id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0710.0386
Supriya Krishnamurthy
Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurell and Seif Haridi
Comparing Maintenance Strategies for Overlays
10 pages, 8 figures
null
null
Tech. Report TR-2007-01, Swedish Institute of Computer Science
cs.NI cond-mat.stat-mech cs.DC
null
In this paper, we present an analytical tool for understanding the performance of structured overlay networks under churn based on the master-equation approach of physics. We motivate and derive an equation for the average number of hops taken by lookups during churn, for the Chord network. We analyse this equation in detail to understand the behaviour with and without churn. We then use this understanding to predict how lookups will scale for varying peer population as well as varying the sizes of the routing tables. We then consider a change in the maintenance algorithm of the overlay, from periodic stabilisation to a reactive one which corrects fingers only when a change is detected. We generalise our earlier analysis to underdstand how the reactive strategy compares with the periodic one.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 20:45:04 GMT" } ]
2007-10-03T00:00:00
[ [ "Krishnamurthy", "Supriya", "" ], [ "El-Ansary", "Sameh", "" ], [ "Aurell", "Erik", "" ], [ "Haridi", "Seif", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0710.0410
Philip Baback Alipour
Philip B. Alipour
The Theory of Unified Relativity for a Biovielectroluminescence Phenomenon via Fly's Visual and Imaging System
51 pages, 4 figures (2 multi-figures), 4 tables, 3 Appendices, 1 Animation clip. This is a personalized report, extension to project license No. TXU001347562. A very concise report is to be published in other journals encompassing the relevant categories on computing and physical sciences
null
null
null
cs.CE cs.CV
null
The elucidation upon fly's neuronal patterns as a link to computer graphics and memory cards I/O's, is investigated for the phenomenon by propounding a unified theory of Einstein's two known relativities. It is conclusive that flies could contribute a certain amount of neuromatrices indicating an imagery function of a visual-computational system into computer graphics and storage systems. The visual system involves the time aspect, whereas flies possess faster pulses compared to humans' visual ability due to the E-field state on an active fly's eye surface. This behaviour can be tested on a dissected fly specimen at its ommatidia. Electro-optical contacts and electrodes are wired through the flesh forming organic emitter layer to stimulate light emission, thereby to a computer circuit. The next step is applying a threshold voltage with secondary voltages to the circuit denoting an array of essential electrodes for bit switch. As a result, circuit's dormant pulses versus active pulses at the specimen's area are recorded. The outcome matrix possesses a construction of RGB and time radicals expressing the time problem in consumption, allocating time into computational algorithms, enhancing the technology far beyond. The obtained formulation generates consumed distance cons(x), denoting circuital travel between data source/sink for pixel data and bendable wavelengths. Once 'image logic' is in place, incorporating this point of graphical acceleration permits one to enhance graphics and optimize immensely central processing, data transmissions between memory and computer visual system. The phenomenon can be mainly used in 360-deg. display/viewing, 3D scanning techniques, military and medicine, a robust and cheap substitution for e.g. pre-motion pattern analysis, real-time rendering and LCDs.
[ { "version": "v1", "created": "Mon, 1 Oct 2007 23:55:50 GMT" } ]
2009-12-05T00:00:00
[ [ "Alipour", "Philip B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0710.0431
Axel Lakus-Becker
Axel Lakus-Becker and Ka-Ming Leung
New Counting Codes for Distributed Video Coding
10 pages, 4 tables
null
null
null
cs.IT math.IT
null
This paper introduces a new counting code. Its design was motivated by distributed video coding where, for decoding, error correction methods are applied to improve predictions. Those error corrections sometimes fail which results in decoded values worse than the initial prediction. Our code exploits the fact that bit errors are relatively unlikely events: more than a few bit errors in a decoded pixel value are rare. With a carefully designed counting code combined with a prediction those bit errors can be corrected and sometimes the original pixel value recovered. The error correction improves significantly. Our new code not only maximizes the Hamming distance between adjacent (or "near 1") codewords but also between nearby (for example "near 2") codewords. This is why our code is significantly different from the well-known maximal counting sequences which have maximal average Hamming distance. Fortunately, the new counting code can be derived from Gray Codes for every code word length (i.e. bit depth).
[ { "version": "v1", "created": "Tue, 2 Oct 2007 03:05:17 GMT" }, { "version": "v2", "created": "Sun, 3 Feb 2008 22:50:28 GMT" } ]
2008-02-04T00:00:00
[ [ "Lakus-Becker", "Axel", "" ], [ "Leung", "Ka-Ming", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.0485
Vladimir Vovk
Vladimir Vovk and Fedor Zhdanov
Prediction with expert advice for the Brier game
34 pages, 22 figures, 2 tables. The conference version (8 pages) is published in the ICML 2008 Proceedings
Journal of Machine Learning Research 10 (2009), 2413 - 2440
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the Brier game of prediction is mixable and find the optimal learning rate and substitution function for it. The resulting prediction algorithm is applied to predict results of football and tennis matches. The theoretical performance guarantee turns out to be rather tight on these data sets, especially in the case of the more extensive tennis data.
[ { "version": "v1", "created": "Tue, 2 Oct 2007 10:08:41 GMT" }, { "version": "v2", "created": "Fri, 27 Jun 2008 18:45:01 GMT" } ]
2009-11-02T00:00:00
[ [ "Vovk", "Vladimir", "" ], [ "Zhdanov", "Fedor", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0710.0510
Jean-Guillaume Dumas
Jean-Guillaume Dumas (LJK)
Q-adic Transform revisited
International Symposium on Symbolic and Algebraic Computation 2008, Hagenberg : Autriche (2008)
null
null
null
cs.SC
null
We present an algorithm to perform a simultaneous modular reduction of several residues. This algorithm is applied fast modular polynomial multiplication. The idea is to convert the $X$-adic representation of modular polynomials, with $X$ an indeterminate, to a $q$-adic representation where $q$ is an integer larger than the field characteristic. With some control on the different involved sizes it is then possible to perform some of the $q$-adic arithmetic directly with machine integers or floating points. Depending also on the number of performed numerical operations one can then convert back to the $q$-adic or $X$-adic representation and eventually mod out high residues. In this note we present a new version of both conversions: more tabulations and a way to reduce the number of divisions involved in the process are presented. The polynomial multiplication is then applied to arithmetic in small finite field extensions.
[ { "version": "v1", "created": "Tue, 2 Oct 2007 12:02:07 GMT" }, { "version": "v2", "created": "Fri, 26 Oct 2007 18:29:40 GMT" }, { "version": "v3", "created": "Wed, 21 Nov 2007 14:56:34 GMT" }, { "version": "v4", "created": "Fri, 4 Apr 2008 09:23:09 GMT" }, { "version": "v5", "created": "Mon, 23 Jun 2008 08:19:23 GMT" } ]
2008-06-23T00:00:00
[ [ "Dumas", "Jean-Guillaume", "", "LJK" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0710.0528
Francesca Scozzari
Gianluca Amato and Francesca Scozzari
On the interaction between sharing and linearity
null
Theory and Practice of Logic Programming, volume 10, issue 01, pp. 49-112, 2010
10.1017/S1471068409990160
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the analysis of logic programs, abstract domains for detecting sharing and linearity information are widely used. Devising abstract unification algorithms for such domains has proved to be rather hard. At the moment, the available algorithms are correct but not optimal, i.e., they cannot fully exploit the information conveyed by the abstract domains. In this paper, we define a new (infinite) domain ShLin-w which can be thought of as a general framework from which other domains can be easily derived by abstraction. ShLin-w makes the interaction between sharing and linearity explicit. We provide a constructive characterization of the optimal abstract unification operator on ShLin-w and we lift it to two well-known abstractions of ShLin-w. Namely, to the classical Sharing X Lin abstract domain and to the more precise ShLin-2 abstract domain by Andy King. In the case of single binding substitutions, we obtain optimal abstract unification algorithms for such domains. To appear in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Tue, 2 Oct 2007 13:29:28 GMT" }, { "version": "v2", "created": "Tue, 28 Jul 2009 09:35:55 GMT" } ]
2012-10-09T00:00:00
[ [ "Amato", "Gianluca", "" ], [ "Scozzari", "Francesca", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0710.0531
Massimiliano Laddomada Ph.D.
Fred Daneshgaran, Massimiliano Laddomada, Marina Mondin
The Problem of Localization in Networks of Randomly Deployed Nodes: Asymptotic and Finite Analysis, and Thresholds
Submitted to IEEE transactions on information theory (Submission date October 1, 2007)
null
null
null
cs.DM cs.IT cs.NI math.IT
null
We derive the probability that a randomly chosen NL-node over $S$ gets localized as a function of a variety of parameters. Then, we derive the probability that the whole network of NL-nodes over $S$ gets localized. In connection with the asymptotic thresholds, we show the presence of asymptotic thresholds on the network localization probability in two different scenarios. The first refers to dense networks, which arise when the domain $S$ is bounded and the densities of the two kinds of nodes tend to grow unboundedly. The second kind of thresholds manifest themselves when the considered domain increases but the number of nodes grow in such a way that the L-node density remains constant throughout the investigated domain. In this scenario, what matters is the minimum value of the maximum transmission range averaged over the fading process, denoted as $d_{max}$, above which the network of NL-nodes almost surely gets asymptotically localized.
[ { "version": "v1", "created": "Tue, 2 Oct 2007 13:36:20 GMT" } ]
2011-11-10T00:00:00
[ [ "Daneshgaran", "Fred", "" ], [ "Laddomada", "Massimiliano", "" ], [ "Mondin", "Marina", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.0539
Anthony A. Ruffa
Anthony A. Ruffa
A Novel Solution to the ATT48 Benchmark Problem
null
null
null
null
cs.DS cs.CC
null
A solution to the benchmark ATT48 Traveling Salesman Problem (from the TSPLIB95 library) results from isolating the set of vertices into ten open-ended zones with nine lengthwise boundaries. In each zone, a minimum-length Hamiltonian Path (HP) is found for each combination of boundary vertices, leading to an approximation for the minimum-length Hamiltonian Cycle (HC). Determination of the optimal HPs for subsequent zones has the effect of automatically filtering out non-optimal HPs from earlier zones. Although the optimal HC for ATT48 involves only two crossing edges between all zones (with one exception), adding inter-zone edges can accommodate more complex problems.
[ { "version": "v1", "created": "Tue, 2 Oct 2007 14:26:33 GMT" } ]
2007-10-03T00:00:00
[ [ "Ruffa", "Anthony A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0710.0550
Vladimir Gudkov
V. Gudkov and V. Montealegre
Community Detection in Complex Networks by Dynamical Simplex Evolution
null
null
10.1103/PhysRevE.78.016113
null
cond-mat.dis-nn cs.NI physics.soc-ph
null
We benchmark the dynamical simplex evolution (DSE) method with several of the currently available algorithms to detect communities in complex networks by comparing the fraction of correctly identified nodes for different levels of ``fuzziness'' of random networks composed of well defined communities. The potential benefits of the DSE method to detect hierarchical sub structures in complex networks are discussed.
[ { "version": "v1", "created": "Tue, 2 Oct 2007 14:55:35 GMT" } ]
2009-11-13T00:00:00
[ [ "Gudkov", "V.", "" ], [ "Montealegre", "V.", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0710.0556
Xianhua Dai
Xianhua Dai and V. P. Belavkin
A Game Theoretic Approach to Quantum Information
35 pages
null
null
null
quant-ph cs.GT cs.IT math.IT
null
This work is an application of game theory to quantum information. In a state estimate, we are given observations distributed according to an unknown distribution $P_{\theta}$ (associated with award $Q$), which Nature chooses at random from the set $\{P_{\theta}: \theta \in \Theta \}$ according to a known prior distribution $\mu$ on $\Theta$, we produce an estimate $M$ for the unknown distribution $P_{\theta}$, and in the end, we will suffer a relative entropy cost $\mathcal{R}(P;M)$, measuring the quality of this estimate, therefore the whole utility is taken as $P \cdot Q -\mathcal{R}(P; M)$. In an introduction to strategic game, a sufficient condition for minimax theorem is obtained; An estimate is explored in the frame of game theory, and in the view of convex conjugate, we reach one new approach to quantum relative entropy, correspondingly quantum mutual entropy, and quantum channel capacity, which are more general, in the sense, without Radon-Nikodym (RN) derivatives. Also the monotonicity of quantum relative entropy and the additivity of quantum channel capacity are investigated.
[ { "version": "v1", "created": "Tue, 2 Oct 2007 15:17:37 GMT" }, { "version": "v2", "created": "Fri, 28 Dec 2007 10:31:48 GMT" } ]
2011-11-10T00:00:00
[ [ "Dai", "Xianhua", "" ], [ "Belavkin", "V. P.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.0564
Cyril Measson
Yi Lu, Cyril Measson and Andrea Montanari
TP Decoding
8 pages, 9 figures
See also: 45th Annual Allerton Conference on Communication, Control, and Computing, Monticello, USA, 2007
null
null
cs.IT math.IT
null
`Tree pruning' (TP) is an algorithm for probabilistic inference on binary Markov random fields. It has been recently derived by Dror Weitz and used to construct the first fully polynomial approximation scheme for counting independent sets up to the `tree uniqueness threshold.' It can be regarded as a clever method for pruning the belief propagation computation tree, in such a way to exactly account for the effect of loops. In this paper we generalize the original algorithm to make it suitable for decoding linear codes, and discuss various schemes for pruning the computation tree. Further, we present the outcomes of numerical simulations on several linear codes, showing that tree pruning allows to interpolate continuously between belief propagation and maximum a posteriori decoding. Finally, we discuss theoretical implications of the new method.
[ { "version": "v1", "created": "Tue, 2 Oct 2007 15:40:14 GMT" } ]
2007-10-03T00:00:00
[ [ "Lu", "Yi", "" ], [ "Measson", "Cyril", "" ], [ "Montanari", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.0658
Yi Lu
Yi Lu, Andrea Montanari and Balaji Prabhakar
Detailed Network Measurements Using Sparse Graph Counters: The Theory
8 pages. Allerton conference
null
null
null
cs.NI cs.IT math.IT
null
Measuring network flow sizes is important for tasks like accounting/billing, network forensics and security. Per-flow accounting is considered hard because it requires that many counters be updated at a very high speed; however, the large fast memories needed for storing the counters are prohibitively expensive. Therefore, current approaches aim to obtain approximate flow counts; that is, to detect large elephant flows and then measure their sizes. Recently the authors and their collaborators have developed [1] a novel method for per-flow traffic measurement that is fast, highly memory efficient and accurate. At the core of this method is a novel counter architecture called "counter braids.'' In this paper, we analyze the performance of the counter braid architecture under a Maximum Likelihood (ML) flow size estimation algorithm and show that it is optimal; that is, the number of bits needed to store the size of a flow matches the entropy lower bound. While the ML algorithm is optimal, it is too complex to implement. In [1] we have developed an easy-to-implement and efficient message passing algorithm for estimating flow sizes.
[ { "version": "v1", "created": "Tue, 2 Oct 2007 22:03:28 GMT" }, { "version": "v2", "created": "Sun, 7 Oct 2007 05:42:39 GMT" } ]
2007-10-07T00:00:00
[ [ "Lu", "Yi", "" ], [ "Montanari", "Andrea", "" ], [ "Prabhakar", "Balaji", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.0672
Valmir Barbosa
Fabio R. J. Vieira, Valmir C. Barbosa
Optimization of supply diversity for the self-assembly of simple objects in two and three dimensions
Minor typos corrected
Natural Computing 10 (2011), 551-581
10.1007/s11047-010-9209-x
null
cs.NE
null
The field of algorithmic self-assembly is concerned with the design and analysis of self-assembly systems from a computational perspective, that is, from the perspective of mathematical problems whose study may give insight into the natural processes through which elementary objects self-assemble into more complex ones. One of the main problems of algorithmic self-assembly is the minimum tile set problem (MTSP), which asks for a collection of types of elementary objects (called tiles) to be found for the self-assembly of an object having a pre-established shape. Such a collection is to be as concise as possible, thus minimizing supply diversity, while satisfying a set of stringent constraints having to do with the termination and other properties of the self-assembly process from its tile types. We present a study of what we think is the first practical approach to MTSP. Our study starts with the introduction of an evolutionary heuristic to tackle MTSP and includes results from extensive experimentation with the heuristic on the self-assembly of simple objects in two and three dimensions. The heuristic we introduce combines classic elements from the field of evolutionary computation with a problem-specific variant of Pareto dominance into a multi-objective approach to MTSP.
[ { "version": "v1", "created": "Wed, 3 Oct 2007 18:29:12 GMT" }, { "version": "v2", "created": "Thu, 4 Oct 2007 13:21:09 GMT" } ]
2011-03-14T00:00:00
[ [ "Vieira", "Fabio R. J.", "" ], [ "Barbosa", "Valmir C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0710.0736
Alessandro Tomasi
David A Kay (Oxford University Computational Laboratory), Alessandro Tomasi (University of Sussex)
Colour image segmentation by the vector-valued Allen-Cahn phase-field model: a multigrid solution
17 pages, 9 figures
IEEE Trans. Im. Proc. 18.10 (2009)
10.1109/TIP.2009.2026678
null
cs.CV cs.NA
null
We propose a new method for the numerical solution of a PDE-driven model for colour image segmentation and give numerical examples of the results. The method combines the vector-valued Allen-Cahn phase field equation with initial data fitting terms. This method is known to be closely related to the Mumford-Shah problem and the level set segmentation by Chan and Vese. Our numerical solution is performed using a multigrid splitting of a finite element space, thereby producing an efficient and robust method for the segmentation of large images.
[ { "version": "v1", "created": "Wed, 3 Oct 2007 08:51:44 GMT" } ]
2018-06-08T00:00:00
[ [ "Kay", "David A", "", "Oxford University Computational Laboratory" ], [ "Tomasi", "Alessandro", "", "University of Sussex" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0710.0748
M Sabu THAMPI
Murali Krishna P, Sabu .M Thampi
A Fast Heuristic Algorithm Based on Verification and Elimination Methods for Maximum Clique Problem
06 pages,01 figures
null
null
null
cs.DM cs.CC
null
A clique in an undirected graph G= (V, E) is a subset V' V of vertices, each pair of which is connected by an edge in E. The clique problem is an optimization problem of finding a clique of maximum size in graph. The clique problem is NP-Complete. We have succeeded in developing a fast algorithm for maximum clique problem by employing the method of verification and elimination. For a graph of size N there are 2N sub graphs, which may be cliques and hence verifying all of them, will take a long time. Idea is to eliminate a major number of sub graphs, which cannot be cliques and verifying only the remaining sub graphs. This heuristic algorithm runs in polynomial time and executes successfully for several examples when applied to random graphs and DIMACS benchmark graphs.
[ { "version": "v1", "created": "Wed, 3 Oct 2007 09:33:20 GMT" } ]
2007-10-04T00:00:00
[ [ "P", "Murali Krishna", "" ], [ "Thampi", "Sabu . M", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0710.0789
Ying Jun Zhang Ph.D.
Ying Jun Zhang, Peng Xuan Zheng, Soung Chang Liew
Wireless Local Area Networks with Multiple-Packet Reception Capability
null
null
null
null
cs.PF cs.NI
null
Thanks to its simplicity and cost efficiency, wireless local area network (WLAN) enjoys unique advantages in providing high-speed and low-cost wireless services in hot spots and indoor environments. Traditional WLAN medium-access-control (MAC) protocols assume that only one station can transmit at a time: simultaneous transmissions of more than one station causes the destruction of all packets involved. By exploiting recent advances in PHY-layer multiuser detection (MUD) techniques, it is possible for a receiver to receive multiple packets simultaneously. This paper argues that such multipacket reception (MPR) capability can greatly enhance the capacity of future WLANs. In addition, it provides the MAC-layer and PHY-layer designs needed to achieve the improved capacity. First, to demonstrate MUD/MPR as a powerful capacity-enhancement technique, we prove a "super-linearity" result, which states that the system throughput per unit cost increases as the MPR capability increases. Second, we show that the commonly deployed binary exponential backoff (BEB) algorithm in today's WLAN MAC may not be optimal in an MPR system, and that the optimal backoff factor increases with the MPR capability: the number of packets that can be received simultaneously. Third, based on the above insights, we design a joint MAC-PHY layer protocol for an IEEE 802.11-like WLAN that incorporates advanced PHY-layer blind detection and MUD techniques to implement MPR
[ { "version": "v1", "created": "Wed, 3 Oct 2007 13:46:01 GMT" } ]
2007-10-04T00:00:00
[ [ "Zhang", "Ying Jun", "" ], [ "Zheng", "Peng Xuan", "" ], [ "Liew", "Soung Chang", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.0805
Elitza Maneva
Elitza Maneva and Alistair Sinclair
On the Satisfiability Threshold and Clustering of Solutions of Random 3-SAT Formulas
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the structure of satisfying assignments of a random 3-SAT formula. In particular, we show that a random formula of density 4.453 or higher almost surely has no non-trivial "core" assignments. Core assignments are certain partial assignments that can be extended to satisfying assignments, and have been studied recently in connection with the Survey Propagation heuristic for random SAT. Their existence implies the presence of clusters of solutions, and they have been shown to exist with high probability below the satisfiability threshold for k-SAT with k>8, by Achlioptas and Ricci-Tersenghi, STOC 2006. Our result implies that either this does not hold for 3-SAT or the threshold density for satisfiability in 3-SAT lies below 4.453. The main technical tool that we use is a novel simple application of the first moment method.
[ { "version": "v1", "created": "Wed, 3 Oct 2007 19:04:44 GMT" }, { "version": "v2", "created": "Mon, 30 Jun 2008 23:01:27 GMT" }, { "version": "v3", "created": "Sun, 31 Aug 2008 18:27:03 GMT" } ]
2008-09-01T00:00:00
[ [ "Maneva", "Elitza", "" ], [ "Sinclair", "Alistair", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0710.0811
Joseph O'Rourke
Joseph O'Rourke
Band Unfoldings and Prismatoids: A Counterexample
5 pages, 3 figures. v2 replaced Fig.1(b) and Fig.3 to illustrate the angles delta=(1/2)epsilon (rather than delta=epsilon)
null
null
Smith Computer Science 086
cs.CG
null
This note shows that the hope expressed in [ADL+07]--that the new algorithm for edge-unfolding any polyhedral band without overlap might lead to an algorithm for unfolding any prismatoid without overlap--cannot be realized. A prismatoid is constructed whose sides constitute a nested polyhedral band, with the property that every placement of the prismatoid top face overlaps with the band unfolding.
[ { "version": "v1", "created": "Wed, 3 Oct 2007 15:18:35 GMT" }, { "version": "v2", "created": "Thu, 4 Oct 2007 13:10:37 GMT" } ]
2007-10-04T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0710.0824
Norman Danner
Norman Danner and James S. Royer
Two algorithms in search of a type system
30 pages. Final version to appear in Theory of Computing Systems
null
null
null
cs.LO cs.PL
null
The authors' ATR programming formalism is a version of call-by-value PCF under a complexity-theoretically motivated type system. ATR programs run in type-2 polynomial-time and all standard type-2 basic feasible functionals are ATR-definable (ATR types are confined to levels 0, 1, and 2). A limitation of the original version of ATR is that the only directly expressible recursions are tail-recursions. Here we extend ATR so that a broad range of affine recursions are directly expressible. In particular, the revised ATR can fairly naturally express the classic insertion- and selection-sort algorithms, thus overcoming a sticking point of most prior implicit-complexity-based formalisms. The paper's main work is in refining the original time-complexity semantics for ATR to show that these new recursion schemes do not lead out of the realm of feasibility.
[ { "version": "v1", "created": "Wed, 3 Oct 2007 16:04:59 GMT" }, { "version": "v2", "created": "Fri, 18 Apr 2008 19:17:30 GMT" } ]
2008-04-18T00:00:00
[ [ "Danner", "Norman", "" ], [ "Royer", "James S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0710.0842
Alexis Clay
Alexis Clay (LIPSI)
Syst\`emes interactifs sensibles aux \'emotions : architecture logicielle
4 pages
null
null
null
cs.HC
null
We propose a software architecture for interactive systems which allows integrating the user's emotion. Emotion can be involved in interaction at several levels. In our application case - ballet dance - emotions is explicitely manipulated by the interactive system to produce emotion-wise output. Our architecture model to develop emotion-wise applications is based on the PAC-Amodeus model. We add a branch to this model, divided into three components: Data capture, analysis and cue extraction, and finally interpretation of those cues. We show the different data flows between this architecture's components depending on the entry point of the emotion branch within the system. We then illustrate our model by describing our application case: capturing a ballet dancer's movement to extract the emotions he expresses and use these emotions to generate graphical content that is displayed on stage.
[ { "version": "v1", "created": "Wed, 3 Oct 2007 17:23:59 GMT" } ]
2007-10-04T00:00:00
[ [ "Clay", "Alexis", "", "LIPSI" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0710.0847
Alexis Clay
Alexis Clay (LIPSI), Nadine Couture (LIPSI), Laurence Nigay (CLIPS - IMAG)
Emotion capture based on body postures and movements
22 pages
Proceedings of the International Conference on Computing and e-systems 2007 (TIGERA'07), Hammamet : Tunisie (2007)
null
null
cs.HC
null
In this paper we present a preliminary study for designing interactive systems that are sensible to human emotions based on the body movements. To do so, we first review the literature on the various approaches for defining and characterizing human emotions. After justifying the adopted characterization space for emotions, we then focus on the movement characteristics that must be captured by the system for being able to recognize the human emotions.
[ { "version": "v1", "created": "Wed, 3 Oct 2007 17:36:07 GMT" } ]
2007-10-04T00:00:00
[ [ "Clay", "Alexis", "", "LIPSI" ], [ "Couture", "Nadine", "", "LIPSI" ], [ "Nigay", "Laurence", "", "CLIPS -\n IMAG" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0710.0859
Publications Loria
Suzanne Kieffer (INRIA Rocquencourt / INRIA Lorraine - LORIA), No\"elle Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA)
Assistance orale \`a la recherche visuelle - \'etude exp\'erimentale de l'apport d'indications spatiales \`a la d\'etection de cibles
http://www.hcirn.com/res/period/rihm.php
Revue d'Interaction Homme-Machine 7, 1 (2006) 30 p
null
null
cs.HC
null
This paper describes an experimental study that aims at assessing the actual contribution of voice system messages to visual search efficiency and comfort. Messages which include spatial information on the target location are meant to support search for familiar targets in collections of photographs (30 per display). 24 participants carried out 240 visual search tasks in two conditions differing from each other in initial target presentation only. The isolated target was presented either simultaneously with an oral message (multimodal presentation, MP), or without any message (visual presentation, VP). Averaged target selection times were thrice longer and errors almost twice more frequent in the VP condition than in the MP condition. In addition, the contribution of spatial messages to visual search rapidity and accuracy was influenced by display layout and task difficulty. Most results are statistically significant. Besides, subjective judgments indicate that oral messages were well accepted.
[ { "version": "v1", "created": "Wed, 3 Oct 2007 18:30:07 GMT" } ]
2007-10-04T00:00:00
[ [ "Kieffer", "Suzanne", "", "INRIA Rocquencourt / INRIA Lorraine - LORIA" ], [ "Carbonell", "Noëlle", "", "INRIA Rocquencourt / INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0710.0865
Lifeng Lai
Lifeng Lai, Hesham El Gamal and H. Vincent Poor
Secrecy Capacity of the Wiretap Channel with Noisy Feedback
To appear in the Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, September 26 - 28, 2007
null
null
null
cs.IT cs.CR math.IT
null
In this work, the role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is investigated. A model is considered in which the feed-forward and feedback signals share the same noisy channel. More specifically, a discrete memoryless modulo-additive channel with a full-duplex destination node is considered first, and it is shown that a judicious use of feedback increases the perfect secrecy capacity to the capacity of the source-destination channel in the absence of the wiretapper. In the achievability scheme, the feedback signal corresponds to a private key, known only to the destination. Then a half-duplex system is considered, for which a novel feedback technique that always achieves a positive perfect secrecy rate (even when the source-wiretapper channel is less noisy than the source-destination channel) is proposed. These results hinge on the modulo-additive property of the channel, which is exploited by the destination to perform encryption over the channel without revealing its key to the source.
[ { "version": "v1", "created": "Wed, 3 Oct 2007 19:21:08 GMT" } ]
2007-10-04T00:00:00
[ [ "Lai", "Lifeng", "" ], [ "Gamal", "Hesham El", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.0871
Grenville Croll
Grenville J. Croll, Raymond J. Butler
Spreadsheets in Clinical Medicine
10 Pages including references
Proc. European Spreadsheet Risks Int. Grp. 2006 7-16
null
null
cs.CY
null
There is overwhelming evidence that the continued and widespread use of untested spreadsheets in business gives rise to regular, significant and unexpected financial losses. Whilst this is worrying, it is perhaps a relatively minor concern compared with the risks arising from the use of poorly constructed and/or untested spreadsheets in medicine, a practice that is already occurring. This article is intended as a warning that the use of poorly constructed and/or untested spreadsheets in clinical medicine cannot be tolerated. It supports this warning by reporting on potentially serious weaknesses found while testing a limited number of publicly available clinical spreadsheets.
[ { "version": "v1", "created": "Wed, 3 Oct 2007 19:23:55 GMT" } ]
2008-03-10T00:00:00
[ [ "Croll", "Grenville J.", "" ], [ "Butler", "Raymond J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0710.0900
Wei Kang
Wei Kang and Sennur Ulukus
A New Achievability Scheme for the Relay Channel
23 pages, 1 figure, submitted to IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
null
In this paper, we propose a new coding scheme for the general relay channel. This coding scheme is in the form of a block Markov code. The transmitter uses a superposition Markov code. The relay compresses the received signal and maps the compressed version of the received signal into a codeword conditioned on the codeword of the previous block. The receiver performs joint decoding after it has received all of the B blocks. We show that this coding scheme can be viewed as a generalization of the well-known Compress-And-Forward (CAF) scheme proposed by Cover and El Gamal. Our coding scheme provides options for preserving the correlation between the channel inputs of the transmitter and the relay, which is not possible in the CAF scheme. Thus, our proposed scheme may potentially yield a larger achievable rate than the CAF scheme.
[ { "version": "v1", "created": "Thu, 4 Oct 2007 19:44:49 GMT" } ]
2007-10-05T00:00:00
[ [ "Kang", "Wei", "" ], [ "Ulukus", "Sennur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.0903
L.T. Handoko
I. Firmansyah, B. Hermanto and L.T. Handoko
Control and Monitoring System for Modular Wireless Robot
4 pages, Proceeding of the Industrial Electronics Seminar 2007
null
null
null
cs.RO
null
We introduce our concept on the modular wireless robot consisting of three main modules : main unit, data acquisition and data processing modules. We have developed a generic prototype with an integrated control and monitoring system to enhance its flexibility, and to enable simple operation through a web-based interface accessible wirelessly. In present paper, we focus on the microcontroller based hardware to enable data acquisition and remote mechanical control.
[ { "version": "v1", "created": "Wed, 3 Oct 2007 23:05:29 GMT" } ]
2007-10-05T00:00:00
[ [ "Firmansyah", "I.", "" ], [ "Hermanto", "B.", "" ], [ "Handoko", "L. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0710.0925
Kimikazu Kato
Hidetoshi Muta and Kimikazu Kato
Degeneracy of Angular Voronoi Diagram
8 pages, 11 figures, 1 table, presented at 4th International Symposium on Voronoi Diagrams in Science and Engineering (ISVD07)
null
null
null
cs.CG
null
Angular Voronoi diagram was introduced by Asano et al. as fundamental research for a mesh generation. In an angular Voronoi diagram, the edges are curves of degree three. From view of computational robustness we need to treat the curves carefully, because they might have a singularity. We enumerate all the possible types of curves that appear as an edge of an angular Voronoi diagram, which tells us what kind of degeneracy is possible and tells us necessity of considering a singularity for computational robustness.
[ { "version": "v1", "created": "Thu, 4 Oct 2007 05:05:06 GMT" } ]
2007-10-05T00:00:00
[ [ "Muta", "Hidetoshi", "" ], [ "Kato", "Kimikazu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0710.0937
Lavrenov Alexandre
Alexandre Lavrenov
Multichannel algorithm based on generalized positional numeration system
7 pages, 7 tables, report at the conference "European Economy: Present And Future"
null
null
null
cs.IT math.IT
null
This report is devoted to introduction in multichannel algorithm based on generalized numeration notations (GPN). The internal, external and mixed account are entered. The concept of the GPN and its classification as decomposition of an integer on composed of integers is discussed. Realization of multichannel algorithm on the basis of GPN is introduced. In particular, some properties of Fibonacci multichannel algorithm are discussed.
[ { "version": "v1", "created": "Thu, 4 Oct 2007 07:44:24 GMT" } ]
2007-10-05T00:00:00
[ [ "Lavrenov", "Alexandre", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1001
Vitaliy Kurlin
V. Kurlin, L. Mihaylova
Connectivity of Random 1-Dimensional Networks
12 pages, 10 figures
null
null
null
cs.IT cs.DS math.IT stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important problem in wireless sensor networks is to find the minimal number of randomly deployed sensors making a network connected with a given probability. In practice sensors are often deployed one by one along a trajectory of a vehicle, so it is natural to assume that arbitrary probability density functions of distances between successive sensors in a segment are given. The paper computes the probability of connectivity and coverage of 1-dimensional networks and gives estimates for a minimal number of sensors for important distributions.
[ { "version": "v1", "created": "Thu, 4 Oct 2007 12:57:34 GMT" }, { "version": "v2", "created": "Fri, 9 Oct 2009 21:01:10 GMT" } ]
2009-10-10T00:00:00
[ [ "Kurlin", "V.", "" ], [ "Mihaylova", "L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0710.1007
Luisa Iturrioz
Luisa Iturrioz
Two representation theorems of three-valued structures by means of binary relations
11 pages, accepted to ISMVL'2001
null
null
null
cs.DM
null
The results here presented are a continuation of the algebraic research line which attempts to find properties of multiple-valued systems based on a poset of two agents. The aim of this paper is to exhibit two relationships between some three-valued structures and binary relations. The established connections are so narrow that two representation theorems are obtained.
[ { "version": "v1", "created": "Thu, 4 Oct 2007 13:30:48 GMT" } ]
2007-10-05T00:00:00
[ [ "Iturrioz", "Luisa", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0710.1149
Joaquim Borges
J. Borges, C. Fernandez, J. Pujol, J. Rifa, M. Villanueva
Z2Z4-linear codes: generator matrices and duality
This paper will be submitted to IEEE Trans. on Inform. Theory
null
null
null
cs.IT cs.DM math.CO math.IT
null
A code ${\cal C}$ is $\Z_2\Z_4$-additive if the set of coordinates can be partitioned into two subsets $X$ and $Y$ such that the punctured code of ${\cal C}$ by deleting the coordinates outside $X$ (respectively, $Y$) is a binary linear code (respectively, a quaternary linear code). In this paper $\Z_2\Z_4$-additive codes are studied. Their corresponding binary images, via the Gray map, are $\Z_2\Z_4$-linear codes, which seem to be a very distinguished class of binary group codes. As for binary and quaternary linear codes, for these codes the fundamental parameters are found and standard forms for generator and parity check matrices are given. For this, the appropriate inner product is deduced and the concept of duality for $\Z_2\Z_4$-additive codes is defined. Moreover, the parameters of the dual codes are computed. Finally, some conditions for self-duality of $\Z_2\Z_4$-additive codes are given.
[ { "version": "v1", "created": "Fri, 5 Oct 2007 08:53:01 GMT" } ]
2007-10-08T00:00:00
[ [ "Borges", "J.", "" ], [ "Fernandez", "C.", "" ], [ "Pujol", "J.", "" ], [ "Rifa", "J.", "" ], [ "Villanueva", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1153
Patrick Baillot
Vincent Atassi, Patrick Baillot, Kazushige Terui
Verification of Ptime Reducibility for system F Terms: Type Inference in<br> Dual Light Affine Logic
32 pages, 8 figures
Logical Methods in Computer Science, Volume 3, Issue 4 (November 15, 2007) lmcs:1234
10.2168/LMCS-3(4:10)2007
null
cs.LO cs.CC
null
In a previous work Baillot and Terui introduced Dual light affine logic (DLAL) as a variant of Light linear logic suitable for guaranteeing complexity properties on lambda calculus terms: all typable terms can be evaluated in polynomial time by beta reduction and all Ptime functions can be represented. In the present work we address the problem of typing lambda-terms in second-order DLAL. For that we give a procedure which, starting with a term typed in system F, determines whether it is typable in DLAL and outputs a concrete typing if there exists any. We show that our procedure can be run in time polynomial in the size of the original Church typed system F term.
[ { "version": "v1", "created": "Fri, 5 Oct 2007 09:24:31 GMT" }, { "version": "v2", "created": "Thu, 15 Nov 2007 11:02:50 GMT" } ]
2015-07-01T00:00:00
[ [ "Atassi", "Vincent", "" ], [ "Baillot", "Patrick", "" ], [ "Terui", "Kazushige", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0710.1182
Albert Guill\'en i F\`abregas
Joseph J. Boutros, Albert Guillen i Fabregas, Ezio Biglieri and Gilles Zemor
Low-Density Parity-Check Codes for Nonergodic Block-Fading Channels
Submitted to the IEEE Transactions on Information Theory
null
10.1109/TIT.2010.2053890
null
cs.IT math.IT
null
We solve the problem of designing powerful low-density parity-check (LDPC) codes with iterative decoding for the block-fading channel. We first study the case of maximum-likelihood decoding, and show that the design criterion is rather straightforward. Unfortunately, optimal constructions for maximum-likelihood decoding do not perform well under iterative decoding. To overcome this limitation, we then introduce a new family of full-diversity LDPC codes that exhibit near-outage-limit performance under iterative decoding for all block-lengths. This family competes with multiplexed parallel turbo codes suitable for nonergodic channels and recently reported in the literature.
[ { "version": "v1", "created": "Fri, 5 Oct 2007 10:47:52 GMT" } ]
2016-11-18T00:00:00
[ [ "Boutros", "Joseph J.", "" ], [ "Fabregas", "Albert Guillen i", "" ], [ "Biglieri", "Ezio", "" ], [ "Zemor", "Gilles", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1190
Nitin Salodkar
Nitin Salodkar, Abhay Karandikar and Vivek S. Borkar
Power Efficient Scheduling under Delay Constraints over Multi-user Wireless Channels
14 pages, 14 figures
null
null
null
cs.NI cs.MA
null
In this paper, we consider the problem of power efficient uplink scheduling in a Time Division Multiple Access (TDMA) system over a fading wireless channel. The objective is to minimize the power expenditure of each user subject to satisfying individual user delay. We make the practical assumption that the system statistics are unknown, i.e., the probability distributions of the user arrivals and channel states are unknown. The problem has the structure of a Constrained Markov Decision Problem (CMDP). Determining an optimal policy under for the CMDP faces the problems of state space explosion and unknown system statistics. To tackle the problem of state space explosion, we suggest determining the transmission rate of a particular user in each slot based on its channel condition and buffer occupancy only. The rate allocation algorithm for a particular user is a learning algorithm that learns about the buffer occupancy and channel states of that user during system execution and thus addresses the issue of unknown system statistics. Once the rate of each user is determined, the proposed algorithm schedules the user with the best rate. Our simulations within an IEEE 802.16 system demonstrate that the algorithm is indeed able to satisfy the user specified delay constraints. We compare the performance of our algorithm with the well known M-LWDF algorithm. Moreover, we demonstrate that the power expended by the users under our algorithm is quite low.
[ { "version": "v1", "created": "Fri, 5 Oct 2007 12:51:46 GMT" } ]
2007-10-08T00:00:00
[ [ "Salodkar", "Nitin", "" ], [ "Karandikar", "Abhay", "" ], [ "Borkar", "Vivek S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0710.1203
Dimitri Petritis
Thomas Sierocinski (IRMAR), Anthony Le B\'echec, Nathalie Th\'eret, Dimitri Petritis (IRMAR)
Semantic distillation: a method for clustering objects by their contextual specificity
Accepted for publication in Studies in Computational Intelligence, Springer-Verlag
null
null
2007-58
math.PR cs.DB math.ST q-bio.QM stat.ML stat.TH
null
Techniques for data-mining, latent semantic analysis, contextual search of databases, etc. have long ago been developed by computer scientists working on information retrieval (IR). Experimental scientists, from all disciplines, having to analyse large collections of raw experimental data (astronomical, physical, biological, etc.) have developed powerful methods for their statistical analysis and for clustering, categorising, and classifying objects. Finally, physicists have developed a theory of quantum measurement, unifying the logical, algebraic, and probabilistic aspects of queries into a single formalism. The purpose of this paper is twofold: first to show that when formulated at an abstract level, problems from IR, from statistical data analysis, and from physical measurement theories are very similar and hence can profitably be cross-fertilised, and, secondly, to propose a novel method of fuzzy hierarchical clustering, termed \textit{semantic distillation} -- strongly inspired from the theory of quantum measurement --, we developed to analyse raw data coming from various types of experiments on DNA arrays. We illustrate the method by analysing DNA arrays experiments and clustering the genes of the array according to their specificity.
[ { "version": "v1", "created": "Fri, 5 Oct 2007 12:30:43 GMT" }, { "version": "v2", "created": "Sat, 6 Oct 2007 09:57:46 GMT" } ]
2007-10-09T00:00:00
[ [ "Sierocinski", "Thomas", "", "IRMAR" ], [ "Béchec", "Anthony Le", "", "IRMAR" ], [ "Théret", "Nathalie", "", "IRMAR" ], [ "Petritis", "Dimitri", "", "IRMAR" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0710.1208
Dominique Duval
Dominique Duval (LJK)
Diagrammatic Inference
16 pages
null
null
null
cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Diagrammatic logics were introduced in 2002, with emphasis on the notions of specifications and models. In this paper we improve the description of the inference process, which is seen as a Yoneda functor on a bicategory of fractions. A diagrammatic logic is defined from a morphism of limit sketches (called a propagator) which gives rise to an adjunction, which in turn determines a bicategory of fractions. The propagator, the adjunction and the bicategory provide respectively the syntax, the models and the inference process for the logic. Then diagrammatic logics and their morphisms are applied to the semantics of side effects in computer languages.
[ { "version": "v1", "created": "Fri, 5 Oct 2007 12:36:02 GMT" }, { "version": "v2", "created": "Fri, 20 Nov 2009 13:11:34 GMT" } ]
2009-11-20T00:00:00
[ [ "Duval", "Dominique", "", "LJK" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
0710.1254
Hua Li
Hua Li and Edwin K.P. Chong
A Group Theoretic Model for Information
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
In this paper we formalize the notions of information elements and information lattices, first proposed by Shannon. Exploiting this formalization, we identify a comprehensive parallelism between information lattices and subgroup lattices. Qualitatively, we demonstrate isomorphisms between information lattices and subgroup lattices. Quantitatively, we establish a decisive approximation relation between the entropy structures of information lattices and the log-index structures of the corresponding subgroup lattices. This approximation extends the approximation for joint entropies carried out previously by Chan and Yeung. As a consequence of our approximation result, we show that any continuous law holds in general for the entropies of information elements if and only if the same law holds in general for the log-indices of subgroups. As an application, by constructing subgroup counterexamples we find surprisingly that common information, unlike joint information, obeys neither the submodularity nor the supermodularity law. We emphasize that the notion of information elements is conceptually significant--formalizing it helps to reveal the deep connection between information theory and group theory. The parallelism established in this paper admits an appealing group-action explanation and provides useful insights into the intrinsic structure among information elements from a group-theoretic perspective.
[ { "version": "v1", "created": "Fri, 5 Oct 2007 18:37:21 GMT" } ]
2007-10-08T00:00:00
[ [ "Li", "Hua", "" ], [ "Chong", "Edwin K. P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1275
Patricio Parada
Francisco J. Piera, Patricio Parada
On Convergence Properties of Shannon Entropy
Submitted to IEEE Transactions on Information Theory
null
10.1134/S003294600902001X
null
cs.IT math.IT
null
Convergence properties of Shannon Entropy are studied. In the differential setting, it is shown that weak convergence of probability measures, or convergence in distribution, is not enough for convergence of the associated differential entropies. A general result for the desired differential entropy convergence is provided, taking into account both compactly and uncompactly supported densities. Convergence of differential entropy is also characterized in terms of the Kullback-Liebler discriminant for densities with fairly general supports, and it is shown that convergence in variation of probability measures guarantees such convergence under an appropriate boundedness condition on the densities involved. Results for the discrete setting are also provided, allowing for infinitely supported probability measures, by taking advantage of the equivalence between weak convergence and convergence in variation in this setting.
[ { "version": "v1", "created": "Fri, 5 Oct 2007 17:26:41 GMT" } ]
2016-11-18T00:00:00
[ [ "Piera", "Francisco J.", "" ], [ "Parada", "Patricio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1280
Patricio Parada
Francisco J. Piera, Patricio Parada
On the Relationship between Mutual Information and Minimum Mean-Square Errors in Stochastic Dynamical Systems
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
We consider a general stochastic input-output dynamical system with output evolving in time as the solution to a functional coefficients, It\^{o}'s stochastic differential equation, excited by an input process. This general class of stochastic systems encompasses not only the classical communication channel models, but also a wide variety of engineering systems appearing through a whole range of applications. For this general setting we find analogous of known relationships linking input-output mutual information and minimum mean causal and non-causal square errors, previously established in the context of additive Gaussian noise communication channels. Relationships are not only established in terms of time-averaged quantities, but also their time-instantaneous, dynamical counterparts are presented. The problem of appropriately introducing in this general framework a signal-to-noise ratio notion expressed through a signal-to-noise ratio parameter is also taken into account, identifying conditions for a proper and meaningful interpretation.
[ { "version": "v1", "created": "Fri, 5 Oct 2007 17:43:51 GMT" } ]
2007-10-08T00:00:00
[ [ "Piera", "Francisco J.", "" ], [ "Parada", "Patricio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1325
Ashish Khisti
Ashish Khisti and Gregory Wornell
The MIMOME Channel
In Proceedings of the 45th Annual Allerton Conference on Communication, Control, and Computing, October 2007, 8 pages
null
null
null
cs.IT math.IT
null
The MIMOME channel is a Gaussian wiretap channel in which the sender, receiver, and eavesdropper all have multiple antennas. We characterize the secrecy capacity as the saddle-value of a minimax problem. Among other implications, our result establishes that a Gaussian distribution maximizes the secrecy capacity characterization of Csisz{\'a}r and K{\"o}rner when applied to the MIMOME channel. We also determine a necessary and sufficient condition for the secrecy capacity to be zero. Large antenna array analysis of this condition reveals several useful insights into the conditions under which secure communication is possible.
[ { "version": "v1", "created": "Fri, 5 Oct 2007 22:25:19 GMT" } ]
2007-10-09T00:00:00
[ [ "Khisti", "Ashish", "" ], [ "Wornell", "Gregory", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1336
Niranjay Ravindran
Niranjay Ravindran, Nihar Jindal
Multi-User Diversity vs. Accurate Channel Feedback for MIMO Broadcast Channels
6 pages, 7 figures, submitted to ICC 2008
null
null
null
cs.IT math.IT
null
A multiple transmit antenna, single receive antenna (per receiver) downlink channel with limited channel feedback is considered. Given a constraint on the total system-wide channel feedback, the following question is considered: is it preferable to get low-rate feedback from a large number of receivers or to receive high-rate/high-quality feedback from a smaller number of (randomly selected) receivers? Acquiring feedback from many users allows multi-user diversity to be exploited, while high-rate feedback allows for very precise selection of beamforming directions. It is shown that systems in which a limited number of users feedback high-rate channel information significantly outperform low-rate/many user systems. While capacity increases only double logarithmically with the number of users, the marginal benefit of channel feedback is very significant up to the point where the CSI is essentially perfect.
[ { "version": "v1", "created": "Sat, 6 Oct 2007 01:21:55 GMT" } ]
2007-10-09T00:00:00
[ [ "Ravindran", "Niranjay", "" ], [ "Jindal", "Nihar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1383
Dmitry Panchenko
Andrea Conti, Dmitry Panchenko, Sergiy Sidenko, Velio Tralli
Log-concavity property of the error probability with application to local bounds for wireless communications
null
IEEE Trans. Inform. Theory, 2009, vol. 55, no. 6, 2766-2775.
10.1109/TIT.2009.2018273
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A clear understanding the behavior of the error probability (EP) as a function of signal-to-noise ratio (SNR) and other system parameters is fundamental for assessing the design of digital wireless communication systems.We propose an analytical framework based on the log-concavity property of the EP which we prove for a wide family of multidimensional modulation formats in the presence of Gaussian disturbances and fading. Based on this property, we construct a class of local bounds for the EP that improve known generic bounds in a given region of the SNR and are invertible, as well as easily tractable for further analysis. This concept is motivated by the fact that communication systems often operate with performance in a certain region of interest (ROI) and, thus, it may be advantageous to have tighter bounds within this region instead of generic bounds valid for all SNRs. We present a possible application of these local bounds, but their relevance is beyond the example made in this paper.
[ { "version": "v1", "created": "Sat, 6 Oct 2007 17:59:32 GMT" }, { "version": "v2", "created": "Fri, 20 Feb 2009 17:09:15 GMT" } ]
2016-11-15T00:00:00
[ [ "Conti", "Andrea", "" ], [ "Panchenko", "Dmitry", "" ], [ "Sidenko", "Sergiy", "" ], [ "Tralli", "Velio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1385
Lifeng Lai
Lifeng Lai, Hesham El Gamal, Hai Jiang and H. Vincent Poor
Cognitive Medium Access: Exploration, Exploitation and Competition
Submitted to IEEE/ACM Trans. on Networking, 14 pages, 2 figures
null
null
null
cs.IT cs.NI math.IT
null
This paper establishes the equivalence between cognitive medium access and the competitive multi-armed bandit problem. First, the scenario in which a single cognitive user wishes to opportunistically exploit the availability of empty frequency bands in the spectrum with multiple bands is considered. In this scenario, the availability probability of each channel is unknown to the cognitive user a priori. Hence efficient medium access strategies must strike a balance between exploring the availability of other free channels and exploiting the opportunities identified thus far. By adopting a Bayesian approach for this classical bandit problem, the optimal medium access strategy is derived and its underlying recursive structure is illustrated via examples. To avoid the prohibitive computational complexity of the optimal strategy, a low complexity asymptotically optimal strategy is developed. The proposed strategy does not require any prior statistical knowledge about the traffic pattern on the different channels. Next, the multi-cognitive user scenario is considered and low complexity medium access protocols, which strike the optimal balance between exploration and exploitation in such competitive environments, are developed. Finally, this formalism is extended to the case in which each cognitive user is capable of sensing and using multiple channels simultaneously.
[ { "version": "v1", "created": "Sat, 6 Oct 2007 18:24:33 GMT" } ]
2007-10-09T00:00:00
[ [ "Lai", "Lifeng", "" ], [ "Gamal", "Hesham El", "" ], [ "Jiang", "Hai", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1404
M Sabu THAMPI
Sabu M. Thampi, Ashwin a K
Performance Comparison of Persistence Frameworks
null
null
null
null
cs.DB cs.IR
null
One of the essential and most complex components in the software development process is the database. The complexity increases when the "orientation" of the interacting components differs. A persistence framework moves the program data in its most natural form to and from a permanent data store, the database. Thus a persistence framework manages the database and the mapping between the database and the objects. This paper compares the performance of two persistence frameworks ? Hibernate and iBatis?s SQLMaps using a banking database. The performance of both of these tools in single and multi-user environments are evaluated.
[ { "version": "v1", "created": "Sun, 7 Oct 2007 08:22:53 GMT" } ]
2007-10-09T00:00:00
[ [ "Thampi", "Sabu M.", "" ], [ "K", "Ashwin a", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0710.1418
Vladimir Anashin
Vladimir Anashin
Non-Archimedean Ergodic Theory and Pseudorandom Generators
Submitted to The Computer Journal
The Computer Journal, 53(4):370--392, 2010
10.1093/comjnl/bxm101
null
math.DS cs.IT math.IT
null
The paper develops techniques in order to construct computer programs, pseudorandom number generators (PRNG), that produce uniformly distributed sequences. The paper exploits an approach that treats standard processor instructions (arithmetic and bitwise logical ones) as continuous functions on the space of 2-adic integers. Within this approach, a PRNG is considered as a dynamical system and is studied by means of the non-Archimedean ergodic theory.
[ { "version": "v1", "created": "Sun, 7 Oct 2007 13:20:51 GMT" } ]
2011-11-15T00:00:00
[ [ "Anashin", "Vladimir", "" ] ]
[ { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1435
Michael Mahoney
Petros Drineas, Michael W. Mahoney, S. Muthukrishnan, and Tamas Sarlos
Faster Least Squares Approximation
25 pages; minor changes from previous version; this version will appear in Numerische Mathematik
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Least squares approximation is a technique to find an approximate solution to a system of linear equations that has no exact solution. In a typical setting, one lets $n$ be the number of constraints and $d$ be the number of variables, with $n \gg d$. Then, existing exact methods find a solution vector in $O(nd^2)$ time. We present two randomized algorithms that provide very accurate relative-error approximations to the optimal value and the solution vector of a least squares approximation problem more rapidly than existing exact algorithms. Both of our algorithms preprocess the data with the Randomized Hadamard Transform. One then uniformly randomly samples constraints and solves the smaller problem on those constraints, and the other performs a sparse random projection and solves the smaller problem on those projected coordinates. In both cases, solving the smaller problem provides relative-error approximations, and, if $n$ is sufficiently larger than $d$, the approximate solution can be computed in $O(nd \log d)$ time.
[ { "version": "v1", "created": "Sun, 7 Oct 2007 17:37:37 GMT" }, { "version": "v2", "created": "Mon, 25 May 2009 23:01:43 GMT" }, { "version": "v3", "created": "Mon, 3 May 2010 06:55:54 GMT" }, { "version": "v4", "created": "Sun, 26 Sep 2010 18:36:00 GMT" } ]
2010-09-28T00:00:00
[ [ "Drineas", "Petros", "" ], [ "Mahoney", "Michael W.", "" ], [ "Muthukrishnan", "S.", "" ], [ "Sarlos", "Tamas", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0710.1436
Wojciech Wislicki
Ryszard Gokieli, Krzysztof Nawrocki, Adam Padee, Dorota Stojda, Karol Wawrzyniak, Wojciech Wislicki
Polish grid infrastructure for science and research
Proceeedings of IEEE Eurocon 2007, Warsaw, Poland, 9-12 Sep. 2007, p.446
2007, ISBN 1-4244-0813-X
10.1109/EURCON.2007.4400477
null
cs.DC hep-ex
null
Structure, functionality, parameters and organization of the computing Grid in Poland is described, mainly from the perspective of high-energy particle physics community, currently its largest consumer and developer. It represents distributed Tier-2 in the worldwide Grid infrastructure. It also provides services and resources for data-intensive applications in other sciences.
[ { "version": "v1", "created": "Sun, 7 Oct 2007 17:45:59 GMT" } ]
2016-11-17T00:00:00
[ [ "Gokieli", "Ryszard", "" ], [ "Nawrocki", "Krzysztof", "" ], [ "Padee", "Adam", "" ], [ "Stojda", "Dorota", "" ], [ "Wawrzyniak", "Karol", "" ], [ "Wislicki", "Wojciech", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Physics", "code": "hep-ex", "description": "Description coming soon", "span": "(High Energy Physics - Experiment)" } ]
0710.1455
Mark Burgin
Mark Burgin
Superrecursive Features of Interactive Computation
null
null
null
null
cs.DC cs.PF
null
Functioning and interaction of distributed devices and concurrent algorithms are analyzed in the context of the theory of algorithms. Our main concern here is how and under what conditions algorithmic interactive devices can be more powerful than the recursive models of computation, such as Turing machines. Realization of such a higher computing power makes these systems superrecursive. We find here five sources for superrecursiveness in interaction. In addition, we prove that when all of these sources are excluded, the algorithmic interactive system in question is able to perform only recursive computations. These results provide computer scientists with necessary and sufficient conditions for achieving superrecursiveness by algorithmic interactive devices.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 01:56:20 GMT" } ]
2007-10-09T00:00:00
[ [ "Burgin", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0710.1462
Christian Leonard
Christian L\'eonard (MODAL'x, Cmap)
Minimization of entropy functionals
null
null
10.1016/j.jmaa.2008.04.048
null
math.OC cs.IT math.IT math.PR
null
Entropy functionals (i.e. convex integral functionals) and extensions of these functionals are minimized on convex sets. This paper is aimed at reducing as much as possible the assumptions on the constraint set. Dual equalities and characterizations of the minimizers are obtained with weak constraint qualifications.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 05:01:20 GMT" } ]
2015-05-13T00:00:00
[ [ "Léonard", "Christian", "", "MODAL'x, Cmap" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0710.1467
Dae San Kim
Dae San Kim
Weight Distributions of Hamming Codes
null
null
null
null
cs.IT math.IT math.NT
null
We derive a recursive formula determing the weight distribution of the [n=(q^m-1)/(q-1), n-m, 3] Hamming code H(m,q), when (m, q-1)=1. Here q is a prime power. The proof is based on Moisio's idea of using Pless power moment identity together with exponential sum techniques.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 05:50:05 GMT" } ]
2007-10-09T00:00:00
[ [ "Kim", "Dae San", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0710.1469
Dae San Kim
Dae San Kim
Weight Distributions of Hamming Codes (II)
null
null
null
null
cs.IT math.IT math.NT
null
In a previous paper, we derived a recursive formula determining the weight distributions of the [n=(q^m-1)/(q-1)] Hamming code H(m,q), when (m,q-1)=1. Here q is a prime power. We note here that the formula actually holds for any positive integer m and any prime power q, without the restriction (m, q-1)=1.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 06:07:19 GMT" } ]
2007-10-09T00:00:00
[ [ "Kim", "Dae San", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0710.1481
Stasinos Konstantopoulos
Stasinos Konstantopoulos
What's in a Name?
Presented at the Computational Phonology Workshop, 6th Intl. Conf. Recent Advances in NLP, Borovets, Bulgaria, September 2007
null
null
null
cs.CL cs.AI
null
This paper describes experiments on identifying the language of a single name in isolation or in a document written in a different language. A new corpus has been compiled and made available, matching names against languages. This corpus is used in a series of experiments measuring the performance of general language models and names-only language models on the language identification task. Conclusions are drawn from the comparison between using general language models and names-only language models and between identifying the language of isolated names and the language of very short document fragments. Future research directions are outlined.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 08:36:32 GMT" } ]
2007-10-09T00:00:00
[ [ "Konstantopoulos", "Stasinos", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0710.1482
Amey Karkare
Amey Karkare, Amitabha Sanyal, Uday Khedker
Heap Reference Analysis for Functional Programs
null
null
null
null
cs.PL cs.SE
null
Current garbage collectors leave a lot of garbage uncollected because they conservatively approximate liveness by reachability from program variables. In this paper, we describe a sequence of static analyses that takes as input a program written in a first-order, eager functional programming language, and finds at each program point the references to objects that are guaranteed not to be used in the future. Such references are made null by a transformation pass. If this makes the object unreachable, it can be collected by the garbage collector. This causes more garbage to be collected, resulting in fewer collections. Additionally, for those garbage collectors which scavenge live objects, it makes each collection faster. The interesting aspects of our method are both in the identification of the analyses required to solve the problem and the way they are carried out. We identify three different analyses -- liveness, sharing and accessibility. In liveness and sharing analyses, the function definitions are analyzed independently of the calling context. This is achieved by using a variable to represent the unknown context of the function being analyzed and setting up constraints expressing the effect of the function with respect to the variable. The solution of the constraints is a summary of the function that is parameterized with respect to a calling context and is used to analyze function calls. As a result we achieve context sensitivity at call sites without analyzing the function multiple number of times.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 08:43:58 GMT" } ]
2007-10-09T00:00:00
[ [ "Karkare", "Amey", "" ], [ "Sanyal", "Amitabha", "" ], [ "Khedker", "Uday", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0710.1484
Denis Kutuzov V
Denis Kutuzov
The structure and modeling results of the parallel spatial switching system
3 pages, 2 figure
IEEE International Siberian Conference on Control and Communications (SIBCON-2007). Proceedings. Tomsk, April 20-21, 2007. (pp. 86-88). IEEE Catalog Number: 07EX1367
10.1109/SIBCON.2007.371303
null
cs.NI cs.DC
null
Problems of the switching parallel system designing provided spatial switching of packets from random time are discussed. Results of modeling of switching system as systems of mass service are resulted.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 08:39:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Kutuzov", "Denis", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0710.1499
Jukka Suomela
Patrik Flor\'een, Petteri Kaski, Topi Musto, Jukka Suomela
Approximating max-min linear programs with local algorithms
16 pages, 2 figures
null
10.1109/IPDPS.2008.4536235
null
cs.DC
null
A local algorithm is a distributed algorithm where each node must operate solely based on the information that was available at system startup within a constant-size neighbourhood of the node. We study the applicability of local algorithms to max-min LPs where the objective is to maximise $\min_k \sum_v c_{kv} x_v$ subject to $\sum_v a_{iv} x_v \le 1$ for each $i$ and $x_v \ge 0$ for each $v$. Here $c_{kv} \ge 0$, $a_{iv} \ge 0$, and the support sets $V_i = \{v : a_{iv} > 0 \}$, $V_k = \{v : c_{kv}>0 \}$, $I_v = \{i : a_{iv} > 0 \}$ and $K_v = \{k : c_{kv} > 0 \}$ have bounded size. In the distributed setting, each agent $v$ is responsible for choosing the value of $x_v$, and the communication network is a hypergraph $\mathcal{H}$ where the sets $V_k$ and $V_i$ constitute the hyperedges. We present inapproximability results for a wide range of structural assumptions; for example, even if $|V_i|$ and $|V_k|$ are bounded by some constants larger than 2, there is no local approximation scheme. To contrast the negative results, we present a local approximation algorithm which achieves good approximation ratios if we can bound the relative growth of the vertex neighbourhoods in $\mathcal{H}$.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 09:46:47 GMT" } ]
2008-09-09T00:00:00
[ [ "Floréen", "Patrik", "" ], [ "Kaski", "Petteri", "" ], [ "Musto", "Topi", "" ], [ "Suomela", "Jukka", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0710.1511
Damian H. Zanette
Damian H. Zanette
Demographic growth and the distribution of language sizes
To appear in Int. J. Mod. Phys. C (2008)
null
10.1142/S0129183108012042
null
physics.data-an cs.CL physics.soc-ph
null
It is argued that the present log-normal distribution of language sizes is, to a large extent, a consequence of demographic dynamics within the population of speakers of each language. A two-parameter stochastic multiplicative process is proposed as a model for the population dynamics of individual languages, and applied over a period spanning the last ten centuries. The model disregards language birth and death. A straightforward fitting of the two parameters, which statistically characterize the population growth rate, predicts a distribution of language sizes in excellent agreement with empirical data. Numerical simulations, and the study of the size distribution within language families, validate the assumptions at the basis of the model.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 11:16:51 GMT" } ]
2009-11-13T00:00:00
[ [ "Zanette", "Damian H.", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0710.1522
Jatin Thukral
J. Thukral and H. B\"olcskei
Distributed spatial multiplexing with 1-bit feedback
8 pages, 4 figures, presented at Forty-Fifth Annual Allerton Conference on Communication, Control and Computing, September 2007
null
null
null
cs.IT math.IT
null
We analyze a slow-fading interference network with MN non-cooperating single-antenna sources and M non-cooperating single-antenna destinations. In particular, we assume that the sources are divided into M mutually exclusive groups of N sources each, every group is dedicated to transmit a common message to a unique destination, all transmissions occur concurrently and in the same frequency band and a dedicated 1-bit broadcast feedback channel from each destination to its corresponding group of sources exists. We provide a feedback-based iterative distributed (multi-user) beamforming algorithm, which "learns" the channels between each group of sources and its assigned destination. This algorithm is a straightforward generalization, to the multi-user case, of the feedback-based iterative distributed beamforming algorithm proposed recently by Mudumbai et al., in IEEE Trans. Inf. Th. (submitted) for networks with a single group of sources and a single destination. Putting the algorithm into a Markov chain context, we provide a simple convergence proof. We then show that, for M finite and N approaching infinity, spatial multiplexing based on the beamforming weights produced by the algorithm achieves full spatial multiplexing gain of M and full per-stream array gain of N, provided the time spent "learning'' the channels scales linearly in N. The network is furthermore shown to "crystallize''. Finally, we characterize the corresponding crystallization rate.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 11:56:28 GMT" } ]
2007-10-09T00:00:00
[ [ "Thukral", "J.", "" ], [ "Bölcskei", "H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1525
Sebastiano Vigna
Sebastiano Vigna, Paolo Boldi
Efficient Optimally Lazy Algorithms for Minimal-Interval Semantics
24 pages, 4 figures. A preliminary (now outdated) version was presented at SPIRE 2006
null
null
null
cs.DS cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Minimal-interval semantics associates with each query over a document a set of intervals, called witnesses, that are incomparable with respect to inclusion (i.e., they form an antichain): witnesses define the minimal regions of the document satisfying the query. Minimal-interval semantics makes it easy to define and compute several sophisticated proximity operators, provides snippets for user presentation, and can be used to rank documents. In this paper we provide algorithms for computing conjunction and disjunction that are linear in the number of intervals and logarithmic in the number of operands; for additional operators, such as ordered conjunction and Brouwerian difference, we provide linear algorithms. In all cases, space is linear in the number of operands. More importantly, we define a formal notion of optimal laziness, and either prove it, or prove its impossibility, for each algorithm. We cast our results in a general framework of antichains of intervals on total orders, making our algorithms directly applicable to other domains.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 12:15:48 GMT" }, { "version": "v2", "created": "Thu, 11 Aug 2016 08:57:30 GMT" } ]
2016-08-12T00:00:00
[ [ "Vigna", "Sebastiano", "" ], [ "Boldi", "Paolo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0710.1589
Guangwen Li
Guangwen Li, Guangzeng Feng
Fast Reliability-based Algorithm of Finding Minimum-weight Codewords for LDPC Codes
8 pages, 1 table
null
null
null
cs.IT math.IT
null
Despite the NP hardness of acquiring minimum distance $d_m$ for linear codes theoretically, in this paper we propose one experimental method of finding minimum-weight codewords, the weight of which is equal to $d_m$ for LDPC codes. One existing syndrome decoding method, called serial belief propagation (BP) with ordered statistic decoding (OSD), is adapted to serve our purpose. We hold the conjecture that among many candidate error patterns in OSD reprocessing, modulo 2 addition of the lightest error pattern with one of the left error patterns may generate a light codeword. When the decoding syndrome changes to all-zero state, the lightest error pattern reduces to all-zero, the lightest non-zero error pattern is a valid codeword to update lightest codeword list. Given sufficient codewords sending, the survived lightest codewords are likely to be the target. Compared with existing techniques, our method demonstrates its efficiency in the simulation of several interested LDPC codes.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 16:59:11 GMT" } ]
2007-10-09T00:00:00
[ [ "Li", "Guangwen", "" ], [ "Feng", "Guangzeng", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1595
Peng Wu
Peng Wu and Nihar Jindal
Analysis of Fixed Outage Transmission Schemes: A Finer Look at the Full Multiplexing Point
5 pages,5 figures, conference
null
null
null
cs.IT math.IT
null
This paper studies the performance of transmission schemes that have rate that increases with average SNR while maintaining a fixed outage probability. This is in contrast to the classical Zheng-Tse diversity-multiplexing tradeoff (DMT) that focuses on increasing rate and decreasing outage probability. Three different systems are explored: antenna diversity systems, time/frequency diversity systems, and automatic repeat request (ARQ) systems. In order to accurately study performance in the fixed outage setting, it is necesary to go beyond the coarse, asymptotic multiplexing gain metric. In the case of antenna diversity and time/frequency diversity, an affine approximation to high SNR outage capacity (i.e., multiplexing gain plus a power/rate offset) accurately describes performance and shows the very significant benefits of diversity. ARQ is also seen to provide a significant performance advantage, but even an affine approximation to outage capacity is unable to capture this advantage and outage capacity must be directly studied in the non-asymptotic regime.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 17:04:46 GMT" } ]
2007-10-09T00:00:00
[ [ "Wu", "Peng", "" ], [ "Jindal", "Nihar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1624
Eduardo Novais
E. Novais, Eduardo R. Mucciolo, Harold U. Baranger
Hamiltonian Formulation of Quantum Error Correction and Correlated Noise: The Effects Of Syndrome Extraction in the Long Time Limit
19 pages, 5 figures. Includes response to arXiv:quant-ph/0702050. New title and an additional example
Phys. Rev. A 78, 012314 (2008)
10.1103/PhysRevA.78.012314
null
quant-ph cond-mat.stat-mech cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze the long time behavior of a quantum computer running a quantum error correction (QEC) code in the presence of a correlated environment. Starting from a Hamiltonian formulation of realistic noise models, and assuming that QEC is indeed possible, we find formal expressions for the probability of a faulty path and the residual decoherence encoded in the reduced density matrix. Systems with non-zero gate times (``long gates'') are included in our analysis by using an upper bound on the noise. In order to introduce the local error probability for a qubit, we assume that propagation of signals through the environment is slower than the QEC period (hypercube assumption). This allows an explicit calculation in the case of a generalized spin-boson model and a quantum frustration model. The key result is a dimensional criterion: If the correlations decay sufficiently fast, the system evolves toward a stochastic error model for which the threshold theorem of fault-tolerant quantum computation has been proven. On the other hand, if the correlations decay slowly, the traditional proof of this threshold theorem does not hold. This dimensional criterion bears many similarities to criteria that occur in the theory of quantum phase transitions.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 19:56:21 GMT" }, { "version": "v2", "created": "Fri, 11 Jul 2008 15:06:07 GMT" } ]
2008-07-11T00:00:00
[ [ "Novais", "E.", "" ], [ "Mucciolo", "Eduardo R.", "" ], [ "Baranger", "Harold U.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1626
Awlok Josan
Awlok Josan, Mingyan Liu, David L. Neuhoff and S. Sandeep Pradhan
Throughput Scaling in Random Wireless Networks: A Non-Hierarchical Multipath Routing Strategy
7 Pages, 4 Figures, 2007 Allerton Conference on Communication, Control and Computing
null
null
null
cs.IT math.IT
null
Franceschetti et al. have recently shown that per-node throughput in an extended, ad hoc wireless network with $\Theta(n)$ randomly distributed nodes and multihop routing can be increased from the $\Omega({1 \over \sqrt{n} \log n})$ scaling demonstrated in the seminal paper of Gupta and Kumar to $\Omega({1 \over \sqrt{n}})$. The goal of the present paper is to understand the dependence of this interesting result on the principal new features it introduced relative to Gupta-Kumar: (1) a capacity-based formula for link transmission bit-rates in terms of received signal-to-interference-and-noise ratio (SINR); (2) hierarchical routing from sources to destinations through a system of communal highways; and (3) cell-based routes constructed by percolation. The conclusion of the present paper is that the improved throughput scaling is principally due to the percolation-based routing, which enables shorter hops and, consequently, less interference. This is established by showing that throughput $\Omega({1 \over \sqrt{n}})$ can be attained by a system that does not employ highways, but instead uses percolation to establish, for each source-destination pair, a set of $\Theta(\log n)$ routes within a narrow routing corridor running from source to destination. As a result, highways are not essential. In addition, it is shown that throughput $\Omega({1 \over \sqrt{n}})$ can be attained with the original threshold transmission bit-rate model, provided that node transmission powers are permitted to grow with $n$. Thus, the benefit of the capacity bit-rate model is simply to permit the power to remain bounded, even as the network expands.
[ { "version": "v1", "created": "Mon, 8 Oct 2007 21:07:35 GMT" } ]
2007-10-10T00:00:00
[ [ "Josan", "Awlok", "" ], [ "Liu", "Mingyan", "" ], [ "Neuhoff", "David L.", "" ], [ "Pradhan", "S. Sandeep", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1641
Vida Dujmovi\'c
Prosenjit Bose, Vida Dujmovic, Ferran Hurtado, Stefan Langerman, Pat Morin, David R. Wood
A polynomial bound for untangling geometric planar graphs
14 pages, 7 figures
Discrete & Computational Geometry 42(4):570-585, 2009
10.1007/s00454-008-9125-3
null
cs.CG cs.DM math.CO
null
To untangle a geometric graph means to move some of the vertices so that the resulting geometric graph has no crossings. Pach and Tardos [Discrete Comput. Geom., 2002] asked if every n-vertex geometric planar graph can be untangled while keeping at least n^\epsilon vertices fixed. We answer this question in the affirmative with \epsilon=1/4. The previous best known bound was \Omega((\log n / \log\log n)^{1/2}). We also consider untangling geometric trees. It is known that every n-vertex geometric tree can be untangled while keeping at least (n/3)^{1/2} vertices fixed, while the best upper bound was O(n\log n)^{2/3}. We answer a question of Spillner and Wolff [arXiv:0709.0170 2007] by closing this gap for untangling trees. In particular, we show that for infinitely many values of n, there is an n-vertex geometric tree that cannot be untangled while keeping more than 3(n^{1/2}-1) vertices fixed. Moreover, we improve the lower bound to (n/2)^{1/2}.
[ { "version": "v1", "created": "Tue, 9 Oct 2007 13:13:24 GMT" }, { "version": "v2", "created": "Fri, 30 Nov 2007 15:04:13 GMT" } ]
2010-05-31T00:00:00
[ [ "Bose", "Prosenjit", "" ], [ "Dujmovic", "Vida", "" ], [ "Hurtado", "Ferran", "" ], [ "Langerman", "Stefan", "" ], [ "Morin", "Pat", "" ], [ "Wood", "David R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0710.1772
Flore Barcellini
Flore Barcellini (INRIA Rocquencourt), Fran\c{c}oise D\'etienne (INRIA Rocquencourt), Jean-Marie Burkhardt (INRIA Rocquencourt, LEI)
Cross-Participants : fostering design-use mediation in an Open Source Software community
null
Dans European Conference on Cognitive Ergonomics (2007) 57-64
null
null
cs.CY cs.HC cs.SE
null
Motivation - This research aims at investigating emerging roles and forms of participation fostering design-use mediation during the Open Source Software design process Research approach - We compare online interactions for a successful "pushed-by-users" design process with unsuccessful previous proposals. The methodology developed, articulate structural analyses of the discussions (organization of discussions, participation) to actions to the code and documentation made by participants to the project. We focus on the useroriented and the developer-oriented mailing-lists of the Python project. Findings/Design - We find that key-participants, the cross-participants, foster the design process and act as boundary spanners between the users and the developers' communities. Research limitations/Implications - These findings can be reinforced developing software to automate the structural analysis of discussions and actions to the code and documentation. Further analyses, supported by these tools, will be necessary to generalise our results. Originality/Value - The analysis of participation among the three interaction spaces of OSS design (discussion, documentation and implementation) is the main originality of this work compared to other OSS research that mainly analyse one or two spaces. Take away message - Beside the idealistic picture that users may intervene freely in the process, OSS design is boost and framed by some key-participants and specific rules and there can be barriers to users' participation
[ { "version": "v1", "created": "Tue, 9 Oct 2007 14:44:44 GMT" } ]
2007-10-10T00:00:00
[ [ "Barcellini", "Flore", "", "INRIA Rocquencourt" ], [ "Détienne", "Françoise", "", "INRIA\n Rocquencourt" ], [ "Burkhardt", "Jean-Marie", "", "INRIA Rocquencourt, LEI" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0710.1784
Marc Shapiro
Marc Shapiro (LIP6, INRIA Rocquencourt), Nuno Pregui\c{c}a (INRIA Rocquencourt)
Designing a commutative replicated data type
null
null
null
null
cs.DC
null
Commuting operations greatly simplify consistency in distributed systems. This paper focuses on designing for commutativity, a topic neglected previously. We show that the replicas of \emph{any} data type for which concurrent operations commute converges to a correct value, under some simple and standard assumptions. We also show that such a data type supports transactions with very low cost. We identify a number of approaches and techniques to ensure commutativity. We re-use some existing ideas (non-destructive updates coupled with invariant identification), but propose a much more efficient implementation. Furthermore, we propose a new technique, background consensus. We illustrate these ideas with a shared edit buffer data type.
[ { "version": "v1", "created": "Tue, 9 Oct 2007 14:38:50 GMT" } ]
2009-09-29T00:00:00
[ [ "Shapiro", "Marc", "", "LIP6, INRIA Rocquencourt" ], [ "Preguiça", "Nuno", "", "INRIA\n Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0710.1842
Frank Ruskey
Frank Ruskey and Aaron Williams
An explicit universal cycle for the (n-1)-permutations of an n-set
null
null
null
null
cs.DM cs.DS
null
We show how to construct an explicit Hamilton cycle in the directed Cayley graph Cay({\sigma_n, sigma_{n-1}} : \mathbb{S}_n), where \sigma_k = (1 2 >... k). The existence of such cycles was shown by Jackson (Discrete Mathematics, 149 (1996) 123-129) but the proof only shows that a certain directed graph is Eulerian, and Knuth (Volume 4 Fascicle 2, Generating All Tuples and Permutations (2005)) asks for an explicit construction. We show that a simple recursion describes our Hamilton cycle and that the cycle can be generated by an iterative algorithm that uses O(n) space. Moreover, the algorithm produces each successive edge of the cycle in constant time; such algorithms are said to be loopless.
[ { "version": "v1", "created": "Tue, 9 Oct 2007 18:06:05 GMT" } ]
2007-10-10T00:00:00
[ [ "Ruskey", "Frank", "" ], [ "Williams", "Aaron", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0710.1870
Mireille Boutin
Mireille Boutin and Gregor Kemper
Lossless Representation of Graphs using Distributions
19 pages
null
null
null
math.CO cs.CV
null
We consider complete graphs with edge weights and/or node weights taking values in some set. In the first part of this paper, we show that a large number of graphs are completely determined, up to isomorphism, by the distribution of their sub-triangles. In the second part, we propose graph representations in terms of one-dimensional distributions (e.g., distribution of the node weights, sum of adjacent weights, etc.). For the case when the weights of the graph are real-valued vectors, we show that all graphs, except for a set of measure zero, are uniquely determined, up to isomorphism, from these distributions. The motivating application for this paper is the problem of browsing through large sets of graphs.
[ { "version": "v1", "created": "Tue, 9 Oct 2007 20:01:59 GMT" } ]
2007-10-11T00:00:00
[ [ "Boutin", "Mireille", "" ], [ "Kemper", "Gregor", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0710.1879
Ning Chen
Ning Chen and Zhiyuan Yan
Cyclotomic FFTs with Reduced Additive Complexities Based on a Novel Common Subexpression Elimination Algorithm
11 pages, submitted to IEEE Transactions on Signal Processing
null
null
null
cs.IT cs.CC math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we first propose a novel common subexpression elimination (CSE) algorithm for matrix-vector multiplications over characteristic-2 fields. As opposed to previously proposed CSE algorithms, which usually focus on complexity savings due to recurrences of subexpressions, our CSE algorithm achieves two types of complexity reductions, differential savings and recurrence savings, by taking advantage of the cancelation property of characteristic-2 fields. Using our CSE algorithm, we reduce the additive complexities of cyclotomic fast Fourier transforms (CFFTs). Using a weighted sum of the numbers of multiplications and additions as a metric, our CFFTs achieve smaller total complexities than previously proposed CFFTs and other FFTs, requiring both fewer multiplications and fewer additions in many cases.
[ { "version": "v1", "created": "Wed, 10 Oct 2007 08:13:44 GMT" }, { "version": "v2", "created": "Tue, 16 Oct 2007 18:09:03 GMT" }, { "version": "v3", "created": "Thu, 8 May 2008 03:23:10 GMT" }, { "version": "v4", "created": "Thu, 23 Oct 2008 06:18:31 GMT" } ]
2008-10-23T00:00:00
[ [ "Chen", "Ning", "" ], [ "Yan", "Zhiyuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1916
Chen Xiaogang
Xiaogang Chen, Hongwen Yang, Jian Gu, Hongkui Yang
Evaluate the Word Error Rate of Binary Block Codes with Square Radius Probability Density Function
I tried to fix the problem that figures cannot be displayed in Version1~3, but it doesnot work. Some new results about decoding threshold is added in version 4 and a pdf is included which is compile in my PC. Figures can displayed
null
null
null
cs.IT math.IT
null
The word error rate (WER) of soft-decision-decoded binary block codes rarely has closed-form. Bounding techniques are widely used to evaluate the performance of maximum-likelihood decoding algorithm. But the existing bounds are not tight enough especially for low signal-to-noise ratios and become looser when a suboptimum decoding algorithm is used. This paper proposes a new concept named square radius probability density function (SR-PDF) of decision region to evaluate the WER. Based on the SR-PDF, The WER of binary block codes can be calculated precisely for ML and suboptimum decoders. Furthermore, for a long binary block code, SR-PDF can be approximated by Gamma distribution with only two parameters that can be measured easily. Using this property, two closed-form approximative expressions are proposed which are very close to the simulation results of the WER of interesting.
[ { "version": "v1", "created": "Wed, 10 Oct 2007 03:24:28 GMT" }, { "version": "v2", "created": "Sat, 20 Oct 2007 03:54:09 GMT" }, { "version": "v3", "created": "Tue, 23 Oct 2007 03:16:58 GMT" }, { "version": "v4", "created": "Sun, 4 Nov 2007 04:24:27 GMT" } ]
2015-03-13T00:00:00
[ [ "Chen", "Xiaogang", "" ], [ "Yang", "Hongwen", "" ], [ "Gu", "Jian", "" ], [ "Yang", "Hongkui", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1920
Fr\'ed\'erique Oggier
Fr\'ed\'erique Oggier and Babak Hassibi
The Secrecy Capacity of the MIMO Wiretap Channel
null
null
null
null
cs.IT cs.CR math.IT
null
We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper. Perfect secrecy is achieved when the the transmitter and the legitimate receiver can communicate at some positive rate, while insuring that the eavesdropper gets zero bits of information. In this paper, we compute the perfect secrecy capacity of the multiple antenna MIMO broadcast channel, where the number of antennas is arbitrary for both the transmitter and the two receivers.
[ { "version": "v1", "created": "Wed, 10 Oct 2007 03:52:34 GMT" } ]
2007-10-11T00:00:00
[ [ "Oggier", "Frédérique", "" ], [ "Hassibi", "Babak", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1924
Mohsen Ravanbakhsh
Mohsen Ravanbakhsh, Yasin Abbasi-Yadkori, Maghsoud Abbaspour, Hamid Sarbazi-Azad
A Heuristic Routing Mechanism Using a New Addressing Scheme
8 pages, because of lack of space journal reference just contains the reference to the proceeding
Proceedings of First International Conference on Bio Inspired models of Networks, Information and Computing Systems (BIONETICS), Cavalese, Italy, December 2006
null
null
cs.NI cs.AI
null
Current methods of routing are based on network information in the form of routing tables, in which routing protocols determine how to update the tables according to the network changes. Despite the variability of data in routing tables, node addresses are constant. In this paper, we first introduce the new concept of variable addresses, which results in a novel framework to cope with routing problems using heuristic solutions. Then we propose a heuristic routing mechanism based on the application of genes for determination of network addresses in a variable address network and describe how this method flexibly solves different problems and induces new ideas in providing integral solutions for variety of problems. The case of ad-hoc networks is where simulation results are more supportive and original solutions have been proposed for issues like mobility.
[ { "version": "v1", "created": "Wed, 10 Oct 2007 04:29:24 GMT" } ]
2007-10-11T00:00:00
[ [ "Ravanbakhsh", "Mohsen", "" ], [ "Abbasi-Yadkori", "Yasin", "" ], [ "Abbaspour", "Maghsoud", "" ], [ "Sarbazi-Azad", "Hamid", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0710.1949
Lorenzo Cappellari
Lorenzo Cappellari
Distributed Source Coding Using Continuous-Valued Syndromes
12 pages, 19 graphic files (15 figures using subfigures), submitted to IEEE Trans. Inform. Theory
null
null
null
cs.IT math.IT
null
This paper addresses the problem of coding a continuous random source correlated with another source which is only available at the decoder. The proposed approach is based on the extension of the channel coding concept of syndrome from the discrete into the continuous domain. If the correlation between the sources can be described by an additive Gaussian backward channel and capacity-achieving linear codes are employed, it is shown that the performance of the system is asymptotically close to the Wyner-Ziv bound. Even if such an additive channel is not Gaussian, the design procedure can fit the desired correlation and transmission rate. Experiments based on trellis-coded quantization show that the proposed system achieves a performance within 3-4 dB of the theoretical bound in the 0.5-3 bit/sample rate range for any Gaussian correlation, with a reasonable computational complexity.
[ { "version": "v1", "created": "Wed, 10 Oct 2007 08:17:03 GMT" } ]
2007-10-11T00:00:00
[ [ "Cappellari", "Lorenzo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.1962
Sebastiano Vigna
Sebastiano Vigna
Stanford Matrix Considered Harmful
null
null
null
null
cs.IR
null
This note argues about the validity of web-graph data used in the literature.
[ { "version": "v1", "created": "Wed, 10 Oct 2007 10:03:03 GMT" } ]
2007-10-11T00:00:00
[ [ "Vigna", "Sebastiano", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0710.1976
Yukitaka Ishimoto
Yukitaka Ishimoto
Solving Infinite Kolam in Knot Theory
13 pages, 2 figures, the final version for FORMA with typo fixed
Forma 22 (2007) 15-30
null
OIQP-06-15
cs.DM cond-mat.stat-mech
null
In south India, there are traditional patterns of line-drawings encircling dots, called ``Kolam'', among which one-line drawings or the ``infinite Kolam'' provide very interesting questions in mathematics. For example, we address the following simple question: how many patterns of infinite Kolam can we draw for a given grid pattern of dots? The simplest way is to draw possible patterns of Kolam while judging if it is infinite Kolam. Such a search problem seems to be NP complete. However, it is certainly not. In this paper, we focus on diamond-shaped grid patterns of dots, (1-3-5-3-1) and (1-3-5-7-5-3-1) in particular. By using the knot-theory description of the infinite Kolam, we show how to find the solution, which inevitably gives a sketch of the proof for the statement ``infinite Kolam is not NP complete.'' Its further discussion will be given in the final section.
[ { "version": "v1", "created": "Wed, 10 Oct 2007 11:46:53 GMT" } ]
2012-02-23T00:00:00
[ [ "Ishimoto", "Yukitaka", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" } ]
0710.2018
Yingbin Liang
Yingbin Liang, Anelia Somekh-Baruch, H. Vincent Poor, Shlomo Shamai (Shitz), and Sergio Verdu
Cognitive Interference Channels with Confidential Messages
To appear in Proc. of forty-fifth annual Allerton conference on communication, control, and computing, Allerton house, Monticello, IL, USA
null
null
null
cs.IT math.IT
null
The cognitive interference channel with confidential messages is studied. Similarly to the classical two-user interference channel, the cognitive interference channel consists of two transmitters whose signals interfere at the two receivers. It is assumed that there is a common message source (message 1) known to both transmitters, and an additional independent message source (message 2) known only to the cognitive transmitter (transmitter 2). The cognitive receiver (receiver 2) needs to decode both messages, while the non-cognitive receiver (receiver 1) should decode only the common message. Furthermore, message 2 is assumed to be a confidential message which needs to be kept as secret as possible from receiver 1, which is viewed as an eavesdropper with regard to message 2. The level of secrecy is measured by the equivocation rate. A single-letter expression for the capacity-equivocation region of the discrete memoryless cognitive interference channel is established and is further explicitly derived for the Gaussian case. Moreover, particularizing the capacity-equivocation region to the case without a secrecy constraint, establishes a new capacity theorem for a class of interference channels, by providing a converse theorem.
[ { "version": "v1", "created": "Wed, 10 Oct 2007 16:34:03 GMT" } ]
2007-10-11T00:00:00
[ [ "Liang", "Yingbin", "", "Shitz" ], [ "Somekh-Baruch", "Anelia", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ], [ "Verdu", "Sergio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.2037
Wu Jiang Mr.
Wu Jiang, Fei Ding and Qiao-liang Xiang
An Affinity Propagation Based method for Vector Quantization Codebook Design
In this version we make some explaination about the network-support similarity
null
null
null
cs.CV
null
In this paper, we firstly modify a parameter in affinity propagation (AP) to improve its convergence ability, and then, we apply it to vector quantization (VQ) codebook design problem. In order to improve the quality of the resulted codebook, we combine the improved AP (IAP) with the conventional LBG algorithm to generate an effective algorithm call IAP-LBG. According to the experimental results, the proposed method not only enhances the convergence abilities but also is capable of providing higher-quality codebooks than conventional LBG method.
[ { "version": "v1", "created": "Wed, 10 Oct 2007 15:12:20 GMT" }, { "version": "v2", "created": "Thu, 11 Oct 2007 11:32:25 GMT" } ]
2007-10-11T00:00:00
[ [ "Jiang", "Wu", "" ], [ "Ding", "Fei", "" ], [ "Xiang", "Qiao-liang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0710.2083
Oliver Schulte
Oliver Schulte, Flavia Moser, Martin Ester and Zhiyong Lu
Association Rules in the Relational Calculus
16 pages, 13 tables
null
null
SFU School of Computing Science, TR 2007-23
cs.DB cs.LG cs.LO
null
One of the most utilized data mining tasks is the search for association rules. Association rules represent significant relationships between items in transactions. We extend the concept of association rule to represent a much broader class of associations, which we refer to as \emph{entity-relationship rules.} Semantically, entity-relationship rules express associations between properties of related objects. Syntactically, these rules are based on a broad subclass of safe domain relational calculus queries. We propose a new definition of support and confidence for entity-relationship rules and for the frequency of entity-relationship queries. We prove that the definition of frequency satisfies standard probability axioms and the Apriori property.
[ { "version": "v1", "created": "Wed, 10 Oct 2007 18:00:44 GMT" } ]
2007-10-11T00:00:00
[ [ "Schulte", "Oliver", "" ], [ "Moser", "Flavia", "" ], [ "Ester", "Martin", "" ], [ "Lu", "Zhiyong", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0710.2092
Marian Boguna
M. Angeles Serrano, Dmitri Krioukov, and Marian Boguna
Self-similarity of complex networks and hidden metric spaces
null
Physical Review Letters 100, 078701 (2008)
10.1103/PhysRevLett.100.078701
null
cond-mat.dis-nn cs.NI physics.soc-ph
null
We demonstrate that the self-similarity of some scale-free networks with respect to a simple degree-thresholding renormalization scheme finds a natural interpretation in the assumption that network nodes exist in hidden metric spaces. Clustering, i.e., cycles of length three, plays a crucial role in this framework as a topological reflection of the triangle inequality in the hidden geometry. We prove that a class of hidden variable models with underlying metric spaces are able to accurately reproduce the self-similarity properties that we measured in the real networks. Our findings indicate that hidden geometries underlying these real networks are a plausible explanation for their observed topologies and, in particular, for their self-similarity with respect to the degree-based renormalization.
[ { "version": "v1", "created": "Wed, 10 Oct 2007 18:45:26 GMT" }, { "version": "v2", "created": "Wed, 20 Feb 2008 20:53:35 GMT" } ]
2008-12-03T00:00:00
[ [ "Serrano", "M. Angeles", "" ], [ "Krioukov", "Dmitri", "" ], [ "Boguna", "Marian", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0710.2134
Andrei Martinez-Finkelshtein
A.I. Aptekarev, J.S. Dehesa, A. Martinez-Finkelshtein, R. Ya\~nez
Discrete entropies of orthogonal polynomials
26 pages, 6 figures
null
null
null
math.CA cs.IT math-ph math.IT math.MP
null
Let $p_n$ be the $n$-th orthonormal polynomial on the real line, whose zeros are $\lambda_j^{(n)}$, $j=1, ..., n$. Then for each $j=1, ..., n$, $$ \vec \Psi_j^2 = (\Psi_{1j}^2, ..., \Psi_{nj}^2) $$ with $$ \Psi_{ij}^2= p_{i-1}^2 (\lambda_j^{(n)}) (\sum_{k=0}^{n-1} p_k^2(\lambda_j^{(n)}))^{-1}, \quad i=1, >..., n, $$ defines a discrete probability distribution. The Shannon entropy of the sequence $\{p_n\}$ is consequently defined as $$ \mathcal S_{n,j} = -\sum_{i=1}^n \Psi_{ij}^{2} \log (\Psi_{ij}^{2}) . $$ In the case of Chebyshev polynomials of the first and second kinds an explicit and closed formula for $\mathcal S_{n,j}$ is obtained, revealing interesting connections with the number theory. Besides, several results of numerical computations exemplifying the behavior of $\mathcal S_{n,j}$ for other families are also presented.
[ { "version": "v1", "created": "Wed, 10 Oct 2007 23:17:43 GMT" } ]
2007-10-12T00:00:00
[ [ "Aptekarev", "A. I.", "" ], [ "Dehesa", "J. S.", "" ], [ "Martinez-Finkelshtein", "A.", "" ], [ "Yañez", "R.", "" ] ]
[ { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
0710.2139
Ashkan Aazami
Ashkan Aazami, Michael D. Stilp
Approximation algorithms and hardness for domination with propagation
null
null
null
null
cs.CC cs.DM
null
The power dominating set (PDS) problem is the following extension of the well-known dominating set problem: find a smallest-size set of nodes $S$ that power dominates all the nodes, where a node $v$ is power dominated if (1) $v$ is in $S$ or $v$ has a neighbor in $S$, or (2) $v$ has a neighbor $w$ such that $w$ and all of its neighbors except $v$ are power dominated. We show a hardness of approximation threshold of $2^{\log^{1-\epsilon}{n}}$ in contrast to the logarithmic hardness for the dominating set problem. We give an $O(\sqrt{n})$ approximation algorithm for planar graphs, and show that our methods cannot improve on this approximation guarantee. Finally, we initiate the study of PDS on directed graphs, and show the same hardness threshold of $2^{\log^{1-\epsilon}{n}}$ for directed \emph{acyclic} graphs. Also we show that the directed PDS problem can be solved optimally in linear time if the underlying undirected graph has bounded tree-width.
[ { "version": "v1", "created": "Wed, 10 Oct 2007 23:30:49 GMT" } ]
2007-10-12T00:00:00
[ [ "Aazami", "Ashkan", "" ], [ "Stilp", "Michael D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0710.2156
Daniel Lemire
Kamel Aouiche, Daniel Lemire and Robert Godin
Collaborative OLAP with Tag Clouds: Web 2.0 OLAP Formalism and Experimental Evaluation
Software at https://github.com/lemire/OLAPTagCloud
null
null
null
cs.DB
http://creativecommons.org/licenses/by/4.0/
Increasingly, business projects are ephemeral. New Business Intelligence tools must support ad-lib data sources and quick perusal. Meanwhile, tag clouds are a popular community-driven visualization technique. Hence, we investigate tag-cloud views with support for OLAP operations such as roll-ups, slices, dices, clustering, and drill-downs. As a case study, we implemented an application where users can upload data and immediately navigate through its ad hoc dimensions. To support social networking, views can be easily shared and embedded in other Web sites. Algorithmically, our tag-cloud views are approximate range top-k queries over spontaneous data cubes. We present experimental evidence that iceberg cuboids provide adequate online approximations. We benchmark several browser-oblivious tag-cloud layout optimizations.
[ { "version": "v1", "created": "Thu, 11 Oct 2007 19:48:10 GMT" }, { "version": "v2", "created": "Mon, 14 Jan 2008 21:23:11 GMT" }, { "version": "v3", "created": "Tue, 15 Mar 2016 21:52:12 GMT" } ]
2016-03-17T00:00:00
[ [ "Aouiche", "Kamel", "" ], [ "Lemire", "Daniel", "" ], [ "Godin", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0710.2227
M Sabu THAMPI
Sabu M. Thampi, K. Chandra Sekaran
A System for Predicting Subcellular Localization of Yeast Genome Using Neural Network
null
null
null
null
cs.NE cs.AI
null
The subcellular location of a protein can provide valuable information about its function. With the rapid increase of sequenced genomic data, the need for an automated and accurate tool to predict subcellular localization becomes increasingly important. Many efforts have been made to predict protein subcellular localization. This paper aims to merge the artificial neural networks and bioinformatics to predict the location of protein in yeast genome. We introduce a new subcellular prediction method based on a backpropagation neural network. The results show that the prediction within an error limit of 5 to 10 percentage can be achieved with the system.
[ { "version": "v1", "created": "Thu, 11 Oct 2007 12:09:33 GMT" } ]
2007-10-12T00:00:00
[ [ "Thampi", "Sabu M.", "" ], [ "Sekaran", "K. Chandra", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0710.2228
Matus Medo
Yi-Cheng Zhang, Matus Medo, Jie Ren, Tao Zhou, Tao Li, and Fan Yang
Recommendation model based on opinion diffusion
5 pages, 2 figures
Europhysics Letters 80 (2007) 68003
10.1209/0295-5075/80/68003
null
physics.soc-ph cs.CY cs.IR physics.data-an
null
Information overload in the modern society calls for highly efficient recommendation algorithms. In this letter we present a novel diffusion based recommendation model, with users' ratings built into a transition matrix. To speed up computation we introduce a Green function method. The numerical tests on a benchmark database show that our prediction is superior to the standard recommendation methods.
[ { "version": "v1", "created": "Thu, 11 Oct 2007 12:54:07 GMT" }, { "version": "v2", "created": "Thu, 15 Nov 2007 13:01:50 GMT" } ]
2007-11-15T00:00:00
[ [ "Zhang", "Yi-Cheng", "" ], [ "Medo", "Matus", "" ], [ "Ren", "Jie", "" ], [ "Zhou", "Tao", "" ], [ "Li", "Tao", "" ], [ "Yang", "Fan", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0710.2231
Daniel Keysers
Daniel Keysers
Comparison and Combination of State-of-the-art Techniques for Handwritten Character Recognition: Topping the MNIST Benchmark
13 pages
null
null
null
cs.CV
null
Although the recognition of isolated handwritten digits has been a research topic for many years, it continues to be of interest for the research community and for commercial applications. We show that despite the maturity of the field, different approaches still deliver results that vary enough to allow improvements by using their combination. We do so by choosing four well-motivated state-of-the-art recognition systems for which results on the standard MNIST benchmark are available. When comparing the errors made, we observe that the errors made differ between all four systems, suggesting the use of classifier combination. We then determine the error rate of a hypothetical system that combines the output of the four systems. The result obtained in this manner is an error rate of 0.35% on the MNIST data, the best result published so far. We furthermore discuss the statistical significance of the combined result and of the results of the individual classifiers.
[ { "version": "v1", "created": "Thu, 11 Oct 2007 12:22:27 GMT" } ]
2007-10-12T00:00:00
[ [ "Keysers", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0710.2243
Lars Eirik Danielsen
Lars Eirik Danielsen and Matthew G. Parker
Edge Local Complementation and Equivalence of Binary Linear Codes
Presented at International Workshop on Coding and Cryptography (WCC 2007), 16-20 Apr. 2007, Versailles, France. (12 pages, 3 figures)
Des. Codes Cryptogr. 49(1-3), 161-170, 2008
10.1007/s10623-008-9190-x
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Orbits of graphs under the operation edge local complementation (ELC) are defined. We show that the ELC orbit of a bipartite graph corresponds to the equivalence class of a binary linear code. The information sets and the minimum distance of a code can be derived from the corresponding ELC orbit. By extending earlier results on local complementation (LC) orbits, we classify the ELC orbits of all graphs on up to 12 vertices. We also give a new method for classifying binary linear codes, with running time comparable to the best known algorithm.
[ { "version": "v1", "created": "Thu, 11 Oct 2007 13:49:41 GMT" }, { "version": "v2", "created": "Mon, 25 Feb 2008 12:34:35 GMT" }, { "version": "v3", "created": "Tue, 26 Feb 2008 15:12:04 GMT" }, { "version": "v4", "created": "Mon, 24 Aug 2009 11:07:53 GMT" } ]
2009-08-24T00:00:00
[ [ "Danielsen", "Lars Eirik", "" ], [ "Parker", "Matthew G.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.2268
Serge Burckel
Serge Burckel
Complexity of some Path Problems in DAGs and Linear Orders
5 pages, 3 figures
null
null
null
math.CO cs.IT math.IT
null
We investigate here the computational complexity of three natural problems in directed acyclic graphs. We prove their NP Completeness and consider their restrictions to linear orders.
[ { "version": "v1", "created": "Thu, 11 Oct 2007 15:00:45 GMT" } ]
2007-10-12T00:00:00
[ [ "Burckel", "Serge", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.2284
Andreas Witzel
Andreas Witzel
Symmetric and Synchronous Communication in Peer-to-Peer Networks
polished, modernized references; incorporated referee feedback from MPC'08
null
null
null
cs.DC cs.GT
null
Motivated by distributed implementations of game-theoretical algorithms, we study symmetric process systems and the problem of attaining common knowledge between processes. We formalize our setting by defining a notion of peer-to-peer networks(*) and appropriate symmetry concepts in the context of Communicating Sequential Processes (CSP), due to the common knowledge creating effects of its synchronous communication primitives. We then prove that CSP with input and output guards makes common knowledge in symmetric peer-to-peer networks possible, but not the restricted version which disallows output statements in guards and is commonly implemented. (*) Please note that we are not dealing with fashionable incarnations such as file-sharing networks, but merely use this name for a mathematical notion of a network consisting of directly connected peers "treated on an equal footing", i.e. not having a client-server structure or otherwise pre-determined roles.)
[ { "version": "v1", "created": "Thu, 11 Oct 2007 16:14:38 GMT" }, { "version": "v2", "created": "Wed, 17 Oct 2007 10:41:05 GMT" }, { "version": "v3", "created": "Mon, 21 Jan 2008 12:51:56 GMT" }, { "version": "v4", "created": "Mon, 14 Apr 2008 15:11:16 GMT" } ]
2008-04-14T00:00:00
[ [ "Witzel", "Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0710.2296
Sonny Ben-Shimon
Sonny Ben-Shimon and Michael Krivelevich
Vertex Percolation on Expander Graphs
13 pages
European Journal of Combinatorics, 30(2), pp. 339-350, 2009
10.1016/j.ejc.2008.07.001
null
math.CO cs.DM math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We say that a graph $G=(V,E)$ on $n$ vertices is a $\beta$-expander for some constant $\beta>0$ if every $U\subseteq V$ of cardinality $|U|\leq \frac{n}{2}$ satisfies $|N_G(U)|\geq \beta|U|$ where $N_G(U)$ denotes the neighborhood of $U$. In this work we explore the process of deleting vertices of a $\beta$-expander independently at random with probability $n^{-\alpha}$ for some constant $\alpha>0$, and study the properties of the resulting graph. Our main result states that as $n$ tends to infinity, the deletion process performed on a $\beta$-expander graph of bounded degree will result with high probability in a graph composed of a giant component containing $n-o(n)$ vertices that is in itself an expander graph, and constant size components. We proceed by applying the main result to expander graphs with a positive spectral gap. In the particular case of $(n,d,\lambda)$-graphs, that are such expanders, we compute the values of $\alpha$, under additional constraints on the graph, for which with high probability the resulting graph will stay connected, or will be composed of a giant component and isolated vertices. As a graph sampled from the uniform probability space of $d$-regular graphs with high probability is an expander and meets the additional constraints, this result strengthens a recent result due to Greenhill, Holt and Wormald about vertex percolation on random $d$-regular graphs. We conclude by showing that performing the above described deletion process on graphs that expand sub-linear sets by an unbounded expansion ratio, with high probability results in a connected expander graph.
[ { "version": "v1", "created": "Thu, 11 Oct 2007 17:05:22 GMT" }, { "version": "v2", "created": "Thu, 22 Nov 2007 15:25:36 GMT" }, { "version": "v3", "created": "Sun, 25 Nov 2007 14:38:30 GMT" }, { "version": "v4", "created": "Thu, 1 May 2008 12:38:47 GMT" }, { "version": "v5", "created": "Mon, 30 Jun 2008 10:32:38 GMT" }, { "version": "v6", "created": "Tue, 1 Jul 2008 15:44:13 GMT" } ]
2008-11-30T00:00:00
[ [ "Ben-Shimon", "Sonny", "" ], [ "Krivelevich", "Michael", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0710.2358
Catherine Recanati
C. Recanati
Success and failure of programming environments - report on the design and use of a graphic abstract syntax tree editor
This is an old paper (1990) of 29 pages
null
null
Esprit project no. 891 (STAPLE), Technical Report no 90/1, Paris, Jan 1990
cs.PL cs.HC
null
The STAPLE project investigated (at the end of the eighties), a persistent architecture for functional programming. Work has been done in two directions: the development of a programming environment for a functional language within a persistent system and an experiment on transferring the expertise of functional prototyping into industry. This paper is a report on the first activity. The first section gives a general description of Absynte - the abstract syntax tree editor developed within the Project. Following sections make an attempt at measuring the effectiveness of such an editor and discuss the problems raised by structured syntax editing - specially environments based on abstract syntax trees.
[ { "version": "v1", "created": "Thu, 11 Oct 2007 23:40:47 GMT" } ]
2007-10-15T00:00:00
[ [ "Recanati", "C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0710.2419
Luigi Santocanale
Walid Belkhir (LIF), Luigi Santocanale (LIF)
The Variable Hierarchy for the Games mu-Calculus
null
null
null
null
cs.LO cs.GT math.LO
null
Parity games are combinatorial representations of closed Boolean mu-terms. By adding to them draw positions, they have been organized by Arnold and one of the authors into a mu-calculus. As done by Berwanger et al. for the propositional modal mu-calculus, it is possible to classify parity games into levels of a hierarchy according to the number of fixed-point variables. We ask whether this hierarchy collapses w.r.t. the standard interpretation of the games mu-calculus into the class of all complete lattices. We answer this question negatively by providing, for each n >= 1, a parity game Gn with these properties: it unravels to a mu-term built up with n fixed-point variables, it is semantically equivalent to no game with strictly less than n-2 fixed-point variables.
[ { "version": "v1", "created": "Fri, 12 Oct 2007 09:50:43 GMT" }, { "version": "v2", "created": "Thu, 13 Mar 2008 13:04:32 GMT" } ]
2008-03-13T00:00:00
[ [ "Belkhir", "Walid", "", "LIF" ], [ "Santocanale", "Luigi", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0710.2446
Catherine Recanati
Catherine Recanati (LIPN), Nicoleta Rogovschi (LIPN), Youn\`es Bennani (LIPN)
The structure of verbal sequences analyzed with unsupervised learning techniques
null
Dans Proceedings - The 3rd Language & Technology Conference: Human Language Technologies as a Challenge for Computer Science and Linguistics, Poznan : Pologne (2007)
null
null
cs.CL cs.AI cs.LG
null
Data mining allows the exploration of sequences of phenomena, whereas one usually tends to focus on isolated phenomena or on the relation between two phenomena. It offers invaluable tools for theoretical analyses and exploration of the structure of sentences, texts, dialogues, and speech. We report here the results of an attempt at using it for inspecting sequences of verbs from French accounts of road accidents. This analysis comes from an original approach of unsupervised training allowing the discovery of the structure of sequential data. The entries of the analyzer were only made of the verbs appearing in the sentences. It provided a classification of the links between two successive verbs into four distinct clusters, allowing thus text segmentation. We give here an interpretation of these clusters by applying a statistical analysis to independent semantic annotations.
[ { "version": "v1", "created": "Fri, 12 Oct 2007 12:44:11 GMT" } ]
2007-10-15T00:00:00
[ [ "Recanati", "Catherine", "", "LIPN" ], [ "Rogovschi", "Nicoleta", "", "LIPN" ], [ "Bennani", "Younès", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0710.2496
Gusztav Morvai
Gusztav Morvai, Sanjeev R. Kulkarni, Andrew B. Nobel
Regression estimation from an individual stable sequence
null
Statistics 33 (1999), no. 2, 99--118
null
null
math.PR cs.IT math.IT math.ST stat.TH
null
We consider univariate regression estimation from an individual (non-random) sequence $(x_1,y_1),(x_2,y_2), ... \in \real \times \real$, which is stable in the sense that for each interval $A \subseteq \real$, (i) the limiting relative frequency of $A$ under $x_1, x_2, ...$ is governed by an unknown probability distribution $\mu$, and (ii) the limiting average of those $y_i$ with $x_i \in A$ is governed by an unknown regression function $m(\cdot)$. A computationally simple scheme for estimating $m(\cdot)$ is exhibited, and is shown to be $L_2$ consistent for stable sequences $\{(x_i,y_i)\}$ such that $\{y_i\}$ is bounded and there is a known upper bound for the variation of $m(\cdot)$ on intervals of the form $(-i,i]$, $i \geq 1$. Complementing this positive result, it is shown that there is no consistent estimation scheme for the family of stable sequences whose regression functions have finite variation, even under the restriction that $x_i \in [0,1]$ and $y_i$ is binary-valued.
[ { "version": "v1", "created": "Fri, 12 Oct 2007 16:02:13 GMT" } ]
2008-06-19T00:00:00
[ [ "Morvai", "Gusztav", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Nobel", "Andrew B.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0710.2500
Gusztav Morvai
Andrew B. Nobel, Gusztav Morvai, Sanjeev R. Kulkarni
Density estimation from an individual numerical sequence
null
IEEE Trans. Inform. Theory 44 (1998), no. 2, 537--541
null
null
math.PR cs.IT math.IT math.ST stat.TH
null
This paper considers estimation of a univariate density from an individual numerical sequence. It is assumed that (i) the limiting relative frequencies of the numerical sequence are governed by an unknown density, and (ii) there is a known upper bound for the variation of the density on an increasing sequence of intervals. A simple estimation scheme is proposed, and is shown to be $L_1$ consistent when (i) and (ii) apply. In addition it is shown that there is no consistent estimation scheme for the set of individual sequences satisfying only condition (i).
[ { "version": "v1", "created": "Fri, 12 Oct 2007 19:11:21 GMT" } ]
2008-06-19T00:00:00
[ [ "Nobel", "Andrew B.", "" ], [ "Morvai", "Gusztav", "" ], [ "Kulkarni", "Sanjeev R.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0710.2505
Ichiro Hasuo
Ichiro Hasuo, Bart Jacobs and Ana Sokolova
Generic Trace Semantics via Coinduction
To appear in Logical Methods in Computer Science. 36 pages
Logical Methods in Computer Science, Volume 3, Issue 4 (November 19, 2007) lmcs:864
10.2168/LMCS-3(4:11)2007
null
cs.LO
null
Trace semantics has been defined for various kinds of state-based systems, notably with different forms of branching such as non-determinism vs. probability. In this paper we claim to identify one underlying mathematical structure behind these "trace semantics," namely coinduction in a Kleisli category. This claim is based on our technical result that, under a suitably order-enriched setting, a final coalgebra in a Kleisli category is given by an initial algebra in the category Sets. Formerly the theory of coalgebras has been employed mostly in Sets where coinduction yields a finer process semantics of bisimilarity. Therefore this paper extends the application field of coalgebras, providing a new instance of the principle "process semantics via coinduction."
[ { "version": "v1", "created": "Fri, 12 Oct 2007 16:28:43 GMT" }, { "version": "v2", "created": "Mon, 19 Nov 2007 10:36:17 GMT" } ]
2015-07-01T00:00:00
[ [ "Hasuo", "Ichiro", "" ], [ "Jacobs", "Bart", "" ], [ "Sokolova", "Ana", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0710.2532
Maxwell Young
Valerie King, Cynthia Phillips, Jared Saia and Maxwell Young
Sleeping on the Job: Energy-Efficient Broadcast for Radio Networks
15 pages, 1 figure
null
null
null
cs.DS
null
We address the problem of minimizing power consumption when performing reliable broadcast on a radio network under the following popular model. Each node in the network is located on a point in a two dimensional grid, and whenever a node sends a message, all awake nodes within distance r receive the message. In the broadcast problem, some node wants to successfully send a message to all other nodes in the network even when up to a 1/2 fraction of the nodes within every neighborhood can be deleted by an adversary. The set of deleted nodes is carefully chosen by the adversary to foil our algorithm and moreover, the set of deleted nodes may change periodically. This models worst-case behavior due to mobile nodes, static nodes losing power or simply some points in the grid being unoccupied. A trivial solution requires each node in the network to be awake roughly 1/2 the time, and a trivial lower bound shows that each node must be awake for at least a 1/n fraction of the time. Our first result is an algorithm that requires each node to be awake for only a 1/sqrt(n) fraction of the time in expectation. Our algorithm achieves this while ensuring correctness with probability 1, and keeping optimal values for other resource costs such as latency and number of messages sent. We give a lower-bound that shows that this reduction in power consumption is asymptotically optimal when latency and number of messages sent must be optimal. If we can increase the latency and messages sent by only a log*n factor we give a Las Vegas algorithm that requires each node to be awake for only a (log*n)/n expected fraction of the time; we give a lower-bound showing that this second algorithm is near optimal. Finally, we show how to ensure energy-efficient broadcast in the presence of Byzantine faults.
[ { "version": "v1", "created": "Fri, 12 Oct 2007 19:56:45 GMT" } ]
2007-10-15T00:00:00
[ [ "King", "Valerie", "" ], [ "Phillips", "Cynthia", "" ], [ "Saia", "Jared", "" ], [ "Young", "Maxwell", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0710.2553
Oren Somekh
O. Simeone, O. Somekh, Y. Bar-Ness, H. V. Poor, and S. Shamai
Capacity of Linear Two-hop Mesh Networks with Rate Splitting, Decode-and-forward Relaying and Cooperation
null
In the Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, September 26 - 28, 2007
null
null
cs.IT math.IT
null
A linear mesh network is considered in which a single user per cell communicates to a local base station via a dedicated relay (two-hop communication). Exploiting the possibly relevant inter-cell channel gains, rate splitting with successive cancellation in both hops is investigated as a promising solution to improve the rate of basic single-rate communications. Then, an alternative solution is proposed that attempts to improve the performance of the second hop (from the relays to base stations) by cooperative transmission among the relay stations. The cooperative scheme leverages the common information obtained by the relays as a by-product of the use of rate splitting in the first hop. Numerical results bring insight into the conditions (network topology and power constraints) under which rate splitting, with possible relay cooperation, is beneficial. Multi-cell processing (joint decoding at the base stations) is also considered for reference.
[ { "version": "v1", "created": "Fri, 12 Oct 2007 23:34:09 GMT" } ]
2007-10-16T00:00:00
[ [ "Simeone", "O.", "" ], [ "Somekh", "O.", "" ], [ "Bar-Ness", "Y.", "" ], [ "Poor", "H. V.", "" ], [ "Shamai", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.2604
Raymond Chi-Wing Wong
Raymond Chi-Wing Wong, Ada Wai-chee Fu, Jian Pei, Yip Sing Ho, Tai Wong, Yubao Liu
Efficient Skyline Querying with Variable User Preferences on Nominal Attributes
10 pages
null
null
null
cs.DB
null
Current skyline evaluation techniques assume a fixed ordering on the attributes. However, dynamic preferences on nominal attributes are more realistic in known applications. In order to generate online response for any such preference issued by a user, we propose two methods of different characteristics. The first one is a semi-materialization method and the second is an adaptive SFS method. Finally, we conduct experiments to show the efficiency of our proposed algorithms.
[ { "version": "v1", "created": "Sat, 13 Oct 2007 11:47:14 GMT" } ]
2007-10-16T00:00:00
[ [ "Wong", "Raymond Chi-Wing", "" ], [ "Fu", "Ada Wai-chee", "" ], [ "Pei", "Jian", "" ], [ "Ho", "Yip Sing", "" ], [ "Wong", "Tai", "" ], [ "Liu", "Yubao", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0710.2611
Marek Czachor
Diederik Aerts, Marek Czachor, Bart De Moor
Geometric Analogue of Holographic Reduced Representation
typos in eqs. (57-58) are corrected
Journal of Mathematical Psychology 53, 389-398 (2009)
null
null
cs.AI quant-ph
null
Holographic reduced representations (HRR) are based on superpositions of convolution-bound $n$-tuples, but the $n$-tuples cannot be regarded as vectors since the formalism is basis dependent. This is why HRR cannot be associated with geometric structures. Replacing convolutions by geometric products one arrives at reduced representations analogous to HRR but interpretable in terms of geometry. Variable bindings occurring in both HRR and its geometric analogue mathematically correspond to two different representations of $Z_2\times...\times Z_2$ (the additive group of binary $n$-tuples with addition modulo 2). As opposed to standard HRR, variable binding performed by means of geometric product allows for computing exact inverses of all nonzero vectors, a procedure even simpler than approximate inverses employed in HRR. The formal structure of the new reduced representation is analogous to cartoon computation, a geometric analogue of quantum computation.
[ { "version": "v1", "created": "Mon, 15 Oct 2007 13:56:39 GMT" }, { "version": "v2", "created": "Wed, 17 Oct 2007 16:51:40 GMT" } ]
2009-12-01T00:00:00
[ [ "Aerts", "Diederik", "" ], [ "Czachor", "Marek", "" ], [ "De Moor", "Bart", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0710.2659
Julien Hendrickx
Julien M. Hendrickx, Changbin Yu, Baris Fidan and Brian D.O. Anderson
Rigidity and persistence for ensuring shape maintenance of multiagent meta formations (ext'd version)
1 zip file containing 1 .tex files, and 39 .eps files. The paper (including the appendix) contains 13 Figures
null
null
null
cs.MA cs.DM
null
This paper treats the problem of the merging of formations, where the underlying model of a formation is graphical. We first analyze the rigidity and persistence of meta-formations, which are formations obtained by connecting several rigid or persistent formations. Persistence is a generalization to directed graphs of the undirected notion of rigidity. In the context of moving autonomous agent formations, persistence characterizes the efficacy of a directed structure of unilateral distance constraints seeking to preserve a formation shape. We derive then, for agents evolving in a two- or three-dimensional space, the conditions under which a set of persistent formations can be merged into a persistent meta-formation, and give the minimal number of interconnections needed for such a merging. We also give conditions for a meta-formation obtained by merging several persistent formations to be persistent.
[ { "version": "v1", "created": "Sun, 14 Oct 2007 13:51:09 GMT" } ]
2007-10-16T00:00:00
[ [ "Hendrickx", "Julien M.", "" ], [ "Yu", "Changbin", "" ], [ "Fidan", "Baris", "" ], [ "Anderson", "Brian D. O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0710.2674
James Ford
James Ford
Linguistic Information Energy
10 pages, 7 graphs
null
null
null
cs.CL cs.IT math.IT
null
In this treatment a text is considered to be a series of word impulses which are read at a constant rate. The brain then assembles these units of information into higher units of meaning. A classical systems approach is used to model an initial part of this assembly process. The concepts of linguistic system response, information energy, and ordering energy are defined and analyzed. Finally, as a demonstration, information energy is used to estimate the publication dates of a series of texts and the similarity of a set of texts.
[ { "version": "v1", "created": "Sun, 14 Oct 2007 16:09:53 GMT" } ]
2007-10-16T00:00:00
[ [ "Ford", "James", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]