id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0710.2705 | Shih-Chun Lin | Shih-Chun Lin, Mohammad Shahmohammadi, Hesham El Gamal | Fingerprinting with Minimum Distance Decoding | 26 pages, 6 figures, submitted to IEEE Transactions on Information
Forensics and Security | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4,
NO. 1, MARCH 2009 pp.59-69 | 10.1109/TIFS.2008.2012201 | null | cs.IT cs.CR math.IT | null | This work adopts an information theoretic framework for the design of
collusion-resistant coding/decoding schemes for digital fingerprinting. More
specifically, the minimum distance decision rule is used to identify 1 out of t
pirates. Achievable rates, under this detection rule, are characterized in two
distinct scenarios. First, we consider the averaging attack where a random
coding argument is used to show that the rate 1/2 is achievable with t=2
pirates. Our study is then extended to the general case of arbitrary $t$
highlighting the underlying complexity-performance tradeoff. Overall, these
results establish the significant performance gains offered by minimum distance
decoding as compared to other approaches based on orthogonal codes and
correlation detectors. In the second scenario, we characterize the achievable
rates, with minimum distance decoding, under any collusion attack that
satisfies the marking assumption. For t=2 pirates, we show that the rate
$1-H(0.25)\approx 0.188$ is achievable using an ensemble of random linear
codes. For $t\geq 3$, the existence of a non-resolvable collusion attack, with
minimum distance decoding, for any non-zero rate is established. Inspired by
our theoretical analysis, we then construct coding/decoding schemes for
fingerprinting based on the celebrated Belief-Propagation framework. Using an
explicit repeat-accumulate code, we obtain a vanishingly small probability of
misidentification at rate 1/3 under averaging attack with t=2. For collusion
attacks which satisfy the marking assumption, we use a more sophisticated
accumulate repeat accumulate code to obtain a vanishingly small
misidentification probability at rate 1/9 with t=2. These results represent a
marked improvement over the best available designs in the literature.
| [
{
"version": "v1",
"created": "Mon, 15 Oct 2007 01:20:01 GMT"
}
] | 2009-03-02T00:00:00 | [
[
"Lin",
"Shih-Chun",
""
],
[
"Shahmohammadi",
"Mohammad",
""
],
[
"Gamal",
"Hesham El",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.2716 | Li Rong | Rong Li, Zhisheng Duan and Guanrong Chen | Cost and Effects of Pinning Control for Network Synchronization | 12 pages, 18 figures | null | null | null | cs.NI | null | In this paper, the problem of pinning control for synchronization of complex
dynamical networks is discussed. A cost function of the controlled network is
defined by the feedback gain and the coupling strength of the network. An
interesting result is that lower cost is achieved by the control scheme of
pinning nodes with smaller degrees. Some rigorous mathematical analysis is
presented for achieving lower cost in the synchronization of different
star-shaped networks. Numerical simulations on some non-regular complex
networks generated by the Barabasi-Albert model and various star-shaped
networks are shown for verification and illustration.
| [
{
"version": "v1",
"created": "Mon, 15 Oct 2007 05:45:49 GMT"
}
] | 2007-10-16T00:00:00 | [
[
"Li",
"Rong",
""
],
[
"Duan",
"Zhisheng",
""
],
[
"Chen",
"Guanrong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.2732 | Marie-Annick Guillemer | Dima Grigoriev (IRMAR) | Probabilistic communication complexity over the reals | null | null | null | 07-60 | cs.CC | null | Deterministic and probabilistic communication protocols are introduced in
which parties can exchange the values of polynomials (rather than bits in the
usual setting). It is established a sharp lower bound $2n$ on the communication
complexity of recognizing the $2n$-dimensional orthant, on the other hand the
probabilistic communication complexity of its recognizing does not exceed 4. A
polyhedron and a union of hyperplanes are constructed in $\RR^{2n}$ for which a
lower bound $n/2$ on the probabilistic communication complexity of recognizing
each is proved. As a consequence this bound holds also for the EMPTINESS and
the KNAPSACK problems.
| [
{
"version": "v1",
"created": "Mon, 15 Oct 2007 08:03:38 GMT"
}
] | 2007-10-16T00:00:00 | [
[
"Grigoriev",
"Dima",
"",
"IRMAR"
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0710.2736 | Chao Liu | Chao Liu, Zhisheng Duan and Guanrong Chen and Lin Huang | L2 norm performance index of synchronization and optimal control
synthesis of complex networks | 15 peges, 11 figures | null | null | null | cs.NI | null | In this paper, the synchronizability problem of dynamical networks is
addressed, where better synchronizability means that the network synchronizes
faster with lower-overshoot. The L2 norm of the error vector e is taken as a
performance index to measure this kind of synchronizability. For the
equilibrium synchronization case, it is shown that there is a close
relationship between the L2 norm of the error vector e and the H2 norm of the
transfer function G of the linearized network about the equilibrium point.
Consequently, the effect of the network coupling topology on the H2 norm of the
transfer function G is analyzed. Finally, an optimal controller is designed,
according to the so-called LQR problem in modern control theory, which can
drive the whole network to its equilibrium point and meanwhile minimize the L2
norm of the output of the linearized network.
| [
{
"version": "v1",
"created": "Mon, 15 Oct 2007 08:16:47 GMT"
}
] | 2007-10-16T00:00:00 | [
[
"Liu",
"Chao",
""
],
[
"Duan",
"Zhisheng",
""
],
[
"Chen",
"Guanrong",
""
],
[
"Huang",
"Lin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.2782 | Leonardo Emmendorfer | Leonardo Emmendorfer and Aurora Pozo | Effective linkage learning using low-order statistics and clustering | Submitted to IEEE Transactions on Evolutionary Computation | null | null | null | cs.NE cs.AI | null | The adoption of probabilistic models for the best individuals found so far is
a powerful approach for evolutionary computation. Increasingly more complex
models have been used by estimation of distribution algorithms (EDAs), which
often result better effectiveness on finding the global optima for hard
optimization problems. Supervised and unsupervised learning of Bayesian
networks are very effective options, since those models are able to capture
interactions of high order among the variables of a problem. Diversity
preservation, through niching techniques, has also shown to be very important
to allow the identification of the problem structure as much as for keeping
several global optima. Recently, clustering was evaluated as an effective
niching technique for EDAs, but the performance of simpler low-order EDAs was
not shown to be much improved by clustering, except for some simple multimodal
problems. This work proposes and evaluates a combination operator guided by a
measure from information theory which allows a clustered low-order EDA to
effectively solve a comprehensive range of benchmark optimization problems.
| [
{
"version": "v1",
"created": "Mon, 15 Oct 2007 15:28:47 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Oct 2007 13:27:03 GMT"
}
] | 2007-10-16T00:00:00 | [
[
"Emmendorfer",
"Leonardo",
""
],
[
"Pozo",
"Aurora",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0710.2848 | Francis Bach | Francis Bach (WILLOW Project - Inria/Ens) | Consistency of trace norm minimization | null | null | null | null | cs.LG | null | Regularization by the sum of singular values, also referred to as the trace
norm, is a popular technique for estimating low rank rectangular matrices. In
this paper, we extend some of the consistency results of the Lasso to provide
necessary and sufficient conditions for rank consistency of trace norm
minimization with the square loss. We also provide an adaptive version that is
rank consistent even when the necessary condition for the non adaptive version
is not fulfilled.
| [
{
"version": "v1",
"created": "Mon, 15 Oct 2007 15:38:33 GMT"
}
] | 2007-10-16T00:00:00 | [
[
"Bach",
"Francis",
"",
"WILLOW Project - Inria/Ens"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0710.2852 | Sebastien Hinderer | Patrick Blackburn (INRIA Lorraine - LORIA), S\'ebastien Hinderer
(INRIA Lorraine - LORIA) | Generating models for temporal representations | null | Dans Recent Advances in Natural Language Processing (2007) 69-75 | null | null | cs.CL | null | We discuss the use of model building for temporal representations. We chose
Polish to illustrate our discussion because it has an interesting aspectual
system, but the points we wish to make are not language specific. Rather, our
goal is to develop theoretical and computational tools for temporal model
building tasks in computational semantics. To this end, we present a
first-order theory of time and events which is rich enough to capture
interesting semantic distinctions, and an algorithm which takes minimal models
for first-order theories and systematically attempts to ``perturb'' their
temporal component to provide non-minimal, but semantically significant,
models.
| [
{
"version": "v1",
"created": "Mon, 15 Oct 2007 15:45:13 GMT"
}
] | 2007-10-16T00:00:00 | [
[
"Blackburn",
"Patrick",
"",
"INRIA Lorraine - LORIA"
],
[
"Hinderer",
"Sébastien",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0710.2887 | Olivier Zendra | Roland Ducournau (LIRMM), Etienne Gagnon, Chandra Krintz (RACE LAB),
Philippe Mulet, Jan Vitek (S3L), Olivier Zendra (INRIA Lorraine - LORIA) | Implementation, Compilation, Optimization of Object-Oriented Languages,
Programs and Systems - Report on the Workshop ICOOOLPS'2006 at ECOOP'06 | The original publication is available at http://www.springerlink.com | Object-Oriented Technology. ECOOP 2006 Workshop Reader - ECOOP
2006 Workshops, Nantes, France, July 3-7, 2006, Final Reports Springer Berlin
/ Heidelberg (Ed.) (2007) 1-14 | 10.1007/978-3-540-71774-4_1 | null | cs.PF cs.PL cs.SE | null | ICOOOLPS'2006 was the first edition of ECOOP-ICOOOLPS workshop. It intended
to bring researchers and practitioners both from academia and industry
together, with a spirit of openness, to try and identify and begin to address
the numerous and very varied issues of optimization. This succeeded, as can be
seen from the papers, the attendance and the liveliness of the discussions that
took place during and after the workshop, not to mention a few new cooperations
or postdoctoral contracts. The 22 talented people from different groups who
participated were unanimous to appreciate this first edition and recommend that
ICOOOLPS be continued next year. A community is thus beginning to form, and
should be reinforced by a second edition next year, with all the improvements
this first edition made emerge.
| [
{
"version": "v1",
"created": "Mon, 15 Oct 2007 17:53:49 GMT"
}
] | 2007-10-16T00:00:00 | [
[
"Ducournau",
"Roland",
"",
"LIRMM"
],
[
"Gagnon",
"Etienne",
"",
"RACE LAB"
],
[
"Krintz",
"Chandra",
"",
"RACE LAB"
],
[
"Mulet",
"Philippe",
"",
"S3L"
],
[
"Vitek",
"Jan",
"",
"S3L"
],
[
"Zendra",
"Olivier",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0710.2889 | Nir Ailon | Nir Ailon and Mehryar Mohri | An efficient reduction of ranking to classification | Revised paper: Improved results: Upper bounds for regret (constant
down to 1 for bipartite case) and also lower bound on deterministic
algorithms for bipartite case. Total number of pages 22 | null | null | null | cs.LG cs.IR | null | This paper describes an efficient reduction of the learning problem of
ranking to binary classification. The reduction guarantees an average pairwise
misranking regret of at most that of the binary classifier regret, improving a
recent result of Balcan et al which only guarantees a factor of 2. Moreover,
our reduction applies to a broader class of ranking loss functions, admits a
simpler proof, and the expected running time complexity of our algorithm in
terms of number of calls to a classifier or preference function is improved
from $\Omega(n^2)$ to $O(n \log n)$. In addition, when the top $k$ ranked
elements only are required ($k \ll n$), as in many applications in information
extraction or search engines, the time complexity of our algorithm can be
further reduced to $O(k \log k + n)$. Our reduction and algorithm are thus
practical for realistic applications where the number of points to rank exceeds
several thousands. Much of our results also extend beyond the bipartite case
previously studied.
Our rediction is a randomized one. To complement our result, we also derive
lower bounds on any deterministic reduction from binary (preference)
classification to ranking, implying that our use of a randomized reduction is
essentially necessary for the guarantees we provide.
| [
{
"version": "v1",
"created": "Mon, 15 Oct 2007 18:25:15 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Dec 2007 00:02:44 GMT"
}
] | 2007-12-07T00:00:00 | [
[
"Ailon",
"Nir",
""
],
[
"Mohri",
"Mehryar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0710.2970 | An-Ping Li | An-Ping Li | A generic attack to ciphers | 4 pages | null | null | null | cs.CR | null | In this paper, we present a generic attack for ciphers, which is in essence a
collision attack on the secret keys of ciphers .
| [
{
"version": "v1",
"created": "Tue, 16 Oct 2007 07:45:58 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Oct 2007 10:34:37 GMT"
}
] | 2009-03-21T00:00:00 | [
[
"Li",
"An-Ping",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0710.2988 | Paul Bedaride | Paul Bedaride (INRIA Lorraine - Loria) | Using Description Logics for Recognising Textual Entailment | null | Dans 19th European Summer School in Logic, Language and
Information (2007) 11-21 | null | null | cs.CL | null | The aim of this paper is to show how we can handle the Recognising Textual
Entailment (RTE) task by using Description Logics (DLs). To do this, we propose
a representation of natural language semantics in DLs inspired by existing
representations in first-order logic. But our most significant contribution is
the definition of two novel inference tasks: A-Box saturation and subgraph
detection which are crucial for our approach to RTE.
| [
{
"version": "v1",
"created": "Tue, 16 Oct 2007 09:16:24 GMT"
}
] | 2007-10-17T00:00:00 | [
[
"Bedaride",
"Paul",
"",
"INRIA Lorraine - Loria"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0710.3027 | Igor Bjelakovic | Igor Bjelakovic and Holger Boche | Classical Capacities of Averaged and Compound Quantum Channels | 15 pages, no figures. Typos corrected. Remarks and suggestions of the
referees incorporated. Submitted to IEEE Transactions on Information Theory | null | null | null | quant-ph cs.IT math-ph math.IT math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We determine the capacity of compound classical-quantum channels. As a
consequence we obtain the capacity formula for the averaged classical-quantum
channels. The capacity result for compound channels demonstrates, as in the
classical setting, the existence of reliable universal classical-quantum codes
in scenarios where the only a priori information about the channel used for the
transmission of information is that it belongs to a given set of memoryless
classical-quantum channels. Our approach is based on the universal classical
approximation of the quantum relative entropy which in turn relies on the
universal hypothesis testing results.
| [
{
"version": "v1",
"created": "Tue, 16 Oct 2007 11:56:29 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Feb 2009 11:35:26 GMT"
}
] | 2009-02-16T00:00:00 | [
[
"Bjelakovic",
"Igor",
""
],
[
"Boche",
"Holger",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
0710.3170 | Louis Yu Lu | Louis Yu Lu | Fast Intrinsic Mode Decomposition of Time Series Data with Sawtooth
Transform | Add details to extend the sawtooth function for boundary points
calculation | null | null | null | cs.NA | null | An efficient method is introduced in this paper to find the intrinsic mode
function (IMF) components of time series data. This method is faster and more
predictable than the Empirical Mode Decomposition (EMD) method devised by the
author of Hilbert Huang Transform (HHT). The approach is to transforms the
original data function into a piecewise linear sawtooth function (or triangle
wave function), then directly constructs the upper envelope by connecting the
maxima and construct lower envelope by connecting minima with straight line
segments in the sawtooth space, the IMF is calculated as the difference between
the sawtooth function and the mean of the upper and lower envelopes. The
results found in the sawtooth space are reversely transformed into the original
data space as the required IMF and envelopes mean. This decomposition method
process the data in one pass to obtain a unique IMF component without the time
consuming repetitive sifting process of EMD method. An alternative
decomposition method with sawtooth function expansion is also presented.
| [
{
"version": "v1",
"created": "Tue, 16 Oct 2007 20:19:27 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Nov 2007 15:58:10 GMT"
}
] | 2007-11-14T00:00:00 | [
[
"Lu",
"Louis Yu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0710.3178 | George Maney Mr. | George A. Maney | Modeling Context, Collaboration, and Civilization in End-User
Informatics | null | null | null | null | cs.OH | null | End-user informatics applications are Internet data web management automation
solutions. These are mass modeling and mass management collaborative communal
consensus solutions. They are made and maintained by managerial, professional,
technical and specialist end-users. In end-user informatics the end-users are
always right. So it becomes necessary for information technology professionals
to understand information and informatics from the end-user perspective.
End-user informatics starts with the observation that practical prose is a mass
consensus communal modeling technology. This high technology is the mechanistic
modeling medium we all use every day in all of our practical pursuits.
Practical information flows are the lifeblood of modern capitalist communities.
But what exactly is practical information? It's ultimately physical
information, but the physics is highly emergent rather than elementary. So
practical reality is just physical reality in deep disguise. Practical prose is
the medium that we all use to model the everyday and elite mechanics of
practical reality. So this is the medium that end-user informatics must
automate and animate.
| [
{
"version": "v1",
"created": "Tue, 16 Oct 2007 22:44:03 GMT"
}
] | 2007-10-18T00:00:00 | [
[
"Maney",
"George A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0710.3185 | Harki Tanaka | Harki Tanaka, Neli Regina Siqueira Ortega, Mauricio Stanzione Galizia,
Joao Batista Borges Sobrinho, and Marcelo Britto Passos Amato | Fuzzy Modeling of Electrical Impedance Tomography Image of the Lungs | 10 pages, 6 figures | null | null | null | cs.AI cs.CV | null | Electrical Impedance Tomography (EIT) is a functional imaging method that is
being developed for bedside use in critical care medicine. Aiming at improving
the chest anatomical resolution of EIT images we developed a fuzzy model based
on EIT high temporal resolution and the functional information contained in the
pulmonary perfusion and ventilation signals. EIT data from an experimental
animal model were collected during normal ventilation and apnea while an
injection of hypertonic saline was used as a reference . The fuzzy model was
elaborated in three parts: a modeling of the heart, a pulmonary map from
ventilation images and, a pulmonary map from perfusion images. Image
segmentation was performed using a threshold method and a ventilation/perfusion
map was generated. EIT images treated by the fuzzy model were compared with the
hypertonic saline injection method and CT-scan images, presenting good results
in both qualitative (the image obtained by the model was very similar to that
of the CT-scan) and quantitative (the ROC curve provided an area equal to 0.93)
point of view. Undoubtedly, these results represent an important step in the
EIT images area, since they open the possibility of developing EIT-based
bedside clinical methods, which are not available nowadays. These achievements
could serve as the base to develop EIT diagnosis system for some
life-threatening diseases commonly found in critical care medicine.
| [
{
"version": "v1",
"created": "Tue, 16 Oct 2007 22:13:11 GMT"
}
] | 2007-10-18T00:00:00 | [
[
"Tanaka",
"Harki",
""
],
[
"Ortega",
"Neli Regina Siqueira",
""
],
[
"Galizia",
"Mauricio Stanzione",
""
],
[
"Sobrinho",
"Joao Batista Borges",
""
],
[
"Amato",
"Marcelo Britto Passos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0710.3246 | John Talbot | David Talbot and John Talbot | Bloom maps | 15 pages | null | null | null | cs.DS cs.IT math.IT | null | We consider the problem of succinctly encoding a static map to support
approximate queries. We derive upper and lower bounds on the space requirements
in terms of the error rate and the entropy of the distribution of values over
keys: our bounds differ by a factor log e. For the upper bound we introduce a
novel data structure, the Bloom map, generalising the Bloom filter to this
problem. The lower bound follows from an information theoretic argument.
| [
{
"version": "v1",
"created": "Wed, 17 Oct 2007 09:35:14 GMT"
}
] | 2007-10-18T00:00:00 | [
[
"Talbot",
"David",
""
],
[
"Talbot",
"John",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.3279 | Meixia Tao | Meixia Tao, Ying-Chang Liang and Fan Zhang | Resource Allocation for Delay Differentiated Traffic in Multiuser OFDM
Systems | 29 pages, 8 figures, submitted to IEEE Transactions on Wireless
Communications | null | 10.1109/ICC.2006.255331 | null | cs.NI cs.IT math.IT | null | Most existing work on adaptive allocation of subcarriers and power in
multiuser orthogonal frequency division multiplexing (OFDM) systems has focused
on homogeneous traffic consisting solely of either delay-constrained data
(guaranteed service) or non-delay-constrained data (best-effort service). In
this paper, we investigate the resource allocation problem in a heterogeneous
multiuser OFDM system with both delay-constrained (DC) and
non-delay-constrained (NDC) traffic. The objective is to maximize the sum-rate
of all the users with NDC traffic while maintaining guaranteed rates for the
users with DC traffic under a total transmit power constraint. Through our
analysis we show that the optimal power allocation over subcarriers follows a
multi-level water-filling principle; moreover, the valid candidates competing
for each subcarrier include only one NDC user but all DC users. By converting
this combinatorial problem with exponential complexity into a convex problem or
showing that it can be solved in the dual domain, efficient iterative
algorithms are proposed to find the optimal solutions. To further reduce the
computational cost, a low-complexity suboptimal algorithm is also developed.
Numerical studies are conducted to evaluate the performance the proposed
algorithms in terms of service outage probability, achievable transmission rate
pairs for DC and NDC traffic, and multiuser diversity.
| [
{
"version": "v1",
"created": "Wed, 17 Oct 2007 12:04:34 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Tao",
"Meixia",
""
],
[
"Liang",
"Ying-Chang",
""
],
[
"Zhang",
"Fan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.3283 | Meixia Tao | Meixia Tao | Effects of Non-Identical Rayleigh Fading on Differential Unitary
Space-Time Modulation | This paper has been withdrawn | null | null | null | cs.PF cs.IT math.IT | null | This paper has been withdrawn by the author.
| [
{
"version": "v1",
"created": "Wed, 17 Oct 2007 12:32:29 GMT"
},
{
"version": "v2",
"created": "Sat, 20 Oct 2007 08:21:37 GMT"
}
] | 2007-10-20T00:00:00 | [
[
"Tao",
"Meixia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.3285 | Tamara Tretjakova | Tretjakova Tamara | Nontraditional Scoring of C-tests | 4 pages, in Russian | null | null | null | cs.CY cs.CL | null | In C-tests the hypothesis of items local independence is violated, which
doesn't permit to consider them as real tests. It is suggested to determine the
distances between separate C-test items (blanks) and to combine items into
clusters. Weights, inversely proportional to the number of items in
corresponding clusters, are assigned to items. As a result, the C-test
structure becomes similar to the structure of classical tests, without
violation of local independence hypothesis.
| [
{
"version": "v1",
"created": "Wed, 17 Oct 2007 12:42:39 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Oct 2007 07:50:21 GMT"
}
] | 2007-10-18T00:00:00 | [
[
"Tamara",
"Tretjakova",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0710.3305 | Laurent Vigneron | Francis Klay (FT R&D), Judson Santiago (DIMAP - UFRN), Laurent
Vigneron (INRIA Lorraine - LORIA / LIFC) | Automatic Methods for Analyzing Non-Repudiation Protocols with an Active
Intruder | null | null | null | null | cs.LO cs.CR | null | Non-repudiation protocols have an important role in many areas where secured
transactions with proofs of participation are necessary. Formal methods are
clever and without error, therefore using them for verifying such protocols is
crucial. In this purpose, we show how to partially represent non-repudiation as
a combination of authentications on the Fair Zhou-Gollmann protocol. After
discussing its limits, we define a new method based on the handling of the
knowledge of protocol participants. This method is very general and is of
natural use, as it consists in adding simple annotations, like for
authentication problems. The method is very easy to implement in tools able to
handle participants knowledge. We have implemented it in the AVISPA Tool and
analyzed the optimistic Cederquist-Corin- Dashti protocol, discovering two
unknown attacks. This extension of the AVISPA Tool for handling non-repudiation
opens a highway to the specification of many other properties, without any more
change in the tool itself.
| [
{
"version": "v1",
"created": "Wed, 17 Oct 2007 14:16:25 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Oct 2007 06:40:14 GMT"
}
] | 2007-10-22T00:00:00 | [
[
"Klay",
"Francis",
"",
"FT R&D"
],
[
"Santiago",
"Judson",
"",
"DIMAP - UFRN"
],
[
"Vigneron",
"Laurent",
"",
"INRIA Lorraine - LORIA / LIFC"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0710.3332 | Jad Saklawi | Paul C. Attie and Jad Saklawi | Model and Program Repair via SAT Solving | 29 pages, new repair features | null | null | null | cs.LO | null | We consider the following \emph{model repair problem}: given a finite Kripke
structure $M$ and a specification formula $\eta$ in some modal or temporal
logic, determine if $M$ contains a substructure $M'$ (with the same initial
state) that satisfies $\eta$. Thus, $M$ can be ``repaired'' to satisfy the
specification $\eta$ by deleting some transitions.
We map an instance $(M, \eta)$ of model repair to a boolean formula
$\repfor(M,\eta)$ such that $(M, \eta)$ has a solution iff $\repfor(M,\eta)$ is
satisfiable. Furthermore, a satisfying assignment determines which transitions
must be removed from $M$ to generate a model $M'$ of $\eta$. Thus, we can use
any SAT solver to repair Kripke structures. Furthermore, using a complete SAT
solver yields a complete algorithm: it always finds a repair if one exists.
We extend our method to repair finite-state shared memory concurrent
programs, to solve the discrete event supervisory control problem
\cite{RW87,RW89}, to check for the existence of symmettric solutions
\cite{ES93}, and to accomodate any boolean constraint on the existence of
states and transitions in the repaired model.
Finally, we show that model repair is NP-complete for CTL, and logics with
polynomial model checking algorithms to which CTL can be reduced in polynomial
time. A notable example of such a logic is Alternating-Time Temporal Logic
(ATL).
| [
{
"version": "v1",
"created": "Wed, 17 Oct 2007 16:56:56 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Oct 2007 11:59:57 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Dec 2007 18:49:00 GMT"
},
{
"version": "v4",
"created": "Tue, 15 Apr 2008 12:47:15 GMT"
}
] | 2008-04-15T00:00:00 | [
[
"Attie",
"Paul C.",
""
],
[
"Saklawi",
"Jad",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0710.3375 | Ivana Maric | I. Maric, A. Goldsmith, G. Kramer, S. Shamai | On the Capacity of Interference Channels with One Cooperating
Transmitter | 11 pages, 8 figures, 1 table | null | null | null | cs.IT math.IT | null | Inner and outer bounds are established on the capacity region of two-sender,
two-receiver interference channels where one transmitter knows both messages.
The transmitter with extra knowledge is referred to as being cognitive. The
inner bound is based on strategies that generalize prior work, and include
rate-splitting, Gel'fand-Pinsker coding and cooperative transmission. A general
outer bound is based on the Nair-El Gamal outer bound for broadcast channels. A
simpler bound is presented for the case in which one of the decoders can decode
both messages. The bounds are evaluated and compared for Gaussian channels.
| [
{
"version": "v1",
"created": "Wed, 17 Oct 2007 19:11:40 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Oct 2007 20:05:11 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Oct 2007 02:29:26 GMT"
}
] | 2007-10-22T00:00:00 | [
[
"Maric",
"I.",
""
],
[
"Goldsmith",
"A.",
""
],
[
"Kramer",
"G.",
""
],
[
"Shamai",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.3427 | Shashi Kiran Chilappagari | Shashi Kiran Chilappagari and Bane Vasic | Error Correction Capability of Column-Weight-Three LDPC Codes | 16 pages, 3 figures. Submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | null | In this paper, we investigate the error correction capability of
column-weight-three LDPC codes when decoded using the Gallager A algorithm. We
prove that the necessary condition for a code to correct $k \geq 5$ errors is
to avoid cycles of length up to $2k$ in its Tanner graph. As a consequence of
this result, we show that given any $\alpha>0, \exists N $ such that $\forall
n>N$, no code in the ensemble of column-weight-three codes can correct all
$\alpha n$ or fewer errors. We extend these results to the bit flipping
algorithm.
| [
{
"version": "v1",
"created": "Thu, 18 Oct 2007 02:53:29 GMT"
}
] | 2007-10-19T00:00:00 | [
[
"Chilappagari",
"Shashi Kiran",
""
],
[
"Vasic",
"Bane",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.3439 | Meixia Tao | Xiaolu Zhang, Meixia Tao and Chun Sum Ng | Utility-Based Wireless Resource Allocation for Variable Rate
Transmission | 6 pages, 5 figures, to appear in IEEE Trans. on Wireless
Communications | null | null | null | cs.NI | null | For most wireless services with variable rate transmission, both average rate
and rate oscillation are important performance metrics. The traditional
performance criterion, utility of average transmission rate, boosts the average
rate but also results in high rate oscillations. We introduce a utility
function of instantaneous transmission rates. It is capable of facilitating the
resource allocation with flexible combinations of average rate and rate
oscillation. Based on the new utility, we consider the time and power
allocation in a time-shared wireless network. Two adaptation policies are
developed, namely, time sharing (TS) and joint time sharing and power control
(JTPC). An extension to quantized time sharing with limited channel feedback
(QTSL) for practical systems is also discussed. Simulation results show that by
controlling the concavity of the utility function, a tradeoff between the
average rate and rate oscillation can be easily made.
| [
{
"version": "v1",
"created": "Thu, 18 Oct 2007 05:09:57 GMT"
}
] | 2007-10-19T00:00:00 | [
[
"Zhang",
"Xiaolu",
""
],
[
"Tao",
"Meixia",
""
],
[
"Ng",
"Chun Sum",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.3443 | EDA Publishing Association | G.F. Bouesse (TIMA), M. Renaudin (TIMA), S. Dumont (TIMA), F. Germain | DPA on quasi delay insensitive asynchronous circuits: formalization and
improvement | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | 10.1109/DATE.2005.124 | null | cs.AR | null | The purpose of this paper is to formally specify a flow devoted to the design
of Differential Power Analysis (DPA) resistant QDI asynchronous circuits. The
paper first proposes a formal modeling of the electrical signature of QDI
asynchronous circuits. The DPA is then applied to the formal model in order to
identify the source of leakage of this type of circuits. Finally, a complete
design flow is specified to minimize the information leakage. The relevancy and
efficiency of the approach is demonstrated using the design of an AES
crypto-processor.
| [
{
"version": "v1",
"created": "Thu, 18 Oct 2007 06:57:52 GMT"
}
] | 2007-10-19T00:00:00 | [
[
"Bouesse",
"G. F.",
"",
"TIMA"
],
[
"Renaudin",
"M.",
"",
"TIMA"
],
[
"Dumont",
"S.",
"",
"TIMA"
],
[
"Germain",
"F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.3502 | Stergos Afantenos | Stergos D. Afantenos, V. Karkaletsis, P. Stamatopoulos and C. Halatsis | Using Synchronic and Diachronic Relations for Summarizing Multiple
Documents Describing Evolving Events | 45 pages, 6 figures. To appear in the Journal of Intelligent
Information Systems | null | 10.1007/s10844-006-0025-9 | null | cs.CL cs.IR | null | In this paper we present a fresh look at the problem of summarizing evolving
events from multiple sources. After a discussion concerning the nature of
evolving events we introduce a distinction between linearly and non-linearly
evolving events. We present then a general methodology for the automatic
creation of summaries from evolving events. At its heart lie the notions of
Synchronic and Diachronic cross-document Relations (SDRs), whose aim is the
identification of similarities and differences between sources, from a
synchronical and diachronical perspective. SDRs do not connect documents or
textual elements found therein, but structures one might call messages.
Applying this methodology will yield a set of messages and relations, SDRs,
connecting them, that is a graph which we call grid. We will show how such a
grid can be considered as the starting point of a Natural Language Generation
System. The methodology is evaluated in two case-studies, one for linearly
evolving events (descriptions of football matches) and another one for
non-linearly evolving events (terrorist incidents involving hostages). In both
cases we evaluate the results produced by our computational systems.
| [
{
"version": "v1",
"created": "Thu, 18 Oct 2007 13:24:26 GMT"
}
] | 2007-10-19T00:00:00 | [
[
"Afantenos",
"Stergos D.",
""
],
[
"Karkaletsis",
"V.",
""
],
[
"Stamatopoulos",
"P.",
""
],
[
"Halatsis",
"C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0710.3519 | Jan Foniok | Jan Foniok | P-matrix recognition is co-NP-complete | 9 pages | null | null | null | cs.CC | null | This is a summary of the proof by G.E. Coxson that P-matrix recognition is
co-NP-complete. The result follows by a reduction from the MAX CUT problem
using results of S. Poljak and J. Rohn.
| [
{
"version": "v1",
"created": "Thu, 18 Oct 2007 14:14:26 GMT"
}
] | 2007-10-19T00:00:00 | [
[
"Foniok",
"Jan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0710.3535 | Andrea Maiorano | F. Belletti, M. Cotallo, A. Cruz, L. A. Fern\'andez, A. Gordillo, M.
Guidetti, A. Maiorano, F. Mantovani, E. Marinari, V. Mart\'in-Mayor, A.
Mu\~noz-Sudupe, D. Navarro, G. Parisi, S. P\'erez-Gaviro, M. Rossi, J. J.
Ruiz-Lorenzo, S. F. Schifano, D. Sciretti, A. Taranc\'on, R. Tripiccione, J.
L. Velasco | JANUS: an FPGA-based System for High Performance Scientific Computing | 11 pages, 6 figures. Improved version, largely rewritten, submitted
to Computing in Science & Engineering | Computing in Science & Engineering 11 (2009 ) 48-58 | 10.1109/MCSE.2009.11 | null | cs.AR | null | This paper describes JANUS, a modular massively parallel and reconfigurable
FPGA-based computing system. Each JANUS module has a computational core and a
host. The computational core is a 4x4 array of FPGA-based processing elements
with nearest-neighbor data links. Processors are also directly connected to an
I/O node attached to the JANUS host, a conventional PC. JANUS is tailored for,
but not limited to, the requirements of a class of hard scientific applications
characterized by regular code structure, unconventional data manipulation
instructions and not too large data-base size. We discuss the architecture of
this configurable machine, and focus on its use on Monte Carlo simulations of
statistical mechanics. On this class of application JANUS achieves impressive
performances: in some cases one JANUS processing element outperfoms high-end
PCs by a factor ~ 1000. We also discuss the role of JANUS on other classes of
scientific applications.
| [
{
"version": "v1",
"created": "Thu, 18 Oct 2007 15:26:32 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Apr 2008 11:10:12 GMT"
}
] | 2017-05-02T00:00:00 | [
[
"Belletti",
"F.",
""
],
[
"Cotallo",
"M.",
""
],
[
"Cruz",
"A.",
""
],
[
"Fernández",
"L. A.",
""
],
[
"Gordillo",
"A.",
""
],
[
"Guidetti",
"M.",
""
],
[
"Maiorano",
"A.",
""
],
[
"Mantovani",
"F.",
""
],
[
"Marinari",
"E.",
""
],
[
"Martín-Mayor",
"V.",
""
],
[
"Muñoz-Sudupe",
"A.",
""
],
[
"Navarro",
"D.",
""
],
[
"Parisi",
"G.",
""
],
[
"Pérez-Gaviro",
"S.",
""
],
[
"Rossi",
"M.",
""
],
[
"Ruiz-Lorenzo",
"J. J.",
""
],
[
"Schifano",
"S. F.",
""
],
[
"Sciretti",
"D.",
""
],
[
"Tarancón",
"A.",
""
],
[
"Tripiccione",
"R.",
""
],
[
"Velasco",
"J. L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.3536 | Krzysztof R. Apt | Krzysztof R. Apt and Jonathan A. Zvesper | Common Beliefs and Public Announcements in Strategic Games with
Arbitrary Strategy Sets | 36 pages. Revised version | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide an epistemic analysis of arbitrary strategic games based on
possibility correspondences. We first establish a generic result that links
true common beliefs (and, respectively, common knowledge) of players'
rationality defined by means of `monotonic' properties, with the iterated
elimination of strategies that do not satisfy these properties. It allows us to
deduce the customary results concerned with true common beliefs of rationality
and iterated elimination of strictly dominated strategies as simple
corollaries. This approach relies on Tarski's Fixpoint Theorem. We also provide
an axiomatic presentation of this generic result. This allows us to clarify the
proof-theoretic principles assumed in players' reasoning. Finally, we provide
an alternative characterization of the iterated elimination of strategies based
on the concept of a public announcement. It applies to `global properties'.
Both classes of properties include the notions of rationalizability and the
iterated elimination of strictly dominated strategies.
| [
{
"version": "v1",
"created": "Thu, 18 Oct 2007 15:28:58 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Nov 2008 08:24:11 GMT"
}
] | 2008-11-07T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Zvesper",
"Jonathan A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0710.3561 | Arturo Berrones | Arturo Berrones | Stationary probability density of stochastic search processes in global
optimization | null | J. Stat. Mech. (2008) P01013 | 10.1088/1742-5468/2008/01/P01013 | null | cs.AI cond-mat.stat-mech cs.NE | null | A method for the construction of approximate analytical expressions for the
stationary marginal densities of general stochastic search processes is
proposed. By the marginal densities, regions of the search space that with high
probability contain the global optima can be readily defined. The density
estimation procedure involves a controlled number of linear operations, with a
computational cost per iteration that grows linearly with problem size.
| [
{
"version": "v1",
"created": "Thu, 18 Oct 2007 18:04:42 GMT"
}
] | 2008-01-30T00:00:00 | [
[
"Berrones",
"Arturo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0710.3603 | Jakub Mare\v{c}ek | Edmund K. Burke, Jakub Marecek, Andrew J. Parkes, and Hana Rudova | On a Clique-Based Integer Programming Formulation of Vertex Colouring
with Applications in Course Timetabling | null | Annals of Operations Research (2010) 179(1), 105-130 | 10.1007/s10479-010-0716-z | NOTTCS-TR-2007-10 | cs.DM cs.DS math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Vertex colouring is a well-known problem in combinatorial optimisation, whose
alternative integer programming formulations have recently attracted
considerable attention. This paper briefly surveys seven known formulations of
vertex colouring and introduces a formulation of vertex colouring using a
suitable clique partition of the graph. This formulation is applicable in
timetabling applications, where such a clique partition of the conflict graph
is given implicitly. In contrast with some alternatives, the presented
formulation can also be easily extended to accommodate complex performance
indicators (``soft constraints'') imposed in a number of real-life course
timetabling applications. Its performance depends on the quality of the clique
partition, but encouraging empirical results for the Udine Course Timetabling
problem are reported.
| [
{
"version": "v1",
"created": "Thu, 18 Oct 2007 21:38:37 GMT"
},
{
"version": "v2",
"created": "Sat, 10 Nov 2007 19:03:39 GMT"
},
{
"version": "v3",
"created": "Tue, 7 Jul 2009 19:55:23 GMT"
}
] | 2014-04-10T00:00:00 | [
[
"Burke",
"Edmund K.",
""
],
[
"Marecek",
"Jakub",
""
],
[
"Parkes",
"Andrew J.",
""
],
[
"Rudova",
"Hana",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0710.3621 | Withawat Withayachumnankul | Withawat Withayachumnankul, Bernd M. Fischer, Samuel P. Mickan, Derek
Abbott | Numerical removal of water-vapor effects from THz-TDS measurements | null | Proceedings of the Royal Society A: Mathematical, Physical &
Engineering Sciences, vol. 464, no. 2097, pp 2435-2456, 2008 | 10.1098/rspa.2007.0294 | null | cs.CE physics.comp-ph | null | One source of disturbance in a pulsed T-ray signal is attributed to ambient
water vapor. Water molecules in the gas phase selectively absorb T-rays at
discrete frequencies corresponding to their molecular rotational transitions.
This results in prominent resonances spread over the T-ray spectrum, and in the
time domain the T-ray signal is observed as fluctuations after the main pulse.
These effects are generally undesired, since they may mask critical
spectroscopic data. So, ambient water vapor is commonly removed from the T-ray
path by using a closed chamber during the measurement. Yet, in some
applications a closed chamber is not applicable. This situation, therefore,
motivates the need for another method to reduce these unwanted artifacts. This
paper presents a study on a computational means to address the problem.
Initially, a complex frequency response of water vapor is modeled from a
spectroscopic catalog. Using a deconvolution technique, together with fine
tuning of the strength of each resonance, parts of the water-vapor response are
removed from a measured T-ray signal, with minimal signal distortion.
| [
{
"version": "v1",
"created": "Fri, 19 Oct 2007 02:17:35 GMT"
}
] | 2008-07-16T00:00:00 | [
[
"Withayachumnankul",
"Withawat",
""
],
[
"Fischer",
"Bernd M.",
""
],
[
"Mickan",
"Samuel P.",
""
],
[
"Abbott",
"Derek",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
] |
0710.3642 | Florent Bouchez | Florent Bouchez (LIP), Alain Darte (LIP), Fabrice Rastello (LIP) | On the Complexity of Spill Everywhere under SSA Form | 10 pages | ACM SIGPLAN Notices Issue 7, Volume 42 (2007) 103 - 112 | 10.1145/1254766.1254782 | null | cs.DS cs.CC | null | Compilation for embedded processors can be either aggressive (time consuming
cross-compilation) or just in time (embedded and usually dynamic). The
heuristics used in dynamic compilation are highly constrained by limited
resources, time and memory in particular. Recent results on the SSA form open
promising directions for the design of new register allocation heuristics for
embedded systems and especially for embedded compilation. In particular,
heuristics based on tree scan with two separated phases -- one for spilling,
then one for coloring/coalescing -- seem good candidates for designing
memory-friendly, fast, and competitive register allocators. Still, also because
of the side effect on power consumption, the minimization of loads and stores
overhead (spilling problem) is an important issue. This paper provides an
exhaustive study of the complexity of the ``spill everywhere'' problem in the
context of the SSA form. Unfortunately, conversely to our initial hopes, many
of the questions we raised lead to NP-completeness results. We identify some
polynomial cases but that are impractical in JIT context. Nevertheless, they
can give hints to simplify formulations for the design of aggressive
allocators.
| [
{
"version": "v1",
"created": "Fri, 19 Oct 2007 07:24:58 GMT"
}
] | 2009-09-18T00:00:00 | [
[
"Bouchez",
"Florent",
"",
"LIP"
],
[
"Darte",
"Alain",
"",
"LIP"
],
[
"Rastello",
"Fabrice",
"",
"LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0710.3757 | Gusztav Morvai | Gusztav Morvai, Benjamin Weiss | Inferring the conditional mean | null | Theory Stoch. Process. 11 (2005), no. 1-2, pp. 112--120 | null | null | math.PR cs.IT math.IT | null | Consider a stationary real-valued time series $\{X_n\}_{n=0}^{\infty}$ with a
priori unknown distribution. The goal is to estimate the conditional
expectation $E(X_{n+1}|X_0,..., X_n)$ based on the observations $(X_0,...,
X_n)$ in a pointwise consistent way. It is well known that this is not possible
at all values of $n$. We will estimate it along stopping times.
| [
{
"version": "v1",
"created": "Fri, 19 Oct 2007 18:31:30 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Morvai",
"Gusztav",
""
],
[
"Weiss",
"Benjamin",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.3760 | Gusztav Morvai | Gusztav Morvai | Guessing the output of a stationary binary time series | null | Foundations of statistical inference (Shoresh, 2000), 207--215,
Contrib. Statist., Physica, Heidelberg, 2003 | null | null | math.PR cs.IT math.IT | null | The forward prediction problem for a binary time series
$\{X_n\}_{n=0}^{\infty}$ is to estimate the probability that $X_{n+1}=1$ based
on the observations $X_i$, $0\le i\le n$ without prior knowledge of the
distribution of the process $\{X_n\}$. It is known that this is not possible if
one estimates at all values of $n$. We present a simple procedure which will
attempt to make such a prediction infinitely often at carefully selected
stopping times chosen by the algorithm. The growth rate of the stopping times
is also exhibited.
| [
{
"version": "v1",
"created": "Fri, 19 Oct 2007 18:37:11 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Morvai",
"Gusztav",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.3764 | Sumit Kumar Jha | Sumit Kumar Jha | Design of a Distributed Reachability Algorithm for Analysis of Linear
Hybrid Automata | 8 pages | null | null | null | cs.LO | null | This paper presents the design of a novel distributed algorithm d-IRA for the
reachability analysis of linear hybrid automata. Recent work on iterative
relaxation abstraction (IRA) is leveraged to distribute the computational
problem among multiple computational nodes in a non-redundant manner by
performing careful infeasibility analysis of linear programs corresponding to
spurious counterexamples. The d-IRA algorithm is resistant to failure of
multiple computational nodes. The experimental results provide promising
evidence for the possible successful application of this technique.
| [
{
"version": "v1",
"created": "Fri, 19 Oct 2007 19:32:39 GMT"
}
] | 2007-10-22T00:00:00 | [
[
"Jha",
"Sumit Kumar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0710.3773 | Gusztav Morvai | Gusztav Morvai and Benjamin Weiss | Limitations on intermittent forecasting | null | Statist. Probab. Lett. 72 (2005), no. 4, 285--290 | null | null | math.PR cs.IT math.IT | null | Bailey showed that the general pointwise forecasting for stationary and
ergodic time series has a negative solution. However, it is known that for
Markov chains the problem can be solved. Morvai showed that there is a stopping
time sequence $\{\lambda_n\}$ such that
$P(X_{\lambda_n+1}=1|X_0,...,X_{\lambda_n}) $ can be estimated from samples
$(X_0,...,X_{\lambda_n})$ such that the difference between the conditional
probability and the estimate vanishes along these stoppping times for all
stationary and ergodic binary time series. We will show it is not possible to
estimate the above conditional probability along a stopping time sequence for
all stationary and ergodic binary time series in a pointwise sense such that if
the time series turns out to be a Markov chain, the predictor will predict
eventually for all $n$.
| [
{
"version": "v1",
"created": "Fri, 19 Oct 2007 20:03:54 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Morvai",
"Gusztav",
""
],
[
"Weiss",
"Benjamin",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.3775 | Gusztav Morvai | Gusztav Morvai and Benjamin Weiss | On classifying processes | null | Bernoulli 11 (2005), no. 3, pp. 523--532 | null | null | math.PR cs.IT math.IT | null | We prove several results concerning classifications, based on successive
observations $(X_1,..., X_n)$ of an unknown stationary and ergodic process, for
membership in a given class of processes, such as the class of all finite order
Markov chains.
| [
{
"version": "v1",
"created": "Fri, 19 Oct 2007 20:10:16 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Morvai",
"Gusztav",
""
],
[
"Weiss",
"Benjamin",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.3777 | Salman Avestimehr | A. S. Avestimehr, S. N. Diggavi, D. N. C. Tse | A Deterministic Approach to Wireless Relay Networks | null | null | null | null | cs.IT cs.DM math.IT math.PR | null | We present a deterministic channel model which captures several key features
of multiuser wireless communication. We consider a model for a wireless network
with nodes connected by such deterministic channels, and present an exact
characterization of the end-to-end capacity when there is a single source and a
single destination and an arbitrary number of relay nodes. This result is a
natural generalization of the max-flow min-cut theorem for wireline networks.
Finally to demonstrate the connections between deterministic model and Gaussian
model, we look at two examples: the single-relay channel and the diamond
network. We show that in each of these two examples, the capacity-achieving
scheme in the corresponding deterministic model naturally suggests a scheme in
the Gaussian model that is within 1 bit and 2 bit respectively from cut-set
upper bound, for all values of the channel gains. This is the first part of a
two-part paper; the sequel [1] will focus on the proof of the max-flow min-cut
theorem of a class of deterministic networks of which our model is a special
case.
| [
{
"version": "v1",
"created": "Fri, 19 Oct 2007 20:10:58 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Avestimehr",
"A. S.",
""
],
[
"Diggavi",
"S. N.",
""
],
[
"Tse",
"D. N. C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0710.3779 | Sumanth Gangasani | Sumanth Kumar Reddy Gangasani | Testing D-Sequences for their Randomness | 8 pages, 5 figures | null | null | null | cs.CR | null | This paper examines the randomness of d-sequences, which are decimal
sequences to an arbitrary base. Our motivation is to check their suitability
for application to cryptography, spread-spectrum systems and use as
pseudorandom sequence.
| [
{
"version": "v1",
"created": "Fri, 19 Oct 2007 20:18:42 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Gangasani",
"Sumanth Kumar Reddy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0710.3781 | Salman Avestimehr | A. S. Avestimehr, S. N. Diggavi, D. N. C. Tse | Wireless Network Information Flow | - Corrected Typos | null | null | null | cs.IT cs.DM math.IT math.PR | null | We present an achievable rate for general deterministic relay networks, with
broadcasting at the transmitters and interference at the receivers. In
particular we show that if the optimizing distribution for the
information-theoretic cut-set bound is a product distribution, then we have a
complete characterization of the achievable rates for such networks. For linear
deterministic finite-field models discussed in a companion paper [3], this is
indeed the case, and we have a generalization of the celebrated max-flow
min-cut theorem for such a network.
| [
{
"version": "v1",
"created": "Fri, 19 Oct 2007 20:23:07 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Oct 2007 04:33:10 GMT"
}
] | 2007-10-24T00:00:00 | [
[
"Avestimehr",
"A. S.",
""
],
[
"Diggavi",
"S. N.",
""
],
[
"Tse",
"D. N. C.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0710.3789 | Mohd Abubakr | Mohd Abubakr | Frequency Analysis of Decoupling Capacitors for Three Voltage Supplies
in SoC | 5 pages, 9 figures, Submitted to ICCSC 2008 | null | null | null | cs.AR | null | Reduction in power consumption has become a major criterion of design in
modern ICs. One such scheme to reduce power consumption by an IC is the use of
multiple power supplies for critical and non-critical paths. To maintain the
impedance of a power distribution system below a specified level, multiple
decoupling capacitors are placed at different levels of power grid hierarchy.
This paper describes about three-voltage supply power distribution systems. The
noise at one power supply can propagate to the other power supply, causing
power and signal integrity problems in the overall system. Effects such as
anti-resonance and remedies for these effects are studied. Impedance of the
three-voltage supply power distribution system is calculated in terms of
RLC-model of decoupling capacitors. Further the obtained impedance depends on
the frequency; hence brief frequency analysis of impedance is done.
| [
{
"version": "v1",
"created": "Fri, 19 Oct 2007 20:59:53 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Abubakr",
"Mohd",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.3802 | Raman Venkataramani | Raman Venkataramani, M. Fatih Erden | A Posteriori Equivalence: A New Perspective for Design of Optimal
Channel Shortening Equalizers | 12 pages, double column format, 5 figures | null | null | null | cs.IT math.IT | null | The problem of channel shortening equalization for optimal detection in ISI
channels is considered. The problem is to choose a linear equalizer and a
partial response target filter such that the combination produces the best
detection performance. Instead of using the traditional approach of MMSE
equalization, we directly seek all equalizer and target pairs that yield
optimal detection performance in terms of the sequence or symbol error rate.
This leads to a new notion of a posteriori equivalence between the equalized
and target channels with a simple characterization in terms of their underlying
probability distributions. Using this characterization we show the surprising
existence an infinite family of equalizer and target pairs for which any
maximum a posteriori (MAP) based detector designed for the target channel is
simultaneously MAP optimal for the equalized channel. For channels whose input
symbols have equal energy, such as q-PSK, the MMSE equalizer designed with a
monic target constraint yields a solution belonging to this optimal family of
designs. Although, these designs produce IIR target filters, the ideas are
extended to design good FIR targets. For an arbitrary choice of target and
equalizer, we derive an expression for the probability of sequence detection
error. This expression is used to design optimal FIR targets and IIR equalizers
and to quantify the FIR approximation penalty.
| [
{
"version": "v1",
"created": "Fri, 19 Oct 2007 23:22:23 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Venkataramani",
"Raman",
""
],
[
"Erden",
"M. Fatih",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.3804 | Thierry Mora | Thierry Mora and Lenka Zdeborova | Random subcubes as a toy model for constraint satisfaction problems | 21 pages, 4 figures | J. Stat. Phys. 131, n. 6 (2008), 1121-1138 | 10.1007/s10955-008-9543-x | null | cs.CC cond-mat.dis-nn | null | We present an exactly solvable random-subcube model inspired by the structure
of hard constraint satisfaction and optimization problems. Our model reproduces
the structure of the solution space of the random k-satisfiability and
k-coloring problems, and undergoes the same phase transitions as these
problems. The comparison becomes quantitative in the large-k limit. Distance
properties, as well the x-satisfiability threshold, are studied. The model is
also generalized to define a continuous energy landscape useful for studying
several aspects of glassy dynamics.
| [
{
"version": "v1",
"created": "Fri, 19 Oct 2007 23:33:18 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jan 2008 16:32:21 GMT"
}
] | 2008-05-23T00:00:00 | [
[
"Mora",
"Thierry",
""
],
[
"Zdeborova",
"Lenka",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
}
] |
0710.3817 | Dejan Djonin | Dejan V. Djonin | A Note on Comparison of Error Correction Codes | 12 pages, 1 figure, Submitted to the IEEE Trans. on Information
Theory | null | null | null | cs.IT math.IT math.ST stat.TH | null | Use of an error correction code in a given transmission channel can be
regarded as the statistical experiment. Therefore, powerful results from the
theory of comparison of experiments can be applied to compare the performances
of different error correction codes. We present results on the comparison of
block error correction codes using the representation of error correction code
as a linear experiment. In this case the code comparison is based on the
Loewner matrix ordering of respective code matrices. Next, we demonstrate the
bit-error rate code performance comparison based on the representation of the
codes as dichotomies, in which case the comparison is based on the matrix
majorization ordering of their respective equivalent code matrices.
| [
{
"version": "v1",
"created": "Sat, 20 Oct 2007 05:06:55 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Djonin",
"Dejan V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0710.3824 | Sebastien Tixeuil | Sylvie Dela\"et (LRI), Partha Sarathi Mandal (INRIA Futurs), Mariusz
Rokicki (LRI), S\'ebastien Tixeuil (INRIA Futurs, LIP6) | Deterministic Secure Positioning in Wireless Sensor Networks | null | null | null | null | cs.CR cs.DC cs.DS cs.NI | null | Properly locating sensor nodes is an important building block for a large
subset of wireless sensor networks (WSN) applications. As a result, the
performance of the WSN degrades significantly when misbehaving nodes report
false location and distance information in order to fake their actual location.
In this paper we propose a general distributed deterministic protocol for
accurate identification of faking sensors in a WSN. Our scheme does \emph{not}
rely on a subset of \emph{trusted} nodes that are not allowed to misbehave and
are known to every node in the network. Thus, any subset of nodes is allowed to
try faking its position. As in previous approaches, our protocol is based on
distance evaluation techniques developed for WSN. On the positive side, we show
that when the received signal strength (RSS) technique is used, our protocol
handles at most $\lfloor \frac{n}{2} \rfloor-2$ faking sensors. Also, when the
time of flight (ToF) technique is used, our protocol manages at most $\lfloor
\frac{n}{2} \rfloor - 3$ misbehaving sensors. On the negative side, we prove
that no deterministic protocol can identify faking sensors if their number is
$\lceil \frac{n}{2}\rceil -1$. Thus our scheme is almost optimal with respect
to the number of faking sensors. We discuss application of our technique in the
trusted sensor model. More precisely our results can be used to minimize the
number of trusted sensors that are needed to defeat faking ones.
| [
{
"version": "v1",
"created": "Mon, 22 Oct 2007 07:29:13 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Delaët",
"Sylvie",
"",
"LRI"
],
[
"Mandal",
"Partha Sarathi",
"",
"INRIA Futurs"
],
[
"Rokicki",
"Mariusz",
"",
"LRI"
],
[
"Tixeuil",
"Sébastien",
"",
"INRIA Futurs, LIP6"
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.3861 | Jarek Duda | Jarek Duda | Optimal encoding on discrete lattice with translational invariant
constrains using statistical algorithms | 39 pages, 8 figures Submitted to IEEE Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper will be presented methodology of encoding information in
valuations of discrete lattice with some translational invariant constrains in
asymptotically optimal way. The method is based on finding statistical
description of such valuations and changing it into statistical algorithm,
which allows to construct deterministically valuation with given statistics.
Optimal statistics allow to generate valuations with uniform distribution - we
get maximum information capacity this way. It will be shown that we can reach
the optimum for one-dimensional models using maximal entropy random walk and
that for the general case we can practically get as close to the capacity of
the model as we want (found numerically: lost 10^{-10} bit/node for Hard
Square). There will be also presented simpler alternative to arithmetic coding
method which can be used as cryptosystem and data correction method too.
| [
{
"version": "v1",
"created": "Sat, 20 Oct 2007 18:00:57 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Dec 2007 14:31:09 GMT"
},
{
"version": "v3",
"created": "Sun, 23 Mar 2008 20:39:09 GMT"
},
{
"version": "v4",
"created": "Thu, 23 Oct 2008 08:20:17 GMT"
},
{
"version": "v5",
"created": "Sun, 2 Nov 2008 20:09:14 GMT"
}
] | 2008-11-02T00:00:00 | [
[
"Duda",
"Jarek",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.3888 | Oren Somekh | Shlomo Shamai, Oren Somekh, Osvaldo Simeone, Amichai Sanderovich,
Benjamin M. Zaidel, H. Vincent Poor | Cooperative Multi-Cell Networks: Impact of Limited-Capacity Backhaul and
Inter-Users Links | null | In the Proceedings of the Joint Workshop on Coding and
Communications, Durnstein, Austria, Oct. 14-16 2007 | null | null | cs.IT math.IT | null | Cooperative technology is expected to have a great impact on the performance
of cellular or, more generally, infrastructure networks. Both multicell
processing (cooperation among base stations) and relaying (cooperation at the
user level) are currently being investigated. In this presentation, recent
results regarding the performance of multicell processing and user cooperation
under the assumption of limited-capacity interbase station and inter-user
links, respectively, are reviewed. The survey focuses on related results
derived for non-fading uplink and downlink channels of simple cellular system
models. The analytical treatment, facilitated by these simple setups, enhances
the insight into the limitations imposed by limited-capacity constraints on the
gains achievable by cooperative techniques.
| [
{
"version": "v1",
"created": "Sat, 20 Oct 2007 22:46:49 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Shamai",
"Shlomo",
""
],
[
"Somekh",
"Oren",
""
],
[
"Simeone",
"Osvaldo",
""
],
[
"Sanderovich",
"Amichai",
""
],
[
"Zaidel",
"Benjamin M.",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.3901 | Christophe Paul | Derek Corneil and Michel Habib and Christophe Paul and Marc Tedder | A recursive linear time modular decomposition algorithm via LexBFS | An EA of this work appeared in ICALP'08. The arXiv v2 contains an
appendix with some sketches of proofs. To date, complete proofs can only be
found in the PhD of M. Tedder and spread over several chapters. This is the
first self-contained version. To ease the understanding, the noveI
presentation enlights the combinatorial objects involved in the algorithm,
which still relies on the same ideas | null | null | null | cs.DM | http://creativecommons.org/licenses/by/4.0/ | A module of a graph G is a set of vertices that have the same set of
neighbours outside. Modules of a graphs form a so-called partitive family and
thereby can be represented by a unique tree MD(G), called the modular
decomposition tree. Motivated by the central role of modules in numerous
algorithmic graph theory questions, the problem of efficiently computing MD(G)
has been investigated since the early 70's. To date the best algorithms run in
linear time but are all rather complicated. By combining previous algorithmic
paradigms developed for the problem, we are able to present a simpler
linear-time that relies on very simple data-structures, namely slice
decomposition and sequences of rooted ordered trees.
| [
{
"version": "v1",
"created": "Sun, 21 Oct 2007 03:30:05 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Mar 2008 09:49:23 GMT"
},
{
"version": "v3",
"created": "Fri, 1 Mar 2024 16:03:35 GMT"
}
] | 2024-03-04T00:00:00 | [
[
"Corneil",
"Derek",
""
],
[
"Habib",
"Michel",
""
],
[
"Paul",
"Christophe",
""
],
[
"Tedder",
"Marc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0710.3916 | Bernard Cousin | Wojtek Bigos (IRISA), St\'ephane Gosselin (IRISA), Bernard Cousin
(IRISA), Morgane Le Foll (IRISA), Hisao Nakajima (IRISA) | Optimized Design of Survivable MPLS over Optical Transport Networks.
Optical Switching and Networking | null | Optical Switching and Networking 3, 3-4 (2006) 202-218 | 10.1016/j.osn.2006.08.001 | null | cs.NI cs.PF | null | In this paper we study different options for the survivability implementation
in MPLS over Optical Transport Networks in terms of network resource usage and
configuration cost. We investigate two approaches to the survivability
deployment: single layer and multilayer survivability and present various
methods for spare capacity allocation (SCA) to reroute disrupted traffic. The
comparative analysis shows the influence of the traffic granularity on the
survivability cost: for high bandwidth LSPs, close to the optical channel
capacity, the multilayer survivability outperforms the single layer one,
whereas for low bandwidth LSPs the single layer survivability is more
cost-efficient. For the multilayer survivability we demonstrate that by mapping
efficiently the spare capacity of the MPLS layer onto the resources of the
optical layer one can achieve up to 22% savings in the total configuration cost
and up to 37% in the optical layer cost. Further savings (up to 9 %) in the
wavelength use can be obtained with the integrated approach to network
configuration over the sequential one, however, at the increase in the
optimization problem complexity. These results are based on a cost model with
actual technology pricing and were obtained for networks targeted to a
nationwide coverage.
| [
{
"version": "v1",
"created": "Sun, 21 Oct 2007 09:40:38 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Bigos",
"Wojtek",
"",
"IRISA"
],
[
"Gosselin",
"Stéphane",
"",
"IRISA"
],
[
"Cousin",
"Bernard",
"",
"IRISA"
],
[
"Foll",
"Morgane Le",
"",
"IRISA"
],
[
"Nakajima",
"Hisao",
"",
"IRISA"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0710.3917 | Bernard Cousin | Hamza Drid (IRISA), Bernard Cousin (IRISA), Miklos Molnar (IRISA) | Heuristic Solution to Protect Communications in WDM Networks using
P-cycles | null | Workshop on Traffic Engineering, Protection and Restoration for
Futur Generation Internet, Oslo : Norv\`ege (2007) | null | null | cs.NI | null | Optical WDM mesh networks are able to transport huge amount of information.
The use of such technology however poses the problem of protection against
failures such as fibre cuts. One of the principal methods for link protection
used in optical WDM networks is pre-configured protection cycle (p-cycle). The
major problem of this method of protection resides in finding the optimal set
of p-cycles which protect the network for a given distribution of working
capacity. Existing heuristics generate a large set of p-cycle candidates which
are entirely independent of the network state, and from then the good sub-set
of p-cycles which will protect the network is selected. In this paper, we
propose a new algorithm of generation of p-cycles based on the incremental
aggregation of the shortest cycles. Our generation of p-cycles depends on the
state of the network. This enables us to choose an efficient set of p-cycles
which will protect the network. The set of p-cycles that we generate is the
final set which will protect the network, in other words our heuristic does not
go through the additional step of p-cycle selection
| [
{
"version": "v1",
"created": "Sun, 21 Oct 2007 09:48:01 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Drid",
"Hamza",
"",
"IRISA"
],
[
"Cousin",
"Bernard",
"",
"IRISA"
],
[
"Molnar",
"Miklos",
"",
"IRISA"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.3918 | Bernard Cousin | Simon Gyula (IRISA), Miklos Molnar (IRISA), Laszlo Gonczy (IRISA),
Bernard Cousin (IRISA) | Dependable k-coverage algorithms for sensor networks | null | Dans Instrumentation and Measurement Technology Conference
Proceedings - IEEE Instrumentation and Measurement Technology Conference,
Varsovie : Pologne (2007) | 10.1109/IMTC.2007.379153 | null | cs.NI | null | Redundant sensing capabilities are often required in sensor network
applications due to various reasons, e.g. robustness, fault tolerance, or
increased accuracy. At the same time high sensor redundancy offers the
possibility of increasing network lifetime by scheduling sleep intervals for
some sensors and still providing continuous service with help of the remaining
active sensors. In this paper centralized and distributed algorithms are
proposed to solve the k-coverage sensing problem and maximize network lifetime.
When physically possible, the proposed robust Controlled Greedy Sleep Algorithm
provides guaranteed service independently of node and communication errors in
the network. The performance of the algorithm is illustrated and compared to
results of a random solution by simulation examples.
| [
{
"version": "v1",
"created": "Sun, 21 Oct 2007 09:48:42 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Gyula",
"Simon",
"",
"IRISA"
],
[
"Molnar",
"Miklos",
"",
"IRISA"
],
[
"Gonczy",
"Laszlo",
"",
"IRISA"
],
[
"Cousin",
"Bernard",
"",
"IRISA"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.3928 | Sonny Ben-Shimon | Sonny Ben-Shimon and Dan Vilenchik | Message passing for the coloring problem: Gallager meets Alon and Kahale | 11 pages | DMTCS Proceedings of the 13th Annual Conference on Analysis of
Algorithms (AofA'07), Juan-les-pins, France, 2007. pp. 217--226. | null | null | math.CO cs.DM math.PR | null | Message passing algorithms are popular in many combinatorial optimization
problems. For example, experimental results show that {\em survey propagation}
(a certain message passing algorithm) is effective in finding proper
$k$-colorings of random graphs in the near-threshold regime. In 1962 Gallager
introduced the concept of Low Density Parity Check (LDPC) codes, and suggested
a simple decoding algorithm based on message passing. In 1994 Alon and Kahale
exhibited a coloring algorithm and proved its usefulness for finding a
$k$-coloring of graphs drawn from a certain planted-solution distribution over
$k$-colorable graphs. In this work we show an interpretation of Alon and
Kahale's coloring algorithm in light of Gallager's decoding algorithm, thus
showing a connection between the two problems - coloring and decoding. This
also provides a rigorous evidence for the usefulness of the message passing
paradigm for the graph coloring problem. Our techniques can be applied to
several other combinatorial optimization problems and networking-related
issues.
| [
{
"version": "v1",
"created": "Sun, 21 Oct 2007 13:29:06 GMT"
}
] | 2008-11-17T00:00:00 | [
[
"Ben-Shimon",
"Sonny",
""
],
[
"Vilenchik",
"Dan",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0710.3955 | Massimiliano Laddomada Ph.D. | F. Daneshgaran, Massimiliano Laddomada, F. Mesiti, M. Mondin | On the Behavior of the Distributed Coordination Function of IEEE 802.11
with Multirate Capability under General Transmission Conditions | Submitted to IEEE Transactions on Wireless Communications, October
21, 2007 | null | null | null | cs.NI cs.PF | null | The aim of this paper is threefold. First, it presents a multi-dimensional
Markovian state transition model characterizing the behavior of the IEEE 802.11
protocol at the Medium Access Control layer which accounts for packet
transmission failures due to channel errors modeling both saturated and
non-saturated traffic conditions. Second, it provides a throughput analysis of
the IEEE 802.11 protocol at the data link layer in both saturated and
non-saturated traffic conditions taking into account the impact of both the
physical propagation channel and multirate transmission in Rayleigh fading
environment. The general traffic model assumed is M/M/1/K. Finally, it shows
that the behavior of the throughput in non-saturated traffic conditions is a
linear combination of two system parameters; the payload size and the packet
rates, $\lambda^{(s)}$, of each contending station. The validity interval of
the proposed model is also derived.
Simulation results closely match the theoretical derivations, confirming the
effectiveness of the proposed models.
| [
{
"version": "v1",
"created": "Sun, 21 Oct 2007 22:59:27 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Daneshgaran",
"F.",
""
],
[
"Laddomada",
"Massimiliano",
""
],
[
"Mesiti",
"F.",
""
],
[
"Mondin",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0710.3961 | Victor Korotkikh | Victor Korotkikh and Galina Korotkikh | On a New Type of Information Processing for Efficient Management of
Complex Systems | 5 pages, 2 figures, to be presented at the International Conference
on Complex Systems, Boston, October 28 - November 2, 2007 | null | null | null | cs.CC | null | It is a challenge to manage complex systems efficiently without confronting
NP-hard problems. To address the situation we suggest to use self-organization
processes of prime integer relations for information processing.
Self-organization processes of prime integer relations define correlation
structures of a complex system and can be equivalently represented by
transformations of two-dimensional geometrical patterns determining the
dynamics of the system and revealing its structural complexity. Computational
experiments raise the possibility of an optimality condition of complex systems
presenting the structural complexity of a system as a key to its optimization.
From this perspective the optimization of a system could be all about the
control of the structural complexity of the system to make it consistent with
the structural complexity of the problem. The experiments also indicate that
the performance of a complex system may behave as a concave function of the
structural complexity. Therefore, once the structural complexity could be
controlled as a single entity, the optimization of a complex system would be
potentially reduced to a one-dimensional concave optimization irrespective of
the number of variables involved its description. This might open a way to a
new type of information processing for efficient management of complex systems.
| [
{
"version": "v1",
"created": "Mon, 22 Oct 2007 01:10:02 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Korotkikh",
"Victor",
""
],
[
"Korotkikh",
"Galina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0710.3974 | Akshay Kashyap | Akshay Kashyap, Luis Alfonso Lastras-Monta\~no, Cathy Xia, Zhen Liu | Distributed source coding in dense sensor networks | This is an extended version of the paper which appeared in the
proceedings of, and was presented at, DCC 2005 | null | null | null | cs.IT math.IT | null | We study the problem of the reconstruction of a Gaussian field defined in
[0,1] using N sensors deployed at regular intervals. The goal is to quantify
the total data rate required for the reconstruction of the field with a given
mean square distortion. We consider a class of two-stage mechanisms which a)
send information to allow the reconstruction of the sensor's samples within
sufficient accuracy, and then b) use these reconstructions to estimate the
entire field. To implement the first stage, the heavy correlation between the
sensor samples suggests the use of distributed coding schemes to reduce the
total rate. We demonstrate the existence of a distributed block coding scheme
that achieves, for a given fidelity criterion for the reconstruction of the
field, a total information rate that is bounded by a constant, independent of
the number $N$ of sensors. The constant in general depends on the
autocorrelation function of the field and the desired distortion criterion for
the sensor samples. We then describe a scheme which can be implemented using
only scalar quantizers at the sensors, without any use of distributed source
coding, and which also achieves a total information rate that is a constant,
independent of the number of sensors. While this scheme operates at a rate that
is greater than the rate achievable through distributed coding and entails
greater delay in reconstruction, its simplicity makes it attractive for
implementation in sensor networks.
| [
{
"version": "v1",
"created": "Mon, 22 Oct 2007 04:14:34 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Kashyap",
"Akshay",
""
],
[
"Lastras-Montaño",
"Luis Alfonso",
""
],
[
"Xia",
"Cathy",
""
],
[
"Liu",
"Zhen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.3979 | William Yurcik | William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani
Thuraisingham | Toward Trusted Sharing of Network Packet Traces Using Anonymization:
Single-Field Privacy/Analysis Tradeoffs | 8 pages,1 figure, 4 tables | null | null | null | cs.CR cs.NI | null | Network data needs to be shared for distributed security analysis.
Anonymization of network data for sharing sets up a fundamental tradeoff
between privacy protection versus security analysis capability. This
privacy/analysis tradeoff has been acknowledged by many researchers but this is
the first paper to provide empirical measurements to characterize the
privacy/analysis tradeoff for an enterprise dataset. Specifically we perform
anonymization options on single-fields within network packet traces and then
make measurements using intrusion detection system alarms as a proxy for
security analysis capability. Our results show: (1) two fields have a zero sum
tradeoff (more privacy lessens security analysis and vice versa) and (2) eight
fields have a more complex tradeoff (that is not zero sum) in which both
privacy and analysis can both be simultaneously accomplished.
| [
{
"version": "v1",
"created": "Mon, 22 Oct 2007 19:18:11 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Oct 2007 14:55:08 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Yurcik",
"William",
""
],
[
"Woolam",
"Clay",
""
],
[
"Hellings",
"Greg",
""
],
[
"Khan",
"Latifur",
""
],
[
"Thuraisingham",
"Bhavani",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.4031 | Amy Glen | Alexandre Blondin-Mass\'e, Srecko Brlek, Amy Glen, S\'ebastien Labb\'e | On the critical exponent of generalized Thue-Morse words | 13 pages; to appear in Discrete Mathematics and Theoretical Computer
Science (accepted October 15, 2007) | Discrete Mathematics and Theoretical Computer Science 9 (2007)
293-304 | null | null | math.CO cs.DM | null | For certain generalized Thue-Morse words t, we compute the "critical
exponent", i.e., the supremum of the set of rational numbers that are exponents
of powers in t, and determine exactly the occurrences of powers realizing it.
| [
{
"version": "v1",
"created": "Mon, 22 Oct 2007 12:05:02 GMT"
}
] | 2010-03-16T00:00:00 | [
[
"Blondin-Massé",
"Alexandre",
""
],
[
"Brlek",
"Srecko",
""
],
[
"Glen",
"Amy",
""
],
[
"Labbé",
"Sébastien",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0710.4046 | Alfonso Martinez | Alfonso Martinez, Albert Guillen i Fabregas, Giuseppe Caire, and Frans
Willems | Bit-interleaved coded modulation in the wideband regime | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | The wideband regime of bit-interleaved coded modulation (BICM) in Gaussian
channels is studied. The Taylor expansion of the coded modulation capacity for
generic signal constellations at low signal-to-noise ratio (SNR) is derived and
used to determine the corresponding expansion for the BICM capacity. Simple
formulas for the minimum energy per bit and the wideband slope are given. BICM
is found to be suboptimal in the sense that its minimum energy per bit can be
larger than the corresponding value for coded modulation schemes. The minimum
energy per bit using standard Gray mapping on M-PAM or M^2-QAM is given by a
simple formula and shown to approach -0.34 dB as M increases. Using the low SNR
expansion, a general trade-off between power and bandwidth in the wideband
regime is used to show how a power loss can be traded off against a bandwidth
gain.
| [
{
"version": "v1",
"created": "Mon, 22 Oct 2007 13:07:28 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Martinez",
"Alfonso",
""
],
[
"Fabregas",
"Albert Guillen i",
""
],
[
"Caire",
"Giuseppe",
""
],
[
"Willems",
"Frans",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.4051 | Jamal Najim | Julien Dumont (IGM-LabInfo), W. Hachem (LTCI), Samson Lasaulce,
Philippe Loubaton (IGM-LabInfo), Jamal Najim (LTCI) | On the capacity achieving covariance matrix for Rician MIMO channels: an
asymptotic approach | 56 pp. Extended version of the published article in IEEE Inf. Th.
(march 2010) with more proofs | IEEE Transactions on Information Theory 56, 3 (2010) 1048--1069 | null | null | math.PR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The capacity-achieving input covariance matrices for coherent block-fading
correlated MIMO Rician channels are determined. In this case, no closed-form
expressions for the eigenvectors of the optimum input covariance matrix are
available. An approximation of the average mutual information is evaluated in
this paper in the asymptotic regime where the number of transmit and receive
antennas converge to $+\infty$. New results related to the accuracy of the
corresponding large system approximation are provided. An attractive
optimization algorithm of this approximation is proposed and we establish that
it yields an effective way to compute the capacity achieving covariance matrix
for the average mutual information. Finally, numerical simulation results show
that, even for a moderate number of transmit and receive antennas, the new
approach provides the same results as direct maximization approaches of the
average mutual information, while being much more computationally attractive.
| [
{
"version": "v1",
"created": "Mon, 22 Oct 2007 13:27:21 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Jul 2010 10:03:00 GMT"
}
] | 2011-06-07T00:00:00 | [
[
"Dumont",
"Julien",
"",
"IGM-LabInfo"
],
[
"Hachem",
"W.",
"",
"LTCI"
],
[
"Lasaulce",
"Samson",
"",
"IGM-LabInfo"
],
[
"Loubaton",
"Philippe",
"",
"IGM-LabInfo"
],
[
"Najim",
"Jamal",
"",
"LTCI"
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.4076 | Ioannis Kontoyiannis | Ioannis Kontoyiannis | Some information-theoretic computations related to the distribution of
prime numbers | 10 pages; see also http://pages.cs.aueb.gr/users/yiannisk/ | null | null | null | cs.IT math.IT math.NT math.PR | null | We illustrate how elementary information-theoretic ideas may be employed to
provide proofs for well-known, nontrivial results in number theory.
Specifically, we give an elementary and fairly short proof of the following
asymptotic result: The sum of (log p)/p, taken over all primes p not exceeding
n, is asymptotic to log n as n tends to infinity. We also give finite-n bounds
refining the above limit. This result, originally proved by Chebyshev in 1852,
is closely related to the celebrated prime number theorem.
| [
{
"version": "v1",
"created": "Mon, 22 Oct 2007 14:32:18 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Nov 2007 00:14:19 GMT"
}
] | 2007-11-06T00:00:00 | [
[
"Kontoyiannis",
"Ioannis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0710.4105 | Tie Liu | Tie Liu and Shlomo Shamai (Shitz) | A Note on the Secrecy Capacity of the Multi-antenna Wiretap Channel | 10 pages, 0 figures | null | null | null | cs.IT math.IT | null | Recently, the secrecy capacity of the multi-antenna wiretap channel was
characterized by Khisti and Wornell [1] using a Sato-like argument. This note
presents an alternative characterization using a channel enhancement argument.
This characterization relies on an extremal entropy inequality recently proved
in the context of multi-antenna broadcast channels, and is directly built on
the physical intuition regarding to the optimal transmission strategy in this
communication scenario.
| [
{
"version": "v1",
"created": "Mon, 22 Oct 2007 16:59:13 GMT"
}
] | 2007-10-23T00:00:00 | [
[
"Liu",
"Tie",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.4117 | Ioannis Kontoyiannis | Yun Gao, Ioannis Kontoyiannis and Elie Bienenstock | From the entropy to the statistical structure of spike trains | null | In Proceedings of the 2006 International Symposium on Information
Theory, Seattle, WA, July 2006 | null | null | q-bio.NC cs.IT math.IT math.PR stat.AP | null | We use statistical estimates of the entropy rate of spike train data in order
to make inferences about the underlying structure of the spike train itself. We
first examine a number of different parametric and nonparametric estimators
(some known and some new), including the ``plug-in'' method, several versions
of Lempel-Ziv-based compression algorithms, a maximum likelihood estimator
tailored to renewal processes, and the natural estimator derived from the
Context-Tree Weighting method (CTW). The theoretical properties of these
estimators are examined, several new theoretical results are developed, and all
estimators are systematically applied to various types of synthetic data and
under different conditions.
Our main focus is on the performance of these entropy estimators on the
(binary) spike trains of 28 neurons recorded simultaneously for a one-hour
period from the primary motor and dorsal premotor cortices of a monkey. We show
how the entropy estimates can be used to test for the existence of long-term
structure in the data, and we construct a hypothesis test for whether the
renewal process model is appropriate for these spike trains. Further, by
applying the CTW algorithm we derive the maximum a posterior (MAP) tree model
of our empirical data, and comment on the underlying structure it reveals.
| [
{
"version": "v1",
"created": "Mon, 22 Oct 2007 18:14:17 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Oct 2007 19:15:01 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Mar 2008 13:51:43 GMT"
}
] | 2008-03-27T00:00:00 | [
[
"Gao",
"Yun",
""
],
[
"Kontoyiannis",
"Ioannis",
""
],
[
"Bienenstock",
"Elie",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0710.4180 | Akisato Kimura | Akisato Kimura, Kunio Kashino, Takayuki Kurozumi, Hiroshi Murase | A quick search method for audio signals based on a piecewise linear
representation of feature trajectories | 20 pages, to appear in IEEE Transactions on Audio, Speech and
Language Processing | IEEE Transactions on Audio, Speech and Language Processing,
Vol.16, No.2, pp.396-407, February 2008. | 10.1109/TASL.2007.912362 | null | cs.MM cs.DB | null | This paper presents a new method for a quick similarity-based search through
long unlabeled audio streams to detect and locate audio clips provided by
users. The method involves feature-dimension reduction based on a piecewise
linear representation of a sequential feature trajectory extracted from a long
audio stream. Two techniques enable us to obtain a piecewise linear
representation: the dynamic segmentation of feature trajectories and the
segment-based Karhunen-L\'{o}eve (KL) transform. The proposed search method
guarantees the same search results as the search method without the proposed
feature-dimension reduction method in principle. Experiment results indicate
significant improvements in search speed. For example the proposed method
reduced the total search time to approximately 1/12 that of previous methods
and detected queries in approximately 0.3 seconds from a 200-hour audio
database.
| [
{
"version": "v1",
"created": "Tue, 23 Oct 2007 03:06:53 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Kimura",
"Akisato",
""
],
[
"Kashino",
"Kunio",
""
],
[
"Kurozumi",
"Takayuki",
""
],
[
"Murase",
"Hiroshi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0710.4182 | Roman Ilin | Roman Ilin, Robert Kozma, Paul J. Werbos | Beyond Feedforward Models Trained by Backpropagation: a Practical
Training Tool for a More Efficient Universal Approximator | null | null | null | null | cs.NE | null | Cellular Simultaneous Recurrent Neural Network (SRN) has been shown to be a
function approximator more powerful than the MLP. This means that the
complexity of MLP would be prohibitively large for some problems while SRN
could realize the desired mapping with acceptable computational constraints.
The speed of training of complex recurrent networks is crucial to their
successful application. Present work improves the previous results by training
the network with extended Kalman filter (EKF). We implemented a generic
Cellular SRN and applied it for solving two challenging problems: 2D maze
navigation and a subset of the connectedness problem. The speed of convergence
has been improved by several orders of magnitude in comparison with the earlier
results in the case of maze navigation, and superior generalization has been
demonstrated in the case of connectedness. The implications of this
improvements are discussed.
| [
{
"version": "v1",
"created": "Tue, 23 Oct 2007 03:43:57 GMT"
}
] | 2007-10-24T00:00:00 | [
[
"Ilin",
"Roman",
""
],
[
"Kozma",
"Robert",
""
],
[
"Werbos",
"Paul J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0710.4187 | Akisato Kimura | Akisato Kimura, Tomohiko Uyematsu, Shigeaki Kuzuoka | Universal coding for correlated sources with complementary delivery | 18 pages, some of the material in this manuscript has been already
published in IEICE Transactions on Fundamentals, September 2007. Several
additional results are also included | IEICE Transactions on Fundamentals, Vol.E90-A, No.9, pp.1840-1847,
September 2007 | 10.1093/ietfec/e90-a.9.1840 | null | cs.IT math.IT | null | This paper deals with a universal coding problem for a certain kind of
multiterminal source coding system that we call the complementary delivery
coding system. In this system, messages from two correlated sources are jointly
encoded, and each decoder has access to one of the two messages to enable it to
reproduce the other message. Both fixed-to-fixed length and fixed-to-variable
length lossless coding schemes are considered. Explicit constructions of
universal codes and bounds of the error probabilities are clarified via
type-theoretical and graph-theoretical analyses. [[Keywords]] multiterminal
source coding, complementary delivery, universal coding, types of sequences,
bipartite graphs
| [
{
"version": "v1",
"created": "Tue, 23 Oct 2007 04:35:07 GMT"
}
] | 2007-10-24T00:00:00 | [
[
"Kimura",
"Akisato",
""
],
[
"Uyematsu",
"Tomohiko",
""
],
[
"Kuzuoka",
"Shigeaki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.4231 | Yoshiharu Maeno | Yoshiharu Maeno, and Yukio Ohsawa | Analyzing covert social network foundation behind terrorism disaster | 17pages, 10 figures, submitted to Int. J. Services Sciences | International Journal of Services Sciences Vol.2, pp.125-141
(2009) | 10.1504/IJSSCI.2009.024936 | null | cs.AI | null | This paper addresses a method to analyze the covert social network foundation
hidden behind the terrorism disaster. It is to solve a node discovery problem,
which means to discover a node, which functions relevantly in a social network,
but escaped from monitoring on the presence and mutual relationship of nodes.
The method aims at integrating the expert investigator's prior understanding,
insight on the terrorists' social network nature derived from the complex graph
theory, and computational data processing. The social network responsible for
the 9/11 attack in 2001 is used to execute simulation experiment to evaluate
the performance of the method.
| [
{
"version": "v1",
"created": "Tue, 23 Oct 2007 10:40:55 GMT"
}
] | 2010-09-28T00:00:00 | [
[
"Maeno",
"Yoshiharu",
""
],
[
"Ohsawa",
"Yukio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0710.4255 | Peter Rost | P. Rost and G. Fettweis | Analysis of a Mixed Strategy for Multiple Relay Networks | submitted to IEEE Tran. Inform. Theory | null | null | null | cs.IT math.IT | null | In their landmark paper Cover and El Gamal proposed different coding
strategies for the relay channel with a single relay supporting a communication
pair. These strategies are the decode-and-forward and compress-and-forward
approach, as well as a general lower bound on the capacity of a relay network
which relies on the mixed application of the previous two strategies. So far,
only parts of their work - the decode-and-forward and the compress-and-forward
strategy - have been applied to networks with multiple relays.
This paper derives a mixed strategy for multiple relay networks using a
combined approach of partial decode-and-forward with N +1 levels and the ideas
of successive refinement with different side information at the receivers.
After describing the protocol structure, we present the achievable rates for
the discrete memoryless relay channel as well as Gaussian multiple relay
networks. Using these results we compare the mixed strategy with some special
cases, e. g., multilevel decode-and-forward, distributed compress-and-forward
and a mixed approach where one relay node operates in decode-and-forward and
the other in compress-and-forward mode.
| [
{
"version": "v1",
"created": "Tue, 23 Oct 2007 12:36:25 GMT"
}
] | 2007-10-24T00:00:00 | [
[
"Rost",
"P.",
""
],
[
"Fettweis",
"G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.4261 | Bernard Cousin | Wojtek Bigos (FT R&D), Bernard Cousin (IRISA), St\'ephane Gosselin (FT
R&D), Morgane Le Foll (FT R&D), Hisao Nakajima (FT R&D) | Survivable MPLS Over Optical Transport Networks: Cost and Resource Usage
Analysis | null | IEEE Journal on Selected Areas in Communications 25, 5 (2007)
949-962 | 10.1109/JSAC.2007.070608 | null | cs.NI cs.PF | null | In this paper we study different options for the survivability implementation
in MPLS over Optical Transport Networks (OTN) in terms of network resource
usage and configuration cost. We investigate two approaches to the
survivability deployment: single layer and multilayer survivability and present
various methods for spare capacity allocation (SCA) to reroute disrupted
traffic. The comparative analysis shows the influence of the offered traffic
granularity and the physical network structure on the survivability cost: for
high bandwidth LSPs, close to the optical channel capacity, the multilayer
survivability outperforms the single layer one, whereas for low bandwidth LSPs
the single layer survivability is more cost-efficient. On the other hand,
sparse networks of low connectivity parameter use more wavelengths for optical
path routing and increase the configuration cost, as compared with dense
networks. We demonstrate that by mapping efficiently the spare capacity of the
MPLS layer onto the resources of the optical layer one can achieve up to 22%
savings in the total configuration cost and up to 37% in the optical layer
cost. Further savings (up to 9 %) in the wavelength use can be obtained with
the integrated approach to network configuration over the sequential one,
however, at the increase in the optimization problem complexity. These results
are based on a cost model with different cost variations, and were obtained for
networks targeted to a nationwide coverage.
| [
{
"version": "v1",
"created": "Tue, 23 Oct 2007 11:25:44 GMT"
}
] | 2007-10-24T00:00:00 | [
[
"Bigos",
"Wojtek",
"",
"FT R&D"
],
[
"Cousin",
"Bernard",
"",
"IRISA"
],
[
"Gosselin",
"Stéphane",
"",
"FT\n R&D"
],
[
"Foll",
"Morgane Le",
"",
"FT R&D"
],
[
"Nakajima",
"Hisao",
"",
"FT R&D"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0710.4272 | Leslie Ann Goldberg | Martin Dyer, Leslie Ann Goldberg and Mark Jerrum | An approximation trichotomy for Boolean #CSP | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a trichotomy theorem for the complexity of approximately counting the
number of satisfying assignments of a Boolean CSP instance. Such problems are
parameterised by a constraint language specifying the relations that may be
used in constraints. If every relation in the constraint language is affine
then the number of satisfying assignments can be exactly counted in polynomial
time. Otherwise, if every relation in the constraint language is in the
co-clone IM_2 from Post's lattice, then the problem of counting satisfying
assignments is complete with respect to approximation-preserving reductions in
the complexity class #RH\Pi_1. This means that the problem of approximately
counting satisfying assignments of such a CSP instance is equivalent in
complexity to several other known counting problems, including the problem of
approximately counting the number of independent sets in a bipartite graph. For
every other fixed constraint language, the problem is complete for #P with
respect to approximation-preserving reductions, meaning that there is no fully
polynomial randomised approximation scheme for counting satisfying assignments
unless NP=RP.
| [
{
"version": "v1",
"created": "Tue, 23 Oct 2007 14:35:05 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Jul 2009 21:14:30 GMT"
}
] | 2009-07-23T00:00:00 | [
[
"Dyer",
"Martin",
""
],
[
"Goldberg",
"Leslie Ann",
""
],
[
"Jerrum",
"Mark",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0710.4318 | Evelyne Hubert | Evelyne Hubert | Differential invariants of a Lie group action: syzygies on a generating
set | Journal of Symbolic Computation (2008) | null | 10.1016/j.jsc.2008.08.003 | null | cs.SC math.DG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a group action, known by its infinitesimal generators, we exhibit a
complete set of syzygies on a generating set of differential invariants. For
that we elaborate on the reinterpretation of Cartan's moving frame by Fels and
Olver (1999). This provides constructive tools for exploring algebras of
differential invariants.
| [
{
"version": "v1",
"created": "Tue, 23 Oct 2007 19:20:10 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Dec 2007 15:49:21 GMT"
},
{
"version": "v3",
"created": "Thu, 4 Sep 2008 15:06:25 GMT"
},
{
"version": "v4",
"created": "Mon, 3 Nov 2008 10:42:30 GMT"
}
] | 2008-11-03T00:00:00 | [
[
"Hubert",
"Evelyne",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
}
] |
0710.4410 | Paul Zimmermann | Richard Brent, Paul Zimmermann (INRIA Lorraine - LORIA) | A Multi-level Blocking Distinct Degree Factorization Algorithm | null | Contemporary Mathematics 461 (2008) 47-58 | null | INRIA Tech. Report RR-6331, Oct. 2007 | cs.DS | null | We give a new algorithm for performing the distinct-degree factorization of a
polynomial P(x) over GF(2), using a multi-level blocking strategy. The coarsest
level of blocking replaces GCD computations by multiplications, as suggested by
Pollard (1975), von zur Gathen and Shoup (1992), and others. The novelty of our
approach is that a finer level of blocking replaces multiplications by
squarings, which speeds up the computation in GF(2)[x]/P(x) of certain interval
polynomials when P(x) is sparse. As an application we give a fast algorithm to
search for all irreducible trinomials x^r + x^s + 1 of degree r over GF(2),
while producing a certificate that can be checked in less time than the full
search. Naive algorithms cost O(r^2) per trinomial, thus O(r^3) to search over
all trinomials of given degree r. Under a plausible assumption about the
distribution of factors of trinomials, the new algorithm has complexity O(r^2
(log r)^{3/2}(log log r)^{1/2}) for the search over all trinomials of degree r.
Our implementation achieves a speedup of greater than a factor of 560 over the
naive algorithm in the case r = 24036583 (a Mersenne exponent). Using our
program, we have found two new primitive trinomials of degree 24036583 over
GF(2) (the previous record degree was 6972593).
| [
{
"version": "v1",
"created": "Wed, 24 Oct 2007 09:18:33 GMT"
}
] | 2010-04-20T00:00:00 | [
[
"Brent",
"Richard",
"",
"INRIA Lorraine - LORIA"
],
[
"Zimmermann",
"Paul",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0710.4486 | Michel Fliess | Michel Fliess (INRIA Futurs), C\'edric Join (INRIA Futurs, CRAN),
Hebertt Sira-Ramirez | Non-linear estimation is easy | null | Int. J. Modelling Identification and Control 4, 1 (2008) 12-27 | 10.1504/IJMIC.2008.020996 | null | cs.CE cs.NA cs.PF math.AC math.NA math.OC | null | Non-linear state estimation and some related topics, like parametric
estimation, fault diagnosis, and perturbation attenuation, are tackled here via
a new methodology in numerical differentiation. The corresponding basic system
theoretic definitions and properties are presented within the framework of
differential algebra, which permits to handle system variables and their
derivatives of any order. Several academic examples and their computer
simulations, with on-line estimations, are illustrating our viewpoint.
| [
{
"version": "v1",
"created": "Wed, 24 Oct 2007 14:48:39 GMT"
}
] | 2008-11-06T00:00:00 | [
[
"Fliess",
"Michel",
"",
"INRIA Futurs"
],
[
"Join",
"Cédric",
"",
"INRIA Futurs, CRAN"
],
[
"Sira-Ramirez",
"Hebertt",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0710.4499 | Colm \'O D\'unlaing | Colm O. Dunlaing and Natalie Schluter | Remarks on Jurdzinski and Lorys' proof that palindromes are not a
Church-Rosser language | 15 pages | null | null | TCDMATH 07-10 | cs.LO | null | In 2002 Jurdzinski and Lorys settled a long-standing conjecture that
palindromes are not a Church-Rosser language. Their proof required a
sophisticated theory about computation graphs of 2-stack automata. We present
their proof in terms of 1-tape Turing machines.We also provide an alternative
proof of Buntrock and Otto's result that the set of non-square bitstrings,
which is context-free, is not Church-Rosser.
| [
{
"version": "v1",
"created": "Wed, 24 Oct 2007 15:40:32 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Oct 2007 10:15:54 GMT"
}
] | 2007-10-25T00:00:00 | [
[
"Dunlaing",
"Colm O.",
""
],
[
"Schluter",
"Natalie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0710.4508 | Gregorio Malajovich | Felipe Cucker, Teresa Krick, Gregorio Malajovich and Mario Wschebor | A Numerical Algorithm for Zero Counting. I: Complexity and Accuracy | We made minor but necessary improvements in the presentation | Journal of Complexity 24 Issues 5-6, pp 582-605 (Oct-Dec 2008) | 10.1016/j.jco.2008.03.001 | null | cs.CC cs.NA cs.SC math.NA | null | We describe an algorithm to count the number of distinct real zeros of a
polynomial (square) system f. The algorithm performs O(n D kappa(f)) iterations
where n is the number of polynomials (as well as the dimension of the ambient
space), D is a bound on the polynomials' degree, and kappa(f) is a condition
number for the system. Each iteration uses an exponential number of operations.
The algorithm uses finite-precision arithmetic and a polynomial bound for the
precision required to ensure the returned output is correct is exhibited. This
bound is a major feature of our algorithm since it is in contrast with the
exponential precision required by the existing (symbolic) algorithms for
counting real zeros. The algorithm parallelizes well in the sense that each
iteration can be computed in parallel polynomial time with an exponential
number of processors.
| [
{
"version": "v1",
"created": "Wed, 24 Oct 2007 16:33:07 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Mar 2008 20:28:15 GMT"
}
] | 2010-07-12T00:00:00 | [
[
"Cucker",
"Felipe",
""
],
[
"Krick",
"Teresa",
""
],
[
"Malajovich",
"Gregorio",
""
],
[
"Wschebor",
"Mario",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
0710.4516 | Thomas Sch\"urmann | Thomas Sch\"urmann and Peter Grassberger | The predictability of letters in written english | 3 pages, 4 figures | Fractals, Vol. 4, No. 1 (1996) 1-5 | 10.1142/S0218348X96000029 | null | physics.soc-ph cs.CL stat.ML | null | We show that the predictability of letters in written English texts depends
strongly on their position in the word. The first letters are usually the least
easy to predict. This agrees with the intuitive notion that words are well
defined subunits in written languages, with much weaker correlations across
these units than within them. It implies that the average entropy of a letter
deep inside a word is roughly 4 times smaller than the entropy of the first
letter.
| [
{
"version": "v1",
"created": "Wed, 24 Oct 2007 17:23:13 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Oct 2007 16:46:30 GMT"
}
] | 2017-04-24T00:00:00 | [
[
"Schürmann",
"Thomas",
""
],
[
"Grassberger",
"Peter",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0710.4596 | Naoto Morikawa | Naoto Morikawa | Discrete differential geometry of tetrahedrons and encoding of local
protein structure | 12 pages, 9 figures | null | null | null | math.CO cs.CG math.MG q-bio.BM | null | Local protein structure analysis is informative to protein structure analysis
and has been used successfully in protein structure prediction and others.
Proteins have recurring structural features, such as helix caps and beta turns,
which often have strong amino acid sequence preferences. And the challenges for
local structure analysis have been identification and assignment of such common
short structural motifs.
This paper proposes a new mathematical framework that can be applied to
analysis of the local structure of proteins, where local conformations of
protein backbones are described using differential geometry of folded
tetrahedron sequences. Using the framework, we could capture the recurring
structural features without any structural templates, which makes local
structure analysis not only simpler, but also more objective.
Programs and examples are available from http://www.genocript.com .
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 01:16:39 GMT"
}
] | 2007-10-26T00:00:00 | [
[
"Morikawa",
"Naoto",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.BM",
"description": "DNA, RNA, proteins, lipids, etc.; molecular structures and folding kinetics; molecular interactions; single-molecule manipulation.",
"span": "(Biomolecules)"
}
] |
0710.4629 | EDA Publishing Association | Jacob Katz, Ziyad Hanna, Nachum Dershowitz | Space-Efficient Bounded Model Checking | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | 10.1109/DATE.2005.276 | null | cs.LO | null | Current algorithms for bounded model checking use SAT methods for checking
satisfiability of Boolean formulae. These methods suffer from the potential
memory explosion problem. Methods based on the validity of Quantified Boolean
Formulae (QBF) allow an exponentially more succinct representation of formulae
to be checked, because no "unrolling" of the transition relation is required.
These methods have not been widely used, because of the lack of an efficient
decision procedure for QBF. We evaluate the usage of QBF in bounded model
checking (BMC), using general-purpose SAT and QBF solvers. We develop a
special-purpose decision procedure for QBF used in BMC, and compare our
technique with the methods using general-purpose SAT and QBF solvers on
real-life industrial benchmarks.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:06:59 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Katz",
"Jacob",
""
],
[
"Hanna",
"Ziyad",
""
],
[
"Dershowitz",
"Nachum",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0710.4630 | EDA Publishing Association | Trent Mcconaghy, Tom Eeckelaert, Georges Gielen | CAFFEINE: Template-Free Symbolic Model Generation of Analog Circuits via
Canonical Form Functions and Genetic Programming | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | This paper presents a method to automatically generate compact symbolic
performance models of analog circuits with no prior specification of an
equation template. The approach takes SPICE simulation data as input, which
enables modeling of any nonlinear circuits and circuit characteristics. Genetic
programming is applied as a means of traversing the space of possible symbolic
expressions. A grammar is specially designed to constrain the search to a
canonical form for functions. Novel evolutionary search operators are designed
to exploit the structure of the grammar. The approach generates a set of
symbolic models which collectively provide a tradeoff between error and model
complexity. Experimental results show that the symbolic models generated are
compact and easy to understand, making this an effective method for aiding
understanding in analog design. The models also demonstrate better prediction
quality than posynomials.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:07:11 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Mcconaghy",
"Trent",
""
],
[
"Eeckelaert",
"Tom",
""
],
[
"Gielen",
"Georges",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4632 | EDA Publishing Association | Nikolaos Kavvadias, Spiridon Nikolaidis | Hardware Support for Arbitrarily Complex Loop Structures in Embedded
Applications | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | In this paper, the program control unit of an embedded RISC processor is
enhanced with a novel zero-overhead loop controller (ZOLC) supporting arbitrary
loop structures with multiple-entry/exit nodes. The ZOLC has been incorporated
to an open RISC processor core to evaluate the performance of the proposed unit
for alternative configurations of the selected processor. It is proven that
speed improvements of 8.4% to 48.2% are feasible for the used benchmarks.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:07:52 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Kavvadias",
"Nikolaos",
""
],
[
"Nikolaidis",
"Spiridon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4633 | EDA Publishing Association | Bharat Sukhwani, Uday Padmanabhan, Janet M. Wang | Nano-Sim: A Step Wise Equivalent Conductance based Statistical Simulator
for Nanotechnology Circuit Design | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | 10.1109/DATE.2005.221 | null | cs.PF | null | New nanotechnology based devices are replacing CMOS devices to overcome CMOS
technology's scaling limitations. However, many such devices exhibit
non-monotonic I-V characteristics and uncertain properties which lead to the
negative differential resistance (NDR) problem and the chaotic performance.
This paper proposes a new circuit simulation approach that can effectively
simulate nanotechnology devices with uncertain input sources and negative
differential resistance (NDR) problem. The experimental results show a 20-30
times speedup comparing with existing simulators.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:07:46 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Sukhwani",
"Bharat",
""
],
[
"Padmanabhan",
"Uday",
""
],
[
"Wang",
"Janet M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0710.4634 | EDA Publishing Association | Y. Satish Kumar, Jun Li, Claudio Talarico, Janet Wang | A Probabilistic Collocation Method Based Statistical Gate Delay Model
Considering Process Variations and Multiple Input Switching | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | 10.1109/DATE.2005.31 | null | cs.AR | null | Since the advent of new nanotechnologies, the variability of gate delay due
to process variations has become a major concern. This paper proposes a new
gate delay model that includes impact from both process variations and multiple
input switching. The proposed model uses orthogonal polynomial based
probabilistic collocation method to construct a delay analytical equation from
circuit timing performance. From the experimental results, our approach has
less that 0.2% error on the mean delay of gates and less than 3% error on the
standard deviation.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:08:50 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Kumar",
"Y. Satish",
""
],
[
"Li",
"Jun",
""
],
[
"Talarico",
"Claudio",
""
],
[
"Wang",
"Janet",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4635 | EDA Publishing Association | Tadashi Takeuchi | OS Debugging Method Using a Lightweight Virtual Machine Monitor | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.OS | null | Demands for implementing original OSs that can achieve high I/O performance
on PC/AT compatible hardware have recently been increasing, but conventional OS
debugging environments have not been able to simultaneously assure their
stability, be easily customized to new OSs and new I/O devices, and assure
efficient execution of I/O operations. We therefore developed a novel OS
debugging method using a lightweight virtual machine. We evaluated this
debugging method experimentally and confirmed that it can transfer data about
5.4 times as fast as the conventional virtual machine monitor.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:09:07 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Takeuchi",
"Tadashi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0710.4636 | EDA Publishing Association | Stephen J. Mellor, John R. Wolfe, Campbell Mccausland | Why Systems-on-Chip Needs More UML like a Hole in the Head | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | Let's be clear from the outset: SoC can most certainly make use of UML; SoC
just doesn't need more UML, or even all of it. The advent of model mappings,
coupled with marks that indicate which mapping rule to apply, enable a major
simplification of the use of UML in SoC.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:09:23 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Mellor",
"Stephen J.",
""
],
[
"Wolfe",
"John R.",
""
],
[
"Mccausland",
"Campbell",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4637 | EDA Publishing Association | Irith Pomeranz, Sudhakar M. Reddy | The Accidental Detection Index as a Fault Ordering Heuristic for
Full-Scan Circuits | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.OH | null | We investigate a new fault ordering heuristic for test generation in
full-scan circuits. The heuristic is referred to as the accidental detection
index. It associates a value ADI (f) with every circuit fault f. The heuristic
estimates the number of faults that will be detected by a test generated for f.
Fault ordering is done such that a fault with a higher accidental detection
index appears earlier in the ordered fault set and targeted earlier during test
generation. This order is effective for generating compact test sets, and for
obtaining a test set with a steep fault coverage curve. Such a test set has
several applications. We present experimental results to demonstrate the
effectiveness of the heuristic.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:09:39 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Pomeranz",
"Irith",
""
],
[
"Reddy",
"Sudhakar M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0710.4638 | EDA Publishing Association | Sankalp S. Kallakuri, Alex Doboli, Eugene A. Feinberg | Buffer Insertion for Bridges and Optimal Buffer Sizing for Communication
Sub-System of Systems-on-Chip | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | We have presented an optimal buffer sizing and buffer insertion methodology
which uses stochastic models of the architecture and Continuous Time Markov
Decision Processes CTMDPs. Such a methodology is useful in managing the scarce
buffer resources available on chip as compared to network based data
communication which can have large buffer space. The modeling of this problem
in terms of a CT-MDP framework lead to a nonlinear formulation due to usage of
bridges in the bus architecture. We present a methodology to split the problem
into several smaller though linear systems and we then solve these subsystems.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:10:40 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Kallakuri",
"Sankalp S.",
""
],
[
"Doboli",
"Alex",
""
],
[
"Feinberg",
"Eugene A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4639 | EDA Publishing Association | Cristiano Forzan, Davide Pandini | Modeling the Non-Linear Behavior of Library Cells for an Accurate Static
Noise Analysis | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | In signal integrity analysis, the joint effect of propagated noise through
library cells, and of the noise injected on a quiet net by neighboring
switching nets through coupling capacitances, must be considered in order to
accurately estimate the overall noise impact on design functionality and
performances. In this work the impact of the cell non-linearity on the noise
glitch waveform is analyzed in detail, and a new macromodel that allows to
accurately and efficiently modeling the non-linear effects of the victim driver
in noise analysis is presented. Experimental results demonstrate the
effectiveness of our method, and confirm that existing noise analysis
approaches based on linear superposition of the propagated and
crosstalk-injected noise can be highly inaccurate, thus impairing the sign-off
functional verification phase.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:11:06 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Forzan",
"Cristiano",
""
],
[
"Pandini",
"Davide",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4640 | EDA Publishing Association | Ilya Issenin, Nikil Dutt | FORAY-GEN: Automatic Generation of Affine Functions for Memory
Optimizations | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.PL | null | In today's embedded applications a significant portion of energy is spent in
the memory subsystem. Several approaches have been proposed to minimize this
energy, including the use of scratch pad memories, with many based on static
analysis of a program. However, often it is not possible to perform static
analysis and optimization of a program's memory access behavior unless the
program is specifically written for this purpose. In this paper we introduce
the FORAY model of a program that permits aggressive analysis of the
application's memory behavior that further enables such optimizations since it
consists of 'for' loops and array accesses which are easily analyzable. We
present FORAY-GEN: an automated profile-based approach for extraction of the
FORAY model from the original program. We also demonstrate how FORAY-GEN
enhances applicability of other memory subsystem optimization approaches,
resulting in an average of two times increase in the number of memory
references that can be analyzed by existing static approaches.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:11:20 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Issenin",
"Ilya",
""
],
[
"Dutt",
"Nikil",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0710.4641 | EDA Publishing Association | Tim Schattkowsky | UML 2.0 - Overview and Perspectives in SoC Design | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.SE | null | The design productivity gap requires more efficient design methods. Software
systems have faced the same challenge and seem to have mastered it with the
introduction of more abstract design methods. The UML has become the standard
for software systems modeling and thus the foundation of new design methods.
Although the UML is defined as a general purpose modeling language, its
application to hardware and hardware/software codesign is very limited. In
order to successfully apply the UML at these fields, it is essential to
understand its capabilities and to map it to a new domain.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:11:39 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Schattkowsky",
"Tim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0710.4642 | EDA Publishing Association | Shahin Nazarian, Massoud Pedram, Emre Tuncer, Tao Lin, Amir H. Ajami | Modeling and Propagation of Noisy Waveforms in Static Timing Analysis | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | 10.1109/DATE.2005.211 | null | cs.OH | null | A technique based on the sensitivity of the output to input waveform is
presented for accurate propagation of delay information through a gate for the
purpose of static timing analysis (STA) in the presence of noise. Conventional
STA tools represent a waveform by its arrival time and slope. However, this is
not an accurate way of modeling the waveform for the purpose of noise analysis.
The key contribution of our work is the development of a method that allows
efficient propagation of equivalent waveforms throughout the circuit.
Experimental results demonstrate higher accuracy of the proposed
sensitivity-based gate delay propagation technique, SGDP, compared to the best
of existing approaches. SGDP is compatible with the current level of gate
characterization in conventional ASIC cell libraries, and as a result, it can
be easily incorporated into commercial STA tools to improve their accuracy.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:13:59 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Nazarian",
"Shahin",
""
],
[
"Pedram",
"Massoud",
""
],
[
"Tuncer",
"Emre",
""
],
[
"Lin",
"Tao",
""
],
[
"Ajami",
"Amir H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0710.4643 | EDA Publishing Association | Mehrdad Reshadi, Nikil Dutt | Generic Pipelined Processor Modeling and High Performance Cycle-Accurate
Simulator Generation | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | 10.1109/DATE.2005.166 | null | cs.AR cs.PF | null | Detailed modeling of processors and high performance cycle-accurate
simulators are essential for today's hardware and software design. These
problems are challenging enough by themselves and have seen many previous
research efforts. Addressing both simultaneously is even more challenging, with
many existing approaches focusing on one over another. In this paper, we
propose the Reduced Colored Petri Net (RCPN) model that has two advantages:
first, it offers a very simple and intuitive way of modeling pipelined
processors; second, it can generate high performance cycle-accurate simulators.
RCPN benefits from all the useful features of Colored Petri Nets without
suffering from their exponential growth in complexity. RCPN processor models
are very intuitive since they are a mirror image of the processor pipeline
block diagram. Furthermore, in our experiments on the generated cycle-accurate
simulators for XScale and StrongArm processor models, we achieved an order of
magnitude (~15 times) speedup over the popular SimpleScalar ARM simulator.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:14:40 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Reshadi",
"Mehrdad",
""
],
[
"Dutt",
"Nikil",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0710.4644 | EDA Publishing Association | Jurgen Schnerr, Oliver Bringmann, Wolfgang Rosenstiel | Cycle Accurate Binary Translation for Simulation Acceleration in Rapid
Prototyping of SoCs | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | In this paper, the application of a cycle accurate binary translator for
rapid prototyping of SoCs will be presented. This translator generates code to
run on a rapid prototyping system consisting of a VLIW processor and FPGAs. The
generated code is annotated with information that triggers cycle generation for
the hardware in parallel to the execution of the translated program. The VLIW
processor executes the translated program whereas the FPGAs contain the
hardware for the parallel cycle generation and the bus interface that adapts
the bus of the VLIW processor to the SoC bus of the emulated processor core.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:18:14 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Schnerr",
"Jurgen",
""
],
[
"Bringmann",
"Oliver",
""
],
[
"Rosenstiel",
"Wolfgang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4645 | EDA Publishing Association | B. Cheon, E. Lee, L.-T. Wang, X. Wen, P. Hsu, J. Cho, J. Park, H.
Chao, S. Wu | At-Speed Logic BIST for IP Cores | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | This paper describes a flexible logic BIST scheme that features high fault
coverage achieved by fault-simulation guided test point insertion, real
at-speed test capability for multi-clock designs without clock frequency
manipulation, and easy physical implementation due to the use of a low-speed SE
signal. Application results of this scheme to two widely used IP cores are also
reported.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:19:34 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Cheon",
"B.",
""
],
[
"Lee",
"E.",
""
],
[
"Wang",
"L. -T.",
""
],
[
"Wen",
"X.",
""
],
[
"Hsu",
"P.",
""
],
[
"Cho",
"J.",
""
],
[
"Park",
"J.",
""
],
[
"Chao",
"H.",
""
],
[
"Wu",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4646 | EDA Publishing Association | O. Villa, P. Schaumont, I. Verbauwhede, M. Monchiero, G. Palermo | Fast Dynamic Memory Integration in Co-Simulation Frameworks for
Multiprocessor System on-Chip | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | In this paper is proposed a technique to integrate and simulate a dynamic
memory in a multiprocessor framework based on C/C++/SystemC. Using host
machine's memory management capabilities, dynamic data processing is supported
without compromising speed and accuracy of the simulation. A first prototype in
a shared memory context is presented.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:20:27 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Villa",
"O.",
""
],
[
"Schaumont",
"P.",
""
],
[
"Verbauwhede",
"I.",
""
],
[
"Monchiero",
"M.",
""
],
[
"Palermo",
"G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4649 | EDA Publishing Association | Praveen Ghanta, Sarma Vrudhula, Rajendran Panda, Janet Wang | Stochastic Power Grid Analysis Considering Process Variations | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | In this paper, we investigate the impact of interconnect and device process
variations on voltage fluctuations in power grids. We consider random
variations in the power grid's electrical parameters as spatial stochastic
processes and propose a new and efficient method to compute the stochastic
voltage response of the power grid. Our approach provides an explicit
analytical representation of the stochastic voltage response using orthogonal
polynomials in a Hilbert space. The approach has been implemented in a
prototype software called OPERA (Orthogonal Polynomial Expansions for Response
Analysis). Use of OPERA on industrial power grids demonstrated speed-ups of up
to two orders of magnitude. The results also show a significant variation of
about $\pm$ 35% in the nominal voltage drops at various nodes of the power
grids and demonstrate the need for variation-aware power grid analysis.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:24:02 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Ghanta",
"Praveen",
""
],
[
"Vrudhula",
"Sarma",
""
],
[
"Panda",
"Rajendran",
""
],
[
"Wang",
"Janet",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4652 | EDA Publishing Association | Mahmut Kandemir, Guilin Chen | Locality-Aware Process Scheduling for Embedded MPSoCs | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | Utilizing on-chip caches in embedded multiprocessor-system-on-a-chip (MPSoC)
based systems is critical from both performance and power perspectives. While
most of the prior work that targets at optimizing cache behavior are performed
at hardware and compilation levels, operating system (OS) can also play major
role as it sees the global access pattern information across applications. This
paper proposes a cache-conscious OS process scheduling strategy based on data
reuse. The proposed scheduler implements two complementary approaches. First,
the processes that do not share any data between them are scheduled at
different cores if it is possible to do so. Second, the processes that could
not be executed at the same time (due to dependences) but share data among each
other are mapped to the same processor core so that they share the cache
contents. Our experimental results using this new data locality aware OS
scheduling strategy are promising, and show significant improvements in task
completion times.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:31:15 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Kandemir",
"Mahmut",
""
],
[
"Chen",
"Guilin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4653 | EDA Publishing Association | Shervin Sharifi, Javid Jaffari, Mohammad Hosseinabady, Ali
Afzali-Kusha, Zainalabedin Navabi | Simultaneous Reduction of Dynamic and Static Power in Scan Structures | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | Power dissipation during test is a major challenge in testing integrated
circuits. Dynamic power has been the dominant part of power dissipation in CMOS
circuits, however, in future technologies the static portion of power
dissipation will outreach the dynamic portion. This paper proposes an efficient
technique to reduce both dynamic and static power dissipation in scan
structures. Scan cell outputs which are not on the critical path(s) are
multiplexed to fixed values during scan mode. These constant values and primary
inputs are selected such that the transitions occurred on non-multiplexed scan
cells are suppressed and the leakage current during scan mode is decreased. A
method for finding these vectors is also proposed. Effectiveness of this
technique is proved by experiments performed on ISCAS89 benchmark circuits.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:32:08 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Sharifi",
"Shervin",
""
],
[
"Jaffari",
"Javid",
""
],
[
"Hosseinabady",
"Mohammad",
""
],
[
"Afzali-Kusha",
"Ali",
""
],
[
"Navabi",
"Zainalabedin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4654 | EDA Publishing Association | Peng Li, Frank Liu, Xin Li, Lawrence T. Pileggi, Sani R. Nassif | Modeling Interconnect Variability Using Efficient Parametric Model Order
Reduction | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | Assessing IC manufacturing process fluctuations and their impacts on IC
interconnect performance has become unavoidable for modern DSM designs.
However, the construction of parametric interconnect models is often hampered
by the rapid increase in computational cost and model complexity. In this paper
we present an efficient yet accurate parametric model order reduction algorithm
for addressing the variability of IC interconnect performance. The efficiency
of the approach lies in a novel combination of low-rank matrix approximation
and multi-parameter moment matching. The complexity of the proposed parametric
model order reduction is as low as that of a standard Krylov subspace method
when applied to a nominal system. Under the projection-based framework, our
algorithm also preserves the passivity of the resulting parametric models.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:33:14 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Li",
"Peng",
""
],
[
"Liu",
"Frank",
""
],
[
"Li",
"Xin",
""
],
[
"Pileggi",
"Lawrence T.",
""
],
[
"Nassif",
"Sani R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4655 | EDA Publishing Association | Baosheng Wang, Yuejian Wu, Andre Ivanov | A Fast Diagnosis Scheme for Distributed Small Embedded SRAMs | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | This paper proposes a diagnosis scheme aimed at reducing diagnosis time of
distributed small embedded SRAMs (e-SRAMs). This scheme improves the one
proposed in [A parallel built-in self-diagnostic method for embedded memory
buffers, A parallel built-in self-diagnostic method for embedded memory
arrays]. The improvements are mainly two-fold. On one hand, the diagnosis of
time-consuming Data Retention Faults (DRFs), which is neglected by the
diagnosis architecture in [A parallel built-in self-diagnostic method for
embedded memory buffers, A parallel built-in self-diagnostic method for
embedded memory arrays], is now considered and performed via a DFT technique
referred to as the "No Write Recovery Test Mode (NWRTM)". On the other hand, a
pair comprising a Serial to Parallel Converter (SPC) and a Parallel to Serial
Converter (PSC) is utilized to replace the bi-directional serial interface, to
avoid the problems of serial fault masking and defect rate dependent diagnosis.
Results from our evaluations show that the proposed diagnosis scheme achieves
an increased diagnosis coverage and reduces diagnosis time compared to those
obtained in [A parallel built-in self-diagnostic method for embedded memory
buffers, A parallel built-in self-diagnostic method for embedded memory
arrays], with neglectable extra area cost.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:34:09 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Wang",
"Baosheng",
""
],
[
"Wu",
"Yuejian",
""
],
[
"Ivanov",
"Andre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4656 | EDA Publishing Association | Minas Dasygenis, Erik Brockmeyer, Bart Durinck, Francky Catthoor,
Dimitrios Soudris, Antonios Thanailakis | A Memory Hierarchical Layer Assigning and Prefetching Technique to
Overcome the Memory Performance/Energy Bottleneck | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | The memory subsystem has always been a bottleneck in performance as well as
significant power contributor in memory intensive applications. Many
researchers have presented multi-layered memory hierarchies as a means to
design energy and performance efficient systems. However, most of the previous
work do not explore trade-offs systematically. We fill this gap by proposing a
formalized technique that takes into consideration data reuse, limited lifetime
of the arrays of an application and application specific prefetching
opportunities, and performs a thorough trade-off exploration for different
memory layer sizes. This technique has been implemented on a prototype tool,
which was tested successfully using nine real-life applications of industrial
relevance. Following this approach we have able to reduce execution time up to
60%, and energy consumption up to 70%.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:34:32 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Dasygenis",
"Minas",
""
],
[
"Brockmeyer",
"Erik",
""
],
[
"Durinck",
"Bart",
""
],
[
"Catthoor",
"Francky",
""
],
[
"Soudris",
"Dimitrios",
""
],
[
"Thanailakis",
"Antonios",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.