id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0710.2705
Shih-Chun Lin
Shih-Chun Lin, Mohammad Shahmohammadi, Hesham El Gamal
Fingerprinting with Minimum Distance Decoding
26 pages, 6 figures, submitted to IEEE Transactions on Information Forensics and Security
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 1, MARCH 2009 pp.59-69
10.1109/TIFS.2008.2012201
null
cs.IT cs.CR math.IT
null
This work adopts an information theoretic framework for the design of collusion-resistant coding/decoding schemes for digital fingerprinting. More specifically, the minimum distance decision rule is used to identify 1 out of t pirates. Achievable rates, under this detection rule, are characterized in two distinct scenarios. First, we consider the averaging attack where a random coding argument is used to show that the rate 1/2 is achievable with t=2 pirates. Our study is then extended to the general case of arbitrary $t$ highlighting the underlying complexity-performance tradeoff. Overall, these results establish the significant performance gains offered by minimum distance decoding as compared to other approaches based on orthogonal codes and correlation detectors. In the second scenario, we characterize the achievable rates, with minimum distance decoding, under any collusion attack that satisfies the marking assumption. For t=2 pirates, we show that the rate $1-H(0.25)\approx 0.188$ is achievable using an ensemble of random linear codes. For $t\geq 3$, the existence of a non-resolvable collusion attack, with minimum distance decoding, for any non-zero rate is established. Inspired by our theoretical analysis, we then construct coding/decoding schemes for fingerprinting based on the celebrated Belief-Propagation framework. Using an explicit repeat-accumulate code, we obtain a vanishingly small probability of misidentification at rate 1/3 under averaging attack with t=2. For collusion attacks which satisfy the marking assumption, we use a more sophisticated accumulate repeat accumulate code to obtain a vanishingly small misidentification probability at rate 1/9 with t=2. These results represent a marked improvement over the best available designs in the literature.
[ { "version": "v1", "created": "Mon, 15 Oct 2007 01:20:01 GMT" } ]
2009-03-02T00:00:00
[ [ "Lin", "Shih-Chun", "" ], [ "Shahmohammadi", "Mohammad", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.2716
Li Rong
Rong Li, Zhisheng Duan and Guanrong Chen
Cost and Effects of Pinning Control for Network Synchronization
12 pages, 18 figures
null
null
null
cs.NI
null
In this paper, the problem of pinning control for synchronization of complex dynamical networks is discussed. A cost function of the controlled network is defined by the feedback gain and the coupling strength of the network. An interesting result is that lower cost is achieved by the control scheme of pinning nodes with smaller degrees. Some rigorous mathematical analysis is presented for achieving lower cost in the synchronization of different star-shaped networks. Numerical simulations on some non-regular complex networks generated by the Barabasi-Albert model and various star-shaped networks are shown for verification and illustration.
[ { "version": "v1", "created": "Mon, 15 Oct 2007 05:45:49 GMT" } ]
2007-10-16T00:00:00
[ [ "Li", "Rong", "" ], [ "Duan", "Zhisheng", "" ], [ "Chen", "Guanrong", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.2732
Marie-Annick Guillemer
Dima Grigoriev (IRMAR)
Probabilistic communication complexity over the reals
null
null
null
07-60
cs.CC
null
Deterministic and probabilistic communication protocols are introduced in which parties can exchange the values of polynomials (rather than bits in the usual setting). It is established a sharp lower bound $2n$ on the communication complexity of recognizing the $2n$-dimensional orthant, on the other hand the probabilistic communication complexity of its recognizing does not exceed 4. A polyhedron and a union of hyperplanes are constructed in $\RR^{2n}$ for which a lower bound $n/2$ on the probabilistic communication complexity of recognizing each is proved. As a consequence this bound holds also for the EMPTINESS and the KNAPSACK problems.
[ { "version": "v1", "created": "Mon, 15 Oct 2007 08:03:38 GMT" } ]
2007-10-16T00:00:00
[ [ "Grigoriev", "Dima", "", "IRMAR" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0710.2736
Chao Liu
Chao Liu, Zhisheng Duan and Guanrong Chen and Lin Huang
L2 norm performance index of synchronization and optimal control synthesis of complex networks
15 peges, 11 figures
null
null
null
cs.NI
null
In this paper, the synchronizability problem of dynamical networks is addressed, where better synchronizability means that the network synchronizes faster with lower-overshoot. The L2 norm of the error vector e is taken as a performance index to measure this kind of synchronizability. For the equilibrium synchronization case, it is shown that there is a close relationship between the L2 norm of the error vector e and the H2 norm of the transfer function G of the linearized network about the equilibrium point. Consequently, the effect of the network coupling topology on the H2 norm of the transfer function G is analyzed. Finally, an optimal controller is designed, according to the so-called LQR problem in modern control theory, which can drive the whole network to its equilibrium point and meanwhile minimize the L2 norm of the output of the linearized network.
[ { "version": "v1", "created": "Mon, 15 Oct 2007 08:16:47 GMT" } ]
2007-10-16T00:00:00
[ [ "Liu", "Chao", "" ], [ "Duan", "Zhisheng", "" ], [ "Chen", "Guanrong", "" ], [ "Huang", "Lin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.2782
Leonardo Emmendorfer
Leonardo Emmendorfer and Aurora Pozo
Effective linkage learning using low-order statistics and clustering
Submitted to IEEE Transactions on Evolutionary Computation
null
null
null
cs.NE cs.AI
null
The adoption of probabilistic models for the best individuals found so far is a powerful approach for evolutionary computation. Increasingly more complex models have been used by estimation of distribution algorithms (EDAs), which often result better effectiveness on finding the global optima for hard optimization problems. Supervised and unsupervised learning of Bayesian networks are very effective options, since those models are able to capture interactions of high order among the variables of a problem. Diversity preservation, through niching techniques, has also shown to be very important to allow the identification of the problem structure as much as for keeping several global optima. Recently, clustering was evaluated as an effective niching technique for EDAs, but the performance of simpler low-order EDAs was not shown to be much improved by clustering, except for some simple multimodal problems. This work proposes and evaluates a combination operator guided by a measure from information theory which allows a clustered low-order EDA to effectively solve a comprehensive range of benchmark optimization problems.
[ { "version": "v1", "created": "Mon, 15 Oct 2007 15:28:47 GMT" }, { "version": "v2", "created": "Tue, 16 Oct 2007 13:27:03 GMT" } ]
2007-10-16T00:00:00
[ [ "Emmendorfer", "Leonardo", "" ], [ "Pozo", "Aurora", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0710.2848
Francis Bach
Francis Bach (WILLOW Project - Inria/Ens)
Consistency of trace norm minimization
null
null
null
null
cs.LG
null
Regularization by the sum of singular values, also referred to as the trace norm, is a popular technique for estimating low rank rectangular matrices. In this paper, we extend some of the consistency results of the Lasso to provide necessary and sufficient conditions for rank consistency of trace norm minimization with the square loss. We also provide an adaptive version that is rank consistent even when the necessary condition for the non adaptive version is not fulfilled.
[ { "version": "v1", "created": "Mon, 15 Oct 2007 15:38:33 GMT" } ]
2007-10-16T00:00:00
[ [ "Bach", "Francis", "", "WILLOW Project - Inria/Ens" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0710.2852
Sebastien Hinderer
Patrick Blackburn (INRIA Lorraine - LORIA), S\'ebastien Hinderer (INRIA Lorraine - LORIA)
Generating models for temporal representations
null
Dans Recent Advances in Natural Language Processing (2007) 69-75
null
null
cs.CL
null
We discuss the use of model building for temporal representations. We chose Polish to illustrate our discussion because it has an interesting aspectual system, but the points we wish to make are not language specific. Rather, our goal is to develop theoretical and computational tools for temporal model building tasks in computational semantics. To this end, we present a first-order theory of time and events which is rich enough to capture interesting semantic distinctions, and an algorithm which takes minimal models for first-order theories and systematically attempts to ``perturb'' their temporal component to provide non-minimal, but semantically significant, models.
[ { "version": "v1", "created": "Mon, 15 Oct 2007 15:45:13 GMT" } ]
2007-10-16T00:00:00
[ [ "Blackburn", "Patrick", "", "INRIA Lorraine - LORIA" ], [ "Hinderer", "Sébastien", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0710.2887
Olivier Zendra
Roland Ducournau (LIRMM), Etienne Gagnon, Chandra Krintz (RACE LAB), Philippe Mulet, Jan Vitek (S3L), Olivier Zendra (INRIA Lorraine - LORIA)
Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems - Report on the Workshop ICOOOLPS'2006 at ECOOP'06
The original publication is available at http://www.springerlink.com
Object-Oriented Technology. ECOOP 2006 Workshop Reader - ECOOP 2006 Workshops, Nantes, France, July 3-7, 2006, Final Reports Springer Berlin / Heidelberg (Ed.) (2007) 1-14
10.1007/978-3-540-71774-4_1
null
cs.PF cs.PL cs.SE
null
ICOOOLPS'2006 was the first edition of ECOOP-ICOOOLPS workshop. It intended to bring researchers and practitioners both from academia and industry together, with a spirit of openness, to try and identify and begin to address the numerous and very varied issues of optimization. This succeeded, as can be seen from the papers, the attendance and the liveliness of the discussions that took place during and after the workshop, not to mention a few new cooperations or postdoctoral contracts. The 22 talented people from different groups who participated were unanimous to appreciate this first edition and recommend that ICOOOLPS be continued next year. A community is thus beginning to form, and should be reinforced by a second edition next year, with all the improvements this first edition made emerge.
[ { "version": "v1", "created": "Mon, 15 Oct 2007 17:53:49 GMT" } ]
2007-10-16T00:00:00
[ [ "Ducournau", "Roland", "", "LIRMM" ], [ "Gagnon", "Etienne", "", "RACE LAB" ], [ "Krintz", "Chandra", "", "RACE LAB" ], [ "Mulet", "Philippe", "", "S3L" ], [ "Vitek", "Jan", "", "S3L" ], [ "Zendra", "Olivier", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0710.2889
Nir Ailon
Nir Ailon and Mehryar Mohri
An efficient reduction of ranking to classification
Revised paper: Improved results: Upper bounds for regret (constant down to 1 for bipartite case) and also lower bound on deterministic algorithms for bipartite case. Total number of pages 22
null
null
null
cs.LG cs.IR
null
This paper describes an efficient reduction of the learning problem of ranking to binary classification. The reduction guarantees an average pairwise misranking regret of at most that of the binary classifier regret, improving a recent result of Balcan et al which only guarantees a factor of 2. Moreover, our reduction applies to a broader class of ranking loss functions, admits a simpler proof, and the expected running time complexity of our algorithm in terms of number of calls to a classifier or preference function is improved from $\Omega(n^2)$ to $O(n \log n)$. In addition, when the top $k$ ranked elements only are required ($k \ll n$), as in many applications in information extraction or search engines, the time complexity of our algorithm can be further reduced to $O(k \log k + n)$. Our reduction and algorithm are thus practical for realistic applications where the number of points to rank exceeds several thousands. Much of our results also extend beyond the bipartite case previously studied. Our rediction is a randomized one. To complement our result, we also derive lower bounds on any deterministic reduction from binary (preference) classification to ranking, implying that our use of a randomized reduction is essentially necessary for the guarantees we provide.
[ { "version": "v1", "created": "Mon, 15 Oct 2007 18:25:15 GMT" }, { "version": "v2", "created": "Fri, 7 Dec 2007 00:02:44 GMT" } ]
2007-12-07T00:00:00
[ [ "Ailon", "Nir", "" ], [ "Mohri", "Mehryar", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0710.2970
An-Ping Li
An-Ping Li
A generic attack to ciphers
4 pages
null
null
null
cs.CR
null
In this paper, we present a generic attack for ciphers, which is in essence a collision attack on the secret keys of ciphers .
[ { "version": "v1", "created": "Tue, 16 Oct 2007 07:45:58 GMT" }, { "version": "v2", "created": "Wed, 17 Oct 2007 10:34:37 GMT" } ]
2009-03-21T00:00:00
[ [ "Li", "An-Ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0710.2988
Paul Bedaride
Paul Bedaride (INRIA Lorraine - Loria)
Using Description Logics for Recognising Textual Entailment
null
Dans 19th European Summer School in Logic, Language and Information (2007) 11-21
null
null
cs.CL
null
The aim of this paper is to show how we can handle the Recognising Textual Entailment (RTE) task by using Description Logics (DLs). To do this, we propose a representation of natural language semantics in DLs inspired by existing representations in first-order logic. But our most significant contribution is the definition of two novel inference tasks: A-Box saturation and subgraph detection which are crucial for our approach to RTE.
[ { "version": "v1", "created": "Tue, 16 Oct 2007 09:16:24 GMT" } ]
2007-10-17T00:00:00
[ [ "Bedaride", "Paul", "", "INRIA Lorraine - Loria" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0710.3027
Igor Bjelakovic
Igor Bjelakovic and Holger Boche
Classical Capacities of Averaged and Compound Quantum Channels
15 pages, no figures. Typos corrected. Remarks and suggestions of the referees incorporated. Submitted to IEEE Transactions on Information Theory
null
null
null
quant-ph cs.IT math-ph math.IT math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We determine the capacity of compound classical-quantum channels. As a consequence we obtain the capacity formula for the averaged classical-quantum channels. The capacity result for compound channels demonstrates, as in the classical setting, the existence of reliable universal classical-quantum codes in scenarios where the only a priori information about the channel used for the transmission of information is that it belongs to a given set of memoryless classical-quantum channels. Our approach is based on the universal classical approximation of the quantum relative entropy which in turn relies on the universal hypothesis testing results.
[ { "version": "v1", "created": "Tue, 16 Oct 2007 11:56:29 GMT" }, { "version": "v2", "created": "Mon, 16 Feb 2009 11:35:26 GMT" } ]
2009-02-16T00:00:00
[ [ "Bjelakovic", "Igor", "" ], [ "Boche", "Holger", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
0710.3170
Louis Yu Lu
Louis Yu Lu
Fast Intrinsic Mode Decomposition of Time Series Data with Sawtooth Transform
Add details to extend the sawtooth function for boundary points calculation
null
null
null
cs.NA
null
An efficient method is introduced in this paper to find the intrinsic mode function (IMF) components of time series data. This method is faster and more predictable than the Empirical Mode Decomposition (EMD) method devised by the author of Hilbert Huang Transform (HHT). The approach is to transforms the original data function into a piecewise linear sawtooth function (or triangle wave function), then directly constructs the upper envelope by connecting the maxima and construct lower envelope by connecting minima with straight line segments in the sawtooth space, the IMF is calculated as the difference between the sawtooth function and the mean of the upper and lower envelopes. The results found in the sawtooth space are reversely transformed into the original data space as the required IMF and envelopes mean. This decomposition method process the data in one pass to obtain a unique IMF component without the time consuming repetitive sifting process of EMD method. An alternative decomposition method with sawtooth function expansion is also presented.
[ { "version": "v1", "created": "Tue, 16 Oct 2007 20:19:27 GMT" }, { "version": "v2", "created": "Wed, 14 Nov 2007 15:58:10 GMT" } ]
2007-11-14T00:00:00
[ [ "Lu", "Louis Yu", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0710.3178
George Maney Mr.
George A. Maney
Modeling Context, Collaboration, and Civilization in End-User Informatics
null
null
null
null
cs.OH
null
End-user informatics applications are Internet data web management automation solutions. These are mass modeling and mass management collaborative communal consensus solutions. They are made and maintained by managerial, professional, technical and specialist end-users. In end-user informatics the end-users are always right. So it becomes necessary for information technology professionals to understand information and informatics from the end-user perspective. End-user informatics starts with the observation that practical prose is a mass consensus communal modeling technology. This high technology is the mechanistic modeling medium we all use every day in all of our practical pursuits. Practical information flows are the lifeblood of modern capitalist communities. But what exactly is practical information? It's ultimately physical information, but the physics is highly emergent rather than elementary. So practical reality is just physical reality in deep disguise. Practical prose is the medium that we all use to model the everyday and elite mechanics of practical reality. So this is the medium that end-user informatics must automate and animate.
[ { "version": "v1", "created": "Tue, 16 Oct 2007 22:44:03 GMT" } ]
2007-10-18T00:00:00
[ [ "Maney", "George A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0710.3185
Harki Tanaka
Harki Tanaka, Neli Regina Siqueira Ortega, Mauricio Stanzione Galizia, Joao Batista Borges Sobrinho, and Marcelo Britto Passos Amato
Fuzzy Modeling of Electrical Impedance Tomography Image of the Lungs
10 pages, 6 figures
null
null
null
cs.AI cs.CV
null
Electrical Impedance Tomography (EIT) is a functional imaging method that is being developed for bedside use in critical care medicine. Aiming at improving the chest anatomical resolution of EIT images we developed a fuzzy model based on EIT high temporal resolution and the functional information contained in the pulmonary perfusion and ventilation signals. EIT data from an experimental animal model were collected during normal ventilation and apnea while an injection of hypertonic saline was used as a reference . The fuzzy model was elaborated in three parts: a modeling of the heart, a pulmonary map from ventilation images and, a pulmonary map from perfusion images. Image segmentation was performed using a threshold method and a ventilation/perfusion map was generated. EIT images treated by the fuzzy model were compared with the hypertonic saline injection method and CT-scan images, presenting good results in both qualitative (the image obtained by the model was very similar to that of the CT-scan) and quantitative (the ROC curve provided an area equal to 0.93) point of view. Undoubtedly, these results represent an important step in the EIT images area, since they open the possibility of developing EIT-based bedside clinical methods, which are not available nowadays. These achievements could serve as the base to develop EIT diagnosis system for some life-threatening diseases commonly found in critical care medicine.
[ { "version": "v1", "created": "Tue, 16 Oct 2007 22:13:11 GMT" } ]
2007-10-18T00:00:00
[ [ "Tanaka", "Harki", "" ], [ "Ortega", "Neli Regina Siqueira", "" ], [ "Galizia", "Mauricio Stanzione", "" ], [ "Sobrinho", "Joao Batista Borges", "" ], [ "Amato", "Marcelo Britto Passos", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0710.3246
John Talbot
David Talbot and John Talbot
Bloom maps
15 pages
null
null
null
cs.DS cs.IT math.IT
null
We consider the problem of succinctly encoding a static map to support approximate queries. We derive upper and lower bounds on the space requirements in terms of the error rate and the entropy of the distribution of values over keys: our bounds differ by a factor log e. For the upper bound we introduce a novel data structure, the Bloom map, generalising the Bloom filter to this problem. The lower bound follows from an information theoretic argument.
[ { "version": "v1", "created": "Wed, 17 Oct 2007 09:35:14 GMT" } ]
2007-10-18T00:00:00
[ [ "Talbot", "David", "" ], [ "Talbot", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.3279
Meixia Tao
Meixia Tao, Ying-Chang Liang and Fan Zhang
Resource Allocation for Delay Differentiated Traffic in Multiuser OFDM Systems
29 pages, 8 figures, submitted to IEEE Transactions on Wireless Communications
null
10.1109/ICC.2006.255331
null
cs.NI cs.IT math.IT
null
Most existing work on adaptive allocation of subcarriers and power in multiuser orthogonal frequency division multiplexing (OFDM) systems has focused on homogeneous traffic consisting solely of either delay-constrained data (guaranteed service) or non-delay-constrained data (best-effort service). In this paper, we investigate the resource allocation problem in a heterogeneous multiuser OFDM system with both delay-constrained (DC) and non-delay-constrained (NDC) traffic. The objective is to maximize the sum-rate of all the users with NDC traffic while maintaining guaranteed rates for the users with DC traffic under a total transmit power constraint. Through our analysis we show that the optimal power allocation over subcarriers follows a multi-level water-filling principle; moreover, the valid candidates competing for each subcarrier include only one NDC user but all DC users. By converting this combinatorial problem with exponential complexity into a convex problem or showing that it can be solved in the dual domain, efficient iterative algorithms are proposed to find the optimal solutions. To further reduce the computational cost, a low-complexity suboptimal algorithm is also developed. Numerical studies are conducted to evaluate the performance the proposed algorithms in terms of service outage probability, achievable transmission rate pairs for DC and NDC traffic, and multiuser diversity.
[ { "version": "v1", "created": "Wed, 17 Oct 2007 12:04:34 GMT" } ]
2016-11-15T00:00:00
[ [ "Tao", "Meixia", "" ], [ "Liang", "Ying-Chang", "" ], [ "Zhang", "Fan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.3283
Meixia Tao
Meixia Tao
Effects of Non-Identical Rayleigh Fading on Differential Unitary Space-Time Modulation
This paper has been withdrawn
null
null
null
cs.PF cs.IT math.IT
null
This paper has been withdrawn by the author.
[ { "version": "v1", "created": "Wed, 17 Oct 2007 12:32:29 GMT" }, { "version": "v2", "created": "Sat, 20 Oct 2007 08:21:37 GMT" } ]
2007-10-20T00:00:00
[ [ "Tao", "Meixia", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.3285
Tamara Tretjakova
Tretjakova Tamara
Nontraditional Scoring of C-tests
4 pages, in Russian
null
null
null
cs.CY cs.CL
null
In C-tests the hypothesis of items local independence is violated, which doesn't permit to consider them as real tests. It is suggested to determine the distances between separate C-test items (blanks) and to combine items into clusters. Weights, inversely proportional to the number of items in corresponding clusters, are assigned to items. As a result, the C-test structure becomes similar to the structure of classical tests, without violation of local independence hypothesis.
[ { "version": "v1", "created": "Wed, 17 Oct 2007 12:42:39 GMT" }, { "version": "v2", "created": "Thu, 18 Oct 2007 07:50:21 GMT" } ]
2007-10-18T00:00:00
[ [ "Tamara", "Tretjakova", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0710.3305
Laurent Vigneron
Francis Klay (FT R&D), Judson Santiago (DIMAP - UFRN), Laurent Vigneron (INRIA Lorraine - LORIA / LIFC)
Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder
null
null
null
null
cs.LO cs.CR
null
Non-repudiation protocols have an important role in many areas where secured transactions with proofs of participation are necessary. Formal methods are clever and without error, therefore using them for verifying such protocols is crucial. In this purpose, we show how to partially represent non-repudiation as a combination of authentications on the Fair Zhou-Gollmann protocol. After discussing its limits, we define a new method based on the handling of the knowledge of protocol participants. This method is very general and is of natural use, as it consists in adding simple annotations, like for authentication problems. The method is very easy to implement in tools able to handle participants knowledge. We have implemented it in the AVISPA Tool and analyzed the optimistic Cederquist-Corin- Dashti protocol, discovering two unknown attacks. This extension of the AVISPA Tool for handling non-repudiation opens a highway to the specification of many other properties, without any more change in the tool itself.
[ { "version": "v1", "created": "Wed, 17 Oct 2007 14:16:25 GMT" }, { "version": "v2", "created": "Mon, 22 Oct 2007 06:40:14 GMT" } ]
2007-10-22T00:00:00
[ [ "Klay", "Francis", "", "FT R&D" ], [ "Santiago", "Judson", "", "DIMAP - UFRN" ], [ "Vigneron", "Laurent", "", "INRIA Lorraine - LORIA / LIFC" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0710.3332
Jad Saklawi
Paul C. Attie and Jad Saklawi
Model and Program Repair via SAT Solving
29 pages, new repair features
null
null
null
cs.LO
null
We consider the following \emph{model repair problem}: given a finite Kripke structure $M$ and a specification formula $\eta$ in some modal or temporal logic, determine if $M$ contains a substructure $M'$ (with the same initial state) that satisfies $\eta$. Thus, $M$ can be ``repaired'' to satisfy the specification $\eta$ by deleting some transitions. We map an instance $(M, \eta)$ of model repair to a boolean formula $\repfor(M,\eta)$ such that $(M, \eta)$ has a solution iff $\repfor(M,\eta)$ is satisfiable. Furthermore, a satisfying assignment determines which transitions must be removed from $M$ to generate a model $M'$ of $\eta$. Thus, we can use any SAT solver to repair Kripke structures. Furthermore, using a complete SAT solver yields a complete algorithm: it always finds a repair if one exists. We extend our method to repair finite-state shared memory concurrent programs, to solve the discrete event supervisory control problem \cite{RW87,RW89}, to check for the existence of symmettric solutions \cite{ES93}, and to accomodate any boolean constraint on the existence of states and transitions in the repaired model. Finally, we show that model repair is NP-complete for CTL, and logics with polynomial model checking algorithms to which CTL can be reduced in polynomial time. A notable example of such a logic is Alternating-Time Temporal Logic (ATL).
[ { "version": "v1", "created": "Wed, 17 Oct 2007 16:56:56 GMT" }, { "version": "v2", "created": "Thu, 18 Oct 2007 11:59:57 GMT" }, { "version": "v3", "created": "Tue, 4 Dec 2007 18:49:00 GMT" }, { "version": "v4", "created": "Tue, 15 Apr 2008 12:47:15 GMT" } ]
2008-04-15T00:00:00
[ [ "Attie", "Paul C.", "" ], [ "Saklawi", "Jad", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0710.3375
Ivana Maric
I. Maric, A. Goldsmith, G. Kramer, S. Shamai
On the Capacity of Interference Channels with One Cooperating Transmitter
11 pages, 8 figures, 1 table
null
null
null
cs.IT math.IT
null
Inner and outer bounds are established on the capacity region of two-sender, two-receiver interference channels where one transmitter knows both messages. The transmitter with extra knowledge is referred to as being cognitive. The inner bound is based on strategies that generalize prior work, and include rate-splitting, Gel'fand-Pinsker coding and cooperative transmission. A general outer bound is based on the Nair-El Gamal outer bound for broadcast channels. A simpler bound is presented for the case in which one of the decoders can decode both messages. The bounds are evaluated and compared for Gaussian channels.
[ { "version": "v1", "created": "Wed, 17 Oct 2007 19:11:40 GMT" }, { "version": "v2", "created": "Thu, 18 Oct 2007 20:05:11 GMT" }, { "version": "v3", "created": "Mon, 22 Oct 2007 02:29:26 GMT" } ]
2007-10-22T00:00:00
[ [ "Maric", "I.", "" ], [ "Goldsmith", "A.", "" ], [ "Kramer", "G.", "" ], [ "Shamai", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.3427
Shashi Kiran Chilappagari
Shashi Kiran Chilappagari and Bane Vasic
Error Correction Capability of Column-Weight-Three LDPC Codes
16 pages, 3 figures. Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
In this paper, we investigate the error correction capability of column-weight-three LDPC codes when decoded using the Gallager A algorithm. We prove that the necessary condition for a code to correct $k \geq 5$ errors is to avoid cycles of length up to $2k$ in its Tanner graph. As a consequence of this result, we show that given any $\alpha>0, \exists N $ such that $\forall n>N$, no code in the ensemble of column-weight-three codes can correct all $\alpha n$ or fewer errors. We extend these results to the bit flipping algorithm.
[ { "version": "v1", "created": "Thu, 18 Oct 2007 02:53:29 GMT" } ]
2007-10-19T00:00:00
[ [ "Chilappagari", "Shashi Kiran", "" ], [ "Vasic", "Bane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.3439
Meixia Tao
Xiaolu Zhang, Meixia Tao and Chun Sum Ng
Utility-Based Wireless Resource Allocation for Variable Rate Transmission
6 pages, 5 figures, to appear in IEEE Trans. on Wireless Communications
null
null
null
cs.NI
null
For most wireless services with variable rate transmission, both average rate and rate oscillation are important performance metrics. The traditional performance criterion, utility of average transmission rate, boosts the average rate but also results in high rate oscillations. We introduce a utility function of instantaneous transmission rates. It is capable of facilitating the resource allocation with flexible combinations of average rate and rate oscillation. Based on the new utility, we consider the time and power allocation in a time-shared wireless network. Two adaptation policies are developed, namely, time sharing (TS) and joint time sharing and power control (JTPC). An extension to quantized time sharing with limited channel feedback (QTSL) for practical systems is also discussed. Simulation results show that by controlling the concavity of the utility function, a tradeoff between the average rate and rate oscillation can be easily made.
[ { "version": "v1", "created": "Thu, 18 Oct 2007 05:09:57 GMT" } ]
2007-10-19T00:00:00
[ [ "Zhang", "Xiaolu", "" ], [ "Tao", "Meixia", "" ], [ "Ng", "Chun Sum", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.3443
EDA Publishing Association
G.F. Bouesse (TIMA), M. Renaudin (TIMA), S. Dumont (TIMA), F. Germain
DPA on quasi delay insensitive asynchronous circuits: formalization and improvement
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
10.1109/DATE.2005.124
null
cs.AR
null
The purpose of this paper is to formally specify a flow devoted to the design of Differential Power Analysis (DPA) resistant QDI asynchronous circuits. The paper first proposes a formal modeling of the electrical signature of QDI asynchronous circuits. The DPA is then applied to the formal model in order to identify the source of leakage of this type of circuits. Finally, a complete design flow is specified to minimize the information leakage. The relevancy and efficiency of the approach is demonstrated using the design of an AES crypto-processor.
[ { "version": "v1", "created": "Thu, 18 Oct 2007 06:57:52 GMT" } ]
2007-10-19T00:00:00
[ [ "Bouesse", "G. F.", "", "TIMA" ], [ "Renaudin", "M.", "", "TIMA" ], [ "Dumont", "S.", "", "TIMA" ], [ "Germain", "F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.3502
Stergos Afantenos
Stergos D. Afantenos, V. Karkaletsis, P. Stamatopoulos and C. Halatsis
Using Synchronic and Diachronic Relations for Summarizing Multiple Documents Describing Evolving Events
45 pages, 6 figures. To appear in the Journal of Intelligent Information Systems
null
10.1007/s10844-006-0025-9
null
cs.CL cs.IR
null
In this paper we present a fresh look at the problem of summarizing evolving events from multiple sources. After a discussion concerning the nature of evolving events we introduce a distinction between linearly and non-linearly evolving events. We present then a general methodology for the automatic creation of summaries from evolving events. At its heart lie the notions of Synchronic and Diachronic cross-document Relations (SDRs), whose aim is the identification of similarities and differences between sources, from a synchronical and diachronical perspective. SDRs do not connect documents or textual elements found therein, but structures one might call messages. Applying this methodology will yield a set of messages and relations, SDRs, connecting them, that is a graph which we call grid. We will show how such a grid can be considered as the starting point of a Natural Language Generation System. The methodology is evaluated in two case-studies, one for linearly evolving events (descriptions of football matches) and another one for non-linearly evolving events (terrorist incidents involving hostages). In both cases we evaluate the results produced by our computational systems.
[ { "version": "v1", "created": "Thu, 18 Oct 2007 13:24:26 GMT" } ]
2007-10-19T00:00:00
[ [ "Afantenos", "Stergos D.", "" ], [ "Karkaletsis", "V.", "" ], [ "Stamatopoulos", "P.", "" ], [ "Halatsis", "C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0710.3519
Jan Foniok
Jan Foniok
P-matrix recognition is co-NP-complete
9 pages
null
null
null
cs.CC
null
This is a summary of the proof by G.E. Coxson that P-matrix recognition is co-NP-complete. The result follows by a reduction from the MAX CUT problem using results of S. Poljak and J. Rohn.
[ { "version": "v1", "created": "Thu, 18 Oct 2007 14:14:26 GMT" } ]
2007-10-19T00:00:00
[ [ "Foniok", "Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0710.3535
Andrea Maiorano
F. Belletti, M. Cotallo, A. Cruz, L. A. Fern\'andez, A. Gordillo, M. Guidetti, A. Maiorano, F. Mantovani, E. Marinari, V. Mart\'in-Mayor, A. Mu\~noz-Sudupe, D. Navarro, G. Parisi, S. P\'erez-Gaviro, M. Rossi, J. J. Ruiz-Lorenzo, S. F. Schifano, D. Sciretti, A. Taranc\'on, R. Tripiccione, J. L. Velasco
JANUS: an FPGA-based System for High Performance Scientific Computing
11 pages, 6 figures. Improved version, largely rewritten, submitted to Computing in Science & Engineering
Computing in Science & Engineering 11 (2009 ) 48-58
10.1109/MCSE.2009.11
null
cs.AR
null
This paper describes JANUS, a modular massively parallel and reconfigurable FPGA-based computing system. Each JANUS module has a computational core and a host. The computational core is a 4x4 array of FPGA-based processing elements with nearest-neighbor data links. Processors are also directly connected to an I/O node attached to the JANUS host, a conventional PC. JANUS is tailored for, but not limited to, the requirements of a class of hard scientific applications characterized by regular code structure, unconventional data manipulation instructions and not too large data-base size. We discuss the architecture of this configurable machine, and focus on its use on Monte Carlo simulations of statistical mechanics. On this class of application JANUS achieves impressive performances: in some cases one JANUS processing element outperfoms high-end PCs by a factor ~ 1000. We also discuss the role of JANUS on other classes of scientific applications.
[ { "version": "v1", "created": "Thu, 18 Oct 2007 15:26:32 GMT" }, { "version": "v2", "created": "Tue, 8 Apr 2008 11:10:12 GMT" } ]
2017-05-02T00:00:00
[ [ "Belletti", "F.", "" ], [ "Cotallo", "M.", "" ], [ "Cruz", "A.", "" ], [ "Fernández", "L. A.", "" ], [ "Gordillo", "A.", "" ], [ "Guidetti", "M.", "" ], [ "Maiorano", "A.", "" ], [ "Mantovani", "F.", "" ], [ "Marinari", "E.", "" ], [ "Martín-Mayor", "V.", "" ], [ "Muñoz-Sudupe", "A.", "" ], [ "Navarro", "D.", "" ], [ "Parisi", "G.", "" ], [ "Pérez-Gaviro", "S.", "" ], [ "Rossi", "M.", "" ], [ "Ruiz-Lorenzo", "J. J.", "" ], [ "Schifano", "S. F.", "" ], [ "Sciretti", "D.", "" ], [ "Tarancón", "A.", "" ], [ "Tripiccione", "R.", "" ], [ "Velasco", "J. L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.3536
Krzysztof R. Apt
Krzysztof R. Apt and Jonathan A. Zvesper
Common Beliefs and Public Announcements in Strategic Games with Arbitrary Strategy Sets
36 pages. Revised version
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide an epistemic analysis of arbitrary strategic games based on possibility correspondences. We first establish a generic result that links true common beliefs (and, respectively, common knowledge) of players' rationality defined by means of `monotonic' properties, with the iterated elimination of strategies that do not satisfy these properties. It allows us to deduce the customary results concerned with true common beliefs of rationality and iterated elimination of strictly dominated strategies as simple corollaries. This approach relies on Tarski's Fixpoint Theorem. We also provide an axiomatic presentation of this generic result. This allows us to clarify the proof-theoretic principles assumed in players' reasoning. Finally, we provide an alternative characterization of the iterated elimination of strategies based on the concept of a public announcement. It applies to `global properties'. Both classes of properties include the notions of rationalizability and the iterated elimination of strictly dominated strategies.
[ { "version": "v1", "created": "Thu, 18 Oct 2007 15:28:58 GMT" }, { "version": "v2", "created": "Fri, 7 Nov 2008 08:24:11 GMT" } ]
2008-11-07T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Zvesper", "Jonathan A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0710.3561
Arturo Berrones
Arturo Berrones
Stationary probability density of stochastic search processes in global optimization
null
J. Stat. Mech. (2008) P01013
10.1088/1742-5468/2008/01/P01013
null
cs.AI cond-mat.stat-mech cs.NE
null
A method for the construction of approximate analytical expressions for the stationary marginal densities of general stochastic search processes is proposed. By the marginal densities, regions of the search space that with high probability contain the global optima can be readily defined. The density estimation procedure involves a controlled number of linear operations, with a computational cost per iteration that grows linearly with problem size.
[ { "version": "v1", "created": "Thu, 18 Oct 2007 18:04:42 GMT" } ]
2008-01-30T00:00:00
[ [ "Berrones", "Arturo", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0710.3603
Jakub Mare\v{c}ek
Edmund K. Burke, Jakub Marecek, Andrew J. Parkes, and Hana Rudova
On a Clique-Based Integer Programming Formulation of Vertex Colouring with Applications in Course Timetabling
null
Annals of Operations Research (2010) 179(1), 105-130
10.1007/s10479-010-0716-z
NOTTCS-TR-2007-10
cs.DM cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vertex colouring is a well-known problem in combinatorial optimisation, whose alternative integer programming formulations have recently attracted considerable attention. This paper briefly surveys seven known formulations of vertex colouring and introduces a formulation of vertex colouring using a suitable clique partition of the graph. This formulation is applicable in timetabling applications, where such a clique partition of the conflict graph is given implicitly. In contrast with some alternatives, the presented formulation can also be easily extended to accommodate complex performance indicators (``soft constraints'') imposed in a number of real-life course timetabling applications. Its performance depends on the quality of the clique partition, but encouraging empirical results for the Udine Course Timetabling problem are reported.
[ { "version": "v1", "created": "Thu, 18 Oct 2007 21:38:37 GMT" }, { "version": "v2", "created": "Sat, 10 Nov 2007 19:03:39 GMT" }, { "version": "v3", "created": "Tue, 7 Jul 2009 19:55:23 GMT" } ]
2014-04-10T00:00:00
[ [ "Burke", "Edmund K.", "" ], [ "Marecek", "Jakub", "" ], [ "Parkes", "Andrew J.", "" ], [ "Rudova", "Hana", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0710.3621
Withawat Withayachumnankul
Withawat Withayachumnankul, Bernd M. Fischer, Samuel P. Mickan, Derek Abbott
Numerical removal of water-vapor effects from THz-TDS measurements
null
Proceedings of the Royal Society A: Mathematical, Physical & Engineering Sciences, vol. 464, no. 2097, pp 2435-2456, 2008
10.1098/rspa.2007.0294
null
cs.CE physics.comp-ph
null
One source of disturbance in a pulsed T-ray signal is attributed to ambient water vapor. Water molecules in the gas phase selectively absorb T-rays at discrete frequencies corresponding to their molecular rotational transitions. This results in prominent resonances spread over the T-ray spectrum, and in the time domain the T-ray signal is observed as fluctuations after the main pulse. These effects are generally undesired, since they may mask critical spectroscopic data. So, ambient water vapor is commonly removed from the T-ray path by using a closed chamber during the measurement. Yet, in some applications a closed chamber is not applicable. This situation, therefore, motivates the need for another method to reduce these unwanted artifacts. This paper presents a study on a computational means to address the problem. Initially, a complex frequency response of water vapor is modeled from a spectroscopic catalog. Using a deconvolution technique, together with fine tuning of the strength of each resonance, parts of the water-vapor response are removed from a measured T-ray signal, with minimal signal distortion.
[ { "version": "v1", "created": "Fri, 19 Oct 2007 02:17:35 GMT" } ]
2008-07-16T00:00:00
[ [ "Withayachumnankul", "Withawat", "" ], [ "Fischer", "Bernd M.", "" ], [ "Mickan", "Samuel P.", "" ], [ "Abbott", "Derek", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" } ]
0710.3642
Florent Bouchez
Florent Bouchez (LIP), Alain Darte (LIP), Fabrice Rastello (LIP)
On the Complexity of Spill Everywhere under SSA Form
10 pages
ACM SIGPLAN Notices Issue 7, Volume 42 (2007) 103 - 112
10.1145/1254766.1254782
null
cs.DS cs.CC
null
Compilation for embedded processors can be either aggressive (time consuming cross-compilation) or just in time (embedded and usually dynamic). The heuristics used in dynamic compilation are highly constrained by limited resources, time and memory in particular. Recent results on the SSA form open promising directions for the design of new register allocation heuristics for embedded systems and especially for embedded compilation. In particular, heuristics based on tree scan with two separated phases -- one for spilling, then one for coloring/coalescing -- seem good candidates for designing memory-friendly, fast, and competitive register allocators. Still, also because of the side effect on power consumption, the minimization of loads and stores overhead (spilling problem) is an important issue. This paper provides an exhaustive study of the complexity of the ``spill everywhere'' problem in the context of the SSA form. Unfortunately, conversely to our initial hopes, many of the questions we raised lead to NP-completeness results. We identify some polynomial cases but that are impractical in JIT context. Nevertheless, they can give hints to simplify formulations for the design of aggressive allocators.
[ { "version": "v1", "created": "Fri, 19 Oct 2007 07:24:58 GMT" } ]
2009-09-18T00:00:00
[ [ "Bouchez", "Florent", "", "LIP" ], [ "Darte", "Alain", "", "LIP" ], [ "Rastello", "Fabrice", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0710.3757
Gusztav Morvai
Gusztav Morvai, Benjamin Weiss
Inferring the conditional mean
null
Theory Stoch. Process. 11 (2005), no. 1-2, pp. 112--120
null
null
math.PR cs.IT math.IT
null
Consider a stationary real-valued time series $\{X_n\}_{n=0}^{\infty}$ with a priori unknown distribution. The goal is to estimate the conditional expectation $E(X_{n+1}|X_0,..., X_n)$ based on the observations $(X_0,..., X_n)$ in a pointwise consistent way. It is well known that this is not possible at all values of $n$. We will estimate it along stopping times.
[ { "version": "v1", "created": "Fri, 19 Oct 2007 18:31:30 GMT" } ]
2008-06-19T00:00:00
[ [ "Morvai", "Gusztav", "" ], [ "Weiss", "Benjamin", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.3760
Gusztav Morvai
Gusztav Morvai
Guessing the output of a stationary binary time series
null
Foundations of statistical inference (Shoresh, 2000), 207--215, Contrib. Statist., Physica, Heidelberg, 2003
null
null
math.PR cs.IT math.IT
null
The forward prediction problem for a binary time series $\{X_n\}_{n=0}^{\infty}$ is to estimate the probability that $X_{n+1}=1$ based on the observations $X_i$, $0\le i\le n$ without prior knowledge of the distribution of the process $\{X_n\}$. It is known that this is not possible if one estimates at all values of $n$. We present a simple procedure which will attempt to make such a prediction infinitely often at carefully selected stopping times chosen by the algorithm. The growth rate of the stopping times is also exhibited.
[ { "version": "v1", "created": "Fri, 19 Oct 2007 18:37:11 GMT" } ]
2008-06-19T00:00:00
[ [ "Morvai", "Gusztav", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.3764
Sumit Kumar Jha
Sumit Kumar Jha
Design of a Distributed Reachability Algorithm for Analysis of Linear Hybrid Automata
8 pages
null
null
null
cs.LO
null
This paper presents the design of a novel distributed algorithm d-IRA for the reachability analysis of linear hybrid automata. Recent work on iterative relaxation abstraction (IRA) is leveraged to distribute the computational problem among multiple computational nodes in a non-redundant manner by performing careful infeasibility analysis of linear programs corresponding to spurious counterexamples. The d-IRA algorithm is resistant to failure of multiple computational nodes. The experimental results provide promising evidence for the possible successful application of this technique.
[ { "version": "v1", "created": "Fri, 19 Oct 2007 19:32:39 GMT" } ]
2007-10-22T00:00:00
[ [ "Jha", "Sumit Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0710.3773
Gusztav Morvai
Gusztav Morvai and Benjamin Weiss
Limitations on intermittent forecasting
null
Statist. Probab. Lett. 72 (2005), no. 4, 285--290
null
null
math.PR cs.IT math.IT
null
Bailey showed that the general pointwise forecasting for stationary and ergodic time series has a negative solution. However, it is known that for Markov chains the problem can be solved. Morvai showed that there is a stopping time sequence $\{\lambda_n\}$ such that $P(X_{\lambda_n+1}=1|X_0,...,X_{\lambda_n}) $ can be estimated from samples $(X_0,...,X_{\lambda_n})$ such that the difference between the conditional probability and the estimate vanishes along these stoppping times for all stationary and ergodic binary time series. We will show it is not possible to estimate the above conditional probability along a stopping time sequence for all stationary and ergodic binary time series in a pointwise sense such that if the time series turns out to be a Markov chain, the predictor will predict eventually for all $n$.
[ { "version": "v1", "created": "Fri, 19 Oct 2007 20:03:54 GMT" } ]
2008-06-19T00:00:00
[ [ "Morvai", "Gusztav", "" ], [ "Weiss", "Benjamin", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.3775
Gusztav Morvai
Gusztav Morvai and Benjamin Weiss
On classifying processes
null
Bernoulli 11 (2005), no. 3, pp. 523--532
null
null
math.PR cs.IT math.IT
null
We prove several results concerning classifications, based on successive observations $(X_1,..., X_n)$ of an unknown stationary and ergodic process, for membership in a given class of processes, such as the class of all finite order Markov chains.
[ { "version": "v1", "created": "Fri, 19 Oct 2007 20:10:16 GMT" } ]
2008-06-19T00:00:00
[ [ "Morvai", "Gusztav", "" ], [ "Weiss", "Benjamin", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.3777
Salman Avestimehr
A. S. Avestimehr, S. N. Diggavi, D. N. C. Tse
A Deterministic Approach to Wireless Relay Networks
null
null
null
null
cs.IT cs.DM math.IT math.PR
null
We present a deterministic channel model which captures several key features of multiuser wireless communication. We consider a model for a wireless network with nodes connected by such deterministic channels, and present an exact characterization of the end-to-end capacity when there is a single source and a single destination and an arbitrary number of relay nodes. This result is a natural generalization of the max-flow min-cut theorem for wireline networks. Finally to demonstrate the connections between deterministic model and Gaussian model, we look at two examples: the single-relay channel and the diamond network. We show that in each of these two examples, the capacity-achieving scheme in the corresponding deterministic model naturally suggests a scheme in the Gaussian model that is within 1 bit and 2 bit respectively from cut-set upper bound, for all values of the channel gains. This is the first part of a two-part paper; the sequel [1] will focus on the proof of the max-flow min-cut theorem of a class of deterministic networks of which our model is a special case.
[ { "version": "v1", "created": "Fri, 19 Oct 2007 20:10:58 GMT" } ]
2007-10-23T00:00:00
[ [ "Avestimehr", "A. S.", "" ], [ "Diggavi", "S. N.", "" ], [ "Tse", "D. N. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0710.3779
Sumanth Gangasani
Sumanth Kumar Reddy Gangasani
Testing D-Sequences for their Randomness
8 pages, 5 figures
null
null
null
cs.CR
null
This paper examines the randomness of d-sequences, which are decimal sequences to an arbitrary base. Our motivation is to check their suitability for application to cryptography, spread-spectrum systems and use as pseudorandom sequence.
[ { "version": "v1", "created": "Fri, 19 Oct 2007 20:18:42 GMT" } ]
2007-10-23T00:00:00
[ [ "Gangasani", "Sumanth Kumar Reddy", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0710.3781
Salman Avestimehr
A. S. Avestimehr, S. N. Diggavi, D. N. C. Tse
Wireless Network Information Flow
- Corrected Typos
null
null
null
cs.IT cs.DM math.IT math.PR
null
We present an achievable rate for general deterministic relay networks, with broadcasting at the transmitters and interference at the receivers. In particular we show that if the optimizing distribution for the information-theoretic cut-set bound is a product distribution, then we have a complete characterization of the achievable rates for such networks. For linear deterministic finite-field models discussed in a companion paper [3], this is indeed the case, and we have a generalization of the celebrated max-flow min-cut theorem for such a network.
[ { "version": "v1", "created": "Fri, 19 Oct 2007 20:23:07 GMT" }, { "version": "v2", "created": "Wed, 24 Oct 2007 04:33:10 GMT" } ]
2007-10-24T00:00:00
[ [ "Avestimehr", "A. S.", "" ], [ "Diggavi", "S. N.", "" ], [ "Tse", "D. N. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0710.3789
Mohd Abubakr
Mohd Abubakr
Frequency Analysis of Decoupling Capacitors for Three Voltage Supplies in SoC
5 pages, 9 figures, Submitted to ICCSC 2008
null
null
null
cs.AR
null
Reduction in power consumption has become a major criterion of design in modern ICs. One such scheme to reduce power consumption by an IC is the use of multiple power supplies for critical and non-critical paths. To maintain the impedance of a power distribution system below a specified level, multiple decoupling capacitors are placed at different levels of power grid hierarchy. This paper describes about three-voltage supply power distribution systems. The noise at one power supply can propagate to the other power supply, causing power and signal integrity problems in the overall system. Effects such as anti-resonance and remedies for these effects are studied. Impedance of the three-voltage supply power distribution system is calculated in terms of RLC-model of decoupling capacitors. Further the obtained impedance depends on the frequency; hence brief frequency analysis of impedance is done.
[ { "version": "v1", "created": "Fri, 19 Oct 2007 20:59:53 GMT" } ]
2007-10-23T00:00:00
[ [ "Abubakr", "Mohd", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.3802
Raman Venkataramani
Raman Venkataramani, M. Fatih Erden
A Posteriori Equivalence: A New Perspective for Design of Optimal Channel Shortening Equalizers
12 pages, double column format, 5 figures
null
null
null
cs.IT math.IT
null
The problem of channel shortening equalization for optimal detection in ISI channels is considered. The problem is to choose a linear equalizer and a partial response target filter such that the combination produces the best detection performance. Instead of using the traditional approach of MMSE equalization, we directly seek all equalizer and target pairs that yield optimal detection performance in terms of the sequence or symbol error rate. This leads to a new notion of a posteriori equivalence between the equalized and target channels with a simple characterization in terms of their underlying probability distributions. Using this characterization we show the surprising existence an infinite family of equalizer and target pairs for which any maximum a posteriori (MAP) based detector designed for the target channel is simultaneously MAP optimal for the equalized channel. For channels whose input symbols have equal energy, such as q-PSK, the MMSE equalizer designed with a monic target constraint yields a solution belonging to this optimal family of designs. Although, these designs produce IIR target filters, the ideas are extended to design good FIR targets. For an arbitrary choice of target and equalizer, we derive an expression for the probability of sequence detection error. This expression is used to design optimal FIR targets and IIR equalizers and to quantify the FIR approximation penalty.
[ { "version": "v1", "created": "Fri, 19 Oct 2007 23:22:23 GMT" } ]
2007-10-23T00:00:00
[ [ "Venkataramani", "Raman", "" ], [ "Erden", "M. Fatih", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.3804
Thierry Mora
Thierry Mora and Lenka Zdeborova
Random subcubes as a toy model for constraint satisfaction problems
21 pages, 4 figures
J. Stat. Phys. 131, n. 6 (2008), 1121-1138
10.1007/s10955-008-9543-x
null
cs.CC cond-mat.dis-nn
null
We present an exactly solvable random-subcube model inspired by the structure of hard constraint satisfaction and optimization problems. Our model reproduces the structure of the solution space of the random k-satisfiability and k-coloring problems, and undergoes the same phase transitions as these problems. The comparison becomes quantitative in the large-k limit. Distance properties, as well the x-satisfiability threshold, are studied. The model is also generalized to define a continuous energy landscape useful for studying several aspects of glassy dynamics.
[ { "version": "v1", "created": "Fri, 19 Oct 2007 23:33:18 GMT" }, { "version": "v2", "created": "Mon, 28 Jan 2008 16:32:21 GMT" } ]
2008-05-23T00:00:00
[ [ "Mora", "Thierry", "" ], [ "Zdeborova", "Lenka", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" } ]
0710.3817
Dejan Djonin
Dejan V. Djonin
A Note on Comparison of Error Correction Codes
12 pages, 1 figure, Submitted to the IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT math.ST stat.TH
null
Use of an error correction code in a given transmission channel can be regarded as the statistical experiment. Therefore, powerful results from the theory of comparison of experiments can be applied to compare the performances of different error correction codes. We present results on the comparison of block error correction codes using the representation of error correction code as a linear experiment. In this case the code comparison is based on the Loewner matrix ordering of respective code matrices. Next, we demonstrate the bit-error rate code performance comparison based on the representation of the codes as dichotomies, in which case the comparison is based on the matrix majorization ordering of their respective equivalent code matrices.
[ { "version": "v1", "created": "Sat, 20 Oct 2007 05:06:55 GMT" } ]
2007-10-23T00:00:00
[ [ "Djonin", "Dejan V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0710.3824
Sebastien Tixeuil
Sylvie Dela\"et (LRI), Partha Sarathi Mandal (INRIA Futurs), Mariusz Rokicki (LRI), S\'ebastien Tixeuil (INRIA Futurs, LIP6)
Deterministic Secure Positioning in Wireless Sensor Networks
null
null
null
null
cs.CR cs.DC cs.DS cs.NI
null
Properly locating sensor nodes is an important building block for a large subset of wireless sensor networks (WSN) applications. As a result, the performance of the WSN degrades significantly when misbehaving nodes report false location and distance information in order to fake their actual location. In this paper we propose a general distributed deterministic protocol for accurate identification of faking sensors in a WSN. Our scheme does \emph{not} rely on a subset of \emph{trusted} nodes that are not allowed to misbehave and are known to every node in the network. Thus, any subset of nodes is allowed to try faking its position. As in previous approaches, our protocol is based on distance evaluation techniques developed for WSN. On the positive side, we show that when the received signal strength (RSS) technique is used, our protocol handles at most $\lfloor \frac{n}{2} \rfloor-2$ faking sensors. Also, when the time of flight (ToF) technique is used, our protocol manages at most $\lfloor \frac{n}{2} \rfloor - 3$ misbehaving sensors. On the negative side, we prove that no deterministic protocol can identify faking sensors if their number is $\lceil \frac{n}{2}\rceil -1$. Thus our scheme is almost optimal with respect to the number of faking sensors. We discuss application of our technique in the trusted sensor model. More precisely our results can be used to minimize the number of trusted sensors that are needed to defeat faking ones.
[ { "version": "v1", "created": "Mon, 22 Oct 2007 07:29:13 GMT" } ]
2007-10-23T00:00:00
[ [ "Delaët", "Sylvie", "", "LRI" ], [ "Mandal", "Partha Sarathi", "", "INRIA Futurs" ], [ "Rokicki", "Mariusz", "", "LRI" ], [ "Tixeuil", "Sébastien", "", "INRIA Futurs, LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.3861
Jarek Duda
Jarek Duda
Optimal encoding on discrete lattice with translational invariant constrains using statistical algorithms
39 pages, 8 figures Submitted to IEEE Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper will be presented methodology of encoding information in valuations of discrete lattice with some translational invariant constrains in asymptotically optimal way. The method is based on finding statistical description of such valuations and changing it into statistical algorithm, which allows to construct deterministically valuation with given statistics. Optimal statistics allow to generate valuations with uniform distribution - we get maximum information capacity this way. It will be shown that we can reach the optimum for one-dimensional models using maximal entropy random walk and that for the general case we can practically get as close to the capacity of the model as we want (found numerically: lost 10^{-10} bit/node for Hard Square). There will be also presented simpler alternative to arithmetic coding method which can be used as cryptosystem and data correction method too.
[ { "version": "v1", "created": "Sat, 20 Oct 2007 18:00:57 GMT" }, { "version": "v2", "created": "Thu, 20 Dec 2007 14:31:09 GMT" }, { "version": "v3", "created": "Sun, 23 Mar 2008 20:39:09 GMT" }, { "version": "v4", "created": "Thu, 23 Oct 2008 08:20:17 GMT" }, { "version": "v5", "created": "Sun, 2 Nov 2008 20:09:14 GMT" } ]
2008-11-02T00:00:00
[ [ "Duda", "Jarek", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.3888
Oren Somekh
Shlomo Shamai, Oren Somekh, Osvaldo Simeone, Amichai Sanderovich, Benjamin M. Zaidel, H. Vincent Poor
Cooperative Multi-Cell Networks: Impact of Limited-Capacity Backhaul and Inter-Users Links
null
In the Proceedings of the Joint Workshop on Coding and Communications, Durnstein, Austria, Oct. 14-16 2007
null
null
cs.IT math.IT
null
Cooperative technology is expected to have a great impact on the performance of cellular or, more generally, infrastructure networks. Both multicell processing (cooperation among base stations) and relaying (cooperation at the user level) are currently being investigated. In this presentation, recent results regarding the performance of multicell processing and user cooperation under the assumption of limited-capacity interbase station and inter-user links, respectively, are reviewed. The survey focuses on related results derived for non-fading uplink and downlink channels of simple cellular system models. The analytical treatment, facilitated by these simple setups, enhances the insight into the limitations imposed by limited-capacity constraints on the gains achievable by cooperative techniques.
[ { "version": "v1", "created": "Sat, 20 Oct 2007 22:46:49 GMT" } ]
2007-10-23T00:00:00
[ [ "Shamai", "Shlomo", "" ], [ "Somekh", "Oren", "" ], [ "Simeone", "Osvaldo", "" ], [ "Sanderovich", "Amichai", "" ], [ "Zaidel", "Benjamin M.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.3901
Christophe Paul
Derek Corneil and Michel Habib and Christophe Paul and Marc Tedder
A recursive linear time modular decomposition algorithm via LexBFS
An EA of this work appeared in ICALP'08. The arXiv v2 contains an appendix with some sketches of proofs. To date, complete proofs can only be found in the PhD of M. Tedder and spread over several chapters. This is the first self-contained version. To ease the understanding, the noveI presentation enlights the combinatorial objects involved in the algorithm, which still relies on the same ideas
null
null
null
cs.DM
http://creativecommons.org/licenses/by/4.0/
A module of a graph G is a set of vertices that have the same set of neighbours outside. Modules of a graphs form a so-called partitive family and thereby can be represented by a unique tree MD(G), called the modular decomposition tree. Motivated by the central role of modules in numerous algorithmic graph theory questions, the problem of efficiently computing MD(G) has been investigated since the early 70's. To date the best algorithms run in linear time but are all rather complicated. By combining previous algorithmic paradigms developed for the problem, we are able to present a simpler linear-time that relies on very simple data-structures, namely slice decomposition and sequences of rooted ordered trees.
[ { "version": "v1", "created": "Sun, 21 Oct 2007 03:30:05 GMT" }, { "version": "v2", "created": "Thu, 20 Mar 2008 09:49:23 GMT" }, { "version": "v3", "created": "Fri, 1 Mar 2024 16:03:35 GMT" } ]
2024-03-04T00:00:00
[ [ "Corneil", "Derek", "" ], [ "Habib", "Michel", "" ], [ "Paul", "Christophe", "" ], [ "Tedder", "Marc", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0710.3916
Bernard Cousin
Wojtek Bigos (IRISA), St\'ephane Gosselin (IRISA), Bernard Cousin (IRISA), Morgane Le Foll (IRISA), Hisao Nakajima (IRISA)
Optimized Design of Survivable MPLS over Optical Transport Networks. Optical Switching and Networking
null
Optical Switching and Networking 3, 3-4 (2006) 202-218
10.1016/j.osn.2006.08.001
null
cs.NI cs.PF
null
In this paper we study different options for the survivability implementation in MPLS over Optical Transport Networks in terms of network resource usage and configuration cost. We investigate two approaches to the survivability deployment: single layer and multilayer survivability and present various methods for spare capacity allocation (SCA) to reroute disrupted traffic. The comparative analysis shows the influence of the traffic granularity on the survivability cost: for high bandwidth LSPs, close to the optical channel capacity, the multilayer survivability outperforms the single layer one, whereas for low bandwidth LSPs the single layer survivability is more cost-efficient. For the multilayer survivability we demonstrate that by mapping efficiently the spare capacity of the MPLS layer onto the resources of the optical layer one can achieve up to 22% savings in the total configuration cost and up to 37% in the optical layer cost. Further savings (up to 9 %) in the wavelength use can be obtained with the integrated approach to network configuration over the sequential one, however, at the increase in the optimization problem complexity. These results are based on a cost model with actual technology pricing and were obtained for networks targeted to a nationwide coverage.
[ { "version": "v1", "created": "Sun, 21 Oct 2007 09:40:38 GMT" } ]
2007-10-23T00:00:00
[ [ "Bigos", "Wojtek", "", "IRISA" ], [ "Gosselin", "Stéphane", "", "IRISA" ], [ "Cousin", "Bernard", "", "IRISA" ], [ "Foll", "Morgane Le", "", "IRISA" ], [ "Nakajima", "Hisao", "", "IRISA" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0710.3917
Bernard Cousin
Hamza Drid (IRISA), Bernard Cousin (IRISA), Miklos Molnar (IRISA)
Heuristic Solution to Protect Communications in WDM Networks using P-cycles
null
Workshop on Traffic Engineering, Protection and Restoration for Futur Generation Internet, Oslo : Norv\`ege (2007)
null
null
cs.NI
null
Optical WDM mesh networks are able to transport huge amount of information. The use of such technology however poses the problem of protection against failures such as fibre cuts. One of the principal methods for link protection used in optical WDM networks is pre-configured protection cycle (p-cycle). The major problem of this method of protection resides in finding the optimal set of p-cycles which protect the network for a given distribution of working capacity. Existing heuristics generate a large set of p-cycle candidates which are entirely independent of the network state, and from then the good sub-set of p-cycles which will protect the network is selected. In this paper, we propose a new algorithm of generation of p-cycles based on the incremental aggregation of the shortest cycles. Our generation of p-cycles depends on the state of the network. This enables us to choose an efficient set of p-cycles which will protect the network. The set of p-cycles that we generate is the final set which will protect the network, in other words our heuristic does not go through the additional step of p-cycle selection
[ { "version": "v1", "created": "Sun, 21 Oct 2007 09:48:01 GMT" } ]
2007-10-23T00:00:00
[ [ "Drid", "Hamza", "", "IRISA" ], [ "Cousin", "Bernard", "", "IRISA" ], [ "Molnar", "Miklos", "", "IRISA" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.3918
Bernard Cousin
Simon Gyula (IRISA), Miklos Molnar (IRISA), Laszlo Gonczy (IRISA), Bernard Cousin (IRISA)
Dependable k-coverage algorithms for sensor networks
null
Dans Instrumentation and Measurement Technology Conference Proceedings - IEEE Instrumentation and Measurement Technology Conference, Varsovie : Pologne (2007)
10.1109/IMTC.2007.379153
null
cs.NI
null
Redundant sensing capabilities are often required in sensor network applications due to various reasons, e.g. robustness, fault tolerance, or increased accuracy. At the same time high sensor redundancy offers the possibility of increasing network lifetime by scheduling sleep intervals for some sensors and still providing continuous service with help of the remaining active sensors. In this paper centralized and distributed algorithms are proposed to solve the k-coverage sensing problem and maximize network lifetime. When physically possible, the proposed robust Controlled Greedy Sleep Algorithm provides guaranteed service independently of node and communication errors in the network. The performance of the algorithm is illustrated and compared to results of a random solution by simulation examples.
[ { "version": "v1", "created": "Sun, 21 Oct 2007 09:48:42 GMT" } ]
2007-10-23T00:00:00
[ [ "Gyula", "Simon", "", "IRISA" ], [ "Molnar", "Miklos", "", "IRISA" ], [ "Gonczy", "Laszlo", "", "IRISA" ], [ "Cousin", "Bernard", "", "IRISA" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.3928
Sonny Ben-Shimon
Sonny Ben-Shimon and Dan Vilenchik
Message passing for the coloring problem: Gallager meets Alon and Kahale
11 pages
DMTCS Proceedings of the 13th Annual Conference on Analysis of Algorithms (AofA'07), Juan-les-pins, France, 2007. pp. 217--226.
null
null
math.CO cs.DM math.PR
null
Message passing algorithms are popular in many combinatorial optimization problems. For example, experimental results show that {\em survey propagation} (a certain message passing algorithm) is effective in finding proper $k$-colorings of random graphs in the near-threshold regime. In 1962 Gallager introduced the concept of Low Density Parity Check (LDPC) codes, and suggested a simple decoding algorithm based on message passing. In 1994 Alon and Kahale exhibited a coloring algorithm and proved its usefulness for finding a $k$-coloring of graphs drawn from a certain planted-solution distribution over $k$-colorable graphs. In this work we show an interpretation of Alon and Kahale's coloring algorithm in light of Gallager's decoding algorithm, thus showing a connection between the two problems - coloring and decoding. This also provides a rigorous evidence for the usefulness of the message passing paradigm for the graph coloring problem. Our techniques can be applied to several other combinatorial optimization problems and networking-related issues.
[ { "version": "v1", "created": "Sun, 21 Oct 2007 13:29:06 GMT" } ]
2008-11-17T00:00:00
[ [ "Ben-Shimon", "Sonny", "" ], [ "Vilenchik", "Dan", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0710.3955
Massimiliano Laddomada Ph.D.
F. Daneshgaran, Massimiliano Laddomada, F. Mesiti, M. Mondin
On the Behavior of the Distributed Coordination Function of IEEE 802.11 with Multirate Capability under General Transmission Conditions
Submitted to IEEE Transactions on Wireless Communications, October 21, 2007
null
null
null
cs.NI cs.PF
null
The aim of this paper is threefold. First, it presents a multi-dimensional Markovian state transition model characterizing the behavior of the IEEE 802.11 protocol at the Medium Access Control layer which accounts for packet transmission failures due to channel errors modeling both saturated and non-saturated traffic conditions. Second, it provides a throughput analysis of the IEEE 802.11 protocol at the data link layer in both saturated and non-saturated traffic conditions taking into account the impact of both the physical propagation channel and multirate transmission in Rayleigh fading environment. The general traffic model assumed is M/M/1/K. Finally, it shows that the behavior of the throughput in non-saturated traffic conditions is a linear combination of two system parameters; the payload size and the packet rates, $\lambda^{(s)}$, of each contending station. The validity interval of the proposed model is also derived. Simulation results closely match the theoretical derivations, confirming the effectiveness of the proposed models.
[ { "version": "v1", "created": "Sun, 21 Oct 2007 22:59:27 GMT" } ]
2007-10-23T00:00:00
[ [ "Daneshgaran", "F.", "" ], [ "Laddomada", "Massimiliano", "" ], [ "Mesiti", "F.", "" ], [ "Mondin", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0710.3961
Victor Korotkikh
Victor Korotkikh and Galina Korotkikh
On a New Type of Information Processing for Efficient Management of Complex Systems
5 pages, 2 figures, to be presented at the International Conference on Complex Systems, Boston, October 28 - November 2, 2007
null
null
null
cs.CC
null
It is a challenge to manage complex systems efficiently without confronting NP-hard problems. To address the situation we suggest to use self-organization processes of prime integer relations for information processing. Self-organization processes of prime integer relations define correlation structures of a complex system and can be equivalently represented by transformations of two-dimensional geometrical patterns determining the dynamics of the system and revealing its structural complexity. Computational experiments raise the possibility of an optimality condition of complex systems presenting the structural complexity of a system as a key to its optimization. From this perspective the optimization of a system could be all about the control of the structural complexity of the system to make it consistent with the structural complexity of the problem. The experiments also indicate that the performance of a complex system may behave as a concave function of the structural complexity. Therefore, once the structural complexity could be controlled as a single entity, the optimization of a complex system would be potentially reduced to a one-dimensional concave optimization irrespective of the number of variables involved its description. This might open a way to a new type of information processing for efficient management of complex systems.
[ { "version": "v1", "created": "Mon, 22 Oct 2007 01:10:02 GMT" } ]
2007-10-23T00:00:00
[ [ "Korotkikh", "Victor", "" ], [ "Korotkikh", "Galina", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0710.3974
Akshay Kashyap
Akshay Kashyap, Luis Alfonso Lastras-Monta\~no, Cathy Xia, Zhen Liu
Distributed source coding in dense sensor networks
This is an extended version of the paper which appeared in the proceedings of, and was presented at, DCC 2005
null
null
null
cs.IT math.IT
null
We study the problem of the reconstruction of a Gaussian field defined in [0,1] using N sensors deployed at regular intervals. The goal is to quantify the total data rate required for the reconstruction of the field with a given mean square distortion. We consider a class of two-stage mechanisms which a) send information to allow the reconstruction of the sensor's samples within sufficient accuracy, and then b) use these reconstructions to estimate the entire field. To implement the first stage, the heavy correlation between the sensor samples suggests the use of distributed coding schemes to reduce the total rate. We demonstrate the existence of a distributed block coding scheme that achieves, for a given fidelity criterion for the reconstruction of the field, a total information rate that is bounded by a constant, independent of the number $N$ of sensors. The constant in general depends on the autocorrelation function of the field and the desired distortion criterion for the sensor samples. We then describe a scheme which can be implemented using only scalar quantizers at the sensors, without any use of distributed source coding, and which also achieves a total information rate that is a constant, independent of the number of sensors. While this scheme operates at a rate that is greater than the rate achievable through distributed coding and entails greater delay in reconstruction, its simplicity makes it attractive for implementation in sensor networks.
[ { "version": "v1", "created": "Mon, 22 Oct 2007 04:14:34 GMT" } ]
2007-10-23T00:00:00
[ [ "Kashyap", "Akshay", "" ], [ "Lastras-Montaño", "Luis Alfonso", "" ], [ "Xia", "Cathy", "" ], [ "Liu", "Zhen", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.3979
William Yurcik
William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs
8 pages,1 figure, 4 tables
null
null
null
cs.CR cs.NI
null
Network data needs to be shared for distributed security analysis. Anonymization of network data for sharing sets up a fundamental tradeoff between privacy protection versus security analysis capability. This privacy/analysis tradeoff has been acknowledged by many researchers but this is the first paper to provide empirical measurements to characterize the privacy/analysis tradeoff for an enterprise dataset. Specifically we perform anonymization options on single-fields within network packet traces and then make measurements using intrusion detection system alarms as a proxy for security analysis capability. Our results show: (1) two fields have a zero sum tradeoff (more privacy lessens security analysis and vice versa) and (2) eight fields have a more complex tradeoff (that is not zero sum) in which both privacy and analysis can both be simultaneously accomplished.
[ { "version": "v1", "created": "Mon, 22 Oct 2007 19:18:11 GMT" }, { "version": "v2", "created": "Fri, 26 Oct 2007 14:55:08 GMT" } ]
2011-11-10T00:00:00
[ [ "Yurcik", "William", "" ], [ "Woolam", "Clay", "" ], [ "Hellings", "Greg", "" ], [ "Khan", "Latifur", "" ], [ "Thuraisingham", "Bhavani", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.4031
Amy Glen
Alexandre Blondin-Mass\'e, Srecko Brlek, Amy Glen, S\'ebastien Labb\'e
On the critical exponent of generalized Thue-Morse words
13 pages; to appear in Discrete Mathematics and Theoretical Computer Science (accepted October 15, 2007)
Discrete Mathematics and Theoretical Computer Science 9 (2007) 293-304
null
null
math.CO cs.DM
null
For certain generalized Thue-Morse words t, we compute the "critical exponent", i.e., the supremum of the set of rational numbers that are exponents of powers in t, and determine exactly the occurrences of powers realizing it.
[ { "version": "v1", "created": "Mon, 22 Oct 2007 12:05:02 GMT" } ]
2010-03-16T00:00:00
[ [ "Blondin-Massé", "Alexandre", "" ], [ "Brlek", "Srecko", "" ], [ "Glen", "Amy", "" ], [ "Labbé", "Sébastien", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0710.4046
Alfonso Martinez
Alfonso Martinez, Albert Guillen i Fabregas, Giuseppe Caire, and Frans Willems
Bit-interleaved coded modulation in the wideband regime
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
The wideband regime of bit-interleaved coded modulation (BICM) in Gaussian channels is studied. The Taylor expansion of the coded modulation capacity for generic signal constellations at low signal-to-noise ratio (SNR) is derived and used to determine the corresponding expansion for the BICM capacity. Simple formulas for the minimum energy per bit and the wideband slope are given. BICM is found to be suboptimal in the sense that its minimum energy per bit can be larger than the corresponding value for coded modulation schemes. The minimum energy per bit using standard Gray mapping on M-PAM or M^2-QAM is given by a simple formula and shown to approach -0.34 dB as M increases. Using the low SNR expansion, a general trade-off between power and bandwidth in the wideband regime is used to show how a power loss can be traded off against a bandwidth gain.
[ { "version": "v1", "created": "Mon, 22 Oct 2007 13:07:28 GMT" } ]
2007-10-23T00:00:00
[ [ "Martinez", "Alfonso", "" ], [ "Fabregas", "Albert Guillen i", "" ], [ "Caire", "Giuseppe", "" ], [ "Willems", "Frans", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.4051
Jamal Najim
Julien Dumont (IGM-LabInfo), W. Hachem (LTCI), Samson Lasaulce, Philippe Loubaton (IGM-LabInfo), Jamal Najim (LTCI)
On the capacity achieving covariance matrix for Rician MIMO channels: an asymptotic approach
56 pp. Extended version of the published article in IEEE Inf. Th. (march 2010) with more proofs
IEEE Transactions on Information Theory 56, 3 (2010) 1048--1069
null
null
math.PR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity-achieving input covariance matrices for coherent block-fading correlated MIMO Rician channels are determined. In this case, no closed-form expressions for the eigenvectors of the optimum input covariance matrix are available. An approximation of the average mutual information is evaluated in this paper in the asymptotic regime where the number of transmit and receive antennas converge to $+\infty$. New results related to the accuracy of the corresponding large system approximation are provided. An attractive optimization algorithm of this approximation is proposed and we establish that it yields an effective way to compute the capacity achieving covariance matrix for the average mutual information. Finally, numerical simulation results show that, even for a moderate number of transmit and receive antennas, the new approach provides the same results as direct maximization approaches of the average mutual information, while being much more computationally attractive.
[ { "version": "v1", "created": "Mon, 22 Oct 2007 13:27:21 GMT" }, { "version": "v2", "created": "Fri, 9 Jul 2010 10:03:00 GMT" } ]
2011-06-07T00:00:00
[ [ "Dumont", "Julien", "", "IGM-LabInfo" ], [ "Hachem", "W.", "", "LTCI" ], [ "Lasaulce", "Samson", "", "IGM-LabInfo" ], [ "Loubaton", "Philippe", "", "IGM-LabInfo" ], [ "Najim", "Jamal", "", "LTCI" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.4076
Ioannis Kontoyiannis
Ioannis Kontoyiannis
Some information-theoretic computations related to the distribution of prime numbers
10 pages; see also http://pages.cs.aueb.gr/users/yiannisk/
null
null
null
cs.IT math.IT math.NT math.PR
null
We illustrate how elementary information-theoretic ideas may be employed to provide proofs for well-known, nontrivial results in number theory. Specifically, we give an elementary and fairly short proof of the following asymptotic result: The sum of (log p)/p, taken over all primes p not exceeding n, is asymptotic to log n as n tends to infinity. We also give finite-n bounds refining the above limit. This result, originally proved by Chebyshev in 1852, is closely related to the celebrated prime number theorem.
[ { "version": "v1", "created": "Mon, 22 Oct 2007 14:32:18 GMT" }, { "version": "v2", "created": "Tue, 6 Nov 2007 00:14:19 GMT" } ]
2007-11-06T00:00:00
[ [ "Kontoyiannis", "Ioannis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0710.4105
Tie Liu
Tie Liu and Shlomo Shamai (Shitz)
A Note on the Secrecy Capacity of the Multi-antenna Wiretap Channel
10 pages, 0 figures
null
null
null
cs.IT math.IT
null
Recently, the secrecy capacity of the multi-antenna wiretap channel was characterized by Khisti and Wornell [1] using a Sato-like argument. This note presents an alternative characterization using a channel enhancement argument. This characterization relies on an extremal entropy inequality recently proved in the context of multi-antenna broadcast channels, and is directly built on the physical intuition regarding to the optimal transmission strategy in this communication scenario.
[ { "version": "v1", "created": "Mon, 22 Oct 2007 16:59:13 GMT" } ]
2007-10-23T00:00:00
[ [ "Liu", "Tie", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.4117
Ioannis Kontoyiannis
Yun Gao, Ioannis Kontoyiannis and Elie Bienenstock
From the entropy to the statistical structure of spike trains
null
In Proceedings of the 2006 International Symposium on Information Theory, Seattle, WA, July 2006
null
null
q-bio.NC cs.IT math.IT math.PR stat.AP
null
We use statistical estimates of the entropy rate of spike train data in order to make inferences about the underlying structure of the spike train itself. We first examine a number of different parametric and nonparametric estimators (some known and some new), including the ``plug-in'' method, several versions of Lempel-Ziv-based compression algorithms, a maximum likelihood estimator tailored to renewal processes, and the natural estimator derived from the Context-Tree Weighting method (CTW). The theoretical properties of these estimators are examined, several new theoretical results are developed, and all estimators are systematically applied to various types of synthetic data and under different conditions. Our main focus is on the performance of these entropy estimators on the (binary) spike trains of 28 neurons recorded simultaneously for a one-hour period from the primary motor and dorsal premotor cortices of a monkey. We show how the entropy estimates can be used to test for the existence of long-term structure in the data, and we construct a hypothesis test for whether the renewal process model is appropriate for these spike trains. Further, by applying the CTW algorithm we derive the maximum a posterior (MAP) tree model of our empirical data, and comment on the underlying structure it reveals.
[ { "version": "v1", "created": "Mon, 22 Oct 2007 18:14:17 GMT" }, { "version": "v2", "created": "Tue, 23 Oct 2007 19:15:01 GMT" }, { "version": "v3", "created": "Thu, 27 Mar 2008 13:51:43 GMT" } ]
2008-03-27T00:00:00
[ [ "Gao", "Yun", "" ], [ "Kontoyiannis", "Ioannis", "" ], [ "Bienenstock", "Elie", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0710.4180
Akisato Kimura
Akisato Kimura, Kunio Kashino, Takayuki Kurozumi, Hiroshi Murase
A quick search method for audio signals based on a piecewise linear representation of feature trajectories
20 pages, to appear in IEEE Transactions on Audio, Speech and Language Processing
IEEE Transactions on Audio, Speech and Language Processing, Vol.16, No.2, pp.396-407, February 2008.
10.1109/TASL.2007.912362
null
cs.MM cs.DB
null
This paper presents a new method for a quick similarity-based search through long unlabeled audio streams to detect and locate audio clips provided by users. The method involves feature-dimension reduction based on a piecewise linear representation of a sequential feature trajectory extracted from a long audio stream. Two techniques enable us to obtain a piecewise linear representation: the dynamic segmentation of feature trajectories and the segment-based Karhunen-L\'{o}eve (KL) transform. The proposed search method guarantees the same search results as the search method without the proposed feature-dimension reduction method in principle. Experiment results indicate significant improvements in search speed. For example the proposed method reduced the total search time to approximately 1/12 that of previous methods and detected queries in approximately 0.3 seconds from a 200-hour audio database.
[ { "version": "v1", "created": "Tue, 23 Oct 2007 03:06:53 GMT" } ]
2011-11-10T00:00:00
[ [ "Kimura", "Akisato", "" ], [ "Kashino", "Kunio", "" ], [ "Kurozumi", "Takayuki", "" ], [ "Murase", "Hiroshi", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0710.4182
Roman Ilin
Roman Ilin, Robert Kozma, Paul J. Werbos
Beyond Feedforward Models Trained by Backpropagation: a Practical Training Tool for a More Efficient Universal Approximator
null
null
null
null
cs.NE
null
Cellular Simultaneous Recurrent Neural Network (SRN) has been shown to be a function approximator more powerful than the MLP. This means that the complexity of MLP would be prohibitively large for some problems while SRN could realize the desired mapping with acceptable computational constraints. The speed of training of complex recurrent networks is crucial to their successful application. Present work improves the previous results by training the network with extended Kalman filter (EKF). We implemented a generic Cellular SRN and applied it for solving two challenging problems: 2D maze navigation and a subset of the connectedness problem. The speed of convergence has been improved by several orders of magnitude in comparison with the earlier results in the case of maze navigation, and superior generalization has been demonstrated in the case of connectedness. The implications of this improvements are discussed.
[ { "version": "v1", "created": "Tue, 23 Oct 2007 03:43:57 GMT" } ]
2007-10-24T00:00:00
[ [ "Ilin", "Roman", "" ], [ "Kozma", "Robert", "" ], [ "Werbos", "Paul J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0710.4187
Akisato Kimura
Akisato Kimura, Tomohiko Uyematsu, Shigeaki Kuzuoka
Universal coding for correlated sources with complementary delivery
18 pages, some of the material in this manuscript has been already published in IEICE Transactions on Fundamentals, September 2007. Several additional results are also included
IEICE Transactions on Fundamentals, Vol.E90-A, No.9, pp.1840-1847, September 2007
10.1093/ietfec/e90-a.9.1840
null
cs.IT math.IT
null
This paper deals with a universal coding problem for a certain kind of multiterminal source coding system that we call the complementary delivery coding system. In this system, messages from two correlated sources are jointly encoded, and each decoder has access to one of the two messages to enable it to reproduce the other message. Both fixed-to-fixed length and fixed-to-variable length lossless coding schemes are considered. Explicit constructions of universal codes and bounds of the error probabilities are clarified via type-theoretical and graph-theoretical analyses. [[Keywords]] multiterminal source coding, complementary delivery, universal coding, types of sequences, bipartite graphs
[ { "version": "v1", "created": "Tue, 23 Oct 2007 04:35:07 GMT" } ]
2007-10-24T00:00:00
[ [ "Kimura", "Akisato", "" ], [ "Uyematsu", "Tomohiko", "" ], [ "Kuzuoka", "Shigeaki", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.4231
Yoshiharu Maeno
Yoshiharu Maeno, and Yukio Ohsawa
Analyzing covert social network foundation behind terrorism disaster
17pages, 10 figures, submitted to Int. J. Services Sciences
International Journal of Services Sciences Vol.2, pp.125-141 (2009)
10.1504/IJSSCI.2009.024936
null
cs.AI
null
This paper addresses a method to analyze the covert social network foundation hidden behind the terrorism disaster. It is to solve a node discovery problem, which means to discover a node, which functions relevantly in a social network, but escaped from monitoring on the presence and mutual relationship of nodes. The method aims at integrating the expert investigator's prior understanding, insight on the terrorists' social network nature derived from the complex graph theory, and computational data processing. The social network responsible for the 9/11 attack in 2001 is used to execute simulation experiment to evaluate the performance of the method.
[ { "version": "v1", "created": "Tue, 23 Oct 2007 10:40:55 GMT" } ]
2010-09-28T00:00:00
[ [ "Maeno", "Yoshiharu", "" ], [ "Ohsawa", "Yukio", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0710.4255
Peter Rost
P. Rost and G. Fettweis
Analysis of a Mixed Strategy for Multiple Relay Networks
submitted to IEEE Tran. Inform. Theory
null
null
null
cs.IT math.IT
null
In their landmark paper Cover and El Gamal proposed different coding strategies for the relay channel with a single relay supporting a communication pair. These strategies are the decode-and-forward and compress-and-forward approach, as well as a general lower bound on the capacity of a relay network which relies on the mixed application of the previous two strategies. So far, only parts of their work - the decode-and-forward and the compress-and-forward strategy - have been applied to networks with multiple relays. This paper derives a mixed strategy for multiple relay networks using a combined approach of partial decode-and-forward with N +1 levels and the ideas of successive refinement with different side information at the receivers. After describing the protocol structure, we present the achievable rates for the discrete memoryless relay channel as well as Gaussian multiple relay networks. Using these results we compare the mixed strategy with some special cases, e. g., multilevel decode-and-forward, distributed compress-and-forward and a mixed approach where one relay node operates in decode-and-forward and the other in compress-and-forward mode.
[ { "version": "v1", "created": "Tue, 23 Oct 2007 12:36:25 GMT" } ]
2007-10-24T00:00:00
[ [ "Rost", "P.", "" ], [ "Fettweis", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.4261
Bernard Cousin
Wojtek Bigos (FT R&D), Bernard Cousin (IRISA), St\'ephane Gosselin (FT R&D), Morgane Le Foll (FT R&D), Hisao Nakajima (FT R&D)
Survivable MPLS Over Optical Transport Networks: Cost and Resource Usage Analysis
null
IEEE Journal on Selected Areas in Communications 25, 5 (2007) 949-962
10.1109/JSAC.2007.070608
null
cs.NI cs.PF
null
In this paper we study different options for the survivability implementation in MPLS over Optical Transport Networks (OTN) in terms of network resource usage and configuration cost. We investigate two approaches to the survivability deployment: single layer and multilayer survivability and present various methods for spare capacity allocation (SCA) to reroute disrupted traffic. The comparative analysis shows the influence of the offered traffic granularity and the physical network structure on the survivability cost: for high bandwidth LSPs, close to the optical channel capacity, the multilayer survivability outperforms the single layer one, whereas for low bandwidth LSPs the single layer survivability is more cost-efficient. On the other hand, sparse networks of low connectivity parameter use more wavelengths for optical path routing and increase the configuration cost, as compared with dense networks. We demonstrate that by mapping efficiently the spare capacity of the MPLS layer onto the resources of the optical layer one can achieve up to 22% savings in the total configuration cost and up to 37% in the optical layer cost. Further savings (up to 9 %) in the wavelength use can be obtained with the integrated approach to network configuration over the sequential one, however, at the increase in the optimization problem complexity. These results are based on a cost model with different cost variations, and were obtained for networks targeted to a nationwide coverage.
[ { "version": "v1", "created": "Tue, 23 Oct 2007 11:25:44 GMT" } ]
2007-10-24T00:00:00
[ [ "Bigos", "Wojtek", "", "FT R&D" ], [ "Cousin", "Bernard", "", "IRISA" ], [ "Gosselin", "Stéphane", "", "FT\n R&D" ], [ "Foll", "Morgane Le", "", "FT R&D" ], [ "Nakajima", "Hisao", "", "FT R&D" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0710.4272
Leslie Ann Goldberg
Martin Dyer, Leslie Ann Goldberg and Mark Jerrum
An approximation trichotomy for Boolean #CSP
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a trichotomy theorem for the complexity of approximately counting the number of satisfying assignments of a Boolean CSP instance. Such problems are parameterised by a constraint language specifying the relations that may be used in constraints. If every relation in the constraint language is affine then the number of satisfying assignments can be exactly counted in polynomial time. Otherwise, if every relation in the constraint language is in the co-clone IM_2 from Post's lattice, then the problem of counting satisfying assignments is complete with respect to approximation-preserving reductions in the complexity class #RH\Pi_1. This means that the problem of approximately counting satisfying assignments of such a CSP instance is equivalent in complexity to several other known counting problems, including the problem of approximately counting the number of independent sets in a bipartite graph. For every other fixed constraint language, the problem is complete for #P with respect to approximation-preserving reductions, meaning that there is no fully polynomial randomised approximation scheme for counting satisfying assignments unless NP=RP.
[ { "version": "v1", "created": "Tue, 23 Oct 2007 14:35:05 GMT" }, { "version": "v2", "created": "Wed, 22 Jul 2009 21:14:30 GMT" } ]
2009-07-23T00:00:00
[ [ "Dyer", "Martin", "" ], [ "Goldberg", "Leslie Ann", "" ], [ "Jerrum", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0710.4318
Evelyne Hubert
Evelyne Hubert
Differential invariants of a Lie group action: syzygies on a generating set
Journal of Symbolic Computation (2008)
null
10.1016/j.jsc.2008.08.003
null
cs.SC math.DG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a group action, known by its infinitesimal generators, we exhibit a complete set of syzygies on a generating set of differential invariants. For that we elaborate on the reinterpretation of Cartan's moving frame by Fels and Olver (1999). This provides constructive tools for exploring algebras of differential invariants.
[ { "version": "v1", "created": "Tue, 23 Oct 2007 19:20:10 GMT" }, { "version": "v2", "created": "Thu, 6 Dec 2007 15:49:21 GMT" }, { "version": "v3", "created": "Thu, 4 Sep 2008 15:06:25 GMT" }, { "version": "v4", "created": "Mon, 3 Nov 2008 10:42:30 GMT" } ]
2008-11-03T00:00:00
[ [ "Hubert", "Evelyne", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.DG", "description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis", "span": "(Differential Geometry)" } ]
0710.4410
Paul Zimmermann
Richard Brent, Paul Zimmermann (INRIA Lorraine - LORIA)
A Multi-level Blocking Distinct Degree Factorization Algorithm
null
Contemporary Mathematics 461 (2008) 47-58
null
INRIA Tech. Report RR-6331, Oct. 2007
cs.DS
null
We give a new algorithm for performing the distinct-degree factorization of a polynomial P(x) over GF(2), using a multi-level blocking strategy. The coarsest level of blocking replaces GCD computations by multiplications, as suggested by Pollard (1975), von zur Gathen and Shoup (1992), and others. The novelty of our approach is that a finer level of blocking replaces multiplications by squarings, which speeds up the computation in GF(2)[x]/P(x) of certain interval polynomials when P(x) is sparse. As an application we give a fast algorithm to search for all irreducible trinomials x^r + x^s + 1 of degree r over GF(2), while producing a certificate that can be checked in less time than the full search. Naive algorithms cost O(r^2) per trinomial, thus O(r^3) to search over all trinomials of given degree r. Under a plausible assumption about the distribution of factors of trinomials, the new algorithm has complexity O(r^2 (log r)^{3/2}(log log r)^{1/2}) for the search over all trinomials of degree r. Our implementation achieves a speedup of greater than a factor of 560 over the naive algorithm in the case r = 24036583 (a Mersenne exponent). Using our program, we have found two new primitive trinomials of degree 24036583 over GF(2) (the previous record degree was 6972593).
[ { "version": "v1", "created": "Wed, 24 Oct 2007 09:18:33 GMT" } ]
2010-04-20T00:00:00
[ [ "Brent", "Richard", "", "INRIA Lorraine - LORIA" ], [ "Zimmermann", "Paul", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0710.4486
Michel Fliess
Michel Fliess (INRIA Futurs), C\'edric Join (INRIA Futurs, CRAN), Hebertt Sira-Ramirez
Non-linear estimation is easy
null
Int. J. Modelling Identification and Control 4, 1 (2008) 12-27
10.1504/IJMIC.2008.020996
null
cs.CE cs.NA cs.PF math.AC math.NA math.OC
null
Non-linear state estimation and some related topics, like parametric estimation, fault diagnosis, and perturbation attenuation, are tackled here via a new methodology in numerical differentiation. The corresponding basic system theoretic definitions and properties are presented within the framework of differential algebra, which permits to handle system variables and their derivatives of any order. Several academic examples and their computer simulations, with on-line estimations, are illustrating our viewpoint.
[ { "version": "v1", "created": "Wed, 24 Oct 2007 14:48:39 GMT" } ]
2008-11-06T00:00:00
[ [ "Fliess", "Michel", "", "INRIA Futurs" ], [ "Join", "Cédric", "", "INRIA Futurs, CRAN" ], [ "Sira-Ramirez", "Hebertt", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0710.4499
Colm \'O D\'unlaing
Colm O. Dunlaing and Natalie Schluter
Remarks on Jurdzinski and Lorys' proof that palindromes are not a Church-Rosser language
15 pages
null
null
TCDMATH 07-10
cs.LO
null
In 2002 Jurdzinski and Lorys settled a long-standing conjecture that palindromes are not a Church-Rosser language. Their proof required a sophisticated theory about computation graphs of 2-stack automata. We present their proof in terms of 1-tape Turing machines.We also provide an alternative proof of Buntrock and Otto's result that the set of non-square bitstrings, which is context-free, is not Church-Rosser.
[ { "version": "v1", "created": "Wed, 24 Oct 2007 15:40:32 GMT" }, { "version": "v2", "created": "Thu, 25 Oct 2007 10:15:54 GMT" } ]
2007-10-25T00:00:00
[ [ "Dunlaing", "Colm O.", "" ], [ "Schluter", "Natalie", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0710.4508
Gregorio Malajovich
Felipe Cucker, Teresa Krick, Gregorio Malajovich and Mario Wschebor
A Numerical Algorithm for Zero Counting. I: Complexity and Accuracy
We made minor but necessary improvements in the presentation
Journal of Complexity 24 Issues 5-6, pp 582-605 (Oct-Dec 2008)
10.1016/j.jco.2008.03.001
null
cs.CC cs.NA cs.SC math.NA
null
We describe an algorithm to count the number of distinct real zeros of a polynomial (square) system f. The algorithm performs O(n D kappa(f)) iterations where n is the number of polynomials (as well as the dimension of the ambient space), D is a bound on the polynomials' degree, and kappa(f) is a condition number for the system. Each iteration uses an exponential number of operations. The algorithm uses finite-precision arithmetic and a polynomial bound for the precision required to ensure the returned output is correct is exhibited. This bound is a major feature of our algorithm since it is in contrast with the exponential precision required by the existing (symbolic) algorithms for counting real zeros. The algorithm parallelizes well in the sense that each iteration can be computed in parallel polynomial time with an exponential number of processors.
[ { "version": "v1", "created": "Wed, 24 Oct 2007 16:33:07 GMT" }, { "version": "v2", "created": "Wed, 19 Mar 2008 20:28:15 GMT" } ]
2010-07-12T00:00:00
[ [ "Cucker", "Felipe", "" ], [ "Krick", "Teresa", "" ], [ "Malajovich", "Gregorio", "" ], [ "Wschebor", "Mario", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
0710.4516
Thomas Sch\"urmann
Thomas Sch\"urmann and Peter Grassberger
The predictability of letters in written english
3 pages, 4 figures
Fractals, Vol. 4, No. 1 (1996) 1-5
10.1142/S0218348X96000029
null
physics.soc-ph cs.CL stat.ML
null
We show that the predictability of letters in written English texts depends strongly on their position in the word. The first letters are usually the least easy to predict. This agrees with the intuitive notion that words are well defined subunits in written languages, with much weaker correlations across these units than within them. It implies that the average entropy of a letter deep inside a word is roughly 4 times smaller than the entropy of the first letter.
[ { "version": "v1", "created": "Wed, 24 Oct 2007 17:23:13 GMT" }, { "version": "v2", "created": "Fri, 26 Oct 2007 16:46:30 GMT" } ]
2017-04-24T00:00:00
[ [ "Schürmann", "Thomas", "" ], [ "Grassberger", "Peter", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0710.4596
Naoto Morikawa
Naoto Morikawa
Discrete differential geometry of tetrahedrons and encoding of local protein structure
12 pages, 9 figures
null
null
null
math.CO cs.CG math.MG q-bio.BM
null
Local protein structure analysis is informative to protein structure analysis and has been used successfully in protein structure prediction and others. Proteins have recurring structural features, such as helix caps and beta turns, which often have strong amino acid sequence preferences. And the challenges for local structure analysis have been identification and assignment of such common short structural motifs. This paper proposes a new mathematical framework that can be applied to analysis of the local structure of proteins, where local conformations of protein backbones are described using differential geometry of folded tetrahedron sequences. Using the framework, we could capture the recurring structural features without any structural templates, which makes local structure analysis not only simpler, but also more objective. Programs and examples are available from http://www.genocript.com .
[ { "version": "v1", "created": "Thu, 25 Oct 2007 01:16:39 GMT" } ]
2007-10-26T00:00:00
[ [ "Morikawa", "Naoto", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Quantitative Biology", "code": "q-bio.BM", "description": "DNA, RNA, proteins, lipids, etc.; molecular structures and folding kinetics; molecular interactions; single-molecule manipulation.", "span": "(Biomolecules)" } ]
0710.4629
EDA Publishing Association
Jacob Katz, Ziyad Hanna, Nachum Dershowitz
Space-Efficient Bounded Model Checking
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
10.1109/DATE.2005.276
null
cs.LO
null
Current algorithms for bounded model checking use SAT methods for checking satisfiability of Boolean formulae. These methods suffer from the potential memory explosion problem. Methods based on the validity of Quantified Boolean Formulae (QBF) allow an exponentially more succinct representation of formulae to be checked, because no "unrolling" of the transition relation is required. These methods have not been widely used, because of the lack of an efficient decision procedure for QBF. We evaluate the usage of QBF in bounded model checking (BMC), using general-purpose SAT and QBF solvers. We develop a special-purpose decision procedure for QBF used in BMC, and compare our technique with the methods using general-purpose SAT and QBF solvers on real-life industrial benchmarks.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:06:59 GMT" } ]
2011-11-09T00:00:00
[ [ "Katz", "Jacob", "" ], [ "Hanna", "Ziyad", "" ], [ "Dershowitz", "Nachum", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0710.4630
EDA Publishing Association
Trent Mcconaghy, Tom Eeckelaert, Georges Gielen
CAFFEINE: Template-Free Symbolic Model Generation of Analog Circuits via Canonical Form Functions and Genetic Programming
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
This paper presents a method to automatically generate compact symbolic performance models of analog circuits with no prior specification of an equation template. The approach takes SPICE simulation data as input, which enables modeling of any nonlinear circuits and circuit characteristics. Genetic programming is applied as a means of traversing the space of possible symbolic expressions. A grammar is specially designed to constrain the search to a canonical form for functions. Novel evolutionary search operators are designed to exploit the structure of the grammar. The approach generates a set of symbolic models which collectively provide a tradeoff between error and model complexity. Experimental results show that the symbolic models generated are compact and easy to understand, making this an effective method for aiding understanding in analog design. The models also demonstrate better prediction quality than posynomials.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:07:11 GMT" } ]
2011-11-09T00:00:00
[ [ "Mcconaghy", "Trent", "" ], [ "Eeckelaert", "Tom", "" ], [ "Gielen", "Georges", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4632
EDA Publishing Association
Nikolaos Kavvadias, Spiridon Nikolaidis
Hardware Support for Arbitrarily Complex Loop Structures in Embedded Applications
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
In this paper, the program control unit of an embedded RISC processor is enhanced with a novel zero-overhead loop controller (ZOLC) supporting arbitrary loop structures with multiple-entry/exit nodes. The ZOLC has been incorporated to an open RISC processor core to evaluate the performance of the proposed unit for alternative configurations of the selected processor. It is proven that speed improvements of 8.4% to 48.2% are feasible for the used benchmarks.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:07:52 GMT" } ]
2011-11-09T00:00:00
[ [ "Kavvadias", "Nikolaos", "" ], [ "Nikolaidis", "Spiridon", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4633
EDA Publishing Association
Bharat Sukhwani, Uday Padmanabhan, Janet M. Wang
Nano-Sim: A Step Wise Equivalent Conductance based Statistical Simulator for Nanotechnology Circuit Design
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
10.1109/DATE.2005.221
null
cs.PF
null
New nanotechnology based devices are replacing CMOS devices to overcome CMOS technology's scaling limitations. However, many such devices exhibit non-monotonic I-V characteristics and uncertain properties which lead to the negative differential resistance (NDR) problem and the chaotic performance. This paper proposes a new circuit simulation approach that can effectively simulate nanotechnology devices with uncertain input sources and negative differential resistance (NDR) problem. The experimental results show a 20-30 times speedup comparing with existing simulators.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:07:46 GMT" } ]
2011-11-09T00:00:00
[ [ "Sukhwani", "Bharat", "" ], [ "Padmanabhan", "Uday", "" ], [ "Wang", "Janet M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0710.4634
EDA Publishing Association
Y. Satish Kumar, Jun Li, Claudio Talarico, Janet Wang
A Probabilistic Collocation Method Based Statistical Gate Delay Model Considering Process Variations and Multiple Input Switching
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
10.1109/DATE.2005.31
null
cs.AR
null
Since the advent of new nanotechnologies, the variability of gate delay due to process variations has become a major concern. This paper proposes a new gate delay model that includes impact from both process variations and multiple input switching. The proposed model uses orthogonal polynomial based probabilistic collocation method to construct a delay analytical equation from circuit timing performance. From the experimental results, our approach has less that 0.2% error on the mean delay of gates and less than 3% error on the standard deviation.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:08:50 GMT" } ]
2011-11-09T00:00:00
[ [ "Kumar", "Y. Satish", "" ], [ "Li", "Jun", "" ], [ "Talarico", "Claudio", "" ], [ "Wang", "Janet", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4635
EDA Publishing Association
Tadashi Takeuchi
OS Debugging Method Using a Lightweight Virtual Machine Monitor
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.OS
null
Demands for implementing original OSs that can achieve high I/O performance on PC/AT compatible hardware have recently been increasing, but conventional OS debugging environments have not been able to simultaneously assure their stability, be easily customized to new OSs and new I/O devices, and assure efficient execution of I/O operations. We therefore developed a novel OS debugging method using a lightweight virtual machine. We evaluated this debugging method experimentally and confirmed that it can transfer data about 5.4 times as fast as the conventional virtual machine monitor.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:09:07 GMT" } ]
2011-11-09T00:00:00
[ [ "Takeuchi", "Tadashi", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0710.4636
EDA Publishing Association
Stephen J. Mellor, John R. Wolfe, Campbell Mccausland
Why Systems-on-Chip Needs More UML like a Hole in the Head
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
Let's be clear from the outset: SoC can most certainly make use of UML; SoC just doesn't need more UML, or even all of it. The advent of model mappings, coupled with marks that indicate which mapping rule to apply, enable a major simplification of the use of UML in SoC.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:09:23 GMT" } ]
2011-11-09T00:00:00
[ [ "Mellor", "Stephen J.", "" ], [ "Wolfe", "John R.", "" ], [ "Mccausland", "Campbell", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4637
EDA Publishing Association
Irith Pomeranz, Sudhakar M. Reddy
The Accidental Detection Index as a Fault Ordering Heuristic for Full-Scan Circuits
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.OH
null
We investigate a new fault ordering heuristic for test generation in full-scan circuits. The heuristic is referred to as the accidental detection index. It associates a value ADI (f) with every circuit fault f. The heuristic estimates the number of faults that will be detected by a test generated for f. Fault ordering is done such that a fault with a higher accidental detection index appears earlier in the ordered fault set and targeted earlier during test generation. This order is effective for generating compact test sets, and for obtaining a test set with a steep fault coverage curve. Such a test set has several applications. We present experimental results to demonstrate the effectiveness of the heuristic.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:09:39 GMT" } ]
2011-11-09T00:00:00
[ [ "Pomeranz", "Irith", "" ], [ "Reddy", "Sudhakar M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0710.4638
EDA Publishing Association
Sankalp S. Kallakuri, Alex Doboli, Eugene A. Feinberg
Buffer Insertion for Bridges and Optimal Buffer Sizing for Communication Sub-System of Systems-on-Chip
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
We have presented an optimal buffer sizing and buffer insertion methodology which uses stochastic models of the architecture and Continuous Time Markov Decision Processes CTMDPs. Such a methodology is useful in managing the scarce buffer resources available on chip as compared to network based data communication which can have large buffer space. The modeling of this problem in terms of a CT-MDP framework lead to a nonlinear formulation due to usage of bridges in the bus architecture. We present a methodology to split the problem into several smaller though linear systems and we then solve these subsystems.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:10:40 GMT" } ]
2011-11-09T00:00:00
[ [ "Kallakuri", "Sankalp S.", "" ], [ "Doboli", "Alex", "" ], [ "Feinberg", "Eugene A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4639
EDA Publishing Association
Cristiano Forzan, Davide Pandini
Modeling the Non-Linear Behavior of Library Cells for an Accurate Static Noise Analysis
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
In signal integrity analysis, the joint effect of propagated noise through library cells, and of the noise injected on a quiet net by neighboring switching nets through coupling capacitances, must be considered in order to accurately estimate the overall noise impact on design functionality and performances. In this work the impact of the cell non-linearity on the noise glitch waveform is analyzed in detail, and a new macromodel that allows to accurately and efficiently modeling the non-linear effects of the victim driver in noise analysis is presented. Experimental results demonstrate the effectiveness of our method, and confirm that existing noise analysis approaches based on linear superposition of the propagated and crosstalk-injected noise can be highly inaccurate, thus impairing the sign-off functional verification phase.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:11:06 GMT" } ]
2011-11-09T00:00:00
[ [ "Forzan", "Cristiano", "" ], [ "Pandini", "Davide", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4640
EDA Publishing Association
Ilya Issenin, Nikil Dutt
FORAY-GEN: Automatic Generation of Affine Functions for Memory Optimizations
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.PL
null
In today's embedded applications a significant portion of energy is spent in the memory subsystem. Several approaches have been proposed to minimize this energy, including the use of scratch pad memories, with many based on static analysis of a program. However, often it is not possible to perform static analysis and optimization of a program's memory access behavior unless the program is specifically written for this purpose. In this paper we introduce the FORAY model of a program that permits aggressive analysis of the application's memory behavior that further enables such optimizations since it consists of 'for' loops and array accesses which are easily analyzable. We present FORAY-GEN: an automated profile-based approach for extraction of the FORAY model from the original program. We also demonstrate how FORAY-GEN enhances applicability of other memory subsystem optimization approaches, resulting in an average of two times increase in the number of memory references that can be analyzed by existing static approaches.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:11:20 GMT" } ]
2011-11-09T00:00:00
[ [ "Issenin", "Ilya", "" ], [ "Dutt", "Nikil", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0710.4641
EDA Publishing Association
Tim Schattkowsky
UML 2.0 - Overview and Perspectives in SoC Design
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.SE
null
The design productivity gap requires more efficient design methods. Software systems have faced the same challenge and seem to have mastered it with the introduction of more abstract design methods. The UML has become the standard for software systems modeling and thus the foundation of new design methods. Although the UML is defined as a general purpose modeling language, its application to hardware and hardware/software codesign is very limited. In order to successfully apply the UML at these fields, it is essential to understand its capabilities and to map it to a new domain.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:11:39 GMT" } ]
2011-11-09T00:00:00
[ [ "Schattkowsky", "Tim", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0710.4642
EDA Publishing Association
Shahin Nazarian, Massoud Pedram, Emre Tuncer, Tao Lin, Amir H. Ajami
Modeling and Propagation of Noisy Waveforms in Static Timing Analysis
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
10.1109/DATE.2005.211
null
cs.OH
null
A technique based on the sensitivity of the output to input waveform is presented for accurate propagation of delay information through a gate for the purpose of static timing analysis (STA) in the presence of noise. Conventional STA tools represent a waveform by its arrival time and slope. However, this is not an accurate way of modeling the waveform for the purpose of noise analysis. The key contribution of our work is the development of a method that allows efficient propagation of equivalent waveforms throughout the circuit. Experimental results demonstrate higher accuracy of the proposed sensitivity-based gate delay propagation technique, SGDP, compared to the best of existing approaches. SGDP is compatible with the current level of gate characterization in conventional ASIC cell libraries, and as a result, it can be easily incorporated into commercial STA tools to improve their accuracy.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:13:59 GMT" } ]
2011-11-09T00:00:00
[ [ "Nazarian", "Shahin", "" ], [ "Pedram", "Massoud", "" ], [ "Tuncer", "Emre", "" ], [ "Lin", "Tao", "" ], [ "Ajami", "Amir H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0710.4643
EDA Publishing Association
Mehrdad Reshadi, Nikil Dutt
Generic Pipelined Processor Modeling and High Performance Cycle-Accurate Simulator Generation
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
10.1109/DATE.2005.166
null
cs.AR cs.PF
null
Detailed modeling of processors and high performance cycle-accurate simulators are essential for today's hardware and software design. These problems are challenging enough by themselves and have seen many previous research efforts. Addressing both simultaneously is even more challenging, with many existing approaches focusing on one over another. In this paper, we propose the Reduced Colored Petri Net (RCPN) model that has two advantages: first, it offers a very simple and intuitive way of modeling pipelined processors; second, it can generate high performance cycle-accurate simulators. RCPN benefits from all the useful features of Colored Petri Nets without suffering from their exponential growth in complexity. RCPN processor models are very intuitive since they are a mirror image of the processor pipeline block diagram. Furthermore, in our experiments on the generated cycle-accurate simulators for XScale and StrongArm processor models, we achieved an order of magnitude (~15 times) speedup over the popular SimpleScalar ARM simulator.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:14:40 GMT" } ]
2011-11-09T00:00:00
[ [ "Reshadi", "Mehrdad", "" ], [ "Dutt", "Nikil", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0710.4644
EDA Publishing Association
Jurgen Schnerr, Oliver Bringmann, Wolfgang Rosenstiel
Cycle Accurate Binary Translation for Simulation Acceleration in Rapid Prototyping of SoCs
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
In this paper, the application of a cycle accurate binary translator for rapid prototyping of SoCs will be presented. This translator generates code to run on a rapid prototyping system consisting of a VLIW processor and FPGAs. The generated code is annotated with information that triggers cycle generation for the hardware in parallel to the execution of the translated program. The VLIW processor executes the translated program whereas the FPGAs contain the hardware for the parallel cycle generation and the bus interface that adapts the bus of the VLIW processor to the SoC bus of the emulated processor core.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:18:14 GMT" } ]
2011-11-09T00:00:00
[ [ "Schnerr", "Jurgen", "" ], [ "Bringmann", "Oliver", "" ], [ "Rosenstiel", "Wolfgang", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4645
EDA Publishing Association
B. Cheon, E. Lee, L.-T. Wang, X. Wen, P. Hsu, J. Cho, J. Park, H. Chao, S. Wu
At-Speed Logic BIST for IP Cores
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
This paper describes a flexible logic BIST scheme that features high fault coverage achieved by fault-simulation guided test point insertion, real at-speed test capability for multi-clock designs without clock frequency manipulation, and easy physical implementation due to the use of a low-speed SE signal. Application results of this scheme to two widely used IP cores are also reported.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:19:34 GMT" } ]
2011-11-09T00:00:00
[ [ "Cheon", "B.", "" ], [ "Lee", "E.", "" ], [ "Wang", "L. -T.", "" ], [ "Wen", "X.", "" ], [ "Hsu", "P.", "" ], [ "Cho", "J.", "" ], [ "Park", "J.", "" ], [ "Chao", "H.", "" ], [ "Wu", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4646
EDA Publishing Association
O. Villa, P. Schaumont, I. Verbauwhede, M. Monchiero, G. Palermo
Fast Dynamic Memory Integration in Co-Simulation Frameworks for Multiprocessor System on-Chip
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
In this paper is proposed a technique to integrate and simulate a dynamic memory in a multiprocessor framework based on C/C++/SystemC. Using host machine's memory management capabilities, dynamic data processing is supported without compromising speed and accuracy of the simulation. A first prototype in a shared memory context is presented.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:20:27 GMT" } ]
2011-11-09T00:00:00
[ [ "Villa", "O.", "" ], [ "Schaumont", "P.", "" ], [ "Verbauwhede", "I.", "" ], [ "Monchiero", "M.", "" ], [ "Palermo", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4649
EDA Publishing Association
Praveen Ghanta, Sarma Vrudhula, Rajendran Panda, Janet Wang
Stochastic Power Grid Analysis Considering Process Variations
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
In this paper, we investigate the impact of interconnect and device process variations on voltage fluctuations in power grids. We consider random variations in the power grid's electrical parameters as spatial stochastic processes and propose a new and efficient method to compute the stochastic voltage response of the power grid. Our approach provides an explicit analytical representation of the stochastic voltage response using orthogonal polynomials in a Hilbert space. The approach has been implemented in a prototype software called OPERA (Orthogonal Polynomial Expansions for Response Analysis). Use of OPERA on industrial power grids demonstrated speed-ups of up to two orders of magnitude. The results also show a significant variation of about $\pm$ 35% in the nominal voltage drops at various nodes of the power grids and demonstrate the need for variation-aware power grid analysis.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:24:02 GMT" } ]
2011-11-09T00:00:00
[ [ "Ghanta", "Praveen", "" ], [ "Vrudhula", "Sarma", "" ], [ "Panda", "Rajendran", "" ], [ "Wang", "Janet", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4652
EDA Publishing Association
Mahmut Kandemir, Guilin Chen
Locality-Aware Process Scheduling for Embedded MPSoCs
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
Utilizing on-chip caches in embedded multiprocessor-system-on-a-chip (MPSoC) based systems is critical from both performance and power perspectives. While most of the prior work that targets at optimizing cache behavior are performed at hardware and compilation levels, operating system (OS) can also play major role as it sees the global access pattern information across applications. This paper proposes a cache-conscious OS process scheduling strategy based on data reuse. The proposed scheduler implements two complementary approaches. First, the processes that do not share any data between them are scheduled at different cores if it is possible to do so. Second, the processes that could not be executed at the same time (due to dependences) but share data among each other are mapped to the same processor core so that they share the cache contents. Our experimental results using this new data locality aware OS scheduling strategy are promising, and show significant improvements in task completion times.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:31:15 GMT" } ]
2011-11-09T00:00:00
[ [ "Kandemir", "Mahmut", "" ], [ "Chen", "Guilin", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4653
EDA Publishing Association
Shervin Sharifi, Javid Jaffari, Mohammad Hosseinabady, Ali Afzali-Kusha, Zainalabedin Navabi
Simultaneous Reduction of Dynamic and Static Power in Scan Structures
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
Power dissipation during test is a major challenge in testing integrated circuits. Dynamic power has been the dominant part of power dissipation in CMOS circuits, however, in future technologies the static portion of power dissipation will outreach the dynamic portion. This paper proposes an efficient technique to reduce both dynamic and static power dissipation in scan structures. Scan cell outputs which are not on the critical path(s) are multiplexed to fixed values during scan mode. These constant values and primary inputs are selected such that the transitions occurred on non-multiplexed scan cells are suppressed and the leakage current during scan mode is decreased. A method for finding these vectors is also proposed. Effectiveness of this technique is proved by experiments performed on ISCAS89 benchmark circuits.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:32:08 GMT" } ]
2011-11-09T00:00:00
[ [ "Sharifi", "Shervin", "" ], [ "Jaffari", "Javid", "" ], [ "Hosseinabady", "Mohammad", "" ], [ "Afzali-Kusha", "Ali", "" ], [ "Navabi", "Zainalabedin", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4654
EDA Publishing Association
Peng Li, Frank Liu, Xin Li, Lawrence T. Pileggi, Sani R. Nassif
Modeling Interconnect Variability Using Efficient Parametric Model Order Reduction
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
Assessing IC manufacturing process fluctuations and their impacts on IC interconnect performance has become unavoidable for modern DSM designs. However, the construction of parametric interconnect models is often hampered by the rapid increase in computational cost and model complexity. In this paper we present an efficient yet accurate parametric model order reduction algorithm for addressing the variability of IC interconnect performance. The efficiency of the approach lies in a novel combination of low-rank matrix approximation and multi-parameter moment matching. The complexity of the proposed parametric model order reduction is as low as that of a standard Krylov subspace method when applied to a nominal system. Under the projection-based framework, our algorithm also preserves the passivity of the resulting parametric models.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:33:14 GMT" } ]
2011-11-09T00:00:00
[ [ "Li", "Peng", "" ], [ "Liu", "Frank", "" ], [ "Li", "Xin", "" ], [ "Pileggi", "Lawrence T.", "" ], [ "Nassif", "Sani R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4655
EDA Publishing Association
Baosheng Wang, Yuejian Wu, Andre Ivanov
A Fast Diagnosis Scheme for Distributed Small Embedded SRAMs
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
This paper proposes a diagnosis scheme aimed at reducing diagnosis time of distributed small embedded SRAMs (e-SRAMs). This scheme improves the one proposed in [A parallel built-in self-diagnostic method for embedded memory buffers, A parallel built-in self-diagnostic method for embedded memory arrays]. The improvements are mainly two-fold. On one hand, the diagnosis of time-consuming Data Retention Faults (DRFs), which is neglected by the diagnosis architecture in [A parallel built-in self-diagnostic method for embedded memory buffers, A parallel built-in self-diagnostic method for embedded memory arrays], is now considered and performed via a DFT technique referred to as the "No Write Recovery Test Mode (NWRTM)". On the other hand, a pair comprising a Serial to Parallel Converter (SPC) and a Parallel to Serial Converter (PSC) is utilized to replace the bi-directional serial interface, to avoid the problems of serial fault masking and defect rate dependent diagnosis. Results from our evaluations show that the proposed diagnosis scheme achieves an increased diagnosis coverage and reduces diagnosis time compared to those obtained in [A parallel built-in self-diagnostic method for embedded memory buffers, A parallel built-in self-diagnostic method for embedded memory arrays], with neglectable extra area cost.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:34:09 GMT" } ]
2011-11-09T00:00:00
[ [ "Wang", "Baosheng", "" ], [ "Wu", "Yuejian", "" ], [ "Ivanov", "Andre", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4656
EDA Publishing Association
Minas Dasygenis, Erik Brockmeyer, Bart Durinck, Francky Catthoor, Dimitrios Soudris, Antonios Thanailakis
A Memory Hierarchical Layer Assigning and Prefetching Technique to Overcome the Memory Performance/Energy Bottleneck
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
The memory subsystem has always been a bottleneck in performance as well as significant power contributor in memory intensive applications. Many researchers have presented multi-layered memory hierarchies as a means to design energy and performance efficient systems. However, most of the previous work do not explore trade-offs systematically. We fill this gap by proposing a formalized technique that takes into consideration data reuse, limited lifetime of the arrays of an application and application specific prefetching opportunities, and performs a thorough trade-off exploration for different memory layer sizes. This technique has been implemented on a prototype tool, which was tested successfully using nine real-life applications of industrial relevance. Following this approach we have able to reduce execution time up to 60%, and energy consumption up to 70%.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 08:34:32 GMT" } ]
2011-11-09T00:00:00
[ [ "Dasygenis", "Minas", "" ], [ "Brockmeyer", "Erik", "" ], [ "Durinck", "Bart", "" ], [ "Catthoor", "Francky", "" ], [ "Soudris", "Dimitrios", "" ], [ "Thanailakis", "Antonios", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]