in a fading channel environment under the Orthogonal Amplify and Forward (OAF) and Orthogonal and Non-Orthogonal Selection Decode and Forward (OSDF and NSDF) protocols. For all these protocols, we compute the Diversity-Multiplexing Gain Tradeoff (DMT). We construct DMT optimal codes for the protocols which are sphere decodable and, in certain cases, incur minimum possible delay. Our results establish that the DMT of the OAF protocol is identical to the DMT of the Non-Orthogonal Amplify and Forward (NAF) protocol. Two variants of the NSDF protocol are considered: fixed-NSDF and variable-NSDF protocol. In the variable-NSDF protocol, the fraction of time duration for which the source alone transmits is allowed to vary with the rate of communication. Among the class of static amplify-and-forward and decode-and-forward protocols, the variable-NSDF protocol is shown to have the best known DMT for any number of relays apart from the two-relay case. When there are two relays, the variable-NSDF protocol is shown to improve on the DMT of the best previously-known protocol for higher values of the multiplexing gain. Our results also establish that the fixed-NSDF protocol has a better DMT than the NAF protocol for any number of relays. Finally, we present a DMT optimal code construction for the NAF protocol.
[ { "version": "v1", "created": "Thu, 30 Nov 2006 07:26:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Elia", "Petros", "" ], [ "Vinodh", "K.", "" ], [ "Anand", "M.", "" ], [ "Kumar", "P. Vijay", "" ] ]
new_dataset
0.961402
cs/0612044
Lifeng Lai
Lifeng Lai and Hesham El Gamal
The Relay-Eavesdropper Channel: Cooperation for Secrecy
33 pages, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
This paper establishes the utility of user cooperation in facilitating secure wireless communications. In particular, the four-terminal relay-eavesdropper channel is introduced and an outer-bound on the optimal rate-equivocation region is derived. Several cooperation strategies are then devised and the corresponding achievable rate-equivocation region are characterized. Of particular interest is the novel Noise-Forwarding (NF) strategy, where the relay node sends codewords independent of the source message to confuse the eavesdropper. This strategy is used to illustrate the deaf helper phenomenon, where the relay is able to facilitate secure communications while being totally ignorant of the transmitted messages. Furthermore, NF is shown to increase the secrecy capacity in the reversely degraded scenario, where the relay node fails to offer performance gains in the classical setting. The gain offered by the proposed cooperation strategies is then proved theoretically and validated numerically in the additive White Gaussian Noise (AWGN) channel.
[ { "version": "v1", "created": "Thu, 7 Dec 2006 17:15:14 GMT" } ]
2007-07-13T00:00:00
[ [ "Lai", "Lifeng", "" ], [ "Gamal", "Hesham El", "" ] ]
new_dataset
0.98813
cs/0701024
Yingbin Liang
Yingbin Liang, H. Vincent Poor and Shlomo Shamai (Shitz)
Secure Communication over Fading Channels
Submitted to IEEE Transactions on Information Theory, Special Issue on Information Theoretic Security, November 2006
null
null
null
cs.IT cs.CR math.IT
null
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1. The confidential information needs to be kept as secret as possible from receiver 2. The broadcast channel from the source node to receivers 1 and 2 is corrupted by multiplicative fading gain coefficients in addition to additive Gaussian noise terms. The channel state information (CSI) is assumed to be known at both the transmitter and the receivers. The parallel BCC with independent subchannels is first studied, which serves as an information-theoretic model for the fading BCC. The secrecy capacity region of the parallel BCC is established. This result is then specialized to give the secrecy capacity region of the parallel BCC with degraded subchannels. The secrecy capacity region is then established for the parallel Gaussian BCC, and the optimal source power allocations that achieve the boundary of the secrecy capacity region are derived. In particular, the secrecy capacity region is established for the basic Gaussian BCC. The secrecy capacity results are then applied to study the fading BCC. Both the ergodic and outage performances are studied.
[ { "version": "v1", "created": "Thu, 4 Jan 2007 18:49:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Liang", "Yingbin", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
new_dataset
0.998377
cs/0701030
Eric Chen
Eric Zhi Chen
New Constructions of a Family of 2-Generator Quasi-Cyclic Two-Weight Codes and Related Codes
4 pages, conference
null
null
null
cs.IT math.IT
null
Based on cyclic simplex codes, a new construction of a family of 2-generator quasi-cyclic two-weight codes is given. New optimal binary quasi-cyclic [195, 8, 96], [210, 8, 104] and [240, 8, 120] codes, good QC ternary [195, 6, 126], [208, 6, 135], [221, 6, 144] codes are thus obtained. Furthermre, binary quasi-cyclic self-complementary codes are also constructed.
[ { "version": "v1", "created": "Fri, 5 Jan 2007 13:39:54 GMT" } ]
2007-07-13T00:00:00
[ [ "Chen", "Eric Zhi", "" ] ]
new_dataset
0.990592
cs/0701055
Leif Hanlen
Leif Hanlen, Thushara Abhayapala
Bounds on Space-Time-Frequency Dimensionality
accepted Australian Communication Theory Workshop
null
null
null
cs.IT math.IT
null
We bound the number of electromagnetic signals which may be observed over a frequency range $2W$ for a time $T$ within a region of space enclosed by a radius $R$. Our result implies that broadband fields in space cannot be arbitrarily complex: there is a finite amount of information which may be extracted from a region of space via electromagnetic radiation. Three-dimensional space allows a trade-off between large carrier frequency and bandwidth. We demonstrate applications in super-resolution and broadband communication.
[ { "version": "v1", "created": "Tue, 9 Jan 2007 00:01:24 GMT" } ]
2007-07-13T00:00:00
[ [ "Hanlen", "Leif", "" ], [ "Abhayapala", "Thushara", "" ] ]
new_dataset
0.984017
cs/0701060
Andreas Klappenecker
Salah A. Aly, Andreas Klappenecker, Pradeep Kiran Sarvepalli
Duadic Group Algebra Codes
5 pages
null
null
null
cs.IT math.IT quant-ph
null
Duadic group algebra codes are a generalization of quadratic residue codes. This paper settles an open problem raised by Zhu concerning the existence of duadic group algebra codes. These codes can be used to construct degenerate quantum stabilizer codes that have the nice feature that many errors of small weight do not need error correction; this fact is illustrated by an example.
[ { "version": "v1", "created": "Tue, 9 Jan 2007 04:36:41 GMT" } ]
2007-07-13T00:00:00
[ [ "Aly", "Salah A.", "" ], [ "Klappenecker", "Andreas", "" ], [ "Sarvepalli", "Pradeep Kiran", "" ] ]
new_dataset
0.999149
cs/0701067
G.Susinder Rajan
G. Susinder Rajan, Anshoo Tandon and B. Sundar Rajan
On Four-group ML Decodable Distributed Space Time Codes for Cooperative Communication
To appear in Proceedings of WCNC 2007, Hong Kong, March 11-15, 2007. 5 pages, 1 Figure
null
null
null
cs.IT math.IT
null
A construction of a new family of distributed space time codes (DSTCs) having full diversity and low Maximum Likelihood (ML) decoding complexity is provided for the two phase based cooperative diversity protocols of Jing-Hassibi and the recently proposed Generalized Non-orthogonal Amplify and Forward (GNAF) protocol of Rajan et al. The salient feature of the proposed DSTCs is that they satisfy the extra constraints imposed by the protocols and are also four-group ML decodable which leads to significant reduction in ML decoding complexity compared to all existing DSTC constructions. Moreover these codes have uniform distribution of power among the relays as well as in time. Also, simulations results indicate that these codes perform better in comparison with the only known DSTC with the same rate and decoding complexity, namely the Coordinate Interleaved Orthogonal Design (CIOD). Furthermore, they perform very close to DSTCs from field extensions which have same rate but higher decoding complexity.
[ { "version": "v1", "created": "Tue, 9 Jan 2007 21:12:53 GMT" } ]
2007-07-13T00:00:00
[ [ "Rajan", "G. Susinder", "" ], [ "Tandon", "Anshoo", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.994353
cs/0701068
G.Susinder Rajan
G. Susinder Rajan and B. Sundar Rajan
Distributed Space-Time Codes for Cooperative Networks with Partial CSI
To appear in Proceedings of WCNC 2007, Hong Kong, March 11-15, 2007
null
null
null
cs.IT math.IT
null
Design criteria and full-diversity Distributed Space Time Codes (DSTCs) for the two phase transmission based cooperative diversity protocol of Jing-Hassibi and the Generalized Nonorthogonal Amplify and Forward (GNAF) protocol are reported, when the relay nodes are assumed to have knowledge of the phase component of the source to relay channel gains. It is shown that this under this partial channel state information (CSI), several well known space time codes for the colocated MIMO (Multiple Input Multiple Output) channel become amenable for use as DSTCs. In particular, the well known complex orthogonal designs, generalized coordinate interleaved orthogonal designs (GCIODs) and unitary weight single symbol decodable (UW-SSD) codes are shown to satisfy the required design constraints for DSTCs. Exploiting the relaxed code design constraints, we propose DSTCs obtained from Clifford Algebras which have low ML decoding complexity.
[ { "version": "v1", "created": "Tue, 9 Jan 2007 21:20:08 GMT" } ]
2007-07-13T00:00:00
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.998791
cs/0701078
Vignesh Sethuraman
Vignesh Sethuraman, Ligong Wang, Bruce Hajek, Amos Lapidoth
Low SNR Capacity of Fading Channels -- MIMO and Delay Spread
null
null
null
null
cs.IT math.IT
null
Discrete-time Rayleigh fading multiple-input multiple-output (MIMO) channels are considered, with no channel state information at the transmitter and receiver. The fading is assumed to be correlated in time and independent from antenna to antenna. Peak and average transmit power constraints are imposed, either on the sum over antennas, or on each individual antenna. In both cases, an upper bound and an asymptotic lower bound, as the signal-to-noise ratio approaches zero, on the channel capacity are presented. The limit of normalized capacity is identified under the sum power constraints, and, for a subclass of channels, for individual power constraints. These results carry over to a SISO channel with delay spread (i.e. frequency selective fading).
[ { "version": "v1", "created": "Thu, 11 Jan 2007 18:58:40 GMT" }, { "version": "v2", "created": "Thu, 26 Apr 2007 06:27:50 GMT" } ]
2007-07-13T00:00:00
[ [ "Sethuraman", "Vignesh", "" ], [ "Wang", "Ligong", "" ], [ "Hajek", "Bruce", "" ], [ "Lapidoth", "Amos", "" ] ]
new_dataset
0.999121
cs/0701182
Marat Burnashev V.
Marat Burnashev
Supplement to: Code Spectrum and Reliability Function: Binary Symmetric Channel
to appear in Problems of Information Transmission, 2007, v. 43, no. 1
null
null
null
cs.IT math.IT
null
A much simpler proof of Theorem 1 from M.Burnashev "Code spectrum and reliability function: Binary symmetric channel" is presented.
[ { "version": "v1", "created": "Sun, 28 Jan 2007 11:05:05 GMT" } ]
2007-07-13T00:00:00
[ [ "Burnashev", "Marat", "" ] ]
new_dataset
0.999823
cs/0702020
Qinqin Yang
Qinqin Yang and Zhongping Qin
Construction of Minimal Tail-Biting Trellises for Codes over Finite Abelian Groups
11 pages, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
A definition of atomic codeword for a group code is presented. Some properties of atomic codewords of group codes are investigated. Using these properties, it is shown that every minimal tail-biting trellis for a group code over a finite abelian group can be constructed from its characteristic generators, which extends the work of Koetter and Vardy who treated the case of a linear code over a field. We also present an efficient algorithm for constructing the minimal tail-biting trellis of a group code over a finite abelian group, given a generator matrix.
[ { "version": "v1", "created": "Mon, 5 Feb 2007 16:41:12 GMT" }, { "version": "v2", "created": "Tue, 6 Feb 2007 03:43:53 GMT" }, { "version": "v3", "created": "Thu, 17 May 2007 06:24:07 GMT" } ]
2007-07-13T00:00:00
[ [ "Yang", "Qinqin", "" ], [ "Qin", "Zhongping", "" ] ]
new_dataset
0.995279
cs/0702093
Ashish Khisti
Ashish Khisti, Aslan Tchamkerten, Gregory Wornell
Secure Broadcasting
Submitted to IEEE Transactions on Information Theory, Special issue on Information Theoretic Security
null
null
null
cs.IT math.IT
null
Wyner's wiretap channel is extended to parallel broadcast channels and fading channels with multiple receivers. In the first part of the paper, we consider the setup of parallel broadcast channels with one sender, multiple intended receivers, and one eavesdropper. We study the situations where the sender broadcasts either a common message or independent messages to the intended receivers. We derive upper and lower bounds on the common-message-secrecy capacity, which coincide when the users are reversely degraded. For the case of independent messages we establish the secrecy sum-capacity when the users are reversely degraded. In the second part of the paper we apply our results to fading channels: perfect channel state information of all intended receivers is known globally, whereas the eavesdropper channel is known only to her. For the common message case, a somewhat surprising result is proven: a positive rate can be achieved independently of the number of intended receivers. For independent messages, an opportunistic transmission scheme is presented that achieves the secrecy sum-capacity in the limit of large number of receivers. Our results are stated for a fast fading channel model. Extensions to the block fading model are also discussed.
[ { "version": "v1", "created": "Fri, 16 Feb 2007 16:41:17 GMT" } ]
2007-07-13T00:00:00
[ [ "Khisti", "Ashish", "" ], [ "Tchamkerten", "Aslan", "" ], [ "Wornell", "Gregory", "" ] ]
new_dataset
0.993543
cs/0702101
Neri Merhav
Neri Merhav
An identity of Chernoff bounds with an interpretation in statistical physics and applications in information theory
29 pages, 1 figure. Submitted to IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
null
An identity between two versions of the Chernoff bound on the probability a certain large deviations event, is established. This identity has an interpretation in statistical physics, namely, an isothermal equilibrium of a composite system that consists of multiple subsystems of particles. Several information--theoretic application examples, where the analysis of this large deviations probability naturally arises, are then described from the viewpoint of this statistical mechanical interpretation. This results in several relationships between information theory and statistical physics, which we hope, the reader will find insightful.
[ { "version": "v1", "created": "Sun, 18 Feb 2007 06:30:46 GMT" } ]
2007-07-13T00:00:00
[ [ "Merhav", "Neri", "" ] ]
new_dataset
0.951263
cs/0703057
Ali Pezeshki
Ali Pezeshki, A. Robert Calderbank, William Moran, and Stephen D. Howard
Doppler Resilient Waveforms with Perfect Autocorrelation
Submitted to IEEE Transactions on Information Theory, March 2007
null
null
null
cs.IT math.IT
null
We describe a method of constructing a sequence of phase coded waveforms with perfect autocorrelation in the presence of Doppler shift. The constituent waveforms are Golay complementary pairs which have perfect autocorrelation at zero Doppler but are sensitive to nonzero Doppler shifts. We extend this construction to multiple dimensions, in particular to radar polarimetry, where the two dimensions are realized by orthogonal polarizations. Here we determine a sequence of two-by-two Alamouti matrices where the entries involve Golay pairs and for which the sum of the matrix-valued ambiguity functions vanish at small Doppler shifts. The Prouhet-Thue-Morse sequence plays a key role in the construction of Doppler resilient sequences of Golay pairs.
[ { "version": "v1", "created": "Mon, 12 Mar 2007 21:46:04 GMT" } ]
2007-07-13T00:00:00
[ [ "Pezeshki", "Ali", "" ], [ "Calderbank", "A. Robert", "" ], [ "Moran", "William", "" ], [ "Howard", "Stephen D.", "" ] ]
new_dataset
0.999468
cs/0703104
Hajime Matsui
Hajime Matsui, Seiichi Mita
Encoding via Gr\"obner bases and discrete Fourier transforms for several types of algebraic codes
5 pages, 4 figures, To be presented at IEEE International Symposium on Information Theory 2007
null
null
null
cs.IT math.IT
null
We propose a novel encoding scheme for algebraic codes such as codes on algebraic curves, multidimensional cyclic codes, and hyperbolic cascaded Reed-Solomon codes and present numerical examples. We employ the recurrence from the Gr\"obner basis of the locator ideal for a set of rational points and the two-dimensional inverse discrete Fourier transform. We generalize the functioning of the generator polynomial for Reed-Solomon codes and develop systematic encoding for various algebraic codes.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 04:52:35 GMT" }, { "version": "v2", "created": "Wed, 2 May 2007 12:25:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Matsui", "Hajime", "" ], [ "Mita", "Seiichi", "" ] ]
new_dataset
0.997953
cs/0703141
Mitsuru Hamada
Mitsuru Hamada
Constructive Conjugate Codes for Quantum Error Correction and Cryptography
10 pages, 1 figure. Ver.2: statement in Theorem 7.1 was revised to a more general one, which the proof (unchanged except a couple of lines after Eq.(11)) had really implied. A corollary to this theorem was added. Annotative parts on achievable rates (mainly after the proof of Theorem 7.1) were revised
null
null
null
cs.IT math.IT
null
A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum error-correcting code. It is known that conjugate code pairs are applicable to quantum cryptography. In this work, a polynomial construction of conjugate code pairs is presented. The constructed pairs achieve the highest known achievable rate on additive channels, and are decodable with algorithms of polynomial complexity.
[ { "version": "v1", "created": "Wed, 28 Mar 2007 12:24:31 GMT" }, { "version": "v2", "created": "Thu, 29 Mar 2007 14:42:59 GMT" } ]
2007-07-13T00:00:00
[ [ "Hamada", "Mitsuru", "" ] ]
new_dataset
0.999043
0707.1607
Erik Schnetter
Erik Schnetter, Christian D. Ott, Gabrielle Allen, Peter Diener, Tom Goodale, Thomas Radke, Edward Seidel, John Shalf
Cactus Framework: Black Holes to Gamma Ray Bursts
16 pages, 4 figures. To appear in Petascale Computing: Algorithms and Applications, Ed. D. Bader, CRC Press LLC (2007)
null
null
null
cs.DC
null
Gamma Ray Bursts (GRBs) are intense narrowly-beamed flashes of gamma-rays of cosmological origin. They are among the most scientifically interesting astrophysical systems, and the riddle concerning their central engines and emission mechanisms is one of the most complex and challenging problems of astrophysics today. In this article we outline our petascale approach to the GRB problem and discuss the computational toolkits and numerical codes that are currently in use and that will be scaled up to run on emerging petaflop scale computing platforms in the near future. Petascale computing will require additional ingredients over conventional parallelism. We consider some of the challenges which will be caused by future petascale architectures, and discuss our plans for the future development of the Cactus framework and its applications to meet these challenges in order to profit from these new architectures.
[ { "version": "v1", "created": "Wed, 11 Jul 2007 13:01:50 GMT" } ]
2007-07-12T00:00:00
[ [ "Schnetter", "Erik", "" ], [ "Ott", "Christian D.", "" ], [ "Allen", "Gabrielle", "" ], [ "Diener", "Peter", "" ], [ "Goodale", "Tom", "" ], [ "Radke", "Thomas", "" ], [ "Seidel", "Edward", "" ], [ "Shalf", "John", "" ] ]
new_dataset
0.987505
0707.1193
Damien Chablat
Mazen Zein (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Singular curves and cusp points in the joint space of 3-RPR parallel manipulators
null
International Conference On Robotics And Automation (2006) 1-6
null
null
cs.RO
null
This paper investigates the singular curves in two-dimensional slices of the joint space of a family of planar parallel manipulators. It focuses on special points, referred to as cusp points, which may appear on these curves. Cusp points play an important role in the kinematic behavior of parallel manipulators since they make possible a nonsingular change of assembly mode. The purpose of this study is twofold. First, it reviews an important previous work, which, to the authors' knowledge, has never been exploited yet. Second, it determines the cusp points in any two-dimensional slice of the joint space. First results show that the number of cusp points may vary from zero to eight. This work finds applications in both design and trajectory planning.
[ { "version": "v1", "created": "Mon, 9 Jul 2007 07:38:47 GMT" } ]
2007-07-10T00:00:00
[ [ "Zein", "Mazen", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
new_dataset
0.965519
0707.0742
Richard McClatchey
A. Ali, A. Anjum, T. Azim, J. Bunn, A. Ikram, R. McClatchey, H. Newman, C. Steenberg, M. Thomas, I. Willers
Mobile Computing in Physics Analysis - An Indicator for eScience
8 pages, 7 figures. Presented at the 3rd Int Conf on Mobile Computing & Ubiquitous Networking (ICMU06. London October 2006
null
null
null
cs.DC
null
This paper presents the design and implementation of a Grid-enabled physics analysis environment for handheld and other resource-limited computing devices as one example of the use of mobile devices in eScience. Handheld devices offer great potential because they provide ubiquitous access to data and round-the-clock connectivity over wireless links. Our solution aims to provide users of handheld devices the capability to launch heavy computational tasks on computational and data Grids, monitor the jobs status during execution, and retrieve results after job completion. Users carry their jobs on their handheld devices in the form of executables (and associated libraries). Users can transparently view the status of their jobs and get back their outputs without having to know where they are being executed. In this way, our system is able to act as a high-throughput computing environment where devices ranging from powerful desktop machines to small handhelds can employ the power of the Grid. The results shown in this paper are readily applicable to the wider eScience community.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 09:32:29 GMT" } ]
2007-07-06T00:00:00
[ [ "Ali", "A.", "" ], [ "Anjum", "A.", "" ], [ "Azim", "T.", "" ], [ "Bunn", "J.", "" ], [ "Ikram", "A.", "" ], [ "McClatchey", "R.", "" ], [ "Newman", "H.", "" ], [ "Steenberg", "C.", "" ], [ "Thomas", "M.", "" ], [ "Willers", "I.", "" ] ]
new_dataset
0.997627
0707.0548
Sebastien Verel
Michael Defoin Platel (I3S), Sebastien Verel (I3S), Manuel Clergue (I3S), Philippe Collard (I3S)
From Royal Road to Epistatic Road for Variable Length Evolution Algorithm
null
Lecture notes in computer science (Lect. notes comput. sci.) ISSN 0302-9743 (27/10/2003) 3-14
null
null
cs.NE
null
Although there are some real world applications where the use of variable length representation (VLR) in Evolutionary Algorithm is natural and suitable, an academic framework is lacking for such representations. In this work we propose a family of tunable fitness landscapes based on VLR of genotypes. The fitness landscapes we propose possess a tunable degree of both neutrality and epistasis; they are inspired, on the one hand by the Royal Road fitness landscapes, and the other hand by the NK fitness landscapes. So these landscapes offer a scale of continuity from Royal Road functions, with neutrality and no epistasis, to landscapes with a large amount of epistasis and no redundancy. To gain insight into these fitness landscapes, we first use standard tools such as adaptive walks and correlation length. Second, we evaluate the performances of evolutionary algorithms on these landscapes for various values of the neutral and the epistatic parameters; the results allow us to correlate the performances with the expected degrees of neutrality and epistasis.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 06:57:52 GMT" } ]
2007-07-05T00:00:00
[ [ "Platel", "Michael Defoin", "", "I3S" ], [ "Verel", "Sebastien", "", "I3S" ], [ "Clergue", "Manuel", "", "I3S" ], [ "Collard", "Philippe", "", "I3S" ] ]
new_dataset
0.985998
0707.0282
Igor Razgon
Igor Razgon and Barry O'Sullivan
Directed Feedback Vertex Set is Fixed-Parameter Tractable
14 pages
null
null
null
cs.DS cs.CC
null
We resolve positively a long standing open question regarding the fixed-parameter tractability of the parameterized Directed Feedback Vertex Set problem. In particular, we propose an algorithm which solves this problem in $O(8^kk!*poly(n))$.
[ { "version": "v1", "created": "Mon, 2 Jul 2007 17:56:53 GMT" } ]
2007-07-03T00:00:00
[ [ "Razgon", "Igor", "" ], [ "O'Sullivan", "Barry", "" ] ]
new_dataset
0.997595
0706.4107
Mihai Patrascu
Gianni Franceschini, S. Muthukrishnan and Mihai Patrascu
Radix Sorting With No Extra Space
Full version of paper accepted to ESA 2007. (17 pages)
null
null
null
cs.DS
null
It is well known that n integers in the range [1,n^c] can be sorted in O(n) time in the RAM model using radix sorting. More generally, integers in any range [1,U] can be sorted in O(n sqrt{loglog n}) time. However, these algorithms use O(n) words of extra memory. Is this necessary? We present a simple, stable, integer sorting algorithm for words of size O(log n), which works in O(n) time and uses only O(1) words of extra memory on a RAM model. This is the integer sorting case most useful in practice. We extend this result with same bounds to the case when the keys are read-only, which is of theoretical interest. Another interesting question is the case of arbitrary c. Here we present a black-box transformation from any RAM sorting algorithm to a sorting algorithm which uses only O(1) extra space and has the same running time. This settles the complexity of in-place sorting in terms of the complexity of sorting.
[ { "version": "v1", "created": "Wed, 27 Jun 2007 22:04:40 GMT" } ]
2007-06-29T00:00:00
[ [ "Franceschini", "Gianni", "" ], [ "Muthukrishnan", "S.", "" ], [ "Patrascu", "Mihai", "" ] ]
new_dataset
0.996318
0704.1068
Leo Liberti
Giacomo Nannicini, Philippe Baptiste, Gilles Barbier, Daniel Krob, Leo Liberti
Fast paths in large-scale dynamic road networks
12 pages, 4 figures
null
null
null
cs.NI cs.DS
null
Efficiently computing fast paths in large scale dynamic road networks (where dynamic traffic information is known over a part of the network) is a practical problem faced by several traffic information service providers who wish to offer a realistic fast path computation to GPS terminal enabled vehicles. The heuristic solution method we propose is based on a highway hierarchy-based shortest path algorithm for static large-scale networks; we maintain a static highway hierarchy and perform each query on the dynamically evaluated network.
[ { "version": "v1", "created": "Mon, 9 Apr 2007 07:04:19 GMT" }, { "version": "v2", "created": "Wed, 27 Jun 2007 18:17:35 GMT" } ]
2007-06-27T00:00:00
[ [ "Nannicini", "Giacomo", "" ], [ "Baptiste", "Philippe", "" ], [ "Barbier", "Gilles", "" ], [ "Krob", "Daniel", "" ], [ "Liberti", "Leo", "" ] ]
new_dataset
0.993277
0706.3132
Paulo Condado
Paulo A. Condado and Fernando G. Lobo
EasyVoice: Integrating voice synthesis with Skype
null
null
null
null
cs.CY cs.HC
null
This paper presents EasyVoice, a system that integrates voice synthesis with Skype. EasyVoice allows a person with voice disabilities to talk with another person located anywhere in the world, removing an important obstacle that affect these people during a phone or VoIP-based conversation.
[ { "version": "v1", "created": "Thu, 21 Jun 2007 12:04:40 GMT" } ]
2007-06-22T00:00:00
[ [ "Condado", "Paulo A.", "" ], [ "Lobo", "Fernando G.", "" ] ]
new_dataset
0.978837
0706.2888
James Harold Thomas
James Harold Thomas
Variations on Kak's Three Stage Quantum Cryptography Protocol
null
null
null
null
cs.CR
null
This paper introduces a variation on Kak's three-stage quanutm key distribution protocol which allows for defence against the man in the middle attack. In addition, we introduce a new protocol, which also offers similar resiliance against such an attack.
[ { "version": "v1", "created": "Tue, 19 Jun 2007 23:04:18 GMT" } ]
2007-06-21T00:00:00
[ [ "Thomas", "James Harold", "" ] ]
new_dataset
0.998342
cs/0302030
David Eppstein
David Eppstein
The traveling salesman problem for cubic graphs
20 pages, 8 figures. A preliminary version of this paper appeared at the 8th Worksh. Algorithms and Data Structures, LNCS 2748, Springer-Verlag, 2003, pp. 307-318. This version generalizes an algorithm from the previous version, to generate all cycles instead of counting them. It also includes a derandomized version of the degree-four algorithm and an implementation of the cycle listing algorithm
J. Graph Algorithms and Applications 11(1):61-81, 2007
null
null
cs.DS
null
We show how to find a Hamiltonian cycle in a graph of degree at most three with n vertices, in time O(2^{n/3}) ~= 1.260^n and linear space. Our algorithm can find the minimum weight Hamiltonian cycle (traveling salesman problem), in the same time bound. We can also count or list all Hamiltonian cycles in a degree three graph in time O(2^{3n/8}) ~= 1.297^n. We also solve the traveling salesman problem in graphs of degree at most four, by randomized and deterministic algorithms with runtime O((27/4)^{n/3}) ~= 1.890^n and O((27/4+epsilon)^{n/3}) respectively. Our algorithms allow the input to specify a set of forced edges which must be part of any generated cycle. Our cycle listing algorithm shows that every degree three graph has O(2^{3n/8}) Hamiltonian cycles; we also exhibit a family of graphs with 2^{n/3} Hamiltonian cycles per graph.
[ { "version": "v1", "created": "Thu, 20 Feb 2003 06:36:35 GMT" }, { "version": "v2", "created": "Mon, 19 Apr 2004 23:32:38 GMT" } ]
2007-06-14T00:00:00
[ [ "Eppstein", "David", "" ] ]
new_dataset
0.998108
cs/0601030
Johan Bollen
Johan Bollen, Marko A. Rodriguez and Herbert Van de Sompel
Journal Status
16 pages
Scientometrics, volume 69, number 3, pp. 669-687, 2006
10.1007/s11192-006-0176-z
LA-UR-05-6466
cs.DL cs.CY
null
The status of an actor in a social context is commonly defined in terms of two factors: the total number of endorsements the actor receives from other actors and the prestige of the endorsing actors. These two factors indicate the distinction between popularity and expert appreciation of the actor, respectively. We refer to the former as popularity and to the latter as prestige. These notions of popularity and prestige also apply to the domain of scholarly assessment. The ISI Impact Factor (ISI IF) is defined as the mean number of citations a journal receives over a 2 year period. By merely counting the amount of citations and disregarding the prestige of the citing journals, the ISI IF is a metric of popularity, not of prestige. We demonstrate how a weighted version of the popular PageRank algorithm can be used to obtain a metric that reflects prestige. We contrast the rankings of journals according to their ISI IF and their weighted PageRank, and we provide an analysis that reveals both significant overlaps and differences. Furthermore, we introduce the Y-factor which is a simple combination of both the ISI IF and the weighted PageRank, and find that the resulting journal rankings correspond well to a general understanding of journal status.
[ { "version": "v1", "created": "Mon, 9 Jan 2006 16:56:01 GMT" } ]
2007-06-13T00:00:00
[ [ "Bollen", "Johan", "" ], [ "Rodriguez", "Marko A.", "" ], [ "Van de Sompel", "Herbert", "" ] ]
new_dataset
0.998511
cs/0701199
Stephane Norte
Stephane Norte and Fernando G. Lobo
A Virtual Logo Keyboard for People with Motor Disabilities
11 pages, 6 figures
null
null
200701
cs.HC
null
In our society, people with motor impairments are oftentimes socially excluded from their environment. This is unfortunate because every human being should have the possibility to obtain the necessary conditions to live a normal life. Although there is technology to assist people with motor impairments, few systems are targeted for programming environments. We have created a system, called Logo Keyboard, to assist people with motor disabilities to program with the Logo programming language. With this special keyboard we can help more people to get involved into computer programming and to develop projects in different areas.
[ { "version": "v1", "created": "Wed, 31 Jan 2007 16:36:43 GMT" }, { "version": "v2", "created": "Thu, 24 May 2007 20:45:24 GMT" } ]
2007-06-13T00:00:00
[ [ "Norte", "Stephane", "" ], [ "Lobo", "Fernando G.", "" ] ]
new_dataset
0.999198
0706.1290
Sylviane Schwer
Sylviane R. Schwer (LIPN)
Temporal Reasoning without Transitive Tables
rapport interne
null
null
null
cs.AI
null
Representing and reasoning about qualitative temporal information is an essential part of many artificial intelligence tasks. Lots of models have been proposed in the litterature for representing such temporal information. All derive from a point-based or an interval-based framework. One fundamental reasoning task that arises in applications of these frameworks is given by the following scheme: given possibly indefinite and incomplete knowledge of the binary relationships between some temporal objects, find the consistent scenarii between all these objects. All these models require transitive tables -- or similarly inference rules-- for solving such tasks. We have defined an alternative model, S-languages - to represent qualitative temporal information, based on the only two relations of \emph{precedence} and \emph{simultaneity}. In this paper, we show how this model enables to avoid transitive tables or inference rules to handle this kind of problem.
[ { "version": "v1", "created": "Sat, 9 Jun 2007 06:57:05 GMT" } ]
2007-06-12T00:00:00
[ [ "Schwer", "Sylviane R.", "", "LIPN" ] ]
new_dataset
0.985514
0706.1118
Samuel Mimram
Paul-Andr\'e Melli\`es (PPS), Samuel Mimram (PPS)
Asynchronous games: innocence without alternation
null
null
null
null
cs.LO
null
The notion of innocent strategy was introduced by Hyland and Ong in order to capture the interactive behaviour of lambda-terms and PCF programs. An innocent strategy is defined as an alternating strategy with partial memory, in which the strategy plays according to its view. Extending the definition to non-alternating strategies is problematic, because the traditional definition of views is based on the hypothesis that Opponent and Proponent alternate during the interaction. Here, we take advantage of the diagrammatic reformulation of alternating innocence in asynchronous games, in order to provide a tentative definition of innocence in non-alternating games. The task is interesting, and far from easy. It requires the combination of true concurrency and game semantics in a clean and organic way, clarifying the relationship between asynchronous games and concurrent games in the sense of Abramsky and Melli\`es. It also requires an interactive reformulation of the usual acyclicity criterion of linear logic, as well as a directed variant, as a scheduling criterion.
[ { "version": "v1", "created": "Fri, 8 Jun 2007 06:56:31 GMT" } ]
2007-06-11T00:00:00
[ [ "Melliès", "Paul-André", "", "PPS" ], [ "Mimram", "Samuel", "", "PPS" ] ]
new_dataset
0.994073
0706.0465
Donald Sofge
D. A. Sofge
Virtual Sensor Based Fault Detection and Classification on a Plasma Etch Reactor
7 pages
D. Sofge, "Virtual Sensor Based Fault Detection and Classification on a Plasma Etch Reactor," The 2nd Joint Mexico-US Int'l. Workshop on Neural Networks and Neurocontrol (poster), 1997
null
null
cs.AI cs.CV
null
The SEMATECH sponsored J-88-E project teaming Texas Instruments with NeuroDyne (et al.) focused on Fault Detection and Classification (FDC) on a Lam 9600 aluminum plasma etch reactor, used in the process of semiconductor fabrication. Fault classification was accomplished by implementing a series of virtual sensor models which used data from real sensors (Lam Station sensors, Optical Emission Spectroscopy, and RF Monitoring) to predict recipe setpoints and wafer state characteristics. Fault detection and classification were performed by comparing predicted recipe and wafer state values with expected values. Models utilized include linear PLS, Polynomial PLS, and Neural Network PLS. Prediction of recipe setpoints based upon sensor data provides a capability for cross-checking that the machine is maintaining the desired setpoints. Wafer state characteristics such as Line Width Reduction and Remaining Oxide were estimated on-line using these same process sensors (Lam, OES, RFM). Wafer-to-wafer measurement of these characteristics in a production setting (where typically this information may be only sparsely available, if at all, after batch processing runs with numerous wafers have been completed) would provide important information to the operator that the process is or is not producing wafers within acceptable bounds of product quality. Production yield is increased, and correspondingly per unit cost is reduced, by providing the operator with the opportunity to adjust the process or machine before etching more wafers.
[ { "version": "v1", "created": "Mon, 4 Jun 2007 15:55:27 GMT" } ]
2007-06-05T00:00:00
[ [ "Sofge", "D. A.", "" ] ]
new_dataset
0.998209
0705.4415
Cnrs : Umr 6057 Laboratoire Parole Et Langage
Carine Andr\'e (LPL), Alain Ghio (LPL), Christian Cav\'e (LPL), Bernard Teston (LPL)
PERCEVAL: a Computer-Driven System for Experimentation on Auditory and Visual Perception
null
Proceedings of International Congress of Phonetic Sciences (ICPhS) (2003) 1421-1424
null
1557
cs.SE
null
Since perception tests are highly time-consuming, there is a need to automate as many operations as possible, such as stimulus generation, procedure control, perception testing, and data analysis. The computer-driven system we are presenting here meets these objectives. To achieve large flexibility, the tests are controlled by scripts. The system's core software resembles that of a lexical-syntactic analyzer, which reads and interprets script files sent to it. The execution sequence (trial) is modified in accordance with the commands and data received. This type of operation provides a great deal of flexibility and supports a wide variety of tests such as auditory-lexical decision making, phoneme monitoring, gating, phonetic categorization, word identification, voice quality, etc. To achieve good performance, we were careful about timing accuracy, which is the greatest problem in computerized perception tests.
[ { "version": "v1", "created": "Wed, 30 May 2007 15:31:07 GMT" } ]
2007-05-31T00:00:00
[ [ "André", "Carine", "", "LPL" ], [ "Ghio", "Alain", "", "LPL" ], [ "Cavé", "Christian", "", "LPL" ], [ "Teston", "Bernard", "", "LPL" ] ]
new_dataset
0.999601
0705.4171
Eva Borbely
Eva Borbely
Grover search algorithm
null
null
null
null
cs.DS
null
A quantum algorithm is a set of instructions for a quantum computer, however, unlike algorithms in classical computer science their results cannot be guaranteed. A quantum system can undergo two types of operation, measurement and quantum state transformation, operations themselves must be unitary (reversible). Most quantum algorithms involve a series of quantum state transformations followed by a measurement. Currently very few quantum algorithms are known and no general design methodology exists for their construction.
[ { "version": "v1", "created": "Tue, 29 May 2007 09:42:46 GMT" } ]
2007-05-30T00:00:00
[ [ "Borbely", "Eva", "" ] ]
new_dataset
0.979782
0705.3949
Yeb Havinga
Yeb Havinga
Translating a first-order modal language to relational algebra
null
null
null
null
cs.LO cs.DB
null
This paper is about Kripke structures that are inside a relational database and queried with a modal language. At first the modal language that is used is introduced, followed by a definition of the database and relational algebra. Based on these definitions two things are presented: a mapping from components of the modal structure to a relational database schema and instance, and a translation from queries in the modal language to relational algebra queries.
[ { "version": "v1", "created": "Sun, 27 May 2007 12:36:58 GMT" } ]
2007-05-29T00:00:00
[ [ "Havinga", "Yeb", "" ] ]
new_dataset
0.999669
0705.3616
Andy Zaidman
Andy Zaidman, Bart Van Rompaey, Serge Demeyer, Arie van Deursen
On How Developers Test Open Source Software Systems
null
null
null
TUD-SERG-2007-012
cs.SE
null
Engineering software systems is a multidisciplinary activity, whereby a number of artifacts must be created - and maintained - synchronously. In this paper we investigate whether production code and the accompanying tests co-evolve by exploring a project's versioning system, code coverage reports and size-metrics. Three open source case studies teach us that testing activities usually start later on during the lifetime and are more "phased", although we did not observe increasing testing activity before releases. Furthermore, we note large differences in the levels of test coverage given the proportion of test code.
[ { "version": "v1", "created": "Thu, 24 May 2007 16:21:35 GMT" } ]
2007-05-25T00:00:00
[ [ "Zaidman", "Andy", "" ], [ "Van Rompaey", "Bart", "" ], [ "Demeyer", "Serge", "" ], [ "van Deursen", "Arie", "" ] ]
new_dataset
0.982315
0704.0834
Anatoly Rodionov
Anatoly Rodionov, Sergey Volkov
P-adic arithmetic coding
29 pages
null
null
null
cs.DS
null
A new incremental algorithm for data compression is presented. For a sequence of input symbols algorithm incrementally constructs a p-adic integer number as an output. Decoding process starts with less significant part of a p-adic integer and incrementally reconstructs a sequence of input symbols. Algorithm is based on certain features of p-adic numbers and p-adic norm. p-adic coding algorithm may be considered as of generalization a popular compression technique - arithmetic coding algorithms. It is shown that for p = 2 the algorithm works as integer variant of arithmetic coding; for a special class of models it gives exactly the same codes as Huffman's algorithm, for another special model and a specific alphabet it gives Golomb-Rice codes.
[ { "version": "v1", "created": "Fri, 6 Apr 2007 02:30:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Rodionov", "Anatoly", "" ], [ "Volkov", "Sergey", "" ] ]
new_dataset
0.968543
0704.1694
Sergey Yekhanin
Kiran S. Kedlaya, Sergey Yekhanin
Locally Decodable Codes From Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers
18 pages
null
null
null
cs.CC math.NT
null
A k-query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit codeword C(x), such that one can probabilistically recover any bit x_i of the message by querying only k bits of the codeword C(x), even after some constant fraction of codeword bits has been corrupted. The major goal of LDC related research is to establish the optimal trade-off between length and query complexity of such codes. Recently [Y] introduced a novel technique for constructing locally decodable codes and vastly improved the upper bounds for code length. The technique is based on Mersenne primes. In this paper we extend the work of [Y] and argue that further progress via these methods is tied to progress on an old number theory question regarding the size of the largest prime factors of Mersenne numbers. Specifically, we show that every Mersenne number m=2^t-1 that has a prime factor p>m^\gamma yields a family of k(\gamma)-query locally decodable codes of length Exp(n^{1/t}). Conversely, if for some fixed k and all \epsilon > 0 one can use the technique of [Y] to obtain a family of k-query LDCs of length Exp(n^\epsilon); then infinitely many Mersenne numbers have prime factors arger than known currently.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 04:18:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Kedlaya", "Kiran S.", "" ], [ "Yekhanin", "Sergey", "" ] ]
new_dataset
0.992422
0704.2201
Hassan Satori
H. Satori, M. Harti and N. Chenfour
Arabic Speech Recognition System using CMU-Sphinx4
5 pages, 3 figures and 2 tables, in French
null
null
null
cs.CL cs.AI
null
In this paper we present the creation of an Arabic version of Automated Speech Recognition System (ASR). This system is based on the open source Sphinx-4, from the Carnegie Mellon University. Which is a speech recognition system based on discrete hidden Markov models (HMMs). We investigate the changes that must be made to the model to adapt Arabic voice recognition. Keywords: Speech recognition, Acoustic model, Arabic language, HMMs, CMUSphinx-4, Artificial intelligence.
[ { "version": "v1", "created": "Tue, 17 Apr 2007 17:04:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Satori", "H.", "" ], [ "Harti", "M.", "" ], [ "Chenfour", "N.", "" ] ]
new_dataset
0.962378
0704.3268
Koray Karahaliloglu
Koray Karahaliloglu
2D Path Solutions from a Single Layer Excitable CNN Model
24 pages, 9 figures
null
null
null
cs.RO cs.NE
null
An easily implementable path solution algorithm for 2D spatial problems, based on excitable/programmable characteristics of a specific cellular nonlinear network (CNN) model is presented and numerically investigated. The network is a single layer bioinspired model which was also implemented in CMOS technology. It exhibits excitable characteristics with regionally bistable cells. The related response realizes propagations of trigger autowaves, where the excitable mode can be globally preset and reset. It is shown that, obstacle distributions in 2D space can also be directly mapped onto the coupled cell array in the network. Combining these two features, the network model can serve as the main block in a 2D path computing processor. The related algorithm and configurations are numerically experimented with circuit level parameters and performance estimations are also presented. The simplicity of the model also allows alternative technology and device level implementation, which may become critical in autonomous processor design of related micro or nanoscale robotic applications.
[ { "version": "v1", "created": "Tue, 24 Apr 2007 20:20:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Karahaliloglu", "Koray", "" ] ]
new_dataset
0.998515
0704.3501
Jerome Darmont
J\'er\^ome Darmont (ERIC), Fadila Bentayeb (ERIC), Omar Boussa\"id (ERIC)
Conception d'un banc d'essais d\'ecisionnel
20 pages
20\`emes Journ\'ees Bases de Donn\'ees Avanc\'ees (BDA 04), Montpellier (19/10/2004) 493-511
null
null
cs.DB
null
We present in this paper a new benchmark for evaluating the performances of data warehouses. Benchmarking is useful either to system users for comparing the performances of different systems, or to system engineers for testing the effect of various design choices. While the TPC (Transaction Processing Performance Council) standard benchmarks address the first point, they are not tuneable enough to address the second one. Our Data Warehouse Engineering Benchmark (DWEB) allows to generate various ad-hoc synthetic data warehouses and workloads. DWEB is fully parameterized. However, two levels of parameterization keep it easy to tune. Since DWEB mainly meets engineering benchmarking needs, it is complimentary to the TPC standard benchmarks, and not a competitor. Finally, DWEB is implemented as a Java free software that can be interfaced with most existing relational database management systems.
[ { "version": "v1", "created": "Thu, 26 Apr 2007 09:13:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Darmont", "Jérôme", "", "ERIC" ], [ "Bentayeb", "Fadila", "", "ERIC" ], [ "Boussaïd", "Omar", "", "ERIC" ] ]
new_dataset
0.991186
0704.3643
Allison Woodruff
Allison Woodruff, Sally Augustin, and Brooke Foucault
Sabbath Day Home Automation: "It's Like Mixing Technology and Religion"
null
null
null
null
cs.HC
null
We present a qualitative study of 20 American Orthodox Jewish families' use of home automation for religious purposes. These lead users offer insight into real-life, long-term experience with home automation technologies. We discuss how automation was seen by participants to contribute to spiritual experience and how participants oriented to the use of automation as a religious custom. We also discuss the relationship of home automation to family life. We draw design implications for the broader population, including surrender of control as a design resource, home technologies that support long-term goals and lifestyle choices, and respite from technology.
[ { "version": "v1", "created": "Fri, 27 Apr 2007 00:42:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Woodruff", "Allison", "" ], [ "Augustin", "Sally", "" ], [ "Foucault", "Brooke", "" ] ]
new_dataset
0.99888
0704.3904
Fabien Mathieu
Anh-Tuan Gai (INRIA Rocquencourt), Dmitry Lebedev (FT R&D), Fabien Mathieu (FT R&D), Fabien De Montgolfier (LIAFA), Julien Reynier (LIENS), Laurent Viennot (INRIA Rocquencourt)
Acyclic Preference Systems in P2P Networks
null
null
null
null
cs.DS cs.GT
null
In this work we study preference systems natural for the Peer-to-Peer paradigm. Most of them fall in three categories: global, symmetric and complementary. All these systems share an acyclicity property. As a consequence, they admit a stable (or Pareto efficient) configuration, where no participant can collaborate with better partners than their current ones. We analyze the representation of the such preference systems and show that any acyclic system can be represented with a symmetric mark matrix. This gives a method to merge acyclic preference systems and retain the acyclicity. We also consider such properties of the corresponding collaboration graph, as clustering coefficient and diameter. In particular, studying the example of preferences based on real latency measurements, we observe that its stable configuration is a small-world graph.
[ { "version": "v1", "created": "Mon, 30 Apr 2007 09:26:39 GMT" }, { "version": "v2", "created": "Wed, 2 May 2007 13:07:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Gai", "Anh-Tuan", "", "INRIA Rocquencourt" ], [ "Lebedev", "Dmitry", "", "FT R&D" ], [ "Mathieu", "Fabien", "", "FT R&D" ], [ "De Montgolfier", "Fabien", "", "LIAFA" ], [ "Reynier", "Julien", "", "LIENS" ], [ "Viennot", "Laurent", "", "INRIA Rocquencourt" ] ]
new_dataset
0.966566
0705.0197
Tshilidzi Marwala
Tshilidzi Marwala, Unathi Mahola and Snehashish Chakraverty
Fault Classification in Cylinders Using Multilayer Perceptrons, Support Vector Machines and Guassian Mixture Models
10 pages, 2 figures, 4 tables
Computer Assisted Mechanics and Engineering Sciences, Vol. 14, No. 2, 2007.
null
null
cs.AI
null
Gaussian mixture models (GMM) and support vector machines (SVM) are introduced to classify faults in a population of cylindrical shells. The proposed procedures are tested on a population of 20 cylindrical shells and their performance is compared to the procedure, which uses multi-layer perceptrons (MLP). The modal properties extracted from vibration data are used to train the GMM, SVM and MLP. It is observed that the GMM produces 98%, SVM produces 94% classification accuracy while the MLP produces 88% classification rates.
[ { "version": "v1", "created": "Wed, 2 May 2007 03:13:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Marwala", "Tshilidzi", "" ], [ "Mahola", "Unathi", "" ], [ "Chakraverty", "Snehashish", "" ] ]
new_dataset
0.974585
0705.0422
Rapport De Recherche Inria
Omid Amini (INRIA Sophia Antipolis), Louis Esperet (LaBRI), Jan Van Den Heuvel (LSE)
Frugal Colouring of Graphs
null
null
null
null
cs.DM cs.NI
null
A $k$-frugal colouring of a graph $G$ is a proper colouring of the vertices of $G$ such that no colour appears more than $k$ times in the neighbourhood of a vertex. This type of colouring was introduced by Hind, Molloy and Reed in 1997. In this paper, we study the frugal chromatic number of planar graphs, planar graphs with large girth, and outerplanar graphs, and relate this parameter with several well-studied colourings, such as colouring of the square, cyclic colouring, and $L(p,q)$-labelling. We also study frugal edge-colourings of multigraphs.
[ { "version": "v1", "created": "Thu, 3 May 2007 08:52:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Amini", "Omid", "", "INRIA Sophia Antipolis" ], [ "Esperet", "Louis", "", "LaBRI" ], [ "Heuvel", "Jan Van Den", "", "LSE" ] ]
new_dataset
0.999715
0705.0817
Andrea Lo Pumo
Andrea Lo Pumo
Quantum Shortest Path Netsukuku
null
null
null
null
cs.NI
null
This document describes the QSPN, the routing discovery algorithm used by Netsukuku. Through a deductive analysis the main proprieties of the QSPN are shown. Moreover, a second version of the algorithm, is presented.
[ { "version": "v1", "created": "Sun, 6 May 2007 20:05:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Pumo", "Andrea Lo", "" ] ]
new_dataset
0.988694
0705.0819
Andrea Lo Pumo
Andrea Lo Pumo
The Netsukuku network topology
null
null
null
null
cs.NI
null
In this document, we describe the fractal structure of the Netsukuku topology. Moreover, we show how it is possible to use the QSPN v2 on the high levels of the fractal.
[ { "version": "v1", "created": "Sun, 6 May 2007 20:12:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Pumo", "Andrea Lo", "" ] ]
new_dataset
0.984609
0705.0820
Andrea Lo Pumo
Andrea Lo Pumo
ANDNA: the distributed hostname management system of Netsukuku
null
null
null
null
cs.NI
null
We present the Abnormal Netsukuku Domain Name Anarchy system. ANDNA is the distributed, non hierarchical and decentralised system of hostname management used in the Netsukuku network.
[ { "version": "v1", "created": "Sun, 6 May 2007 20:19:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Pumo", "Andrea Lo", "" ] ]
new_dataset
0.99785
0705.1217
Damien Chablat
J\'erome Renotte (IRCCyN), Damien Chablat (IRCCyN), Jorge Angeles (CIM)
The Design of a Novel Prismatic Drive for a Three-DOF Parallel-Kinematics Machine
null
ASME Design Engineering Technical Conferences (2004) 1-10
null
null
cs.RO
null
The design of a novel prismatic drive is reported in this paper. This transmission is based on Slide-O-Cam, a cam mechanism with multiple rollers mounted on a common translating follower. The design of Slide-O-Cam was reported elsewhere. This drive thus provides pure-rolling motion, thereby reducing the friction of rack-and-pinions and linear drives. Such properties can be used to design new transmissions for parallel-kinematics machines. In this paper, this transmission is optimized to replace ball-screws in Orthoglide, a three-DOF parallel robot optimized for machining applications.
[ { "version": "v1", "created": "Wed, 9 May 2007 07:27:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Renotte", "Jérome", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Angeles", "Jorge", "", "CIM" ] ]
new_dataset
0.982366
0705.1282
Damien Chablat
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Design of a Three-Axis Isotropic Parallel Manipulator for Machining Applications: The Orthoglide
null
Workshop on Fundamental Issues and Future Research Directions for Parallel Mechanisms and Manipulators (2002) 1-9
null
null
cs.RO
null
The orthoglide is a 3-DOF parallel mechanism designed at IRCCyN for machining applications. It features three fixed parallel linear joints which are mounted orthogonally and a mobile platform which moves in the Cartesian x-y-z space with fixed orientation. The orthoglide has been designed as function of a prescribed Cartesian workspace with prescribed kinetostatic performances. The interesting features of the orthoglide are a regular Cartesian workspace shape, uniform performances in all directions and good compactness. A small-scale prototype of the orthoglide under development is presented at the end of this paper.
[ { "version": "v1", "created": "Wed, 9 May 2007 13:23:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
new_dataset
0.997223
0705.1285
Damien Chablat
Damien Chablat (IRCCyN), Fouad Bennis (IRCCyN), Bernard Hoessler, Matthieu Guibert
P\'eriph\'eriques haptiques et simulation d'objets, de robots et de mannequins dans un environnement de CAO-Robotique : eM-Virtual Desktop
null
Virtual Concept (2002) 51-56
null
null
cs.RO
null
This paper presents the development of a new software in order to manage objects, robots and mannequins in using the possibilities given by the haptic feedback of the Phantom desktop devices. The haptic device provides 6 positional degree of freedom sensing but three degrees force feedback. This software called eM-Virtual Desktop is integrated in the Tecnomatix's solution called eM-Workplace. The eM-Workplace provides powerful solutions for planning and designing of complex assembly facilities, lines and workplaces. In the digital mockup context, the haptic interfaces can be used to reduce the development cycle of products. Three different loops are used to manage the graphic, the collision detection and the haptic feedback according to theirs own frequencies. The developed software is currently tested in industrial context by a European automotive constructor.
[ { "version": "v1", "created": "Wed, 9 May 2007 13:26:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Bennis", "Fouad", "", "IRCCyN" ], [ "Hoessler", "Bernard", "" ], [ "Guibert", "Matthieu", "" ] ]
new_dataset
0.977989
0705.1394
Damien Chablat
Anatoly Pashkevich (Robotic Laboratory), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
The Orthoglide: Kinematics and Workspace Analysis
null
9th International Symposium on Advances in Robot Kinematics (2004) 1-10
null
null
cs.RO
null
The paper addresses kinematic and geometrical aspects of the Orthoglide, a three-DOF parallel mechanism. This machine consists of three fixed linear joints, which are mounted orthogonally, three identical legs and a mobile platform, which moves in the Cartesian x-y-z space with fixed orientation. New solutions to solve inverse/direct kinematics are proposed and a detailed workspace analysis is performed taking into account specific joint limit constraints.
[ { "version": "v1", "created": "Thu, 10 May 2007 06:53:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Pashkevich", "Anatoly", "", "Robotic Laboratory" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
new_dataset
0.96218
0705.1400
Damien Chablat
Philippe Wenger (IRCCyN), Maher Baili (IRCCyN), Damien Chablat (IRCCyN)
A Workspace based Classification of 3R Orthogonal Manipulators
null
9th International Symposium on Advances in Robot Kinematics (2004) 1-10
null
null
cs.RO
null
A classification of a family of 3-revolute (3R) positioning manipulators is established. This classification is based on the topology of their workspace. The workspace is characterized in a half-cross section by the singular curves of the manipulator. The workspace topology is defined by the number of cusps and nodes that appear on these singular curves. The design parameters space is shown to be partitioned into nine subspaces of distinct workspace topologies. Each separating surface is given as an explicit expression in the DH-parameters.
[ { "version": "v1", "created": "Thu, 10 May 2007 07:05:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Baili", "Maher", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
new_dataset
0.988649
0705.1453
Jerome Darmont
J\'er\^ome Darmont (ERIC), Fadila Bentayeb (ERIC), Omar Boussa\"id (ERIC)
DWEB: A Data Warehouse Engineering Benchmark
null
LNCS, Vol. 3589 (08/2005) 85-94
null
null
cs.DB
null
Data warehouse architectural choices and optimization techniques are critical to decision support query performance. To facilitate these choices, the performance of the designed data warehouse must be assessed. This is usually done with the help of benchmarks, which can either help system users comparing the performances of different systems, or help system engineers testing the effect of various design choices. While the TPC standard decision support benchmarks address the first point, they are not tuneable enough to address the second one and fail to model different data warehouse schemas. By contrast, our Data Warehouse Engineering Benchmark (DWEB) allows to generate various ad-hoc synthetic data warehouses and workloads. DWEB is fully parameterized to fulfill data warehouse design needs. However, two levels of parameterization keep it relatively easy to tune. Finally, DWEB is implemented as a Java free software that can be interfaced with most existing relational database management systems. A sample usage of DWEB is also provided in this paper.
[ { "version": "v1", "created": "Thu, 10 May 2007 12:23:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Darmont", "Jérôme", "", "ERIC" ], [ "Bentayeb", "Fadila", "", "ERIC" ], [ "Boussaïd", "Omar", "", "ERIC" ] ]
new_dataset
0.999658
0705.1999
Camilla Schwind
Camilla Schwind (LIF)
A first-order Temporal Logic for Actions
null
null
null
null
cs.AI cs.LO
null
We present a multi-modal action logic with first-order modalities, which contain terms which can be unified with the terms inside the subsequent formulas and which can be quantified. This makes it possible to handle simultaneously time and states. We discuss applications of this language to action theory where it is possible to express many temporal aspects of actions, as for example, beginning, end, time points, delayed preconditions and results, duration and many others. We present tableaux rules for a decidable fragment of this logic.
[ { "version": "v1", "created": "Mon, 14 May 2007 18:36:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Schwind", "Camilla", "", "LIF" ] ]
new_dataset
0.999449
0705.2819
Preetam Patil
Preetam Patil, Varsha Apte (Department of CSE, IIT-Bombay, India)
An Autonomous Distributed Admission Control Scheme for IEEE 802.11 DCF
Submitted to QShine'07
null
null
null
cs.NI cs.PF
null
Admission control as a mechanism for providing QoS requires an accurate description of the requested flow as well as already admitted flows. Since 802.11 WLAN capacity is shared between flows belonging to all stations, admission control requires knowledge of all flows in the WLAN. Further, estimation of the load-dependent WLAN capacity through analytical model requires inputs about channel data rate, payload size and the number of stations. These factors combined point to a centralized admission control whereas for 802.11 DCF it is ideally performed in a distributed manner. The use of measurements from the channel avoids explicit inputs about the state of the channel described above. BUFFET, a model based measurement-assisted distributed admission control scheme for DCF proposed in this paper relies on measurements to derive model inputs and predict WLAN saturation, thereby maintaining average delay within acceptable limits. Being measurement based, it adapts to a combination of data rates and payload sizes, making it completely autonomous and distributed. Performance analysis using OPNET simulations suggests that BUFFET is able to ensure average delay under 7ms at a near-optimal throughput.
[ { "version": "v1", "created": "Sat, 19 May 2007 13:54:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Patil", "Preetam", "", "Department of CSE, IIT-Bombay, India" ], [ "Apte", "Varsha", "", "Department of CSE, IIT-Bombay, India" ] ]
new_dataset
0.985899
cs/0001001
Alexander Y. Vlasov
Alexander Yu. Vlasov (FRC/IRH, St.-Petersburg, Russia)
Von Neumann Quantum Logic vs. Classical von Neumann Architecture?
4 pages LaTeXe, two columns, 1 inline logo, submitted to III International Conference on Soft Computing and Measurements SCM'2000
null
null
null
cs.OH quant-ph
null
The name of John von Neumann is common both in quantum mechanics and computer science. Are they really two absolutely unconnected areas? Many works devoted to quantum computations and communications are serious argument to suggest about existence of such a relation, but it is impossible to touch the new and active theme in a short review. In the paper are described the structures and models of linear algebra and just due to their generality it is possible to use universal description of very different areas as quantum mechanics and theory of Bayesian image analysis, associative memory, neural networks, fuzzy logic.
[ { "version": "v1", "created": "Mon, 3 Jan 2000 14:25:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Vlasov", "Alexander Yu.", "", "FRC/IRH, St.-Petersburg, Russia" ] ]
new_dataset
0.985471
cs/0001002
Wlodek W. Zadrozny
Wlodek Zadrozny
Minimum Description Length and Compositionality
null
H.Bunt and R.Muskens(Eds.) "Computing Meaning" Vol.1. Kluwer 1999. pp.113-128
null
null
cs.CL cs.AI
null
We present a non-vacuous definition of compositionality. It is based on the idea of combining the minimum description length principle with the original definition of compositionality (that is, that the meaning of the whole is a function of the meaning of the parts). The new definition is intuitive and allows us to distinguish between compositional and non-compositional semantics, and between idiomatic and non-idiomatic expressions. It is not ad hoc, since it does not make any references to non-intrinsic properties of meaning functions (like being a polynomial). Moreover, it allows us to compare different meaning functions with respect to how compositional they are. It bridges linguistic and corpus-based, statistical approaches to natural language understanding.
[ { "version": "v1", "created": "Tue, 4 Jan 2000 21:46:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Zadrozny", "Wlodek", "" ] ]
new_dataset
0.993885
cs/0001019
Joseph O'Rourke
Erik D. Demaine, Martin L. Demaine, Joseph O'Rourke
PushPush is NP-hard in 2D
18 pages, 13 figures, 1 table. Improves cs.CG/9911013
null
null
Smith Technical Report 065
cs.CG cs.DM
null
We prove that a particular pushing-blocks puzzle is intractable in 2D, improving an earlier result that established intractability in 3D [OS99]. The puzzle, inspired by the game *PushPush*, consists of unit square blocks on an integer lattice. An agent may push blocks (but never pull them) in attempting to move between given start and goal positions. In the PushPush version, the agent can only push one block at a time, and moreover, each block, when pushed, slides the maximal extent of its free range. We prove this version is NP-hard in 2D by reduction from SAT.
[ { "version": "v1", "created": "Mon, 24 Jan 2000 14:04:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "O'Rourke", "Joseph", "" ] ]
new_dataset
0.999804
cs/0001026
Joseph Y. Halpern
Joseph Y. Halpern and Ron van der Meyden
A Logic for SDSI's Linked Local Name Spaces
To appear, Journal of Computer Security
null
null
null
cs.CR cs.LO
null
Abadi has introduced a logic to explicate the meaning of local names in SDSI, the Simple Distributed Security Infrastructure proposed by Rivest and Lampson. Abadi's logic does not correspond precisely to SDSI, however; it draws conclusions about local names that do not follow from SDSI's name resolution algorithm. Moreover, its semantics is somewhat unintuitive. This paper presents the Logic of Local Name Containment, which does not suffer from these deficiencies. It has a clear semantics and provides a tight characterization of SDSI name resolution. The semantics is shown to be closely related to that of logic programs, leading to an approach to the efficient implementation of queries concerning local names. A complete axiomatization of the logic is also provided.
[ { "version": "v1", "created": "Fri, 28 Jan 2000 20:50:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "van der Meyden", "Ron", "" ] ]
new_dataset
0.99954
cs/0002008
Robbie Gates
R. Gates, P. Katis, N. Sabadini, R.F.C. Walters
On Automata with Boundary
41 pages, 22 figures. Uses Paul Taylor's diagrams macros, see http://www.ctan.org/tex-archive/macros/generic/diagrams/taylor/
null
null
C/TR00-01
cs.DC
null
We present a theory of automata with boundary for designing, modelling and analysing distributed systems. Notions of behaviour, design and simulation appropriate to the theory are defined. The problem of model checking for deadlock detection is discussed, and an algorithm for state space reduction in exhaustive search, based on the theory presented here, is described. Three examples of the application of the theory are given, one in the course of the development of the ideas and two as illustrative examples of the use of the theory.
[ { "version": "v1", "created": "Wed, 16 Feb 2000 02:45:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Gates", "R.", "" ], [ "Katis", "P.", "" ], [ "Sabadini", "N.", "" ], [ "Walters", "R. F. C.", "" ] ]
new_dataset
0.989328
cs/0003001
Erik T. Mueller
Erik T. Mueller
Making news understandable to computers
null
null
null
null
cs.IR
null
Computers and devices are largely unaware of events taking place in the world. This could be changed if news were made available in a computer-understandable form. In this paper we present XML documents called NewsForms that represent the key points of 17 types of news events. We discuss the benefits of computer-understandable news and present the NewsExtract program for converting text news stories into NewsForms.
[ { "version": "v1", "created": "Wed, 1 Mar 2000 18:11:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Mueller", "Erik T.", "" ] ]
new_dataset
0.99876
cs/0003004
Erik T. Mueller
Erik T. Mueller
A database and lexicon of scripts for ThoughtTreasure
null
null
null
null
cs.AI cs.CL
null
Since scripts were proposed in the 1970's as an inferencing mechanism for AI and natural language processing programs, there have been few attempts to build a database of scripts. This paper describes a database and lexicon of scripts that has been added to the ThoughtTreasure commonsense platform. The database provides the following information about scripts: sequence of events, roles, props, entry conditions, results, goals, emotions, places, duration, frequency, and cost. English and French words and phrases are linked to script concepts.
[ { "version": "v1", "created": "Wed, 1 Mar 2000 18:07:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Mueller", "Erik T.", "" ] ]
new_dataset
0.999297
cs/0003024
Hans Tompits
James P. Delgrande, Torsten Schaub, Hans Tompits
A Compiler for Ordered Logic Programs
null
null
null
null
cs.AI
null
This paper describes a system, called PLP, for compiling ordered logic programs into standard logic programs under the answer set semantics. In an ordered logic program, rules are named by unique terms, and preferences among rules are given by a set of dedicated atoms. An ordered logic program is transformed into a second, regular, extended logic program wherein the preferences are respected, in that the answer sets obtained in the transformed theory correspond with the preferred answer sets of the original theory. Since the result of the translation is an extended logic program, existing logic programming systems can be used as underlying reasoning engine. In particular, PLP is conceived as a front-end to the logic programming systems dlv and smodels.
[ { "version": "v1", "created": "Wed, 8 Mar 2000 10:15:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Delgrande", "James P.", "" ], [ "Schaub", "Torsten", "" ], [ "Tompits", "Hans", "" ] ]
new_dataset
0.998908
cs/0003036
Gerald Pfeifer
Thomas Eiter and Wolfgang Faber and Christoph Koch and Nicola Leone and Gerald Pfeifer
DLV - A System for Declarative Problem Solving
6 pages, 1 figure, 1 table
null
null
null
cs.AI cs.LO
null
DLV is an efficient logic programming and non-monotonic reasoning (LPNMR) system with advanced knowledge representation mechanisms and interfaces to classic relational database systems. Its core language is disjunctive datalog (function-free disjunctive logic programming) under the Answer Set Semantics with integrity constraints, both default and strong (or explicit) negation, and queries. Integer arithmetics and various built-in predicates are also supported. In addition DLV has several frontends, namely brave and cautious reasoning, abductive diagnosis, consistency-based diagnosis, a subset of SQL3, planning with action languages, and logic programming with inheritance.
[ { "version": "v1", "created": "Wed, 8 Mar 2000 18:17:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Eiter", "Thomas", "" ], [ "Faber", "Wolfgang", "" ], [ "Koch", "Christoph", "" ], [ "Leone", "Nicola", "" ], [ "Pfeifer", "Gerald", "" ] ]
new_dataset
0.99921
cs/0003037
Hans Tompits
Uwe Egly, Thomas Eiter, Hans Tompits, Stefan Woltran
QUIP - A Tool for Computing Nonmonotonic Reasoning Tasks
null
null
null
null
cs.AI
null
In this paper, we outline the prototype of an automated inference tool, called QUIP, which provides a uniform implementation for several nonmonotonic reasoning formalisms. The theoretical basis of QUIP is derived from well-known results about the computational complexity of nonmonotonic logics and exploits a representation of the different reasoning tasks in terms of quantified boolean formulae.
[ { "version": "v1", "created": "Wed, 8 Mar 2000 17:18:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Egly", "Uwe", "" ], [ "Eiter", "Thomas", "" ], [ "Tompits", "Hans", "" ], [ "Woltran", "Stefan", "" ] ]
new_dataset
0.997914
cs/0003039
Ilkka Niemela
Maarit Hietalahti, Fabio Massacci, Ilkka Niemela
DES: a Challenge Problem for Nonmonotonic Reasoning Systems
10 pages, 1 Postscript figure, uses aaai.sty and graphicx.sty
null
null
null
cs.AI
null
The US Data Encryption Standard, DES for short, is put forward as an interesting benchmark problem for nonmonotonic reasoning systems because (i) it provides a set of test cases of industrial relevance which shares features of randomly generated problems and real-world problems, (ii) the representation of DES using normal logic programs with the stable model semantics is simple and easy to understand, and (iii) this subclass of logic programs can be seen as an interesting special case for many other formalizations of nonmonotonic reasoning. In this paper we present two encodings of DES as logic programs: a direct one out of the standard specifications and an optimized one extending the work of Massacci and Marraro. The computational properties of the encodings are studied by using them for DES key search with the Smodels system as the implementation of the stable model semantics. Results indicate that the encodings and Smodels are quite competitive: they outperform state-of-the-art SAT-checkers working with an optimized encoding of DES into SAT and are comparable with a SAT-checker that is customized and tuned for the optimized SAT encoding.
[ { "version": "v1", "created": "Wed, 8 Mar 2000 21:49:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Hietalahti", "Maarit", "" ], [ "Massacci", "Fabio", "" ], [ "Niemela", "Ilkka", "" ] ]
new_dataset
0.956979
cs/0003047
Hans-Peter Stoerr
Steffen Hoelldobler and Hans-Peter Stoerr
BDD-based reasoning in the fluent calculus - first results
9 pages; Workshop on Nonmonotonic Reasoning 2000 (NMR 2000)
null
null
null
cs.AI
null
The paper reports on first preliminary results and insights gained in a project aiming at implementing the fluent calculus using methods and techniques based on binary decision diagrams. After reporting on an initial experiment showing promising results we discuss our findings concerning various techniques and heuristics used to speed up the reasoning process.
[ { "version": "v1", "created": "Thu, 9 Mar 2000 17:18:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Hoelldobler", "Steffen", "" ], [ "Stoerr", "Hans-Peter", "" ] ]
new_dataset
0.972314
cs/0003048
Pedro Cabalar
Pedro Cabalar, Manuel Cabarcos, Ramon P. Otero
PAL: Pertinence Action Language
5 pages
null
null
null
cs.AI cs.LO
null
The current document contains a brief description of a system for Reasoning about Actions and Change called PAL (Pertinence Action Language) which makes use of several reasoning properties extracted from a Temporal Expert Systems tool called Medtool.
[ { "version": "v1", "created": "Thu, 9 Mar 2000 19:50:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Cabalar", "Pedro", "" ], [ "Cabarcos", "Manuel", "" ], [ "Otero", "Ramon P.", "" ] ]
new_dataset
0.996054
cs/0003055
Thorsten Brants
Thorsten Brants (Saarland University, Germany)
TnT - A Statistical Part-of-Speech Tagger
8 pages
Proceedings of ANLP-2000, Seattle, WA
null
null
cs.CL
null
Trigrams'n'Tags (TnT) is an efficient statistical part-of-speech tagger. Contrary to claims found elsewhere in the literature, we argue that a tagger based on Markov models performs at least as well as other current approaches, including the Maximum Entropy framework. A recent comparison has even shown that TnT performs significantly better for the tested corpora. We describe the basic model of TnT, the techniques used for smoothing and for handling unknown words. Furthermore, we present evaluations on two corpora.
[ { "version": "v1", "created": "Mon, 13 Mar 2000 09:55:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Brants", "Thorsten", "", "Saarland University, Germany" ] ]
new_dataset
0.99772
cs/0003064
null
Oleg Kiselyov
A network file system over HTTP: remote access and modification of files and "files"
This present document combines a paper and a Freenix Track talk presented at a 1999 USENIX Annual Technical Conference, June 6-11, 1999; Monterey, CA, USA; 6 HTML files. The paper alone appeared in Proc. FREENIX Track: 1999 USENIX Annual Technical Conference, June 6-11,1999; Monterey, CA, USA, pp. 75-80
null
null
null
cs.OS cs.NI
null
The goal of the present HTTPFS project is to enable access to remote files, directories, and other containers through an HTTP pipe. HTTPFS system permits retrieval, creation and modification of these resources as if they were regular files and directories on a local filesystem. The remote host can be any UNIX or Win9x/WinNT box that is capable of running a Perl CGI script and accessible either directly or via a web proxy or a gateway. HTTPFS runs entirely in user space. The current implementation fully supports reading as well as creating, writing, appending, and truncating of files on a remote HTTP host. HTTPFS provides an isolation level for concurrent file access stronger than the one mandated by POSIX file system semantics, closer to that of AFS. Both an API with familiar open(), read(), write(), close(), etc. calls, and an interactive interface, via the popular Midnight Commander file browser, are provided.
[ { "version": "v1", "created": "Wed, 15 Mar 2000 19:20:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiselyov", "Oleg", "" ] ]
new_dataset
0.997725
cs/0004011
Burkhard D. Steinmacher-Burow
Burkhard D. Steinmacher-Burow
Task Frames
null
null
null
null
cs.PL
null
Forty years ago Dijkstra introduced the current conventional execution of routines. It places activation frames onto a stack. Each frame is the internal state of an executing routine. The resulting application execution is not easily helped by an external system. This presentation proposes an alternative execution of routines. It places task frames onto the stack. A task frame is the call of a routine to be executed. The feasibility of the alternative execution is demonstrated by a crude implementation. As described elsewhere, an application which executes in terms of tasks can be provided by an external system with a transparent reliable, distributed, heterogeneous, adaptive, dynamic, real-time, parallel, secure or other execution. By extending the crude implementation, this presentation outlines a simple transparent parallel execution.
[ { "version": "v1", "created": "Wed, 19 Apr 2000 12:22:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Steinmacher-Burow", "Burkhard D.", "" ] ]
new_dataset
0.974011
cs/0005002
Jan Heering
Jan Heering
Application Software, Domain-Specific Languages, and Language Design Assistants
To be presented at SSGRR 2000, L'Aquila, Italy
in Proceedings SSGRR 2000 International Conference on Advances in Infrastructure for Electronic Business, Science, and Education on the Internet
null
SEN-R0010 (CWI, Amsterdam)
cs.PL
null
While application software does the real work, domain-specific languages (DSLs) are tools to help produce it efficiently, and language design assistants in turn are meta-tools to help produce DSLs quickly. DSLs are already in wide use (HTML for web pages, Excel macros for spreadsheet applications, VHDL for hardware design, ...), but many more will be needed for both new as well as existing application domains. Language design assistants to help develop them currently exist only in the basic form of language development systems. After a quick look at domain-specific languages, and especially their relationship to application libraries, we survey existing language development systems and give an outline of future language design assistants.
[ { "version": "v1", "created": "Wed, 3 May 2000 13:34:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Heering", "Jan", "" ] ]
new_dataset
0.997731
cs/0005008
Krzysztof R. Apt
Krzysztof R. Apt
A Denotational Semantics for First-Order Logic
17 pages. Invited talk at the Computational Logic Conference (CL 2000). To appear in Springer-Verlag Lecture Notes in Computer Science
null
null
null
cs.PL cs.AI
null
In Apt and Bezem [AB99] (see cs.LO/9811017) we provided a computational interpretation of first-order formulas over arbitrary interpretations. Here we complement this work by introducing a denotational semantics for first-order logic. Additionally, by allowing an assignment of a non-ground term to a variable we introduce in this framework logical variables. The semantics combines a number of well-known ideas from the areas of semantics of imperative programming languages and logic programming. In the resulting computational view conjunction corresponds to sequential composition, disjunction to ``don't know'' nondeterminism, existential quantification to declaration of a local variable, and negation to the ``negation as finite failure'' rule. The soundness result shows correctness of the semantics with respect to the notion of truth. The proof resembles in some aspects the proof of the soundness of the SLDNF-resolution.
[ { "version": "v1", "created": "Mon, 8 May 2000 12:23:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
new_dataset
0.990542
cs/0005009
Stephan Tobies
Stephan Tobies
PSPACE Reasoning for Graded Modal Logics
null
Journal of Logic and Computation, Vol. 11 No. 1, pp 85-106 2001
null
null
cs.LO cs.AI cs.CC cs.DS
null
We present a PSPACE algorithm that decides satisfiability of the graded modal logic Gr(K_R)---a natural extension of propositional modal logic K_R by counting expressions---which plays an important role in the area of knowledge representation. The algorithm employs a tableaux approach and is the first known algorithm which meets the lower bound for the complexity of the problem. Thus, we exactly fix the complexity of the problem and refute an ExpTime-hardness conjecture. We extend the results to the logic Gr(K_(R \cap I)), which augments Gr(K_R) with inverse relations and intersection of accessibility relations. This establishes a kind of ``theoretical benchmark'' that all algorithmic approaches can be measured against.
[ { "version": "v1", "created": "Mon, 8 May 2000 14:51:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Tobies", "Stephan", "" ] ]
new_dataset
0.995404
cs/0005012
Stephan Tobies
Ian Horrocks and Stephan Tobies
Reasoning with Axioms: Theory and Pratice
This paper appeard in the Proceedings of KR'2000
null
null
null
cs.LO cs.AI
null
When reasoning in description, modal or temporal logics it is often useful to consider axioms representing universal truths in the domain of discourse. Reasoning with respect to an arbitrary set of axioms is hard, even for relatively inexpressive logics, and it is essential to deal with such axioms in an efficient manner if implemented systems are to be effective in real applications. This is particularly relevant to Description Logics, where subsumption reasoning with respect to a terminology is a fundamental problem. Two optimisation techniques that have proved to be particularly effective in dealing with terminologies are lazy unfolding and absorption. In this paper we seek to improve our theoretical understanding of these important techniques. We define a formal framework that allows the techniques to be precisely described, establish conditions under which they can be safely applied, and prove that, provided these conditions are respected, subsumption testing algorithms will still function correctly. These results are used to show that the procedures used in the FaCT system are correct and, moreover, to show how efficiency can be significantly improved, while still retaining the guarantee of correctness, by relaxing the safety conditions for absorption.
[ { "version": "v1", "created": "Tue, 9 May 2000 07:17:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Horrocks", "Ian", "" ], [ "Tobies", "Stephan", "" ] ]
new_dataset
0.996842
cs/0005023
Emanuele Panizzi
Alessandro Lonardo, Emanuele Panizzi and Benedetto Proietti
C++ programming language for an abstract massively parallel SIMD architecture
10 pages
null
null
null
cs.PL
null
The aim of this work is to define and implement an extended C++ language to support the SIMD programming paradigm. The C++ programming language has been extended to express all the potentiality of an abstract SIMD machine consisting of a central Control Processor and a N-dimensional toroidal array of Numeric Processors. Very few extensions have been added to the standard C++ with the goal of minimising the effort for the programmer in learning a new language and to keep very high the performance of the compiled code. The proposed language has been implemented as a porting of the GNU C++ Compiler on a SIMD supercomputer.
[ { "version": "v1", "created": "Fri, 19 May 2000 10:19:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Lonardo", "Alessandro", "" ], [ "Panizzi", "Emanuele", "" ], [ "Proietti", "Benedetto", "" ] ]
new_dataset
0.997857
cs/0005026
Igor Sobrado Delgado
Igor Sobrado (University of Oviedo)
A One-Time Pad based Cipher for Data Protection in Distributed Environments
19 pages, 8 PostScript figures (attached), uses ACM/LaTeX macros esub2acm.{bst|cls} and pifont package
null
null
FFUOV-00/03
cs.CR cs.DC cs.IR cs.NI
null
A one-time pad (OTP) based cipher to insure both data protection and integrity when mobile code arrives to a remote host is presented. Data protection is required when a mobile agent could retrieve confidential information that would be encrypted in untrusted nodes of the network; in this case, information management could not rely on carrying an encryption key. Data integrity is a prerequisite because mobile code must be protected against malicious hosts that, by counterfeiting or removing collected data, could cover information to the server that has sent the agent. The algorithm described in this article seems to be simple enough, so as to be easily implemented. This scheme is based on a non-interactive protocol and allows a remote host to change its own data on-the-fly and, at the same time, protecting information against handling by other hosts.
[ { "version": "v1", "created": "Wed, 24 May 2000 22:24:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Sobrado", "Igor", "", "University of Oviedo" ] ]
new_dataset
0.992115
cs/0006019
Frankie James
Manny Rayner, Beth Ann Hockey, Frankie James
A Compact Architecture for Dialogue Management Based on Scripts and Meta-Outputs
null
Language Technology Joint Conference ANLP-NAACL 2000. 29 April - 4 May 2000, Seattle, WA
null
null
cs.CL
null
We describe an architecture for spoken dialogue interfaces to semi-autonomous systems that transforms speech signals through successive representations of linguistic, dialogue, and domain knowledge. Each step produces an output, and a meta-output describing the transformation, with an executable program in a simple scripting language as the final result. The output/meta-output distinction permits perspicuous treatment of diverse tasks such as resolving pronouns, correcting user misconceptions, and optimizing scripts.
[ { "version": "v1", "created": "Fri, 9 Jun 2000 21:41:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Rayner", "Manny", "" ], [ "Hockey", "Beth Ann", "" ], [ "James", "Frankie", "" ] ]
new_dataset
0.964139
cs/0007004
Alejandro Zunino
Alejandro Zunino and Analia Amandi
Brainstorm/J: a Java Framework for Intelligent Agents
15 pages. To be published in Proceedings of the Second Argentinian Symposium on Artificial Intelligence (ASAI'2000 - 29th JAIIO). September 2000. Tandil, Buenos Aires, Argentina. See http://www.exa.unicen.edu.ar/~azunino
null
null
null
cs.AI
null
Despite the effort of many researchers in the area of multi-agent systems (MAS) for designing and programming agents, a few years ago the research community began to take into account that common features among different MAS exists. Based on these common features, several tools have tackled the problem of agent development on specific application domains or specific types of agents. As a consequence, their scope is restricted to a subset of the huge application domain of MAS. In this paper we propose a generic infrastructure for programming agents whose name is Brainstorm/J. The infrastructure has been implemented as an object oriented framework. As a consequence, our approach supports a broader scope of MAS applications than previous efforts, being flexible and reusable.
[ { "version": "v1", "created": "Tue, 4 Jul 2000 16:31:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Zunino", "Alejandro", "" ], [ "Amandi", "Analia", "" ] ]
new_dataset
0.97574
cs/0007006
Hans G. Kaper
Hans G. Kaper (1), Sever Tipei (2) and Jeff M. Wright (2) ((1) Argonne National Laboratory, (2) University of Illinois at Urbana-Champaign)
DISCO: An object-oriented system for music composition and sound design
4 pages, no figures; to be published in Proc. Int'l Computer Music Conference 2000 (Berlin, August 2000)
null
null
null
cs.SD cs.DS cs.SE
null
This paper describes an object-oriented approach to music composition and sound design. The approach unifies the processes of music making and instrument building by using similar logic, objects, and procedures. The composition modules use an abstract representation of musical data, which can be easily mapped onto different synthesis languages or a traditionally notated score. An abstract base class is used to derive classes on different time scales. Objects can be related to act across time scales, as well as across an entire piece, and relationships between similar objects can replicate traditional music operations or introduce new ones. The DISCO (Digital Instrument for Sonification and Composition) system is an open-ended work in progress.
[ { "version": "v1", "created": "Wed, 5 Jul 2000 18:20:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Kaper", "Hans G.", "" ], [ "Tipei", "Sever", "" ], [ "Wright", "Jeff M.", "" ] ]
new_dataset
0.955566
cs/0007009
Jan Daciuk
Jan Daciuk, Stoyan Mihov, Bruce Watson, Richard Watson
Incremental construction of minimal acyclic finite-state automata
14 pages, 7 figures
Computational Linguistics, Vol. 26, Number 1, March 2000
null
null
cs.CL
null
In this paper, we describe a new method for constructing minimal, deterministic, acyclic finite-state automata from a set of strings. Traditional methods consist of two phases: the first to construct a trie, the second one to minimize it. Our approach is to construct a minimal automaton in a single phase by adding new strings one by one and minimizing the resulting automaton on-the-fly. We present a general algorithm as well as a specialization that relies upon the lexicographical ordering of the input strings.
[ { "version": "v1", "created": "Thu, 6 Jul 2000 14:15:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Daciuk", "Jan", "" ], [ "Mihov", "Stoyan", "" ], [ "Watson", "Bruce", "" ], [ "Watson", "Richard", "" ] ]
new_dataset
0.955825
cs/0007015
Ted Herman
Ted Herman
Phase Clocks for Transient Fault Repair
22 pages, LaTeX
null
null
TR99-08
cs.DC
null
Phase clocks are synchronization tools that implement a form of logical time in distributed systems. For systems tolerating transient faults by self-repair of damaged data, phase clocks can enable reasoning about the progress of distributed repair procedures. This paper presents a phase clock algorithm suited to the model of transient memory faults in asynchronous systems with read/write registers. The algorithm is self-stabilizing and guarantees accuracy of phase clocks within O(k) time following an initial state that is k-faulty. Composition theorems show how the algorithm can be used for the timing of distributed procedures that repair system outputs.
[ { "version": "v1", "created": "Mon, 10 Jul 2000 15:59:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Herman", "Ted", "" ] ]
new_dataset
0.998633
cs/0007021
Joseph O'Rourke
Erik D. Demaine, Martin L. Demaine, Joseph O'Rourke
PushPush and Push-1 are NP-hard in 2D
10 pages, 11 figures. Corrects an error in the conference version: Proc. of the 12th Canadian Conference on Computational Geometry, August 2000, pp. 211-219
null
null
null
cs.CG cs.DM
null
We prove that two pushing-blocks puzzles are intractable in 2D. One of our constructions improves an earlier result that established intractability in 3D [OS99] for a puzzle inspired by the game PushPush. The second construction answers a question we raised in [DDO00] for a variant we call Push-1. Both puzzles consist of unit square blocks on an integer lattice; all blocks are movable. An agent may push blocks (but never pull them) in attempting to move between given start and goal positions. In the PushPush version, the agent can only push one block at a time, and moreover when a block is pushed it slides the maximal extent of its free range. In the Push-1 version, the agent can only push one block one square at a time, the minimal extent---one square. Both NP-hardness proofs are by reduction from SAT, and rely on a common construction.
[ { "version": "v1", "created": "Thu, 13 Jul 2000 17:34:58 GMT" }, { "version": "v2", "created": "Sun, 3 Sep 2000 14:57:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "O'Rourke", "Joseph", "" ] ]
new_dataset
0.999748
cs/0007024
Steven Bird
David Graff and Steven Bird
Many uses, many annotations for large speech corpora: Switchboard and TDT as case studies
7 pages, 2 figures
Proceedings of the Second International Conference on Language Resources and Evaluation, pp. 427-433, Paris: European Language Resources Association, 2000
null
null
cs.CL
null
This paper discusses the challenges that arise when large speech corpora receive an ever-broadening range of diverse and distinct annotations. Two case studies of this process are presented: the Switchboard Corpus of telephone conversations and the TDT2 corpus of broadcast news. Switchboard has undergone two independent transcriptions and various types of additional annotation, all carried out as separate projects that were dispersed both geographically and chronologically. The TDT2 corpus has also received a variety of annotations, but all directly created or managed by a core group. In both cases, issues arise involving the propagation of repairs, consistency of references, and the ability to integrate annotations having different formats and levels of detail. We describe a general framework whereby these issues can be addressed successfully.
[ { "version": "v1", "created": "Thu, 13 Jul 2000 18:51:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Graff", "David", "" ], [ "Bird", "Steven", "" ] ]
new_dataset
0.988511
cs/0007028
Po-Han Lin
Po-Han Lin
Base Encryption: Dynamic algorithms, Keys, and Symbol Set
html page
null
null
null
cs.CR cs.CC
null
All the current modern encryption algorithms utilize fixed symbols for plaintext and cyphertext. What I mean by fixed is that there is a set and limited number of symbols to represent the characters, numbers, and punctuations. In addition, they are usually the same (the plaintext symbols have the same and equivalent counterpart in the cyphertext symbols). Almost all the encryption algorithms rely on a predefined keyspace and length for the encryption/decription keys, and it is usually fixed (number of bits). In addition, the algorithms used by the encryptions are static. There is a predefined number of operatiors, and a predefined order (loops included) of operations. The algorithm stays the same, and the plaintext and cyphertext along with the key are churned through this cypherblock. Base Encryption does the opposite: It utilizes the novel concepts of base conversion, symbol remapping, and dynamic algorithms (dynamic operators and dynamic operations). Base Encryption solves the weakness in todays encryption schemes, namely... Fixed symbols (base) Fixed keylengths Fixed algorithms (fixed number of operations and operators) Unique features... Immune from plain-text-attacks. Immune from brute-force-attacks. Can utilize throwaway algorithms (as opposed to throw away keys). Plug-And-Play engine (other cyphers can be augmentated to it)
[ { "version": "v1", "created": "Tue, 18 Jul 2000 16:44:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Lin", "Po-Han", "" ] ]
new_dataset
0.990036
cs/0007038
Konstantinos Georgatos
Konstantinos Georgatos
Modal Logics for Topological Spaces
25 pages, extened abstract of PHD Dissertation
null
null
null
cs.LO cs.AI
null
In this thesis we shall present two logical systems, MP and MP, for the purpose of reasoning about knowledge and effort. These logical systems will be interpreted in a spatial context and therefore, the abstract concepts of knowledge and effort will be defined by concrete mathematical concepts.
[ { "version": "v1", "created": "Wed, 26 Jul 2000 18:41:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Georgatos", "Konstantinos", "" ] ]
new_dataset
0.992778
cs/0007043
Suman Kumar Nath
Suman Kumar Nath, Rezaul Alam Chowdhury, M. Kaykobad
Min-Max Fine Heaps
6 pages, pdf file
null
null
null
cs.DS
null
In this paper we present a new data structure for double ended priority queue, called min-max fine heap, which combines the techniques used in fine heap and traditional min-max heap. The standard operations on this proposed structure are also presented, and their analysis indicates that the new structure outperforms the traditional one.
[ { "version": "v1", "created": "Mon, 31 Jul 2000 00:13:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Nath", "Suman Kumar", "" ], [ "Chowdhury", "Rezaul Alam", "" ], [ "Kaykobad", "M.", "" ] ]
new_dataset
0.998654
cs/0008010
Jeff Erickson
Oswin Aichholzer, Carmen Cortes, Erik D. Demaine, Vida Dujmovic, Jeff Erickson, Henk Meijer, Mark Overmars, Belen Palop, Suneeta Ramaswami, and Godfried T. Toussaint
Flipturning polygons
26 pages, 32 figures, see also http://www.uiuc.edu/~jeffe/pubs/flipturn.html
null
null
null
cs.CG cs.DM math.MG
null
A flipturn is an operation that transforms a nonconvex simple polygon into another simple polygon, by rotating a concavity 180 degrees around the midpoint of its bounding convex hull edge. Joss and Shannon proved in 1973 that a sequence of flipturns eventually transforms any simple polygon into a convex polygon. This paper describes several new results about such flipturn sequences. We show that any orthogonal polygon is convexified after at most n-5 arbitrary flipturns, or at most 5(n-4)/6 well-chosen flipturns, improving the previously best upper bound of (n-1)!/2. We also show that any simple polygon can be convexified by at most n^2-4n+1 flipturns, generalizing earlier results of Ahn et al. These bounds depend critically on how degenerate cases are handled; we carefully explore several possibilities. We describe how to maintain both a simple polygon and its convex hull in O(log^4 n) time per flipturn, using a data structure of size O(n). We show that although flipturn sequences for the same polygon can have very different lengths, the shape and position of the final convex polygon is the same for all sequences and can be computed in O(n log n) time. Finally, we demonstrate that finding the longest convexifying flipturn sequence of a simple polygon is NP-hard.
[ { "version": "v1", "created": "Wed, 16 Aug 2000 04:32:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Aichholzer", "Oswin", "" ], [ "Cortes", "Carmen", "" ], [ "Demaine", "Erik D.", "" ], [ "Dujmovic", "Vida", "" ], [ "Erickson", "Jeff", "" ], [ "Meijer", "Henk", "" ], [ "Overmars", "Mark", "" ], [ "Palop", "Belen", "" ], [ "Ramaswami", "Suneeta", "" ], [ "Toussaint", "Godfried T.", "" ] ]
new_dataset
0.991275
cs/0008021
Brian Roark
Mark Johnson and Brian Roark
Compact non-left-recursive grammars using the selective left-corner transform and factoring
7 pages, 5 tables, 2 figures
Proceedings of the 18th International Conference on Computational Linguistics (COLING), 2000, pages 355-361
null
null
cs.CL
null
The left-corner transform removes left-recursion from (probabilistic) context-free grammars and unification grammars, permitting simple top-down parsing techniques to be used. Unfortunately the grammars produced by the standard left-corner transform are usually much larger than the original. The selective left-corner transform described in this paper produces a transformed grammar which simulates left-corner recognition of a user-specified set of the original productions, and top-down recognition of the others. Combined with two factorizations, it produces non-left-recursive grammars that are not much larger than the original.
[ { "version": "v1", "created": "Tue, 22 Aug 2000 15:16:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Johnson", "Mark", "" ], [ "Roark", "Brian", "" ] ]
new_dataset
0.985142
cs/0008025
David Eppstein
Erik D. Demaine, Martin L. Demaine, and David Eppstein
Phutball Endgames are Hard
9 pages, 8 figures. Revised to include additional references on the complexity of checkers
More Games of No Chance, MSRI Publications 42, 2002, pp. 351-360
null
null
cs.CC cs.GT
null
We show that, in John Conway's board game Phutball (or Philosopher's Football), it is NP-complete to determine whether the current player has a move that immediately wins the game. In contrast, the similar problems of determining whether there is an immediately winning move in checkers, or a move that kings a man, are both solvable in polynomial time.
[ { "version": "v1", "created": "Wed, 23 Aug 2000 21:56:15 GMT" }, { "version": "v2", "created": "Fri, 27 Jul 2001 18:31:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Eppstein", "David", "" ] ]
new_dataset
0.999773
cs/0008031
Masaki Murata
Masaki Murata, Kiyotaka Uchimoto, Qing Ma, Hitoshi Isahara
Bunsetsu Identification Using Category-Exclusive Rules
7 pages. Computation and Language
COLING'2000, Saarbrucken, Germany, August, 2000
null
null
cs.CL
null
This paper describes two new bunsetsu identification methods using supervised learning. Since Japanese syntactic analysis is usually done after bunsetsu identification, bunsetsu identification is important for analyzing Japanese sentences. In experiments comparing the four previously available machine-learning methods (decision tree, maximum-entropy method, example-based approach and decision list) and two new methods using category-exclusive rules, the new method using the category-exclusive rules with the highest similarity performed best.
[ { "version": "v1", "created": "Mon, 28 Aug 2000 08:17:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Murata", "Masaki", "" ], [ "Uchimoto", "Kiyotaka", "" ], [ "Ma", "Qing", "" ], [ "Isahara", "Hitoshi", "" ] ]
new_dataset
0.988348