id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0710.0386 | Supriya Krishnamurthy | Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurell and Seif Haridi | Comparing Maintenance Strategies for Overlays | 10 pages, 8 figures | null | null | Tech. Report TR-2007-01, Swedish Institute of Computer Science | cs.NI cond-mat.stat-mech cs.DC | null | In this paper, we present an analytical tool for understanding the
performance of structured overlay networks under churn based on the
master-equation approach of physics. We motivate and derive an equation for the
average number of hops taken by lookups during churn, for the Chord network. We
analyse this equation in detail to understand the behaviour with and without
churn. We then use this understanding to predict how lookups will scale for
varying peer population as well as varying the sizes of the routing tables. We
then consider a change in the maintenance algorithm of the overlay, from
periodic stabilisation to a reactive one which corrects fingers only when a
change is detected. We generalise our earlier analysis to underdstand how the
reactive strategy compares with the periodic one.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 20:45:04 GMT"
}
] | 2007-10-03T00:00:00 | [
[
"Krishnamurthy",
"Supriya",
""
],
[
"El-Ansary",
"Sameh",
""
],
[
"Aurell",
"Erik",
""
],
[
"Haridi",
"Seif",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0710.0410 | Philip Baback Alipour | Philip B. Alipour | The Theory of Unified Relativity for a Biovielectroluminescence
Phenomenon via Fly's Visual and Imaging System | 51 pages, 4 figures (2 multi-figures), 4 tables, 3 Appendices, 1
Animation clip. This is a personalized report, extension to project license
No. TXU001347562. A very concise report is to be published in other journals
encompassing the relevant categories on computing and physical sciences | null | null | null | cs.CE cs.CV | null | The elucidation upon fly's neuronal patterns as a link to computer graphics
and memory cards I/O's, is investigated for the phenomenon by propounding a
unified theory of Einstein's two known relativities. It is conclusive that
flies could contribute a certain amount of neuromatrices indicating an imagery
function of a visual-computational system into computer graphics and storage
systems. The visual system involves the time aspect, whereas flies possess
faster pulses compared to humans' visual ability due to the E-field state on an
active fly's eye surface. This behaviour can be tested on a dissected fly
specimen at its ommatidia. Electro-optical contacts and electrodes are wired
through the flesh forming organic emitter layer to stimulate light emission,
thereby to a computer circuit. The next step is applying a threshold voltage
with secondary voltages to the circuit denoting an array of essential
electrodes for bit switch. As a result, circuit's dormant pulses versus active
pulses at the specimen's area are recorded. The outcome matrix possesses a
construction of RGB and time radicals expressing the time problem in
consumption, allocating time into computational algorithms, enhancing the
technology far beyond. The obtained formulation generates consumed distance
cons(x), denoting circuital travel between data source/sink for pixel data and
bendable wavelengths. Once 'image logic' is in place, incorporating this point
of graphical acceleration permits one to enhance graphics and optimize
immensely central processing, data transmissions between memory and computer
visual system. The phenomenon can be mainly used in 360-deg. display/viewing,
3D scanning techniques, military and medicine, a robust and cheap substitution
for e.g. pre-motion pattern analysis, real-time rendering and LCDs.
| [
{
"version": "v1",
"created": "Mon, 1 Oct 2007 23:55:50 GMT"
}
] | 2009-12-05T00:00:00 | [
[
"Alipour",
"Philip B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0710.0431 | Axel Lakus-Becker | Axel Lakus-Becker and Ka-Ming Leung | New Counting Codes for Distributed Video Coding | 10 pages, 4 tables | null | null | null | cs.IT math.IT | null | This paper introduces a new counting code. Its design was motivated by
distributed video coding where, for decoding, error correction methods are
applied to improve predictions. Those error corrections sometimes fail which
results in decoded values worse than the initial prediction. Our code exploits
the fact that bit errors are relatively unlikely events: more than a few bit
errors in a decoded pixel value are rare. With a carefully designed counting
code combined with a prediction those bit errors can be corrected and sometimes
the original pixel value recovered. The error correction improves
significantly. Our new code not only maximizes the Hamming distance between
adjacent (or "near 1") codewords but also between nearby (for example "near 2")
codewords. This is why our code is significantly different from the well-known
maximal counting sequences which have maximal average Hamming distance.
Fortunately, the new counting code can be derived from Gray Codes for every
code word length (i.e. bit depth).
| [
{
"version": "v1",
"created": "Tue, 2 Oct 2007 03:05:17 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Feb 2008 22:50:28 GMT"
}
] | 2008-02-04T00:00:00 | [
[
"Lakus-Becker",
"Axel",
""
],
[
"Leung",
"Ka-Ming",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.0485 | Vladimir Vovk | Vladimir Vovk and Fedor Zhdanov | Prediction with expert advice for the Brier game | 34 pages, 22 figures, 2 tables. The conference version (8 pages) is
published in the ICML 2008 Proceedings | Journal of Machine Learning Research 10 (2009), 2413 - 2440 | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that the Brier game of prediction is mixable and find the optimal
learning rate and substitution function for it. The resulting prediction
algorithm is applied to predict results of football and tennis matches. The
theoretical performance guarantee turns out to be rather tight on these data
sets, especially in the case of the more extensive tennis data.
| [
{
"version": "v1",
"created": "Tue, 2 Oct 2007 10:08:41 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Jun 2008 18:45:01 GMT"
}
] | 2009-11-02T00:00:00 | [
[
"Vovk",
"Vladimir",
""
],
[
"Zhdanov",
"Fedor",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0710.0510 | Jean-Guillaume Dumas | Jean-Guillaume Dumas (LJK) | Q-adic Transform revisited | International Symposium on Symbolic and Algebraic Computation 2008,
Hagenberg : Autriche (2008) | null | null | null | cs.SC | null | We present an algorithm to perform a simultaneous modular reduction of
several residues. This algorithm is applied fast modular polynomial
multiplication. The idea is to convert the $X$-adic representation of modular
polynomials, with $X$ an indeterminate, to a $q$-adic representation where $q$
is an integer larger than the field characteristic. With some control on the
different involved sizes it is then possible to perform some of the $q$-adic
arithmetic directly with machine integers or floating points. Depending also on
the number of performed numerical operations one can then convert back to the
$q$-adic or $X$-adic representation and eventually mod out high residues. In
this note we present a new version of both conversions: more tabulations and a
way to reduce the number of divisions involved in the process are presented.
The polynomial multiplication is then applied to arithmetic in small finite
field extensions.
| [
{
"version": "v1",
"created": "Tue, 2 Oct 2007 12:02:07 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Oct 2007 18:29:40 GMT"
},
{
"version": "v3",
"created": "Wed, 21 Nov 2007 14:56:34 GMT"
},
{
"version": "v4",
"created": "Fri, 4 Apr 2008 09:23:09 GMT"
},
{
"version": "v5",
"created": "Mon, 23 Jun 2008 08:19:23 GMT"
}
] | 2008-06-23T00:00:00 | [
[
"Dumas",
"Jean-Guillaume",
"",
"LJK"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0710.0528 | Francesca Scozzari | Gianluca Amato and Francesca Scozzari | On the interaction between sharing and linearity | null | Theory and Practice of Logic Programming, volume 10, issue 01, pp.
49-112, 2010 | 10.1017/S1471068409990160 | null | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the analysis of logic programs, abstract domains for detecting sharing and
linearity information are widely used. Devising abstract unification algorithms
for such domains has proved to be rather hard. At the moment, the available
algorithms are correct but not optimal, i.e., they cannot fully exploit the
information conveyed by the abstract domains. In this paper, we define a new
(infinite) domain ShLin-w which can be thought of as a general framework from
which other domains can be easily derived by abstraction. ShLin-w makes the
interaction between sharing and linearity explicit. We provide a constructive
characterization of the optimal abstract unification operator on ShLin-w and we
lift it to two well-known abstractions of ShLin-w. Namely, to the classical
Sharing X Lin abstract domain and to the more precise ShLin-2 abstract domain
by Andy King. In the case of single binding substitutions, we obtain optimal
abstract unification algorithms for such domains.
To appear in Theory and Practice of Logic Programming (TPLP).
| [
{
"version": "v1",
"created": "Tue, 2 Oct 2007 13:29:28 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Jul 2009 09:35:55 GMT"
}
] | 2012-10-09T00:00:00 | [
[
"Amato",
"Gianluca",
""
],
[
"Scozzari",
"Francesca",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0710.0531 | Massimiliano Laddomada Ph.D. | Fred Daneshgaran, Massimiliano Laddomada, Marina Mondin | The Problem of Localization in Networks of Randomly Deployed Nodes:
Asymptotic and Finite Analysis, and Thresholds | Submitted to IEEE transactions on information theory (Submission date
October 1, 2007) | null | null | null | cs.DM cs.IT cs.NI math.IT | null | We derive the probability that a randomly chosen NL-node over $S$ gets
localized as a function of a variety of parameters. Then, we derive the
probability that the whole network of NL-nodes over $S$ gets localized. In
connection with the asymptotic thresholds, we show the presence of asymptotic
thresholds on the network localization probability in two different scenarios.
The first refers to dense networks, which arise when the domain $S$ is bounded
and the densities of the two kinds of nodes tend to grow unboundedly. The
second kind of thresholds manifest themselves when the considered domain
increases but the number of nodes grow in such a way that the L-node density
remains constant throughout the investigated domain. In this scenario, what
matters is the minimum value of the maximum transmission range averaged over
the fading process, denoted as $d_{max}$, above which the network of NL-nodes
almost surely gets asymptotically localized.
| [
{
"version": "v1",
"created": "Tue, 2 Oct 2007 13:36:20 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Daneshgaran",
"Fred",
""
],
[
"Laddomada",
"Massimiliano",
""
],
[
"Mondin",
"Marina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.0539 | Anthony A. Ruffa | Anthony A. Ruffa | A Novel Solution to the ATT48 Benchmark Problem | null | null | null | null | cs.DS cs.CC | null | A solution to the benchmark ATT48 Traveling Salesman Problem (from the
TSPLIB95 library) results from isolating the set of vertices into ten
open-ended zones with nine lengthwise boundaries. In each zone, a
minimum-length Hamiltonian Path (HP) is found for each combination of boundary
vertices, leading to an approximation for the minimum-length Hamiltonian Cycle
(HC). Determination of the optimal HPs for subsequent zones has the effect of
automatically filtering out non-optimal HPs from earlier zones. Although the
optimal HC for ATT48 involves only two crossing edges between all zones (with
one exception), adding inter-zone edges can accommodate more complex problems.
| [
{
"version": "v1",
"created": "Tue, 2 Oct 2007 14:26:33 GMT"
}
] | 2007-10-03T00:00:00 | [
[
"Ruffa",
"Anthony A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0710.0550 | Vladimir Gudkov | V. Gudkov and V. Montealegre | Community Detection in Complex Networks by Dynamical Simplex Evolution | null | null | 10.1103/PhysRevE.78.016113 | null | cond-mat.dis-nn cs.NI physics.soc-ph | null | We benchmark the dynamical simplex evolution (DSE) method with several of the
currently available algorithms to detect communities in complex networks by
comparing the fraction of correctly identified nodes for different levels of
``fuzziness'' of random networks composed of well defined communities. The
potential benefits of the DSE method to detect hierarchical sub structures in
complex networks are discussed.
| [
{
"version": "v1",
"created": "Tue, 2 Oct 2007 14:55:35 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Gudkov",
"V.",
""
],
[
"Montealegre",
"V.",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0710.0556 | Xianhua Dai | Xianhua Dai and V. P. Belavkin | A Game Theoretic Approach to Quantum Information | 35 pages | null | null | null | quant-ph cs.GT cs.IT math.IT | null | This work is an application of game theory to quantum information. In a state
estimate, we are given observations distributed according to an unknown
distribution $P_{\theta}$ (associated with award $Q$), which Nature chooses at
random from the set $\{P_{\theta}: \theta \in \Theta \}$ according to a known
prior distribution $\mu$ on $\Theta$, we produce an estimate $M$ for the
unknown distribution $P_{\theta}$, and in the end, we will suffer a relative
entropy cost $\mathcal{R}(P;M)$, measuring the quality of this estimate,
therefore the whole utility is taken as $P \cdot Q -\mathcal{R}(P; M)$.
In an introduction to strategic game, a sufficient condition for minimax
theorem is obtained; An estimate is explored in the frame of game theory, and
in the view of convex conjugate, we reach one new approach to quantum relative
entropy, correspondingly quantum mutual entropy, and quantum channel capacity,
which are more general, in the sense, without Radon-Nikodym (RN) derivatives.
Also the monotonicity of quantum relative entropy and the additivity of quantum
channel capacity are investigated.
| [
{
"version": "v1",
"created": "Tue, 2 Oct 2007 15:17:37 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Dec 2007 10:31:48 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Dai",
"Xianhua",
""
],
[
"Belavkin",
"V. P.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.0564 | Cyril Measson | Yi Lu, Cyril Measson and Andrea Montanari | TP Decoding | 8 pages, 9 figures | See also: 45th Annual Allerton Conference on Communication,
Control, and Computing, Monticello, USA, 2007 | null | null | cs.IT math.IT | null | `Tree pruning' (TP) is an algorithm for probabilistic inference on binary
Markov random fields. It has been recently derived by Dror Weitz and used to
construct the first fully polynomial approximation scheme for counting
independent sets up to the `tree uniqueness threshold.' It can be regarded as a
clever method for pruning the belief propagation computation tree, in such a
way to exactly account for the effect of loops.
In this paper we generalize the original algorithm to make it suitable for
decoding linear codes, and discuss various schemes for pruning the computation
tree. Further, we present the outcomes of numerical simulations on several
linear codes, showing that tree pruning allows to interpolate continuously
between belief propagation and maximum a posteriori decoding. Finally, we
discuss theoretical implications of the new method.
| [
{
"version": "v1",
"created": "Tue, 2 Oct 2007 15:40:14 GMT"
}
] | 2007-10-03T00:00:00 | [
[
"Lu",
"Yi",
""
],
[
"Measson",
"Cyril",
""
],
[
"Montanari",
"Andrea",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.0658 | Yi Lu | Yi Lu, Andrea Montanari and Balaji Prabhakar | Detailed Network Measurements Using Sparse Graph Counters: The Theory | 8 pages. Allerton conference | null | null | null | cs.NI cs.IT math.IT | null | Measuring network flow sizes is important for tasks like accounting/billing,
network forensics and security. Per-flow accounting is considered hard because
it requires that many counters be updated at a very high speed; however, the
large fast memories needed for storing the counters are prohibitively
expensive. Therefore, current approaches aim to obtain approximate flow counts;
that is, to detect large elephant flows and then measure their sizes.
Recently the authors and their collaborators have developed [1] a novel
method for per-flow traffic measurement that is fast, highly memory efficient
and accurate. At the core of this method is a novel counter architecture called
"counter braids.'' In this paper, we analyze the performance of the counter
braid architecture under a Maximum Likelihood (ML) flow size estimation
algorithm and show that it is optimal; that is, the number of bits needed to
store the size of a flow matches the entropy lower bound. While the ML
algorithm is optimal, it is too complex to implement. In [1] we have developed
an easy-to-implement and efficient message passing algorithm for estimating
flow sizes.
| [
{
"version": "v1",
"created": "Tue, 2 Oct 2007 22:03:28 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Oct 2007 05:42:39 GMT"
}
] | 2007-10-07T00:00:00 | [
[
"Lu",
"Yi",
""
],
[
"Montanari",
"Andrea",
""
],
[
"Prabhakar",
"Balaji",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.0672 | Valmir Barbosa | Fabio R. J. Vieira, Valmir C. Barbosa | Optimization of supply diversity for the self-assembly of simple objects
in two and three dimensions | Minor typos corrected | Natural Computing 10 (2011), 551-581 | 10.1007/s11047-010-9209-x | null | cs.NE | null | The field of algorithmic self-assembly is concerned with the design and
analysis of self-assembly systems from a computational perspective, that is,
from the perspective of mathematical problems whose study may give insight into
the natural processes through which elementary objects self-assemble into more
complex ones. One of the main problems of algorithmic self-assembly is the
minimum tile set problem (MTSP), which asks for a collection of types of
elementary objects (called tiles) to be found for the self-assembly of an
object having a pre-established shape. Such a collection is to be as concise as
possible, thus minimizing supply diversity, while satisfying a set of stringent
constraints having to do with the termination and other properties of the
self-assembly process from its tile types. We present a study of what we think
is the first practical approach to MTSP. Our study starts with the introduction
of an evolutionary heuristic to tackle MTSP and includes results from extensive
experimentation with the heuristic on the self-assembly of simple objects in
two and three dimensions. The heuristic we introduce combines classic elements
from the field of evolutionary computation with a problem-specific variant of
Pareto dominance into a multi-objective approach to MTSP.
| [
{
"version": "v1",
"created": "Wed, 3 Oct 2007 18:29:12 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Oct 2007 13:21:09 GMT"
}
] | 2011-03-14T00:00:00 | [
[
"Vieira",
"Fabio R. J.",
""
],
[
"Barbosa",
"Valmir C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0710.0736 | Alessandro Tomasi | David A Kay (Oxford University Computational Laboratory), Alessandro
Tomasi (University of Sussex) | Colour image segmentation by the vector-valued Allen-Cahn phase-field
model: a multigrid solution | 17 pages, 9 figures | IEEE Trans. Im. Proc. 18.10 (2009) | 10.1109/TIP.2009.2026678 | null | cs.CV cs.NA | null | We propose a new method for the numerical solution of a PDE-driven model for
colour image segmentation and give numerical examples of the results. The
method combines the vector-valued Allen-Cahn phase field equation with initial
data fitting terms. This method is known to be closely related to the
Mumford-Shah problem and the level set segmentation by Chan and Vese. Our
numerical solution is performed using a multigrid splitting of a finite element
space, thereby producing an efficient and robust method for the segmentation of
large images.
| [
{
"version": "v1",
"created": "Wed, 3 Oct 2007 08:51:44 GMT"
}
] | 2018-06-08T00:00:00 | [
[
"Kay",
"David A",
"",
"Oxford University Computational Laboratory"
],
[
"Tomasi",
"Alessandro",
"",
"University of Sussex"
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0710.0748 | M Sabu THAMPI | Murali Krishna P, Sabu .M Thampi | A Fast Heuristic Algorithm Based on Verification and Elimination Methods
for Maximum Clique Problem | 06 pages,01 figures | null | null | null | cs.DM cs.CC | null | A clique in an undirected graph G= (V, E) is a subset V' V of vertices, each
pair of which is connected by an edge in E. The clique problem is an
optimization problem of finding a clique of maximum size in graph. The clique
problem is NP-Complete. We have succeeded in developing a fast algorithm for
maximum clique problem by employing the method of verification and elimination.
For a graph of size N there are 2N sub graphs, which may be cliques and hence
verifying all of them, will take a long time. Idea is to eliminate a major
number of sub graphs, which cannot be cliques and verifying only the remaining
sub graphs. This heuristic algorithm runs in polynomial time and executes
successfully for several examples when applied to random graphs and DIMACS
benchmark graphs.
| [
{
"version": "v1",
"created": "Wed, 3 Oct 2007 09:33:20 GMT"
}
] | 2007-10-04T00:00:00 | [
[
"P",
"Murali Krishna",
""
],
[
"Thampi",
"Sabu . M",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0710.0789 | Ying Jun Zhang Ph.D. | Ying Jun Zhang, Peng Xuan Zheng, Soung Chang Liew | Wireless Local Area Networks with Multiple-Packet Reception Capability | null | null | null | null | cs.PF cs.NI | null | Thanks to its simplicity and cost efficiency, wireless local area network
(WLAN) enjoys unique advantages in providing high-speed and low-cost wireless
services in hot spots and indoor environments. Traditional WLAN
medium-access-control (MAC) protocols assume that only one station can transmit
at a time: simultaneous transmissions of more than one station causes the
destruction of all packets involved. By exploiting recent advances in PHY-layer
multiuser detection (MUD) techniques, it is possible for a receiver to receive
multiple packets simultaneously. This paper argues that such multipacket
reception (MPR) capability can greatly enhance the capacity of future WLANs. In
addition, it provides the MAC-layer and PHY-layer designs needed to achieve the
improved capacity. First, to demonstrate MUD/MPR as a powerful
capacity-enhancement technique, we prove a "super-linearity" result, which
states that the system throughput per unit cost increases as the MPR capability
increases. Second, we show that the commonly deployed binary exponential
backoff (BEB) algorithm in today's WLAN MAC may not be optimal in an MPR
system, and that the optimal backoff factor increases with the MPR capability:
the number of packets that can be received simultaneously. Third, based on the
above insights, we design a joint MAC-PHY layer protocol for an IEEE
802.11-like WLAN that incorporates advanced PHY-layer blind detection and MUD
techniques to implement MPR
| [
{
"version": "v1",
"created": "Wed, 3 Oct 2007 13:46:01 GMT"
}
] | 2007-10-04T00:00:00 | [
[
"Zhang",
"Ying Jun",
""
],
[
"Zheng",
"Peng Xuan",
""
],
[
"Liew",
"Soung Chang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.0805 | Elitza Maneva | Elitza Maneva and Alistair Sinclair | On the Satisfiability Threshold and Clustering of Solutions of Random
3-SAT Formulas | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the structure of satisfying assignments of a random 3-SAT formula.
In particular, we show that a random formula of density 4.453 or higher almost
surely has no non-trivial "core" assignments. Core assignments are certain
partial assignments that can be extended to satisfying assignments, and have
been studied recently in connection with the Survey Propagation heuristic for
random SAT. Their existence implies the presence of clusters of solutions, and
they have been shown to exist with high probability below the satisfiability
threshold for k-SAT with k>8, by Achlioptas and Ricci-Tersenghi, STOC 2006. Our
result implies that either this does not hold for 3-SAT or the threshold
density for satisfiability in 3-SAT lies below 4.453.
The main technical tool that we use is a novel simple application of the
first moment method.
| [
{
"version": "v1",
"created": "Wed, 3 Oct 2007 19:04:44 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jun 2008 23:01:27 GMT"
},
{
"version": "v3",
"created": "Sun, 31 Aug 2008 18:27:03 GMT"
}
] | 2008-09-01T00:00:00 | [
[
"Maneva",
"Elitza",
""
],
[
"Sinclair",
"Alistair",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0710.0811 | Joseph O'Rourke | Joseph O'Rourke | Band Unfoldings and Prismatoids: A Counterexample | 5 pages, 3 figures. v2 replaced Fig.1(b) and Fig.3 to illustrate the
angles delta=(1/2)epsilon (rather than delta=epsilon) | null | null | Smith Computer Science 086 | cs.CG | null | This note shows that the hope expressed in [ADL+07]--that the new algorithm
for edge-unfolding any polyhedral band without overlap might lead to an
algorithm for unfolding any prismatoid without overlap--cannot be realized. A
prismatoid is constructed whose sides constitute a nested polyhedral band, with
the property that every placement of the prismatoid top face overlaps with the
band unfolding.
| [
{
"version": "v1",
"created": "Wed, 3 Oct 2007 15:18:35 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Oct 2007 13:10:37 GMT"
}
] | 2007-10-04T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0710.0824 | Norman Danner | Norman Danner and James S. Royer | Two algorithms in search of a type system | 30 pages. Final version to appear in Theory of Computing Systems | null | null | null | cs.LO cs.PL | null | The authors' ATR programming formalism is a version of call-by-value PCF
under a complexity-theoretically motivated type system. ATR programs run in
type-2 polynomial-time and all standard type-2 basic feasible functionals are
ATR-definable (ATR types are confined to levels 0, 1, and 2). A limitation of
the original version of ATR is that the only directly expressible recursions
are tail-recursions. Here we extend ATR so that a broad range of affine
recursions are directly expressible. In particular, the revised ATR can fairly
naturally express the classic insertion- and selection-sort algorithms, thus
overcoming a sticking point of most prior implicit-complexity-based formalisms.
The paper's main work is in refining the original time-complexity semantics for
ATR to show that these new recursion schemes do not lead out of the realm of
feasibility.
| [
{
"version": "v1",
"created": "Wed, 3 Oct 2007 16:04:59 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Apr 2008 19:17:30 GMT"
}
] | 2008-04-18T00:00:00 | [
[
"Danner",
"Norman",
""
],
[
"Royer",
"James S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0710.0842 | Alexis Clay | Alexis Clay (LIPSI) | Syst\`emes interactifs sensibles aux \'emotions : architecture
logicielle | 4 pages | null | null | null | cs.HC | null | We propose a software architecture for interactive systems which allows
integrating the user's emotion. Emotion can be involved in interaction at
several levels. In our application case - ballet dance - emotions is
explicitely manipulated by the interactive system to produce emotion-wise
output. Our architecture model to develop emotion-wise applications is based on
the PAC-Amodeus model. We add a branch to this model, divided into three
components: Data capture, analysis and cue extraction, and finally
interpretation of those cues. We show the different data flows between this
architecture's components depending on the entry point of the emotion branch
within the system. We then illustrate our model by describing our application
case: capturing a ballet dancer's movement to extract the emotions he expresses
and use these emotions to generate graphical content that is displayed on
stage.
| [
{
"version": "v1",
"created": "Wed, 3 Oct 2007 17:23:59 GMT"
}
] | 2007-10-04T00:00:00 | [
[
"Clay",
"Alexis",
"",
"LIPSI"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0710.0847 | Alexis Clay | Alexis Clay (LIPSI), Nadine Couture (LIPSI), Laurence Nigay (CLIPS -
IMAG) | Emotion capture based on body postures and movements | 22 pages | Proceedings of the International Conference on Computing and
e-systems 2007 (TIGERA'07), Hammamet : Tunisie (2007) | null | null | cs.HC | null | In this paper we present a preliminary study for designing interactive
systems that are sensible to human emotions based on the body movements. To do
so, we first review the literature on the various approaches for defining and
characterizing human emotions. After justifying the adopted characterization
space for emotions, we then focus on the movement characteristics that must be
captured by the system for being able to recognize the human emotions.
| [
{
"version": "v1",
"created": "Wed, 3 Oct 2007 17:36:07 GMT"
}
] | 2007-10-04T00:00:00 | [
[
"Clay",
"Alexis",
"",
"LIPSI"
],
[
"Couture",
"Nadine",
"",
"LIPSI"
],
[
"Nigay",
"Laurence",
"",
"CLIPS -\n IMAG"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0710.0859 | Publications Loria | Suzanne Kieffer (INRIA Rocquencourt / INRIA Lorraine - LORIA),
No\"elle Carbonell (INRIA Rocquencourt / INRIA Lorraine - LORIA) | Assistance orale \`a la recherche visuelle - \'etude exp\'erimentale de
l'apport d'indications spatiales \`a la d\'etection de cibles | http://www.hcirn.com/res/period/rihm.php | Revue d'Interaction Homme-Machine 7, 1 (2006) 30 p | null | null | cs.HC | null | This paper describes an experimental study that aims at assessing the actual
contribution of voice system messages to visual search efficiency and comfort.
Messages which include spatial information on the target location are meant to
support search for familiar targets in collections of photographs (30 per
display). 24 participants carried out 240 visual search tasks in two conditions
differing from each other in initial target presentation only. The isolated
target was presented either simultaneously with an oral message (multimodal
presentation, MP), or without any message (visual presentation, VP). Averaged
target selection times were thrice longer and errors almost twice more frequent
in the VP condition than in the MP condition. In addition, the contribution of
spatial messages to visual search rapidity and accuracy was influenced by
display layout and task difficulty. Most results are statistically significant.
Besides, subjective judgments indicate that oral messages were well accepted.
| [
{
"version": "v1",
"created": "Wed, 3 Oct 2007 18:30:07 GMT"
}
] | 2007-10-04T00:00:00 | [
[
"Kieffer",
"Suzanne",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
],
[
"Carbonell",
"Noëlle",
"",
"INRIA Rocquencourt / INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0710.0865 | Lifeng Lai | Lifeng Lai, Hesham El Gamal and H. Vincent Poor | Secrecy Capacity of the Wiretap Channel with Noisy Feedback | To appear in the Proceedings of the 45th Annual Allerton Conference
on Communication, Control and Computing, Monticello, IL, September 26 - 28,
2007 | null | null | null | cs.IT cs.CR math.IT | null | In this work, the role of noisy feedback in enhancing the secrecy capacity of
the wiretap channel is investigated. A model is considered in which the
feed-forward and feedback signals share the same noisy channel. More
specifically, a discrete memoryless modulo-additive channel with a full-duplex
destination node is considered first, and it is shown that a judicious use of
feedback increases the perfect secrecy capacity to the capacity of the
source-destination channel in the absence of the wiretapper. In the
achievability scheme, the feedback signal corresponds to a private key, known
only to the destination. Then a half-duplex system is considered, for which a
novel feedback technique that always achieves a positive perfect secrecy rate
(even when the source-wiretapper channel is less noisy than the
source-destination channel) is proposed. These results hinge on the
modulo-additive property of the channel, which is exploited by the destination
to perform encryption over the channel without revealing its key to the source.
| [
{
"version": "v1",
"created": "Wed, 3 Oct 2007 19:21:08 GMT"
}
] | 2007-10-04T00:00:00 | [
[
"Lai",
"Lifeng",
""
],
[
"Gamal",
"Hesham El",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.0871 | Grenville Croll | Grenville J. Croll, Raymond J. Butler | Spreadsheets in Clinical Medicine | 10 Pages including references | Proc. European Spreadsheet Risks Int. Grp. 2006 7-16 | null | null | cs.CY | null | There is overwhelming evidence that the continued and widespread use of
untested spreadsheets in business gives rise to regular, significant and
unexpected financial losses. Whilst this is worrying, it is perhaps a
relatively minor concern compared with the risks arising from the use of poorly
constructed and/or untested spreadsheets in medicine, a practice that is
already occurring. This article is intended as a warning that the use of poorly
constructed and/or untested spreadsheets in clinical medicine cannot be
tolerated. It supports this warning by reporting on potentially serious
weaknesses found while testing a limited number of publicly available clinical
spreadsheets.
| [
{
"version": "v1",
"created": "Wed, 3 Oct 2007 19:23:55 GMT"
}
] | 2008-03-10T00:00:00 | [
[
"Croll",
"Grenville J.",
""
],
[
"Butler",
"Raymond J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0710.0900 | Wei Kang | Wei Kang and Sennur Ulukus | A New Achievability Scheme for the Relay Channel | 23 pages, 1 figure, submitted to IEEE Trans. on Information Theory | null | null | null | cs.IT math.IT | null | In this paper, we propose a new coding scheme for the general relay channel.
This coding scheme is in the form of a block Markov code. The transmitter uses
a superposition Markov code. The relay compresses the received signal and maps
the compressed version of the received signal into a codeword conditioned on
the codeword of the previous block. The receiver performs joint decoding after
it has received all of the B blocks. We show that this coding scheme can be
viewed as a generalization of the well-known Compress-And-Forward (CAF) scheme
proposed by Cover and El Gamal. Our coding scheme provides options for
preserving the correlation between the channel inputs of the transmitter and
the relay, which is not possible in the CAF scheme. Thus, our proposed scheme
may potentially yield a larger achievable rate than the CAF scheme.
| [
{
"version": "v1",
"created": "Thu, 4 Oct 2007 19:44:49 GMT"
}
] | 2007-10-05T00:00:00 | [
[
"Kang",
"Wei",
""
],
[
"Ulukus",
"Sennur",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.0903 | L.T. Handoko | I. Firmansyah, B. Hermanto and L.T. Handoko | Control and Monitoring System for Modular Wireless Robot | 4 pages, Proceeding of the Industrial Electronics Seminar 2007 | null | null | null | cs.RO | null | We introduce our concept on the modular wireless robot consisting of three
main modules : main unit, data acquisition and data processing modules. We have
developed a generic prototype with an integrated control and monitoring system
to enhance its flexibility, and to enable simple operation through a web-based
interface accessible wirelessly. In present paper, we focus on the
microcontroller based hardware to enable data acquisition and remote mechanical
control.
| [
{
"version": "v1",
"created": "Wed, 3 Oct 2007 23:05:29 GMT"
}
] | 2007-10-05T00:00:00 | [
[
"Firmansyah",
"I.",
""
],
[
"Hermanto",
"B.",
""
],
[
"Handoko",
"L. T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0710.0925 | Kimikazu Kato | Hidetoshi Muta and Kimikazu Kato | Degeneracy of Angular Voronoi Diagram | 8 pages, 11 figures, 1 table, presented at 4th International
Symposium on Voronoi Diagrams in Science and Engineering (ISVD07) | null | null | null | cs.CG | null | Angular Voronoi diagram was introduced by Asano et al. as fundamental
research for a mesh generation. In an angular Voronoi diagram, the edges are
curves of degree three. From view of computational robustness we need to treat
the curves carefully, because they might have a singularity.
We enumerate all the possible types of curves that appear as an edge of an
angular Voronoi diagram, which tells us what kind of degeneracy is possible and
tells us necessity of considering a singularity for computational robustness.
| [
{
"version": "v1",
"created": "Thu, 4 Oct 2007 05:05:06 GMT"
}
] | 2007-10-05T00:00:00 | [
[
"Muta",
"Hidetoshi",
""
],
[
"Kato",
"Kimikazu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0710.0937 | Lavrenov Alexandre | Alexandre Lavrenov | Multichannel algorithm based on generalized positional numeration system | 7 pages, 7 tables, report at the conference "European Economy:
Present And Future" | null | null | null | cs.IT math.IT | null | This report is devoted to introduction in multichannel algorithm based on
generalized numeration notations (GPN). The internal, external and mixed
account are entered. The concept of the GPN and its classification as
decomposition of an integer on composed of integers is discussed. Realization
of multichannel algorithm on the basis of GPN is introduced. In particular,
some properties of Fibonacci multichannel algorithm are discussed.
| [
{
"version": "v1",
"created": "Thu, 4 Oct 2007 07:44:24 GMT"
}
] | 2007-10-05T00:00:00 | [
[
"Lavrenov",
"Alexandre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1001 | Vitaliy Kurlin | V. Kurlin, L. Mihaylova | Connectivity of Random 1-Dimensional Networks | 12 pages, 10 figures | null | null | null | cs.IT cs.DS math.IT stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An important problem in wireless sensor networks is to find the minimal
number of randomly deployed sensors making a network connected with a given
probability. In practice sensors are often deployed one by one along a
trajectory of a vehicle, so it is natural to assume that arbitrary probability
density functions of distances between successive sensors in a segment are
given. The paper computes the probability of connectivity and coverage of
1-dimensional networks and gives estimates for a minimal number of sensors for
important distributions.
| [
{
"version": "v1",
"created": "Thu, 4 Oct 2007 12:57:34 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Oct 2009 21:01:10 GMT"
}
] | 2009-10-10T00:00:00 | [
[
"Kurlin",
"V.",
""
],
[
"Mihaylova",
"L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0710.1007 | Luisa Iturrioz | Luisa Iturrioz | Two representation theorems of three-valued structures by means of
binary relations | 11 pages, accepted to ISMVL'2001 | null | null | null | cs.DM | null | The results here presented are a continuation of the algebraic research line
which attempts to find properties of multiple-valued systems based on a poset
of two agents.
The aim of this paper is to exhibit two relationships between some
three-valued structures and binary relations. The established connections are
so narrow that two representation theorems are obtained.
| [
{
"version": "v1",
"created": "Thu, 4 Oct 2007 13:30:48 GMT"
}
] | 2007-10-05T00:00:00 | [
[
"Iturrioz",
"Luisa",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0710.1149 | Joaquim Borges | J. Borges, C. Fernandez, J. Pujol, J. Rifa, M. Villanueva | Z2Z4-linear codes: generator matrices and duality | This paper will be submitted to IEEE Trans. on Inform. Theory | null | null | null | cs.IT cs.DM math.CO math.IT | null | A code ${\cal C}$ is $\Z_2\Z_4$-additive if the set of coordinates can be
partitioned into two subsets $X$ and $Y$ such that the punctured code of ${\cal
C}$ by deleting the coordinates outside $X$ (respectively, $Y$) is a binary
linear code (respectively, a quaternary linear code). In this paper
$\Z_2\Z_4$-additive codes are studied. Their corresponding binary images, via
the Gray map, are $\Z_2\Z_4$-linear codes, which seem to be a very
distinguished class of binary group codes.
As for binary and quaternary linear codes, for these codes the fundamental
parameters are found and standard forms for generator and parity check matrices
are given. For this, the appropriate inner product is deduced and the concept
of duality for $\Z_2\Z_4$-additive codes is defined. Moreover, the parameters
of the dual codes are computed. Finally, some conditions for self-duality of
$\Z_2\Z_4$-additive codes are given.
| [
{
"version": "v1",
"created": "Fri, 5 Oct 2007 08:53:01 GMT"
}
] | 2007-10-08T00:00:00 | [
[
"Borges",
"J.",
""
],
[
"Fernandez",
"C.",
""
],
[
"Pujol",
"J.",
""
],
[
"Rifa",
"J.",
""
],
[
"Villanueva",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1153 | Patrick Baillot | Vincent Atassi, Patrick Baillot, Kazushige Terui | Verification of Ptime Reducibility for system F Terms: Type Inference
in<br> Dual Light Affine Logic | 32 pages, 8 figures | Logical Methods in Computer Science, Volume 3, Issue 4 (November
15, 2007) lmcs:1234 | 10.2168/LMCS-3(4:10)2007 | null | cs.LO cs.CC | null | In a previous work Baillot and Terui introduced Dual light affine logic
(DLAL) as a variant of Light linear logic suitable for guaranteeing complexity
properties on lambda calculus terms: all typable terms can be evaluated in
polynomial time by beta reduction and all Ptime functions can be represented.
In the present work we address the problem of typing lambda-terms in
second-order DLAL. For that we give a procedure which, starting with a term
typed in system F, determines whether it is typable in DLAL and outputs a
concrete typing if there exists any. We show that our procedure can be run in
time polynomial in the size of the original Church typed system F term.
| [
{
"version": "v1",
"created": "Fri, 5 Oct 2007 09:24:31 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Nov 2007 11:02:50 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Atassi",
"Vincent",
""
],
[
"Baillot",
"Patrick",
""
],
[
"Terui",
"Kazushige",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0710.1182 | Albert Guill\'en i F\`abregas | Joseph J. Boutros, Albert Guillen i Fabregas, Ezio Biglieri and Gilles
Zemor | Low-Density Parity-Check Codes for Nonergodic Block-Fading Channels | Submitted to the IEEE Transactions on Information Theory | null | 10.1109/TIT.2010.2053890 | null | cs.IT math.IT | null | We solve the problem of designing powerful low-density parity-check (LDPC)
codes with iterative decoding for the block-fading channel. We first study the
case of maximum-likelihood decoding, and show that the design criterion is
rather straightforward. Unfortunately, optimal constructions for
maximum-likelihood decoding do not perform well under iterative decoding. To
overcome this limitation, we then introduce a new family of full-diversity LDPC
codes that exhibit near-outage-limit performance under iterative decoding for
all block-lengths. This family competes with multiplexed parallel turbo codes
suitable for nonergodic channels and recently reported in the literature.
| [
{
"version": "v1",
"created": "Fri, 5 Oct 2007 10:47:52 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Boutros",
"Joseph J.",
""
],
[
"Fabregas",
"Albert Guillen i",
""
],
[
"Biglieri",
"Ezio",
""
],
[
"Zemor",
"Gilles",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1190 | Nitin Salodkar | Nitin Salodkar, Abhay Karandikar and Vivek S. Borkar | Power Efficient Scheduling under Delay Constraints over Multi-user
Wireless Channels | 14 pages, 14 figures | null | null | null | cs.NI cs.MA | null | In this paper, we consider the problem of power efficient uplink scheduling
in a Time Division Multiple Access (TDMA) system over a fading wireless
channel. The objective is to minimize the power expenditure of each user
subject to satisfying individual user delay. We make the practical assumption
that the system statistics are unknown, i.e., the probability distributions of
the user arrivals and channel states are unknown. The problem has the structure
of a Constrained Markov Decision Problem (CMDP). Determining an optimal policy
under for the CMDP faces the problems of state space explosion and unknown
system statistics. To tackle the problem of state space explosion, we suggest
determining the transmission rate of a particular user in each slot based on
its channel condition and buffer occupancy only. The rate allocation algorithm
for a particular user is a learning algorithm that learns about the buffer
occupancy and channel states of that user during system execution and thus
addresses the issue of unknown system statistics. Once the rate of each user is
determined, the proposed algorithm schedules the user with the best rate. Our
simulations within an IEEE 802.16 system demonstrate that the algorithm is
indeed able to satisfy the user specified delay constraints. We compare the
performance of our algorithm with the well known M-LWDF algorithm. Moreover, we
demonstrate that the power expended by the users under our algorithm is quite
low.
| [
{
"version": "v1",
"created": "Fri, 5 Oct 2007 12:51:46 GMT"
}
] | 2007-10-08T00:00:00 | [
[
"Salodkar",
"Nitin",
""
],
[
"Karandikar",
"Abhay",
""
],
[
"Borkar",
"Vivek S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0710.1203 | Dimitri Petritis | Thomas Sierocinski (IRMAR), Anthony Le B\'echec, Nathalie Th\'eret,
Dimitri Petritis (IRMAR) | Semantic distillation: a method for clustering objects by their
contextual specificity | Accepted for publication in Studies in Computational Intelligence,
Springer-Verlag | null | null | 2007-58 | math.PR cs.DB math.ST q-bio.QM stat.ML stat.TH | null | Techniques for data-mining, latent semantic analysis, contextual search of
databases, etc. have long ago been developed by computer scientists working on
information retrieval (IR). Experimental scientists, from all disciplines,
having to analyse large collections of raw experimental data (astronomical,
physical, biological, etc.) have developed powerful methods for their
statistical analysis and for clustering, categorising, and classifying objects.
Finally, physicists have developed a theory of quantum measurement, unifying
the logical, algebraic, and probabilistic aspects of queries into a single
formalism. The purpose of this paper is twofold: first to show that when
formulated at an abstract level, problems from IR, from statistical data
analysis, and from physical measurement theories are very similar and hence can
profitably be cross-fertilised, and, secondly, to propose a novel method of
fuzzy hierarchical clustering, termed \textit{semantic distillation} --
strongly inspired from the theory of quantum measurement --, we developed to
analyse raw data coming from various types of experiments on DNA arrays. We
illustrate the method by analysing DNA arrays experiments and clustering the
genes of the array according to their specificity.
| [
{
"version": "v1",
"created": "Fri, 5 Oct 2007 12:30:43 GMT"
},
{
"version": "v2",
"created": "Sat, 6 Oct 2007 09:57:46 GMT"
}
] | 2007-10-09T00:00:00 | [
[
"Sierocinski",
"Thomas",
"",
"IRMAR"
],
[
"Béchec",
"Anthony Le",
"",
"IRMAR"
],
[
"Théret",
"Nathalie",
"",
"IRMAR"
],
[
"Petritis",
"Dimitri",
"",
"IRMAR"
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0710.1208 | Dominique Duval | Dominique Duval (LJK) | Diagrammatic Inference | 16 pages | null | null | null | cs.LO math.CT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diagrammatic logics were introduced in 2002, with emphasis on the notions of
specifications and models. In this paper we improve the description of the
inference process, which is seen as a Yoneda functor on a bicategory of
fractions. A diagrammatic logic is defined from a morphism of limit sketches
(called a propagator) which gives rise to an adjunction, which in turn
determines a bicategory of fractions. The propagator, the adjunction and the
bicategory provide respectively the syntax, the models and the inference
process for the logic. Then diagrammatic logics and their morphisms are applied
to the semantics of side effects in computer languages.
| [
{
"version": "v1",
"created": "Fri, 5 Oct 2007 12:36:02 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Nov 2009 13:11:34 GMT"
}
] | 2009-11-20T00:00:00 | [
[
"Duval",
"Dominique",
"",
"LJK"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
0710.1254 | Hua Li | Hua Li and Edwin K.P. Chong | A Group Theoretic Model for Information | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | In this paper we formalize the notions of information elements and
information lattices, first proposed by Shannon. Exploiting this formalization,
we identify a comprehensive parallelism between information lattices and
subgroup lattices. Qualitatively, we demonstrate isomorphisms between
information lattices and subgroup lattices. Quantitatively, we establish a
decisive approximation relation between the entropy structures of information
lattices and the log-index structures of the corresponding subgroup lattices.
This approximation extends the approximation for joint entropies carried out
previously by Chan and Yeung. As a consequence of our approximation result, we
show that any continuous law holds in general for the entropies of information
elements if and only if the same law holds in general for the log-indices of
subgroups. As an application, by constructing subgroup counterexamples we find
surprisingly that common information, unlike joint information, obeys neither
the submodularity nor the supermodularity law. We emphasize that the notion of
information elements is conceptually significant--formalizing it helps to
reveal the deep connection between information theory and group theory. The
parallelism established in this paper admits an appealing group-action
explanation and provides useful insights into the intrinsic structure among
information elements from a group-theoretic perspective.
| [
{
"version": "v1",
"created": "Fri, 5 Oct 2007 18:37:21 GMT"
}
] | 2007-10-08T00:00:00 | [
[
"Li",
"Hua",
""
],
[
"Chong",
"Edwin K. P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1275 | Patricio Parada | Francisco J. Piera, Patricio Parada | On Convergence Properties of Shannon Entropy | Submitted to IEEE Transactions on Information Theory | null | 10.1134/S003294600902001X | null | cs.IT math.IT | null | Convergence properties of Shannon Entropy are studied. In the differential
setting, it is shown that weak convergence of probability measures, or
convergence in distribution, is not enough for convergence of the associated
differential entropies. A general result for the desired differential entropy
convergence is provided, taking into account both compactly and uncompactly
supported densities. Convergence of differential entropy is also characterized
in terms of the Kullback-Liebler discriminant for densities with fairly general
supports, and it is shown that convergence in variation of probability measures
guarantees such convergence under an appropriate boundedness condition on the
densities involved. Results for the discrete setting are also provided,
allowing for infinitely supported probability measures, by taking advantage of
the equivalence between weak convergence and convergence in variation in this
setting.
| [
{
"version": "v1",
"created": "Fri, 5 Oct 2007 17:26:41 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Piera",
"Francisco J.",
""
],
[
"Parada",
"Patricio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1280 | Patricio Parada | Francisco J. Piera, Patricio Parada | On the Relationship between Mutual Information and Minimum Mean-Square
Errors in Stochastic Dynamical Systems | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | We consider a general stochastic input-output dynamical system with output
evolving in time as the solution to a functional coefficients, It\^{o}'s
stochastic differential equation, excited by an input process. This general
class of stochastic systems encompasses not only the classical communication
channel models, but also a wide variety of engineering systems appearing
through a whole range of applications. For this general setting we find
analogous of known relationships linking input-output mutual information and
minimum mean causal and non-causal square errors, previously established in the
context of additive Gaussian noise communication channels. Relationships are
not only established in terms of time-averaged quantities, but also their
time-instantaneous, dynamical counterparts are presented. The problem of
appropriately introducing in this general framework a signal-to-noise ratio
notion expressed through a signal-to-noise ratio parameter is also taken into
account, identifying conditions for a proper and meaningful interpretation.
| [
{
"version": "v1",
"created": "Fri, 5 Oct 2007 17:43:51 GMT"
}
] | 2007-10-08T00:00:00 | [
[
"Piera",
"Francisco J.",
""
],
[
"Parada",
"Patricio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1325 | Ashish Khisti | Ashish Khisti and Gregory Wornell | The MIMOME Channel | In Proceedings of the 45th Annual Allerton Conference on
Communication, Control, and Computing, October 2007, 8 pages | null | null | null | cs.IT math.IT | null | The MIMOME channel is a Gaussian wiretap channel in which the sender,
receiver, and eavesdropper all have multiple antennas. We characterize the
secrecy capacity as the saddle-value of a minimax problem. Among other
implications, our result establishes that a Gaussian distribution maximizes the
secrecy capacity characterization of Csisz{\'a}r and K{\"o}rner when applied to
the MIMOME channel. We also determine a necessary and sufficient condition for
the secrecy capacity to be zero. Large antenna array analysis of this condition
reveals several useful insights into the conditions under which secure
communication is possible.
| [
{
"version": "v1",
"created": "Fri, 5 Oct 2007 22:25:19 GMT"
}
] | 2007-10-09T00:00:00 | [
[
"Khisti",
"Ashish",
""
],
[
"Wornell",
"Gregory",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1336 | Niranjay Ravindran | Niranjay Ravindran, Nihar Jindal | Multi-User Diversity vs. Accurate Channel Feedback for MIMO Broadcast
Channels | 6 pages, 7 figures, submitted to ICC 2008 | null | null | null | cs.IT math.IT | null | A multiple transmit antenna, single receive antenna (per receiver) downlink
channel with limited channel feedback is considered. Given a constraint on the
total system-wide channel feedback, the following question is considered: is it
preferable to get low-rate feedback from a large number of receivers or to
receive high-rate/high-quality feedback from a smaller number of (randomly
selected) receivers? Acquiring feedback from many users allows multi-user
diversity to be exploited, while high-rate feedback allows for very precise
selection of beamforming directions. It is shown that systems in which a
limited number of users feedback high-rate channel information significantly
outperform low-rate/many user systems. While capacity increases only double
logarithmically with the number of users, the marginal benefit of channel
feedback is very significant up to the point where the CSI is essentially
perfect.
| [
{
"version": "v1",
"created": "Sat, 6 Oct 2007 01:21:55 GMT"
}
] | 2007-10-09T00:00:00 | [
[
"Ravindran",
"Niranjay",
""
],
[
"Jindal",
"Nihar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1383 | Dmitry Panchenko | Andrea Conti, Dmitry Panchenko, Sergiy Sidenko, Velio Tralli | Log-concavity property of the error probability with application to
local bounds for wireless communications | null | IEEE Trans. Inform. Theory, 2009, vol. 55, no. 6, 2766-2775. | 10.1109/TIT.2009.2018273 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A clear understanding the behavior of the error probability (EP) as a
function of signal-to-noise ratio (SNR) and other system parameters is
fundamental for assessing the design of digital wireless communication
systems.We propose an analytical framework based on the log-concavity property
of the EP which we prove for a wide family of multidimensional modulation
formats in the presence of Gaussian disturbances and fading. Based on this
property, we construct a class of local bounds for the EP that improve known
generic bounds in a given region of the SNR and are invertible, as well as
easily tractable for further analysis. This concept is motivated by the fact
that communication systems often operate with performance in a certain region
of interest (ROI) and, thus, it may be advantageous to have tighter bounds
within this region instead of generic bounds valid for all SNRs. We present a
possible application of these local bounds, but their relevance is beyond the
example made in this paper.
| [
{
"version": "v1",
"created": "Sat, 6 Oct 2007 17:59:32 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Feb 2009 17:09:15 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Conti",
"Andrea",
""
],
[
"Panchenko",
"Dmitry",
""
],
[
"Sidenko",
"Sergiy",
""
],
[
"Tralli",
"Velio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1385 | Lifeng Lai | Lifeng Lai, Hesham El Gamal, Hai Jiang and H. Vincent Poor | Cognitive Medium Access: Exploration, Exploitation and Competition | Submitted to IEEE/ACM Trans. on Networking, 14 pages, 2 figures | null | null | null | cs.IT cs.NI math.IT | null | This paper establishes the equivalence between cognitive medium access and
the competitive multi-armed bandit problem. First, the scenario in which a
single cognitive user wishes to opportunistically exploit the availability of
empty frequency bands in the spectrum with multiple bands is considered. In
this scenario, the availability probability of each channel is unknown to the
cognitive user a priori. Hence efficient medium access strategies must strike a
balance between exploring the availability of other free channels and
exploiting the opportunities identified thus far. By adopting a Bayesian
approach for this classical bandit problem, the optimal medium access strategy
is derived and its underlying recursive structure is illustrated via examples.
To avoid the prohibitive computational complexity of the optimal strategy, a
low complexity asymptotically optimal strategy is developed. The proposed
strategy does not require any prior statistical knowledge about the traffic
pattern on the different channels. Next, the multi-cognitive user scenario is
considered and low complexity medium access protocols, which strike the optimal
balance between exploration and exploitation in such competitive environments,
are developed. Finally, this formalism is extended to the case in which each
cognitive user is capable of sensing and using multiple channels
simultaneously.
| [
{
"version": "v1",
"created": "Sat, 6 Oct 2007 18:24:33 GMT"
}
] | 2007-10-09T00:00:00 | [
[
"Lai",
"Lifeng",
""
],
[
"Gamal",
"Hesham El",
""
],
[
"Jiang",
"Hai",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1404 | M Sabu THAMPI | Sabu M. Thampi, Ashwin a K | Performance Comparison of Persistence Frameworks | null | null | null | null | cs.DB cs.IR | null | One of the essential and most complex components in the software development
process is the database. The complexity increases when the "orientation" of the
interacting components differs. A persistence framework moves the program data
in its most natural form to and from a permanent data store, the database. Thus
a persistence framework manages the database and the mapping between the
database and the objects. This paper compares the performance of two
persistence frameworks ? Hibernate and iBatis?s SQLMaps using a banking
database. The performance of both of these tools in single and multi-user
environments are evaluated.
| [
{
"version": "v1",
"created": "Sun, 7 Oct 2007 08:22:53 GMT"
}
] | 2007-10-09T00:00:00 | [
[
"Thampi",
"Sabu M.",
""
],
[
"K",
"Ashwin a",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0710.1418 | Vladimir Anashin | Vladimir Anashin | Non-Archimedean Ergodic Theory and Pseudorandom Generators | Submitted to The Computer Journal | The Computer Journal, 53(4):370--392, 2010 | 10.1093/comjnl/bxm101 | null | math.DS cs.IT math.IT | null | The paper develops techniques in order to construct computer programs,
pseudorandom number generators (PRNG), that produce uniformly distributed
sequences. The paper exploits an approach that treats standard processor
instructions (arithmetic and bitwise logical ones) as continuous functions on
the space of 2-adic integers. Within this approach, a PRNG is considered as a
dynamical system and is studied by means of the non-Archimedean ergodic theory.
| [
{
"version": "v1",
"created": "Sun, 7 Oct 2007 13:20:51 GMT"
}
] | 2011-11-15T00:00:00 | [
[
"Anashin",
"Vladimir",
""
]
] | [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1435 | Michael Mahoney | Petros Drineas, Michael W. Mahoney, S. Muthukrishnan, and Tamas Sarlos | Faster Least Squares Approximation | 25 pages; minor changes from previous version; this version will
appear in Numerische Mathematik | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Least squares approximation is a technique to find an approximate solution to
a system of linear equations that has no exact solution. In a typical setting,
one lets $n$ be the number of constraints and $d$ be the number of variables,
with $n \gg d$. Then, existing exact methods find a solution vector in
$O(nd^2)$ time. We present two randomized algorithms that provide very accurate
relative-error approximations to the optimal value and the solution vector of a
least squares approximation problem more rapidly than existing exact
algorithms. Both of our algorithms preprocess the data with the Randomized
Hadamard Transform. One then uniformly randomly samples constraints and solves
the smaller problem on those constraints, and the other performs a sparse
random projection and solves the smaller problem on those projected
coordinates. In both cases, solving the smaller problem provides relative-error
approximations, and, if $n$ is sufficiently larger than $d$, the approximate
solution can be computed in $O(nd \log d)$ time.
| [
{
"version": "v1",
"created": "Sun, 7 Oct 2007 17:37:37 GMT"
},
{
"version": "v2",
"created": "Mon, 25 May 2009 23:01:43 GMT"
},
{
"version": "v3",
"created": "Mon, 3 May 2010 06:55:54 GMT"
},
{
"version": "v4",
"created": "Sun, 26 Sep 2010 18:36:00 GMT"
}
] | 2010-09-28T00:00:00 | [
[
"Drineas",
"Petros",
""
],
[
"Mahoney",
"Michael W.",
""
],
[
"Muthukrishnan",
"S.",
""
],
[
"Sarlos",
"Tamas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0710.1436 | Wojciech Wislicki | Ryszard Gokieli, Krzysztof Nawrocki, Adam Padee, Dorota Stojda, Karol
Wawrzyniak, Wojciech Wislicki | Polish grid infrastructure for science and research | Proceeedings of IEEE Eurocon 2007, Warsaw, Poland, 9-12 Sep. 2007,
p.446 | 2007, ISBN 1-4244-0813-X | 10.1109/EURCON.2007.4400477 | null | cs.DC hep-ex | null | Structure, functionality, parameters and organization of the computing Grid
in Poland is described, mainly from the perspective of high-energy particle
physics community, currently its largest consumer and developer. It represents
distributed Tier-2 in the worldwide Grid infrastructure. It also provides
services and resources for data-intensive applications in other sciences.
| [
{
"version": "v1",
"created": "Sun, 7 Oct 2007 17:45:59 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Gokieli",
"Ryszard",
""
],
[
"Nawrocki",
"Krzysztof",
""
],
[
"Padee",
"Adam",
""
],
[
"Stojda",
"Dorota",
""
],
[
"Wawrzyniak",
"Karol",
""
],
[
"Wislicki",
"Wojciech",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Physics",
"code": "hep-ex",
"description": "Description coming soon",
"span": "(High Energy Physics - Experiment)"
}
] |
0710.1455 | Mark Burgin | Mark Burgin | Superrecursive Features of Interactive Computation | null | null | null | null | cs.DC cs.PF | null | Functioning and interaction of distributed devices and concurrent algorithms
are analyzed in the context of the theory of algorithms. Our main concern here
is how and under what conditions algorithmic interactive devices can be more
powerful than the recursive models of computation, such as Turing machines.
Realization of such a higher computing power makes these systems
superrecursive. We find here five sources for superrecursiveness in
interaction. In addition, we prove that when all of these sources are excluded,
the algorithmic interactive system in question is able to perform only
recursive computations. These results provide computer scientists with
necessary and sufficient conditions for achieving superrecursiveness by
algorithmic interactive devices.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 01:56:20 GMT"
}
] | 2007-10-09T00:00:00 | [
[
"Burgin",
"Mark",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0710.1462 | Christian Leonard | Christian L\'eonard (MODAL'x, Cmap) | Minimization of entropy functionals | null | null | 10.1016/j.jmaa.2008.04.048 | null | math.OC cs.IT math.IT math.PR | null | Entropy functionals (i.e. convex integral functionals) and extensions of
these functionals are minimized on convex sets. This paper is aimed at reducing
as much as possible the assumptions on the constraint set. Dual equalities and
characterizations of the minimizers are obtained with weak constraint
qualifications.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 05:01:20 GMT"
}
] | 2015-05-13T00:00:00 | [
[
"Léonard",
"Christian",
"",
"MODAL'x, Cmap"
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0710.1467 | Dae San Kim | Dae San Kim | Weight Distributions of Hamming Codes | null | null | null | null | cs.IT math.IT math.NT | null | We derive a recursive formula determing the weight distribution of the
[n=(q^m-1)/(q-1), n-m, 3] Hamming code H(m,q), when (m, q-1)=1. Here q is a
prime power. The proof is based on Moisio's idea of using Pless power moment
identity together with exponential sum techniques.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 05:50:05 GMT"
}
] | 2007-10-09T00:00:00 | [
[
"Kim",
"Dae San",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
0710.1469 | Dae San Kim | Dae San Kim | Weight Distributions of Hamming Codes (II) | null | null | null | null | cs.IT math.IT math.NT | null | In a previous paper, we derived a recursive formula determining the weight
distributions of the [n=(q^m-1)/(q-1)] Hamming code H(m,q), when (m,q-1)=1.
Here q is a prime power. We note here that the formula actually holds for any
positive integer m and any prime power q, without the restriction (m, q-1)=1.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 06:07:19 GMT"
}
] | 2007-10-09T00:00:00 | [
[
"Kim",
"Dae San",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
0710.1481 | Stasinos Konstantopoulos | Stasinos Konstantopoulos | What's in a Name? | Presented at the Computational Phonology Workshop, 6th Intl. Conf.
Recent Advances in NLP, Borovets, Bulgaria, September 2007 | null | null | null | cs.CL cs.AI | null | This paper describes experiments on identifying the language of a single name
in isolation or in a document written in a different language. A new corpus has
been compiled and made available, matching names against languages. This corpus
is used in a series of experiments measuring the performance of general
language models and names-only language models on the language identification
task. Conclusions are drawn from the comparison between using general language
models and names-only language models and between identifying the language of
isolated names and the language of very short document fragments. Future
research directions are outlined.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 08:36:32 GMT"
}
] | 2007-10-09T00:00:00 | [
[
"Konstantopoulos",
"Stasinos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0710.1482 | Amey Karkare | Amey Karkare, Amitabha Sanyal, Uday Khedker | Heap Reference Analysis for Functional Programs | null | null | null | null | cs.PL cs.SE | null | Current garbage collectors leave a lot of garbage uncollected because they
conservatively approximate liveness by reachability from program variables. In
this paper, we describe a sequence of static analyses that takes as input a
program written in a first-order, eager functional programming language, and
finds at each program point the references to objects that are guaranteed not
to be used in the future. Such references are made null by a transformation
pass. If this makes the object unreachable, it can be collected by the garbage
collector. This causes more garbage to be collected, resulting in fewer
collections. Additionally, for those garbage collectors which scavenge live
objects, it makes each collection faster.
The interesting aspects of our method are both in the identification of the
analyses required to solve the problem and the way they are carried out. We
identify three different analyses -- liveness, sharing and accessibility. In
liveness and sharing analyses, the function definitions are analyzed
independently of the calling context. This is achieved by using a variable to
represent the unknown context of the function being analyzed and setting up
constraints expressing the effect of the function with respect to the variable.
The solution of the constraints is a summary of the function that is
parameterized with respect to a calling context and is used to analyze function
calls. As a result we achieve context sensitivity at call sites without
analyzing the function multiple number of times.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 08:43:58 GMT"
}
] | 2007-10-09T00:00:00 | [
[
"Karkare",
"Amey",
""
],
[
"Sanyal",
"Amitabha",
""
],
[
"Khedker",
"Uday",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0710.1484 | Denis Kutuzov V | Denis Kutuzov | The structure and modeling results of the parallel spatial switching
system | 3 pages, 2 figure | IEEE International Siberian Conference on Control and
Communications (SIBCON-2007). Proceedings. Tomsk, April 20-21, 2007. (pp.
86-88). IEEE Catalog Number: 07EX1367 | 10.1109/SIBCON.2007.371303 | null | cs.NI cs.DC | null | Problems of the switching parallel system designing provided spatial
switching of packets from random time are discussed. Results of modeling of
switching system as systems of mass service are resulted.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 08:39:50 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Kutuzov",
"Denis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0710.1499 | Jukka Suomela | Patrik Flor\'een, Petteri Kaski, Topi Musto, Jukka Suomela | Approximating max-min linear programs with local algorithms | 16 pages, 2 figures | null | 10.1109/IPDPS.2008.4536235 | null | cs.DC | null | A local algorithm is a distributed algorithm where each node must operate
solely based on the information that was available at system startup within a
constant-size neighbourhood of the node. We study the applicability of local
algorithms to max-min LPs where the objective is to maximise $\min_k \sum_v
c_{kv} x_v$ subject to $\sum_v a_{iv} x_v \le 1$ for each $i$ and $x_v \ge 0$
for each $v$. Here $c_{kv} \ge 0$, $a_{iv} \ge 0$, and the support sets $V_i =
\{v : a_{iv} > 0 \}$, $V_k = \{v : c_{kv}>0 \}$, $I_v = \{i : a_{iv} > 0 \}$
and $K_v = \{k : c_{kv} > 0 \}$ have bounded size. In the distributed setting,
each agent $v$ is responsible for choosing the value of $x_v$, and the
communication network is a hypergraph $\mathcal{H}$ where the sets $V_k$ and
$V_i$ constitute the hyperedges. We present inapproximability results for a
wide range of structural assumptions; for example, even if $|V_i|$ and $|V_k|$
are bounded by some constants larger than 2, there is no local approximation
scheme. To contrast the negative results, we present a local approximation
algorithm which achieves good approximation ratios if we can bound the relative
growth of the vertex neighbourhoods in $\mathcal{H}$.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 09:46:47 GMT"
}
] | 2008-09-09T00:00:00 | [
[
"Floréen",
"Patrik",
""
],
[
"Kaski",
"Petteri",
""
],
[
"Musto",
"Topi",
""
],
[
"Suomela",
"Jukka",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0710.1511 | Damian H. Zanette | Damian H. Zanette | Demographic growth and the distribution of language sizes | To appear in Int. J. Mod. Phys. C (2008) | null | 10.1142/S0129183108012042 | null | physics.data-an cs.CL physics.soc-ph | null | It is argued that the present log-normal distribution of language sizes is,
to a large extent, a consequence of demographic dynamics within the population
of speakers of each language. A two-parameter stochastic multiplicative process
is proposed as a model for the population dynamics of individual languages, and
applied over a period spanning the last ten centuries. The model disregards
language birth and death. A straightforward fitting of the two parameters,
which statistically characterize the population growth rate, predicts a
distribution of language sizes in excellent agreement with empirical data.
Numerical simulations, and the study of the size distribution within language
families, validate the assumptions at the basis of the model.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 11:16:51 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Zanette",
"Damian H.",
""
]
] | [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0710.1522 | Jatin Thukral | J. Thukral and H. B\"olcskei | Distributed spatial multiplexing with 1-bit feedback | 8 pages, 4 figures, presented at Forty-Fifth Annual Allerton
Conference on Communication, Control and Computing, September 2007 | null | null | null | cs.IT math.IT | null | We analyze a slow-fading interference network with MN non-cooperating
single-antenna sources and M non-cooperating single-antenna destinations. In
particular, we assume that the sources are divided into M mutually exclusive
groups of N sources each, every group is dedicated to transmit a common message
to a unique destination, all transmissions occur concurrently and in the same
frequency band and a dedicated 1-bit broadcast feedback channel from each
destination to its corresponding group of sources exists. We provide a
feedback-based iterative distributed (multi-user) beamforming algorithm, which
"learns" the channels between each group of sources and its assigned
destination. This algorithm is a straightforward generalization, to the
multi-user case, of the feedback-based iterative distributed beamforming
algorithm proposed recently by Mudumbai et al., in IEEE Trans. Inf. Th.
(submitted) for networks with a single group of sources and a single
destination. Putting the algorithm into a Markov chain context, we provide a
simple convergence proof. We then show that, for M finite and N approaching
infinity, spatial multiplexing based on the beamforming weights produced by the
algorithm achieves full spatial multiplexing gain of M and full per-stream
array gain of N, provided the time spent "learning'' the channels scales
linearly in N. The network is furthermore shown to "crystallize''. Finally, we
characterize the corresponding crystallization rate.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 11:56:28 GMT"
}
] | 2007-10-09T00:00:00 | [
[
"Thukral",
"J.",
""
],
[
"Bölcskei",
"H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1525 | Sebastiano Vigna | Sebastiano Vigna, Paolo Boldi | Efficient Optimally Lazy Algorithms for Minimal-Interval Semantics | 24 pages, 4 figures. A preliminary (now outdated) version was
presented at SPIRE 2006 | null | null | null | cs.DS cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Minimal-interval semantics associates with each query over a document a set
of intervals, called witnesses, that are incomparable with respect to inclusion
(i.e., they form an antichain): witnesses define the minimal regions of the
document satisfying the query. Minimal-interval semantics makes it easy to
define and compute several sophisticated proximity operators, provides snippets
for user presentation, and can be used to rank documents. In this paper we
provide algorithms for computing conjunction and disjunction that are linear in
the number of intervals and logarithmic in the number of operands; for
additional operators, such as ordered conjunction and Brouwerian difference, we
provide linear algorithms. In all cases, space is linear in the number of
operands. More importantly, we define a formal notion of optimal laziness, and
either prove it, or prove its impossibility, for each algorithm. We cast our
results in a general framework of antichains of intervals on total orders,
making our algorithms directly applicable to other domains.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 12:15:48 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Aug 2016 08:57:30 GMT"
}
] | 2016-08-12T00:00:00 | [
[
"Vigna",
"Sebastiano",
""
],
[
"Boldi",
"Paolo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0710.1589 | Guangwen Li | Guangwen Li, Guangzeng Feng | Fast Reliability-based Algorithm of Finding Minimum-weight Codewords for
LDPC Codes | 8 pages, 1 table | null | null | null | cs.IT math.IT | null | Despite the NP hardness of acquiring minimum distance $d_m$ for linear codes
theoretically, in this paper we propose one experimental method of finding
minimum-weight codewords, the weight of which is equal to $d_m$ for LDPC codes.
One existing syndrome decoding method, called serial belief propagation (BP)
with ordered statistic decoding (OSD), is adapted to serve our purpose. We hold
the conjecture that among many candidate error patterns in OSD reprocessing,
modulo 2 addition of the lightest error pattern with one of the left error
patterns may generate a light codeword. When the decoding syndrome changes to
all-zero state, the lightest error pattern reduces to all-zero, the lightest
non-zero error pattern is a valid codeword to update lightest codeword list.
Given sufficient codewords sending, the survived lightest codewords are
likely to be the target. Compared with existing techniques, our method
demonstrates its efficiency in the simulation of several interested LDPC codes.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 16:59:11 GMT"
}
] | 2007-10-09T00:00:00 | [
[
"Li",
"Guangwen",
""
],
[
"Feng",
"Guangzeng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1595 | Peng Wu | Peng Wu and Nihar Jindal | Analysis of Fixed Outage Transmission Schemes: A Finer Look at the Full
Multiplexing Point | 5 pages,5 figures, conference | null | null | null | cs.IT math.IT | null | This paper studies the performance of transmission schemes that have rate
that increases with average SNR while maintaining a fixed outage probability.
This is in contrast to the classical Zheng-Tse diversity-multiplexing tradeoff
(DMT) that focuses on increasing rate and decreasing outage probability. Three
different systems are explored: antenna diversity systems, time/frequency
diversity systems, and automatic repeat request (ARQ) systems. In order to
accurately study performance in the fixed outage setting, it is necesary to go
beyond the coarse, asymptotic multiplexing gain metric. In the case of antenna
diversity and time/frequency diversity, an affine approximation to high SNR
outage capacity (i.e., multiplexing gain plus a power/rate offset) accurately
describes performance and shows the very significant benefits of diversity. ARQ
is also seen to provide a significant performance advantage, but even an affine
approximation to outage capacity is unable to capture this advantage and outage
capacity must be directly studied in the non-asymptotic regime.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 17:04:46 GMT"
}
] | 2007-10-09T00:00:00 | [
[
"Wu",
"Peng",
""
],
[
"Jindal",
"Nihar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1624 | Eduardo Novais | E. Novais, Eduardo R. Mucciolo, Harold U. Baranger | Hamiltonian Formulation of Quantum Error Correction and Correlated
Noise: The Effects Of Syndrome Extraction in the Long Time Limit | 19 pages, 5 figures. Includes response to arXiv:quant-ph/0702050. New
title and an additional example | Phys. Rev. A 78, 012314 (2008) | 10.1103/PhysRevA.78.012314 | null | quant-ph cond-mat.stat-mech cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze the long time behavior of a quantum computer running a quantum
error correction (QEC) code in the presence of a correlated environment.
Starting from a Hamiltonian formulation of realistic noise models, and assuming
that QEC is indeed possible, we find formal expressions for the probability of
a faulty path and the residual decoherence encoded in the reduced density
matrix. Systems with non-zero gate times (``long gates'') are included in our
analysis by using an upper bound on the noise. In order to introduce the local
error probability for a qubit, we assume that propagation of signals through
the environment is slower than the QEC period (hypercube assumption). This
allows an explicit calculation in the case of a generalized spin-boson model
and a quantum frustration model. The key result is a dimensional criterion: If
the correlations decay sufficiently fast, the system evolves toward a
stochastic error model for which the threshold theorem of fault-tolerant
quantum computation has been proven. On the other hand, if the correlations
decay slowly, the traditional proof of this threshold theorem does not hold.
This dimensional criterion bears many similarities to criteria that occur in
the theory of quantum phase transitions.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 19:56:21 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Jul 2008 15:06:07 GMT"
}
] | 2008-07-11T00:00:00 | [
[
"Novais",
"E.",
""
],
[
"Mucciolo",
"Eduardo R.",
""
],
[
"Baranger",
"Harold U.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1626 | Awlok Josan | Awlok Josan, Mingyan Liu, David L. Neuhoff and S. Sandeep Pradhan | Throughput Scaling in Random Wireless Networks: A Non-Hierarchical
Multipath Routing Strategy | 7 Pages, 4 Figures, 2007 Allerton Conference on Communication,
Control and Computing | null | null | null | cs.IT math.IT | null | Franceschetti et al. have recently shown that per-node throughput in an
extended, ad hoc wireless network with $\Theta(n)$ randomly distributed nodes
and multihop routing can be increased from the $\Omega({1 \over \sqrt{n} \log
n})$ scaling demonstrated in the seminal paper of Gupta and Kumar to $\Omega({1
\over \sqrt{n}})$. The goal of the present paper is to understand the
dependence of this interesting result on the principal new features it
introduced relative to Gupta-Kumar: (1) a capacity-based formula for link
transmission bit-rates in terms of received signal-to-interference-and-noise
ratio (SINR); (2) hierarchical routing from sources to destinations through a
system of communal highways; and (3) cell-based routes constructed by
percolation. The conclusion of the present paper is that the improved
throughput scaling is principally due to the percolation-based routing, which
enables shorter hops and, consequently, less interference. This is established
by showing that throughput $\Omega({1 \over \sqrt{n}})$ can be attained by a
system that does not employ highways, but instead uses percolation to
establish, for each source-destination pair, a set of $\Theta(\log n)$ routes
within a narrow routing corridor running from source to destination. As a
result, highways are not essential. In addition, it is shown that throughput
$\Omega({1 \over \sqrt{n}})$ can be attained with the original threshold
transmission bit-rate model, provided that node transmission powers are
permitted to grow with $n$. Thus, the benefit of the capacity bit-rate model is
simply to permit the power to remain bounded, even as the network expands.
| [
{
"version": "v1",
"created": "Mon, 8 Oct 2007 21:07:35 GMT"
}
] | 2007-10-10T00:00:00 | [
[
"Josan",
"Awlok",
""
],
[
"Liu",
"Mingyan",
""
],
[
"Neuhoff",
"David L.",
""
],
[
"Pradhan",
"S. Sandeep",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1641 | Vida Dujmovi\'c | Prosenjit Bose, Vida Dujmovic, Ferran Hurtado, Stefan Langerman, Pat
Morin, David R. Wood | A polynomial bound for untangling geometric planar graphs | 14 pages, 7 figures | Discrete & Computational Geometry 42(4):570-585, 2009 | 10.1007/s00454-008-9125-3 | null | cs.CG cs.DM math.CO | null | To untangle a geometric graph means to move some of the vertices so that the
resulting geometric graph has no crossings. Pach and Tardos [Discrete Comput.
Geom., 2002] asked if every n-vertex geometric planar graph can be untangled
while keeping at least n^\epsilon vertices fixed. We answer this question in
the affirmative with \epsilon=1/4. The previous best known bound was
\Omega((\log n / \log\log n)^{1/2}). We also consider untangling geometric
trees. It is known that every n-vertex geometric tree can be untangled while
keeping at least (n/3)^{1/2} vertices fixed, while the best upper bound was
O(n\log n)^{2/3}. We answer a question of Spillner and Wolff [arXiv:0709.0170
2007] by closing this gap for untangling trees. In particular, we show that for
infinitely many values of n, there is an n-vertex geometric tree that cannot be
untangled while keeping more than 3(n^{1/2}-1) vertices fixed. Moreover, we
improve the lower bound to (n/2)^{1/2}.
| [
{
"version": "v1",
"created": "Tue, 9 Oct 2007 13:13:24 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Nov 2007 15:04:13 GMT"
}
] | 2010-05-31T00:00:00 | [
[
"Bose",
"Prosenjit",
""
],
[
"Dujmovic",
"Vida",
""
],
[
"Hurtado",
"Ferran",
""
],
[
"Langerman",
"Stefan",
""
],
[
"Morin",
"Pat",
""
],
[
"Wood",
"David R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0710.1772 | Flore Barcellini | Flore Barcellini (INRIA Rocquencourt), Fran\c{c}oise D\'etienne (INRIA
Rocquencourt), Jean-Marie Burkhardt (INRIA Rocquencourt, LEI) | Cross-Participants : fostering design-use mediation in an Open Source
Software community | null | Dans European Conference on Cognitive Ergonomics (2007) 57-64 | null | null | cs.CY cs.HC cs.SE | null | Motivation - This research aims at investigating emerging roles and forms of
participation fostering design-use mediation during the Open Source Software
design process Research approach - We compare online interactions for a
successful "pushed-by-users" design process with unsuccessful previous
proposals. The methodology developed, articulate structural analyses of the
discussions (organization of discussions, participation) to actions to the code
and documentation made by participants to the project. We focus on the
useroriented and the developer-oriented mailing-lists of the Python project.
Findings/Design - We find that key-participants, the cross-participants, foster
the design process and act as boundary spanners between the users and the
developers' communities. Research limitations/Implications - These findings can
be reinforced developing software to automate the structural analysis of
discussions and actions to the code and documentation. Further analyses,
supported by these tools, will be necessary to generalise our results.
Originality/Value - The analysis of participation among the three interaction
spaces of OSS design (discussion, documentation and implementation) is the main
originality of this work compared to other OSS research that mainly analyse one
or two spaces. Take away message - Beside the idealistic picture that users may
intervene freely in the process, OSS design is boost and framed by some
key-participants and specific rules and there can be barriers to users'
participation
| [
{
"version": "v1",
"created": "Tue, 9 Oct 2007 14:44:44 GMT"
}
] | 2007-10-10T00:00:00 | [
[
"Barcellini",
"Flore",
"",
"INRIA Rocquencourt"
],
[
"Détienne",
"Françoise",
"",
"INRIA\n Rocquencourt"
],
[
"Burkhardt",
"Jean-Marie",
"",
"INRIA Rocquencourt, LEI"
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0710.1784 | Marc Shapiro | Marc Shapiro (LIP6, INRIA Rocquencourt), Nuno Pregui\c{c}a (INRIA
Rocquencourt) | Designing a commutative replicated data type | null | null | null | null | cs.DC | null | Commuting operations greatly simplify consistency in distributed systems.
This paper focuses on designing for commutativity, a topic neglected
previously. We show that the replicas of \emph{any} data type for which
concurrent operations commute converges to a correct value, under some simple
and standard assumptions. We also show that such a data type supports
transactions with very low cost. We identify a number of approaches and
techniques to ensure commutativity. We re-use some existing ideas
(non-destructive updates coupled with invariant identification), but propose a
much more efficient implementation. Furthermore, we propose a new technique,
background consensus. We illustrate these ideas with a shared edit buffer data
type.
| [
{
"version": "v1",
"created": "Tue, 9 Oct 2007 14:38:50 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Shapiro",
"Marc",
"",
"LIP6, INRIA Rocquencourt"
],
[
"Preguiça",
"Nuno",
"",
"INRIA\n Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0710.1842 | Frank Ruskey | Frank Ruskey and Aaron Williams | An explicit universal cycle for the (n-1)-permutations of an n-set | null | null | null | null | cs.DM cs.DS | null | We show how to construct an explicit Hamilton cycle in the directed Cayley
graph Cay({\sigma_n, sigma_{n-1}} : \mathbb{S}_n), where \sigma_k = (1 2 >...
k). The existence of such cycles was shown by Jackson (Discrete Mathematics,
149 (1996) 123-129) but the proof only shows that a certain directed graph is
Eulerian, and Knuth (Volume 4 Fascicle 2, Generating All Tuples and
Permutations (2005)) asks for an explicit construction. We show that a simple
recursion describes our Hamilton cycle and that the cycle can be generated by
an iterative algorithm that uses O(n) space. Moreover, the algorithm produces
each successive edge of the cycle in constant time; such algorithms are said to
be loopless.
| [
{
"version": "v1",
"created": "Tue, 9 Oct 2007 18:06:05 GMT"
}
] | 2007-10-10T00:00:00 | [
[
"Ruskey",
"Frank",
""
],
[
"Williams",
"Aaron",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0710.1870 | Mireille Boutin | Mireille Boutin and Gregor Kemper | Lossless Representation of Graphs using Distributions | 19 pages | null | null | null | math.CO cs.CV | null | We consider complete graphs with edge weights and/or node weights taking
values in some set. In the first part of this paper, we show that a large
number of graphs are completely determined, up to isomorphism, by the
distribution of their sub-triangles. In the second part, we propose graph
representations in terms of one-dimensional distributions (e.g., distribution
of the node weights, sum of adjacent weights, etc.). For the case when the
weights of the graph are real-valued vectors, we show that all graphs, except
for a set of measure zero, are uniquely determined, up to isomorphism, from
these distributions. The motivating application for this paper is the problem
of browsing through large sets of graphs.
| [
{
"version": "v1",
"created": "Tue, 9 Oct 2007 20:01:59 GMT"
}
] | 2007-10-11T00:00:00 | [
[
"Boutin",
"Mireille",
""
],
[
"Kemper",
"Gregor",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0710.1879 | Ning Chen | Ning Chen and Zhiyuan Yan | Cyclotomic FFTs with Reduced Additive Complexities Based on a Novel
Common Subexpression Elimination Algorithm | 11 pages, submitted to IEEE Transactions on Signal Processing | null | null | null | cs.IT cs.CC math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we first propose a novel common subexpression elimination
(CSE) algorithm for matrix-vector multiplications over characteristic-2 fields.
As opposed to previously proposed CSE algorithms, which usually focus on
complexity savings due to recurrences of subexpressions, our CSE algorithm
achieves two types of complexity reductions, differential savings and
recurrence savings, by taking advantage of the cancelation property of
characteristic-2 fields. Using our CSE algorithm, we reduce the additive
complexities of cyclotomic fast Fourier transforms (CFFTs). Using a weighted
sum of the numbers of multiplications and additions as a metric, our CFFTs
achieve smaller total complexities than previously proposed CFFTs and other
FFTs, requiring both fewer multiplications and fewer additions in many cases.
| [
{
"version": "v1",
"created": "Wed, 10 Oct 2007 08:13:44 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Oct 2007 18:09:03 GMT"
},
{
"version": "v3",
"created": "Thu, 8 May 2008 03:23:10 GMT"
},
{
"version": "v4",
"created": "Thu, 23 Oct 2008 06:18:31 GMT"
}
] | 2008-10-23T00:00:00 | [
[
"Chen",
"Ning",
""
],
[
"Yan",
"Zhiyuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1916 | Chen Xiaogang | Xiaogang Chen, Hongwen Yang, Jian Gu, Hongkui Yang | Evaluate the Word Error Rate of Binary Block Codes with Square Radius
Probability Density Function | I tried to fix the problem that figures cannot be displayed in
Version1~3, but it doesnot work. Some new results about decoding threshold is
added in version 4 and a pdf is included which is compile in my PC. Figures
can displayed | null | null | null | cs.IT math.IT | null | The word error rate (WER) of soft-decision-decoded binary block codes rarely
has closed-form. Bounding techniques are widely used to evaluate the
performance of maximum-likelihood decoding algorithm. But the existing bounds
are not tight enough especially for low signal-to-noise ratios and become
looser when a suboptimum decoding algorithm is used. This paper proposes a new
concept named square radius probability density function (SR-PDF) of decision
region to evaluate the WER. Based on the SR-PDF, The WER of binary block codes
can be calculated precisely for ML and suboptimum decoders. Furthermore, for a
long binary block code, SR-PDF can be approximated by Gamma distribution with
only two parameters that can be measured easily. Using this property, two
closed-form approximative expressions are proposed which are very close to the
simulation results of the WER of interesting.
| [
{
"version": "v1",
"created": "Wed, 10 Oct 2007 03:24:28 GMT"
},
{
"version": "v2",
"created": "Sat, 20 Oct 2007 03:54:09 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Oct 2007 03:16:58 GMT"
},
{
"version": "v4",
"created": "Sun, 4 Nov 2007 04:24:27 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Chen",
"Xiaogang",
""
],
[
"Yang",
"Hongwen",
""
],
[
"Gu",
"Jian",
""
],
[
"Yang",
"Hongkui",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1920 | Fr\'ed\'erique Oggier | Fr\'ed\'erique Oggier and Babak Hassibi | The Secrecy Capacity of the MIMO Wiretap Channel | null | null | null | null | cs.IT cs.CR math.IT | null | We consider the MIMO wiretap channel, that is a MIMO broadcast channel where
the transmitter sends some confidential information to one user which is a
legitimate receiver, while the other user is an eavesdropper. Perfect secrecy
is achieved when the the transmitter and the legitimate receiver can
communicate at some positive rate, while insuring that the eavesdropper gets
zero bits of information. In this paper, we compute the perfect secrecy
capacity of the multiple antenna MIMO broadcast channel, where the number of
antennas is arbitrary for both the transmitter and the two receivers.
| [
{
"version": "v1",
"created": "Wed, 10 Oct 2007 03:52:34 GMT"
}
] | 2007-10-11T00:00:00 | [
[
"Oggier",
"Frédérique",
""
],
[
"Hassibi",
"Babak",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1924 | Mohsen Ravanbakhsh | Mohsen Ravanbakhsh, Yasin Abbasi-Yadkori, Maghsoud Abbaspour, Hamid
Sarbazi-Azad | A Heuristic Routing Mechanism Using a New Addressing Scheme | 8 pages, because of lack of space journal reference just contains the
reference to the proceeding | Proceedings of First International Conference on Bio Inspired
models of Networks, Information and Computing Systems (BIONETICS), Cavalese,
Italy, December 2006 | null | null | cs.NI cs.AI | null | Current methods of routing are based on network information in the form of
routing tables, in which routing protocols determine how to update the tables
according to the network changes. Despite the variability of data in routing
tables, node addresses are constant. In this paper, we first introduce the new
concept of variable addresses, which results in a novel framework to cope with
routing problems using heuristic solutions. Then we propose a heuristic routing
mechanism based on the application of genes for determination of network
addresses in a variable address network and describe how this method flexibly
solves different problems and induces new ideas in providing integral solutions
for variety of problems. The case of ad-hoc networks is where simulation
results are more supportive and original solutions have been proposed for
issues like mobility.
| [
{
"version": "v1",
"created": "Wed, 10 Oct 2007 04:29:24 GMT"
}
] | 2007-10-11T00:00:00 | [
[
"Ravanbakhsh",
"Mohsen",
""
],
[
"Abbasi-Yadkori",
"Yasin",
""
],
[
"Abbaspour",
"Maghsoud",
""
],
[
"Sarbazi-Azad",
"Hamid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0710.1949 | Lorenzo Cappellari | Lorenzo Cappellari | Distributed Source Coding Using Continuous-Valued Syndromes | 12 pages, 19 graphic files (15 figures using subfigures), submitted
to IEEE Trans. Inform. Theory | null | null | null | cs.IT math.IT | null | This paper addresses the problem of coding a continuous random source
correlated with another source which is only available at the decoder. The
proposed approach is based on the extension of the channel coding concept of
syndrome from the discrete into the continuous domain. If the correlation
between the sources can be described by an additive Gaussian backward channel
and capacity-achieving linear codes are employed, it is shown that the
performance of the system is asymptotically close to the Wyner-Ziv bound. Even
if such an additive channel is not Gaussian, the design procedure can fit the
desired correlation and transmission rate. Experiments based on trellis-coded
quantization show that the proposed system achieves a performance within 3-4 dB
of the theoretical bound in the 0.5-3 bit/sample rate range for any Gaussian
correlation, with a reasonable computational complexity.
| [
{
"version": "v1",
"created": "Wed, 10 Oct 2007 08:17:03 GMT"
}
] | 2007-10-11T00:00:00 | [
[
"Cappellari",
"Lorenzo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.1962 | Sebastiano Vigna | Sebastiano Vigna | Stanford Matrix Considered Harmful | null | null | null | null | cs.IR | null | This note argues about the validity of web-graph data used in the literature.
| [
{
"version": "v1",
"created": "Wed, 10 Oct 2007 10:03:03 GMT"
}
] | 2007-10-11T00:00:00 | [
[
"Vigna",
"Sebastiano",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0710.1976 | Yukitaka Ishimoto | Yukitaka Ishimoto | Solving Infinite Kolam in Knot Theory | 13 pages, 2 figures, the final version for FORMA with typo fixed | Forma 22 (2007) 15-30 | null | OIQP-06-15 | cs.DM cond-mat.stat-mech | null | In south India, there are traditional patterns of line-drawings encircling
dots, called ``Kolam'', among which one-line drawings or the ``infinite Kolam''
provide very interesting questions in mathematics. For example, we address the
following simple question: how many patterns of infinite Kolam can we draw for
a given grid pattern of dots? The simplest way is to draw possible patterns of
Kolam while judging if it is infinite Kolam. Such a search problem seems to be
NP complete. However, it is certainly not. In this paper, we focus on
diamond-shaped grid patterns of dots, (1-3-5-3-1) and (1-3-5-7-5-3-1) in
particular. By using the knot-theory description of the infinite Kolam, we show
how to find the solution, which inevitably gives a sketch of the proof for the
statement ``infinite Kolam is not NP complete.'' Its further discussion will be
given in the final section.
| [
{
"version": "v1",
"created": "Wed, 10 Oct 2007 11:46:53 GMT"
}
] | 2012-02-23T00:00:00 | [
[
"Ishimoto",
"Yukitaka",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
}
] |
0710.2018 | Yingbin Liang | Yingbin Liang, Anelia Somekh-Baruch, H. Vincent Poor, Shlomo Shamai
(Shitz), and Sergio Verdu | Cognitive Interference Channels with Confidential Messages | To appear in Proc. of forty-fifth annual Allerton conference on
communication, control, and computing, Allerton house, Monticello, IL, USA | null | null | null | cs.IT math.IT | null | The cognitive interference channel with confidential messages is studied.
Similarly to the classical two-user interference channel, the cognitive
interference channel consists of two transmitters whose signals interfere at
the two receivers. It is assumed that there is a common message source (message
1) known to both transmitters, and an additional independent message source
(message 2) known only to the cognitive transmitter (transmitter 2). The
cognitive receiver (receiver 2) needs to decode both messages, while the
non-cognitive receiver (receiver 1) should decode only the common message.
Furthermore, message 2 is assumed to be a confidential message which needs to
be kept as secret as possible from receiver 1, which is viewed as an
eavesdropper with regard to message 2. The level of secrecy is measured by the
equivocation rate. A single-letter expression for the capacity-equivocation
region of the discrete memoryless cognitive interference channel is established
and is further explicitly derived for the Gaussian case. Moreover,
particularizing the capacity-equivocation region to the case without a secrecy
constraint, establishes a new capacity theorem for a class of interference
channels, by providing a converse theorem.
| [
{
"version": "v1",
"created": "Wed, 10 Oct 2007 16:34:03 GMT"
}
] | 2007-10-11T00:00:00 | [
[
"Liang",
"Yingbin",
"",
"Shitz"
],
[
"Somekh-Baruch",
"Anelia",
"",
"Shitz"
],
[
"Poor",
"H. Vincent",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
],
[
"Verdu",
"Sergio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.2037 | Wu Jiang Mr. | Wu Jiang, Fei Ding and Qiao-liang Xiang | An Affinity Propagation Based method for Vector Quantization Codebook
Design | In this version we make some explaination about the network-support
similarity | null | null | null | cs.CV | null | In this paper, we firstly modify a parameter in affinity propagation (AP) to
improve its convergence ability, and then, we apply it to vector quantization
(VQ) codebook design problem. In order to improve the quality of the resulted
codebook, we combine the improved AP (IAP) with the conventional LBG algorithm
to generate an effective algorithm call IAP-LBG. According to the experimental
results, the proposed method not only enhances the convergence abilities but
also is capable of providing higher-quality codebooks than conventional LBG
method.
| [
{
"version": "v1",
"created": "Wed, 10 Oct 2007 15:12:20 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Oct 2007 11:32:25 GMT"
}
] | 2007-10-11T00:00:00 | [
[
"Jiang",
"Wu",
""
],
[
"Ding",
"Fei",
""
],
[
"Xiang",
"Qiao-liang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0710.2083 | Oliver Schulte | Oliver Schulte, Flavia Moser, Martin Ester and Zhiyong Lu | Association Rules in the Relational Calculus | 16 pages, 13 tables | null | null | SFU School of Computing Science, TR 2007-23 | cs.DB cs.LG cs.LO | null | One of the most utilized data mining tasks is the search for association
rules. Association rules represent significant relationships between items in
transactions. We extend the concept of association rule to represent a much
broader class of associations, which we refer to as \emph{entity-relationship
rules.} Semantically, entity-relationship rules express associations between
properties of related objects. Syntactically, these rules are based on a broad
subclass of safe domain relational calculus queries. We propose a new
definition of support and confidence for entity-relationship rules and for the
frequency of entity-relationship queries. We prove that the definition of
frequency satisfies standard probability axioms and the Apriori property.
| [
{
"version": "v1",
"created": "Wed, 10 Oct 2007 18:00:44 GMT"
}
] | 2007-10-11T00:00:00 | [
[
"Schulte",
"Oliver",
""
],
[
"Moser",
"Flavia",
""
],
[
"Ester",
"Martin",
""
],
[
"Lu",
"Zhiyong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0710.2092 | Marian Boguna | M. Angeles Serrano, Dmitri Krioukov, and Marian Boguna | Self-similarity of complex networks and hidden metric spaces | null | Physical Review Letters 100, 078701 (2008) | 10.1103/PhysRevLett.100.078701 | null | cond-mat.dis-nn cs.NI physics.soc-ph | null | We demonstrate that the self-similarity of some scale-free networks with
respect to a simple degree-thresholding renormalization scheme finds a natural
interpretation in the assumption that network nodes exist in hidden metric
spaces. Clustering, i.e., cycles of length three, plays a crucial role in this
framework as a topological reflection of the triangle inequality in the hidden
geometry. We prove that a class of hidden variable models with underlying
metric spaces are able to accurately reproduce the self-similarity properties
that we measured in the real networks. Our findings indicate that hidden
geometries underlying these real networks are a plausible explanation for their
observed topologies and, in particular, for their self-similarity with respect
to the degree-based renormalization.
| [
{
"version": "v1",
"created": "Wed, 10 Oct 2007 18:45:26 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Feb 2008 20:53:35 GMT"
}
] | 2008-12-03T00:00:00 | [
[
"Serrano",
"M. Angeles",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Boguna",
"Marian",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0710.2134 | Andrei Martinez-Finkelshtein | A.I. Aptekarev, J.S. Dehesa, A. Martinez-Finkelshtein, R. Ya\~nez | Discrete entropies of orthogonal polynomials | 26 pages, 6 figures | null | null | null | math.CA cs.IT math-ph math.IT math.MP | null | Let $p_n$ be the $n$-th orthonormal polynomial on the real line, whose zeros
are $\lambda_j^{(n)}$, $j=1, ..., n$. Then for each $j=1, ..., n$, $$ \vec
\Psi_j^2 = (\Psi_{1j}^2, ..., \Psi_{nj}^2) $$ with $$ \Psi_{ij}^2= p_{i-1}^2
(\lambda_j^{(n)}) (\sum_{k=0}^{n-1} p_k^2(\lambda_j^{(n)}))^{-1}, \quad i=1,
>..., n, $$ defines a discrete probability distribution. The Shannon entropy of
the sequence $\{p_n\}$ is consequently defined as $$ \mathcal S_{n,j} =
-\sum_{i=1}^n \Psi_{ij}^{2} \log (\Psi_{ij}^{2}) . $$ In the case of Chebyshev
polynomials of the first and second kinds an explicit and closed formula for
$\mathcal S_{n,j}$ is obtained, revealing interesting connections with the
number theory. Besides, several results of numerical computations exemplifying
the behavior of $\mathcal S_{n,j}$ for other families are also presented.
| [
{
"version": "v1",
"created": "Wed, 10 Oct 2007 23:17:43 GMT"
}
] | 2007-10-12T00:00:00 | [
[
"Aptekarev",
"A. I.",
""
],
[
"Dehesa",
"J. S.",
""
],
[
"Martinez-Finkelshtein",
"A.",
""
],
[
"Yañez",
"R.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
0710.2139 | Ashkan Aazami | Ashkan Aazami, Michael D. Stilp | Approximation algorithms and hardness for domination with propagation | null | null | null | null | cs.CC cs.DM | null | The power dominating set (PDS) problem is the following extension of the
well-known dominating set problem: find a smallest-size set of nodes $S$ that
power dominates all the nodes, where a node $v$ is power dominated if (1) $v$
is in $S$ or $v$ has a neighbor in $S$, or (2) $v$ has a neighbor $w$ such that
$w$ and all of its neighbors except $v$ are power dominated. We show a hardness
of approximation threshold of $2^{\log^{1-\epsilon}{n}}$ in contrast to the
logarithmic hardness for the dominating set problem. We give an $O(\sqrt{n})$
approximation algorithm for planar graphs, and show that our methods cannot
improve on this approximation guarantee. Finally, we initiate the study of PDS
on directed graphs, and show the same hardness threshold of
$2^{\log^{1-\epsilon}{n}}$ for directed \emph{acyclic} graphs. Also we show
that the directed PDS problem can be solved optimally in linear time if the
underlying undirected graph has bounded tree-width.
| [
{
"version": "v1",
"created": "Wed, 10 Oct 2007 23:30:49 GMT"
}
] | 2007-10-12T00:00:00 | [
[
"Aazami",
"Ashkan",
""
],
[
"Stilp",
"Michael D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0710.2156 | Daniel Lemire | Kamel Aouiche, Daniel Lemire and Robert Godin | Collaborative OLAP with Tag Clouds: Web 2.0 OLAP Formalism and
Experimental Evaluation | Software at https://github.com/lemire/OLAPTagCloud | null | null | null | cs.DB | http://creativecommons.org/licenses/by/4.0/ | Increasingly, business projects are ephemeral. New Business Intelligence
tools must support ad-lib data sources and quick perusal. Meanwhile, tag clouds
are a popular community-driven visualization technique. Hence, we investigate
tag-cloud views with support for OLAP operations such as roll-ups, slices,
dices, clustering, and drill-downs. As a case study, we implemented an
application where users can upload data and immediately navigate through its ad
hoc dimensions. To support social networking, views can be easily shared and
embedded in other Web sites. Algorithmically, our tag-cloud views are
approximate range top-k queries over spontaneous data cubes. We present
experimental evidence that iceberg cuboids provide adequate online
approximations. We benchmark several browser-oblivious tag-cloud layout
optimizations.
| [
{
"version": "v1",
"created": "Thu, 11 Oct 2007 19:48:10 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jan 2008 21:23:11 GMT"
},
{
"version": "v3",
"created": "Tue, 15 Mar 2016 21:52:12 GMT"
}
] | 2016-03-17T00:00:00 | [
[
"Aouiche",
"Kamel",
""
],
[
"Lemire",
"Daniel",
""
],
[
"Godin",
"Robert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0710.2227 | M Sabu THAMPI | Sabu M. Thampi, K. Chandra Sekaran | A System for Predicting Subcellular Localization of Yeast Genome Using
Neural Network | null | null | null | null | cs.NE cs.AI | null | The subcellular location of a protein can provide valuable information about
its function. With the rapid increase of sequenced genomic data, the need for
an automated and accurate tool to predict subcellular localization becomes
increasingly important. Many efforts have been made to predict protein
subcellular localization. This paper aims to merge the artificial neural
networks and bioinformatics to predict the location of protein in yeast genome.
We introduce a new subcellular prediction method based on a backpropagation
neural network. The results show that the prediction within an error limit of 5
to 10 percentage can be achieved with the system.
| [
{
"version": "v1",
"created": "Thu, 11 Oct 2007 12:09:33 GMT"
}
] | 2007-10-12T00:00:00 | [
[
"Thampi",
"Sabu M.",
""
],
[
"Sekaran",
"K. Chandra",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0710.2228 | Matus Medo | Yi-Cheng Zhang, Matus Medo, Jie Ren, Tao Zhou, Tao Li, and Fan Yang | Recommendation model based on opinion diffusion | 5 pages, 2 figures | Europhysics Letters 80 (2007) 68003 | 10.1209/0295-5075/80/68003 | null | physics.soc-ph cs.CY cs.IR physics.data-an | null | Information overload in the modern society calls for highly efficient
recommendation algorithms. In this letter we present a novel diffusion based
recommendation model, with users' ratings built into a transition matrix. To
speed up computation we introduce a Green function method. The numerical tests
on a benchmark database show that our prediction is superior to the standard
recommendation methods.
| [
{
"version": "v1",
"created": "Thu, 11 Oct 2007 12:54:07 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Nov 2007 13:01:50 GMT"
}
] | 2007-11-15T00:00:00 | [
[
"Zhang",
"Yi-Cheng",
""
],
[
"Medo",
"Matus",
""
],
[
"Ren",
"Jie",
""
],
[
"Zhou",
"Tao",
""
],
[
"Li",
"Tao",
""
],
[
"Yang",
"Fan",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0710.2231 | Daniel Keysers | Daniel Keysers | Comparison and Combination of State-of-the-art Techniques for
Handwritten Character Recognition: Topping the MNIST Benchmark | 13 pages | null | null | null | cs.CV | null | Although the recognition of isolated handwritten digits has been a research
topic for many years, it continues to be of interest for the research community
and for commercial applications. We show that despite the maturity of the
field, different approaches still deliver results that vary enough to allow
improvements by using their combination. We do so by choosing four
well-motivated state-of-the-art recognition systems for which results on the
standard MNIST benchmark are available. When comparing the errors made, we
observe that the errors made differ between all four systems, suggesting the
use of classifier combination. We then determine the error rate of a
hypothetical system that combines the output of the four systems. The result
obtained in this manner is an error rate of 0.35% on the MNIST data, the best
result published so far. We furthermore discuss the statistical significance of
the combined result and of the results of the individual classifiers.
| [
{
"version": "v1",
"created": "Thu, 11 Oct 2007 12:22:27 GMT"
}
] | 2007-10-12T00:00:00 | [
[
"Keysers",
"Daniel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0710.2243 | Lars Eirik Danielsen | Lars Eirik Danielsen and Matthew G. Parker | Edge Local Complementation and Equivalence of Binary Linear Codes | Presented at International Workshop on Coding and Cryptography (WCC
2007), 16-20 Apr. 2007, Versailles, France. (12 pages, 3 figures) | Des. Codes Cryptogr. 49(1-3), 161-170, 2008 | 10.1007/s10623-008-9190-x | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Orbits of graphs under the operation edge local complementation (ELC) are
defined. We show that the ELC orbit of a bipartite graph corresponds to the
equivalence class of a binary linear code. The information sets and the minimum
distance of a code can be derived from the corresponding ELC orbit. By
extending earlier results on local complementation (LC) orbits, we classify the
ELC orbits of all graphs on up to 12 vertices. We also give a new method for
classifying binary linear codes, with running time comparable to the best known
algorithm.
| [
{
"version": "v1",
"created": "Thu, 11 Oct 2007 13:49:41 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Feb 2008 12:34:35 GMT"
},
{
"version": "v3",
"created": "Tue, 26 Feb 2008 15:12:04 GMT"
},
{
"version": "v4",
"created": "Mon, 24 Aug 2009 11:07:53 GMT"
}
] | 2009-08-24T00:00:00 | [
[
"Danielsen",
"Lars Eirik",
""
],
[
"Parker",
"Matthew G.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.2268 | Serge Burckel | Serge Burckel | Complexity of some Path Problems in DAGs and Linear Orders | 5 pages, 3 figures | null | null | null | math.CO cs.IT math.IT | null | We investigate here the computational complexity of three natural problems in
directed acyclic graphs. We prove their NP Completeness and consider their
restrictions to linear orders.
| [
{
"version": "v1",
"created": "Thu, 11 Oct 2007 15:00:45 GMT"
}
] | 2007-10-12T00:00:00 | [
[
"Burckel",
"Serge",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.2284 | Andreas Witzel | Andreas Witzel | Symmetric and Synchronous Communication in Peer-to-Peer Networks | polished, modernized references; incorporated referee feedback from
MPC'08 | null | null | null | cs.DC cs.GT | null | Motivated by distributed implementations of game-theoretical algorithms, we
study symmetric process systems and the problem of attaining common knowledge
between processes. We formalize our setting by defining a notion of
peer-to-peer networks(*) and appropriate symmetry concepts in the context of
Communicating Sequential Processes (CSP), due to the common knowledge creating
effects of its synchronous communication primitives. We then prove that CSP
with input and output guards makes common knowledge in symmetric peer-to-peer
networks possible, but not the restricted version which disallows output
statements in guards and is commonly implemented.
(*) Please note that we are not dealing with fashionable incarnations such as
file-sharing networks, but merely use this name for a mathematical notion of a
network consisting of directly connected peers "treated on an equal footing",
i.e. not having a client-server structure or otherwise pre-determined roles.)
| [
{
"version": "v1",
"created": "Thu, 11 Oct 2007 16:14:38 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Oct 2007 10:41:05 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Jan 2008 12:51:56 GMT"
},
{
"version": "v4",
"created": "Mon, 14 Apr 2008 15:11:16 GMT"
}
] | 2008-04-14T00:00:00 | [
[
"Witzel",
"Andreas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0710.2296 | Sonny Ben-Shimon | Sonny Ben-Shimon and Michael Krivelevich | Vertex Percolation on Expander Graphs | 13 pages | European Journal of Combinatorics, 30(2), pp. 339-350, 2009 | 10.1016/j.ejc.2008.07.001 | null | math.CO cs.DM math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We say that a graph $G=(V,E)$ on $n$ vertices is a $\beta$-expander for some
constant $\beta>0$ if every $U\subseteq V$ of cardinality $|U|\leq \frac{n}{2}$
satisfies $|N_G(U)|\geq \beta|U|$ where $N_G(U)$ denotes the neighborhood of
$U$. In this work we explore the process of deleting vertices of a
$\beta$-expander independently at random with probability $n^{-\alpha}$ for
some constant $\alpha>0$, and study the properties of the resulting graph. Our
main result states that as $n$ tends to infinity, the deletion process
performed on a $\beta$-expander graph of bounded degree will result with high
probability in a graph composed of a giant component containing $n-o(n)$
vertices that is in itself an expander graph, and constant size components. We
proceed by applying the main result to expander graphs with a positive spectral
gap. In the particular case of $(n,d,\lambda)$-graphs, that are such expanders,
we compute the values of $\alpha$, under additional constraints on the graph,
for which with high probability the resulting graph will stay connected, or
will be composed of a giant component and isolated vertices. As a graph sampled
from the uniform probability space of $d$-regular graphs with high probability
is an expander and meets the additional constraints, this result strengthens a
recent result due to Greenhill, Holt and Wormald about vertex percolation on
random $d$-regular graphs. We conclude by showing that performing the above
described deletion process on graphs that expand sub-linear sets by an
unbounded expansion ratio, with high probability results in a connected
expander graph.
| [
{
"version": "v1",
"created": "Thu, 11 Oct 2007 17:05:22 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Nov 2007 15:25:36 GMT"
},
{
"version": "v3",
"created": "Sun, 25 Nov 2007 14:38:30 GMT"
},
{
"version": "v4",
"created": "Thu, 1 May 2008 12:38:47 GMT"
},
{
"version": "v5",
"created": "Mon, 30 Jun 2008 10:32:38 GMT"
},
{
"version": "v6",
"created": "Tue, 1 Jul 2008 15:44:13 GMT"
}
] | 2008-11-30T00:00:00 | [
[
"Ben-Shimon",
"Sonny",
""
],
[
"Krivelevich",
"Michael",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0710.2358 | Catherine Recanati | C. Recanati | Success and failure of programming environments - report on the design
and use of a graphic abstract syntax tree editor | This is an old paper (1990) of 29 pages | null | null | Esprit project no. 891 (STAPLE), Technical Report no 90/1, Paris,
Jan 1990 | cs.PL cs.HC | null | The STAPLE project investigated (at the end of the eighties), a persistent
architecture for functional programming. Work has been done in two directions:
the development of a programming environment for a functional language within a
persistent system and an experiment on transferring the expertise of functional
prototyping into industry. This paper is a report on the first activity. The
first section gives a general description of Absynte - the abstract syntax tree
editor developed within the Project. Following sections make an attempt at
measuring the effectiveness of such an editor and discuss the problems raised
by structured syntax editing - specially environments based on abstract syntax
trees.
| [
{
"version": "v1",
"created": "Thu, 11 Oct 2007 23:40:47 GMT"
}
] | 2007-10-15T00:00:00 | [
[
"Recanati",
"C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0710.2419 | Luigi Santocanale | Walid Belkhir (LIF), Luigi Santocanale (LIF) | The Variable Hierarchy for the Games mu-Calculus | null | null | null | null | cs.LO cs.GT math.LO | null | Parity games are combinatorial representations of closed Boolean mu-terms. By
adding to them draw positions, they have been organized by Arnold and one of
the authors into a mu-calculus. As done by Berwanger et al. for the
propositional modal mu-calculus, it is possible to classify parity games into
levels of a hierarchy according to the number of fixed-point variables. We ask
whether this hierarchy collapses w.r.t. the standard interpretation of the
games mu-calculus into the class of all complete lattices. We answer this
question negatively by providing, for each n >= 1, a parity game Gn with these
properties: it unravels to a mu-term built up with n fixed-point variables, it
is semantically equivalent to no game with strictly less than n-2 fixed-point
variables.
| [
{
"version": "v1",
"created": "Fri, 12 Oct 2007 09:50:43 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Mar 2008 13:04:32 GMT"
}
] | 2008-03-13T00:00:00 | [
[
"Belkhir",
"Walid",
"",
"LIF"
],
[
"Santocanale",
"Luigi",
"",
"LIF"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0710.2446 | Catherine Recanati | Catherine Recanati (LIPN), Nicoleta Rogovschi (LIPN), Youn\`es Bennani
(LIPN) | The structure of verbal sequences analyzed with unsupervised learning
techniques | null | Dans Proceedings - The 3rd Language & Technology Conference: Human
Language Technologies as a Challenge for Computer Science and Linguistics,
Poznan : Pologne (2007) | null | null | cs.CL cs.AI cs.LG | null | Data mining allows the exploration of sequences of phenomena, whereas one
usually tends to focus on isolated phenomena or on the relation between two
phenomena. It offers invaluable tools for theoretical analyses and exploration
of the structure of sentences, texts, dialogues, and speech. We report here the
results of an attempt at using it for inspecting sequences of verbs from French
accounts of road accidents. This analysis comes from an original approach of
unsupervised training allowing the discovery of the structure of sequential
data. The entries of the analyzer were only made of the verbs appearing in the
sentences. It provided a classification of the links between two successive
verbs into four distinct clusters, allowing thus text segmentation. We give
here an interpretation of these clusters by applying a statistical analysis to
independent semantic annotations.
| [
{
"version": "v1",
"created": "Fri, 12 Oct 2007 12:44:11 GMT"
}
] | 2007-10-15T00:00:00 | [
[
"Recanati",
"Catherine",
"",
"LIPN"
],
[
"Rogovschi",
"Nicoleta",
"",
"LIPN"
],
[
"Bennani",
"Younès",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0710.2496 | Gusztav Morvai | Gusztav Morvai, Sanjeev R. Kulkarni, Andrew B. Nobel | Regression estimation from an individual stable sequence | null | Statistics 33 (1999), no. 2, 99--118 | null | null | math.PR cs.IT math.IT math.ST stat.TH | null | We consider univariate regression estimation from an individual (non-random)
sequence $(x_1,y_1),(x_2,y_2), ... \in \real \times \real$, which is stable in
the sense that for each interval $A \subseteq \real$, (i) the limiting relative
frequency of $A$ under $x_1, x_2, ...$ is governed by an unknown probability
distribution $\mu$, and (ii) the limiting average of those $y_i$ with $x_i \in
A$ is governed by an unknown regression function $m(\cdot)$.
A computationally simple scheme for estimating $m(\cdot)$ is exhibited, and
is shown to be $L_2$ consistent for stable sequences $\{(x_i,y_i)\}$ such that
$\{y_i\}$ is bounded and there is a known upper bound for the variation of
$m(\cdot)$ on intervals of the form $(-i,i]$, $i \geq 1$. Complementing this
positive result, it is shown that there is no consistent estimation scheme for
the family of stable sequences whose regression functions have finite
variation, even under the restriction that $x_i \in [0,1]$ and $y_i$ is
binary-valued.
| [
{
"version": "v1",
"created": "Fri, 12 Oct 2007 16:02:13 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Morvai",
"Gusztav",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
],
[
"Nobel",
"Andrew B.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0710.2500 | Gusztav Morvai | Andrew B. Nobel, Gusztav Morvai, Sanjeev R. Kulkarni | Density estimation from an individual numerical sequence | null | IEEE Trans. Inform. Theory 44 (1998), no. 2, 537--541 | null | null | math.PR cs.IT math.IT math.ST stat.TH | null | This paper considers estimation of a univariate density from an individual
numerical sequence. It is assumed that (i) the limiting relative frequencies of
the numerical sequence are governed by an unknown density, and (ii) there is a
known upper bound for the variation of the density on an increasing sequence of
intervals. A simple estimation scheme is proposed, and is shown to be $L_1$
consistent when (i) and (ii) apply. In addition it is shown that there is no
consistent estimation scheme for the set of individual sequences satisfying
only condition (i).
| [
{
"version": "v1",
"created": "Fri, 12 Oct 2007 19:11:21 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Nobel",
"Andrew B.",
""
],
[
"Morvai",
"Gusztav",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0710.2505 | Ichiro Hasuo | Ichiro Hasuo, Bart Jacobs and Ana Sokolova | Generic Trace Semantics via Coinduction | To appear in Logical Methods in Computer Science. 36 pages | Logical Methods in Computer Science, Volume 3, Issue 4 (November
19, 2007) lmcs:864 | 10.2168/LMCS-3(4:11)2007 | null | cs.LO | null | Trace semantics has been defined for various kinds of state-based systems,
notably with different forms of branching such as non-determinism vs.
probability. In this paper we claim to identify one underlying mathematical
structure behind these "trace semantics," namely coinduction in a Kleisli
category. This claim is based on our technical result that, under a suitably
order-enriched setting, a final coalgebra in a Kleisli category is given by an
initial algebra in the category Sets. Formerly the theory of coalgebras has
been employed mostly in Sets where coinduction yields a finer process semantics
of bisimilarity. Therefore this paper extends the application field of
coalgebras, providing a new instance of the principle "process semantics via
coinduction."
| [
{
"version": "v1",
"created": "Fri, 12 Oct 2007 16:28:43 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Nov 2007 10:36:17 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Hasuo",
"Ichiro",
""
],
[
"Jacobs",
"Bart",
""
],
[
"Sokolova",
"Ana",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0710.2532 | Maxwell Young | Valerie King, Cynthia Phillips, Jared Saia and Maxwell Young | Sleeping on the Job: Energy-Efficient Broadcast for Radio Networks | 15 pages, 1 figure | null | null | null | cs.DS | null | We address the problem of minimizing power consumption when performing
reliable broadcast on a radio network under the following popular model. Each
node in the network is located on a point in a two dimensional grid, and
whenever a node sends a message, all awake nodes within distance r receive the
message. In the broadcast problem, some node wants to successfully send a
message to all other nodes in the network even when up to a 1/2 fraction of the
nodes within every neighborhood can be deleted by an adversary. The set of
deleted nodes is carefully chosen by the adversary to foil our algorithm and
moreover, the set of deleted nodes may change periodically. This models
worst-case behavior due to mobile nodes, static nodes losing power or simply
some points in the grid being unoccupied. A trivial solution requires each node
in the network to be awake roughly 1/2 the time, and a trivial lower bound
shows that each node must be awake for at least a 1/n fraction of the time. Our
first result is an algorithm that requires each node to be awake for only a
1/sqrt(n) fraction of the time in expectation. Our algorithm achieves this
while ensuring correctness with probability 1, and keeping optimal values for
other resource costs such as latency and number of messages sent. We give a
lower-bound that shows that this reduction in power consumption is
asymptotically optimal when latency and number of messages sent must be
optimal. If we can increase the latency and messages sent by only a log*n
factor we give a Las Vegas algorithm that requires each node to be awake for
only a (log*n)/n expected fraction of the time; we give a lower-bound showing
that this second algorithm is near optimal. Finally, we show how to ensure
energy-efficient broadcast in the presence of Byzantine faults.
| [
{
"version": "v1",
"created": "Fri, 12 Oct 2007 19:56:45 GMT"
}
] | 2007-10-15T00:00:00 | [
[
"King",
"Valerie",
""
],
[
"Phillips",
"Cynthia",
""
],
[
"Saia",
"Jared",
""
],
[
"Young",
"Maxwell",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0710.2553 | Oren Somekh | O. Simeone, O. Somekh, Y. Bar-Ness, H. V. Poor, and S. Shamai | Capacity of Linear Two-hop Mesh Networks with Rate Splitting,
Decode-and-forward Relaying and Cooperation | null | In the Proceedings of the 45th Annual Allerton Conference on
Communication, Control and Computing, Monticello, IL, September 26 - 28, 2007 | null | null | cs.IT math.IT | null | A linear mesh network is considered in which a single user per cell
communicates to a local base station via a dedicated relay (two-hop
communication). Exploiting the possibly relevant inter-cell channel gains, rate
splitting with successive cancellation in both hops is investigated as a
promising solution to improve the rate of basic single-rate communications.
Then, an alternative solution is proposed that attempts to improve the
performance of the second hop (from the relays to base stations) by cooperative
transmission among the relay stations. The cooperative scheme leverages the
common information obtained by the relays as a by-product of the use of rate
splitting in the first hop. Numerical results bring insight into the conditions
(network topology and power constraints) under which rate splitting, with
possible relay cooperation, is beneficial. Multi-cell processing (joint
decoding at the base stations) is also considered for reference.
| [
{
"version": "v1",
"created": "Fri, 12 Oct 2007 23:34:09 GMT"
}
] | 2007-10-16T00:00:00 | [
[
"Simeone",
"O.",
""
],
[
"Somekh",
"O.",
""
],
[
"Bar-Ness",
"Y.",
""
],
[
"Poor",
"H. V.",
""
],
[
"Shamai",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.2604 | Raymond Chi-Wing Wong | Raymond Chi-Wing Wong, Ada Wai-chee Fu, Jian Pei, Yip Sing Ho, Tai
Wong, Yubao Liu | Efficient Skyline Querying with Variable User Preferences on Nominal
Attributes | 10 pages | null | null | null | cs.DB | null | Current skyline evaluation techniques assume a fixed ordering on the
attributes. However, dynamic preferences on nominal attributes are more
realistic in known applications. In order to generate online response for any
such preference issued by a user, we propose two methods of different
characteristics. The first one is a semi-materialization method and the second
is an adaptive SFS method. Finally, we conduct experiments to show the
efficiency of our proposed algorithms.
| [
{
"version": "v1",
"created": "Sat, 13 Oct 2007 11:47:14 GMT"
}
] | 2007-10-16T00:00:00 | [
[
"Wong",
"Raymond Chi-Wing",
""
],
[
"Fu",
"Ada Wai-chee",
""
],
[
"Pei",
"Jian",
""
],
[
"Ho",
"Yip Sing",
""
],
[
"Wong",
"Tai",
""
],
[
"Liu",
"Yubao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0710.2611 | Marek Czachor | Diederik Aerts, Marek Czachor, Bart De Moor | Geometric Analogue of Holographic Reduced Representation | typos in eqs. (57-58) are corrected | Journal of Mathematical Psychology 53, 389-398 (2009) | null | null | cs.AI quant-ph | null | Holographic reduced representations (HRR) are based on superpositions of
convolution-bound $n$-tuples, but the $n$-tuples cannot be regarded as vectors
since the formalism is basis dependent. This is why HRR cannot be associated
with geometric structures. Replacing convolutions by geometric products one
arrives at reduced representations analogous to HRR but interpretable in terms
of geometry. Variable bindings occurring in both HRR and its geometric analogue
mathematically correspond to two different representations of
$Z_2\times...\times Z_2$ (the additive group of binary $n$-tuples with addition
modulo 2). As opposed to standard HRR, variable binding performed by means of
geometric product allows for computing exact inverses of all nonzero vectors, a
procedure even simpler than approximate inverses employed in HRR. The formal
structure of the new reduced representation is analogous to cartoon
computation, a geometric analogue of quantum computation.
| [
{
"version": "v1",
"created": "Mon, 15 Oct 2007 13:56:39 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Oct 2007 16:51:40 GMT"
}
] | 2009-12-01T00:00:00 | [
[
"Aerts",
"Diederik",
""
],
[
"Czachor",
"Marek",
""
],
[
"De Moor",
"Bart",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0710.2659 | Julien Hendrickx | Julien M. Hendrickx, Changbin Yu, Baris Fidan and Brian D.O. Anderson | Rigidity and persistence for ensuring shape maintenance of multiagent
meta formations (ext'd version) | 1 zip file containing 1 .tex files, and 39 .eps files. The paper
(including the appendix) contains 13 Figures | null | null | null | cs.MA cs.DM | null | This paper treats the problem of the merging of formations, where the
underlying model of a formation is graphical. We first analyze the rigidity and
persistence of meta-formations, which are formations obtained by connecting
several rigid or persistent formations. Persistence is a generalization to
directed graphs of the undirected notion of rigidity. In the context of moving
autonomous agent formations, persistence characterizes the efficacy of a
directed structure of unilateral distance constraints seeking to preserve a
formation shape. We derive then, for agents evolving in a two- or
three-dimensional space, the conditions under which a set of persistent
formations can be merged into a persistent meta-formation, and give the minimal
number of interconnections needed for such a merging. We also give conditions
for a meta-formation obtained by merging several persistent formations to be
persistent.
| [
{
"version": "v1",
"created": "Sun, 14 Oct 2007 13:51:09 GMT"
}
] | 2007-10-16T00:00:00 | [
[
"Hendrickx",
"Julien M.",
""
],
[
"Yu",
"Changbin",
""
],
[
"Fidan",
"Baris",
""
],
[
"Anderson",
"Brian D. O.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0710.2674 | James Ford | James Ford | Linguistic Information Energy | 10 pages, 7 graphs | null | null | null | cs.CL cs.IT math.IT | null | In this treatment a text is considered to be a series of word impulses which
are read at a constant rate. The brain then assembles these units of
information into higher units of meaning. A classical systems approach is used
to model an initial part of this assembly process. The concepts of linguistic
system response, information energy, and ordering energy are defined and
analyzed. Finally, as a demonstration, information energy is used to estimate
the publication dates of a series of texts and the similarity of a set of
texts.
| [
{
"version": "v1",
"created": "Sun, 14 Oct 2007 16:09:53 GMT"
}
] | 2007-10-16T00:00:00 | [
[
"Ford",
"James",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.