id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0710.4799
EDA Publishing Association
O. Ozturk, H. Saputra, M. Kandemir, I. Kolcu
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.OH
null
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space requirements, power, real-time predictability, and reliability. In particular, many modern embedded systems operate under tight memory space constraints. One way of satisfying these constraints is to compress executable code and data as much as possible. While research on code compression have studied efficient hardware and software based code strategies, many of these techniques do not take application behavior into account, that is, the same compression/decompression strategy is used irrespective of the application being optimized. This paper presents a code compression strategy based on control flow graph (CFG) representation of the embedded program. The idea is to start with a memory image wherein all basic blocks are compressed, and decompress only the blocks that are predicted to be needed in the near future. When the current access to a basic block is over, our approach also decides the point at which the block could be compressed. We propose several compression and decompression strategies that try to reduce memory requirements without excessively increasing the original instruction cycle counts.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 11:54:46 GMT" } ]
2011-11-09T00:00:00
[ [ "Ozturk", "O.", "" ], [ "Saputra", "H.", "" ], [ "Kandemir", "M.", "" ], [ "Kolcu", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0710.4800
EDA Publishing Association
Hala A. Farouk, Magdy Saeb
An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.CR
null
The hybrid hiding encryption algorithm, as its name implies, embraces concepts from both steganography and cryptography. In this exertion, an improved micro-architecture Field Programmable Gate Array (FPGA) implementation of this algorithm is presented. This design overcomes the observed limitations of a previously-designed micro-architecture. These observed limitations are: no exploitation of the possibility of parallel bit replacement, and the fact that the input plaintext was encrypted serially, which caused a dependency between the throughput and the nature of the used secret key. This dependency can be viewed by some as vulnerability in the security of the implemented micro-architecture. The proposed modified micro-architecture is constructed using five basic modules. These modules are; the message cache, the message alignment module, the key cache, the comparator, and at last the encryption module. In this work, we provide comprehensive simulation and implementation results. These are: the timing diagrams, the post-implementation timing and routing reports, and finally the floor plan. Moreover, a detailed comparison with other FPGA implementations is made available and discussed.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 11:55:19 GMT" } ]
2011-11-09T00:00:00
[ [ "Farouk", "Hala A.", "" ], [ "Saeb", "Magdy", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0710.4801
EDA Publishing Association
R. Ruiz-Sautua, M. C. Molina, J. M. Mendias, R. Hermida
Behavioural Transformation to Improve Circuit Performance in High-Level Synthesis
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
Early scheduling algorithms usually adjusted the clock cycle duration to the execution time of the slowest operation. This resulted in large slack times wasted in those cycles executing faster operations. To reduce the wasted times multi-cycle and chaining techniques have been employed. While these techniques have produced successful designs, its effectiveness is often limited due to the area increment that may derive from chaining, and the extra latencies that may derive from multicycling. In this paper we present an optimization method that solves the time-constrained scheduling problem by transforming behavioural specifications into new ones whose subsequent synthesis substantially improves circuit performance. Our proposal breaks up some of the specification operations, allowing their execution during several possibly unconsecutive cycles, and also the calculation of several data-dependent operation fragments in the same cycle. To do so, it takes into account the circuit latency and the execution time of every specification operation. The experimental results carried out show that circuits obtained from the optimized specification are on average 60% faster than those synthesized from the original specification, with only slight increments in the circuit area.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 11:55:59 GMT" } ]
2011-11-09T00:00:00
[ [ "Ruiz-Sautua", "R.", "" ], [ "Molina", "M. C.", "" ], [ "Mendias", "J. M.", "" ], [ "Hermida", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4802
EDA Publishing Association
M. Scholive, V. Beroulle, C. Robach, M. L. Flottes (LIRMM), B. Rouzeyre (LIRMM)
Mutation Sampling Technique for the Generation of Structural Test Data
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.OH
null
Our goal is to produce validation data that can be used as an efficient (pre) test set for structural stuck-at faults. In this paper, we detail an original test-oriented mutation sampling technique used for generating such data and we present a first evaluation on these validation data with regard to a structural test.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 11:56:47 GMT" } ]
2011-11-09T00:00:00
[ [ "Scholive", "M.", "", "LIRMM" ], [ "Beroulle", "V.", "", "LIRMM" ], [ "Robach", "C.", "", "LIRMM" ], [ "Flottes", "M. L.", "", "LIRMM" ], [ "Rouzeyre", "B.", "", "LIRMM" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0710.4803
EDA Publishing Association
R. Elbaz, L. Torres (LIRMM), G. Sassatelli (LIRMM), P. Guillemin, C. Anguille, M. Bardouillet, C. Buatois, J. B. Rigaud
Hardware Engines for Bus Encryption: A Survey of Existing Techniques
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.CR
null
The widening spectrum of applications and services provided by portable and embedded devices bring a new dimension of concerns in security. Most of those embedded systems (pay-TV, PDAs, mobile phones, etc...) make use of external memory. As a result, the main problem is that data and instructions are constantly exchanged between memory (RAM) and CPU in clear form on the bus. This memory may contain confidential data like commercial software or private contents, which either the end-user or the content provider is willing to protect. The goal of this paper is to clearly describe the problem of processor-memory bus communications in this regard and the existing techniques applied to secure the communication channel through encryption - Performance overheads implied by those solutions will be extensively discussed in this paper.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 11:57:22 GMT" } ]
2011-11-09T00:00:00
[ [ "Elbaz", "R.", "", "LIRMM" ], [ "Torres", "L.", "", "LIRMM" ], [ "Sassatelli", "G.", "", "LIRMM" ], [ "Guillemin", "P.", "" ], [ "Anguille", "C.", "" ], [ "Bardouillet", "M.", "" ], [ "Buatois", "C.", "" ], [ "Rigaud", "J. B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0710.4805
EDA Publishing Association
Hannu Heusala, Jussi Liedes
Modeling of a Reconfigurable OFDM IP Block Family For an RF System Simulator
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
The idea of design domain specific Mother Model of IP block family as a base of modeling of system integration is presented here. A common reconfigurable Mother Model for ten different standardized digital OFDM transmitters has been developed. By means of a set of parameters, the mother model can be reconfigured to any of the ten selected standards. So far the applicability of the proposed reconfiguration and analog-digital co-modeling methods have been proved by modeling the function of the digital parts of three, 802.11a, ADSL and DRM, transmitters in an RF system simulator. The model is intended to be used as signal source template in RF system simulations. The concept is not restricted to signal sources, it can be applied to any IP block development. The idea of the Mother Model will be applied in other design domains to prove that in certain application areas, OFDM transceivers in this case, the design process can progress simultaneously in different design domains - mixed signal, system and RTL-architectural - without the need of high-level synthesis. Only the Mother Models of three design domains are needed to be formally proved to function as specified.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 11:57:50 GMT" } ]
2011-11-09T00:00:00
[ [ "Heusala", "Hannu", "" ], [ "Liedes", "Jussi", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4806
EDA Publishing Association
Kris Tiri, Ingrid Verbauwhede
A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
This paper presents a digital VLSI design flow to create secure, side-channel attack (SCA) resistant integrated circuits. The design flow starts from a normal design in a hardware description language such as VHDL or Verilog and provides a direct path to a SCA resistant layout. Instead of a full custom layout or an iterative design process with extensive simulations, a few key modifications are incorporated in a regular synchronous CMOS standard cell design flow. We discuss the basis for side-channel attack resistance and adjust the library databases and constraints files of the synthesis and place & route procedures accordingly. Experimental results show that a DPA attack on a regular single ended CMOS standard cell implementation of a module of the DES algorithm discloses the secret key after 200 measurements. The same attack on a secure version still does not disclose the secret key after more than 2000 measurements.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 11:57:56 GMT" } ]
2011-11-09T00:00:00
[ [ "Tiri", "Kris", "" ], [ "Verbauwhede", "Ingrid", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4807
EDA Publishing Association
G. Chen, M. Kandemir, M. Karakoy
A Constraint Network Based Approach to Memory Layout Optimization
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.PL
null
While loop restructuring based code optimization for array intensive applications has been successful in the past, it has several problems such as the requirement of checking dependences (legality issues) and transformation of all of the array references within the loop body indiscriminately (while some of the references can benefit from the transformation, others may not). As a result, data transformations, i.e., transformations that modify memory layout of array data instead of loop structure have been proposed. One of the problems associated with data transformations is the difficulty of selecting a memory layout for an array that is acceptable to the entire program (not just to a single loop). In this paper, we formulate the problem of determining the memory layouts of arrays as a constraint network, and explore several methods of solution in a systematic way. Our experiments provide strong support in favor of employing constraint processing, and point out future research directions.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 11:59:01 GMT" } ]
2011-11-09T00:00:00
[ [ "Chen", "G.", "" ], [ "Kandemir", "M.", "" ], [ "Karakoy", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0710.4808
EDA Publishing Association
Young-Taek Kim, Taehun Kim, Youngduk Kim, Chulho Shin, Eui-Young Chung, Kyu-Myung Choi, Jeong-Taek Kong, Soo-Kwan Eo
Fast and Accurate Transaction Level Modeling of an Extended AMBA2.0 Bus Architecture
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
Transaction Level Modeling (TLM) approach is used to meet the simulation speed as well as cycle accuracy for large scale SoC performance analysis. We implemented a transaction-level model of a proprietary bus called AHB+ which supports an extended AMBA2.0 protocol. The AHB+ transaction-level model shows 353 times faster than pin-accurate RTL model while maintaining 97% of accuracy on average. We also present the development procedure of TLM of a bus architecture.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 11:59:15 GMT" } ]
2011-11-09T00:00:00
[ [ "Kim", "Young-Taek", "" ], [ "Kim", "Taehun", "" ], [ "Kim", "Youngduk", "" ], [ "Shin", "Chulho", "" ], [ "Chung", "Eui-Young", "" ], [ "Choi", "Kyu-Myung", "" ], [ "Kong", "Jeong-Taek", "" ], [ "Eo", "Soo-Kwan", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4809
EDA Publishing Association
Andres Takach, Bryan Bowyer, Thomas Bollaert
C Based Hardware Design for Wireless Applications
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
The algorithms used in wireless applications are increasingly more sophisticated and consequently more challenging to implement in hardware. Traditional design flows require developing the micro architecture, coding the RTL, and verifying the generated RTL against the original functional C or MATLAB specification. This paper describes a C-based design flow that is well suited for the hardware implementation of DSP algorithms commonly found in wireless applications. The C design flow relies on guided synthesis to generate the RTL directly from the untimed C algorithm. The specifics of the C-based design flow are described using a simple DSP filtering algorithm consisting of a forward adaptive equalizer, a 64-QAM slicer and an adaptive decision feedback equalizer. The example illustrates some of the capabilities and advantages offered by this flow.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 11:59:48 GMT" } ]
2011-11-09T00:00:00
[ [ "Takach", "Andres", "" ], [ "Bowyer", "Bryan", "" ], [ "Bollaert", "Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4810
EDA Publishing Association
Zoya Dyka, Peter Langendoerfer
Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba's Method
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.CR
null
Securing communication channels is especially needed in wireless environments. But applying cipher mechanisms in software is limited by the calculation and energy resources of the mobile devices. If hardware is applied to realize cryptographic operations cost becomes an issue. In this paper we describe an approach which tackles all these three points. We implemented a hardware accelerator for polynomial multiplication in extended Galois fields (GF) applying Karatsuba's method iteratively. With this approach the area consumption is reduced to 2.1 mm^2 in comparison to. 6.2 mm^2 for the standard application of Karatsuba's method i.e. for recursive application. Our approach also reduces the energy consumption to 60 per cent of the original approach. The price we have to pay for these achievement is the increased execution time. In our implementation a polynomial multiplication takes 3 clock cycles whereas the recurisve Karatsuba approach needs only one clock cycle. But considering area, energy and calculation speed we are convinced that the benefits of our approach outweigh its drawback.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:00:04 GMT" } ]
2011-11-09T00:00:00
[ [ "Dyka", "Zoya", "" ], [ "Langendoerfer", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0710.4811
EDA Publishing Association
Massimo Conti, Daniele Moretti
System Level Analysis of the Bluetooth Standard
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.OH
null
The SystemC modules of the Link Manager Layer and Baseband Layer have been designed in this work at behavioral level to analyze the performances of the Bluetooth standard. In particular the probability of the creation of a piconet in presence of noise in the channel and the power reduction using the sniff and hold mode have been investigated.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:00:26 GMT" } ]
2011-11-09T00:00:00
[ [ "Conti", "Massimo", "" ], [ "Moretti", "Daniele", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0710.4812
EDA Publishing Association
Sandro V. Silva, Sergio Bampi
Area and Throughput Trade-Offs in the Design of Pipelined Discrete Wavelet Transform Architectures
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
The JPEG2000 standard defines the discrete wavelet transform (DWT) as a linear space-to-frequency transform of the image domain in an irreversible compression. This irreversible discrete wavelet transform is implemented by FIR filter using 9/7 Daubechies coefficients or a lifting scheme of factorizated coefficients from 9/7 Daubechies coefficients. This work investigates the tradeoffs between area, power and data throughput (or operating frequency) of several implementations of the Discrete Wavelet Transform using the lifting scheme in various pipeline designs. This paper shows the results of five different architectures synthesized and simulated in FPGAs. It concludes that the descriptions with pipelined operators provide the best area-power-operating frequency trade-off over non-pipelined operators descriptions. Those descriptions require around 40% more hardware to increase the maximum operating frequency up to 100% and reduce power consumption to less than 50%. Starting from behavioral HDL descriptions provide the best area-power-operating frequency trade-off, improving hardware cost and maximum operating frequency around 30% in comparison to structural descriptions for the same power requirement.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:00:41 GMT" } ]
2011-11-09T00:00:00
[ [ "Silva", "Sandro V.", "" ], [ "Bampi", "Sergio", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4813
EDA Publishing Association
I. Papaefstathiou, T. Orphanoudakis, G. Kornaros, C. Kachris, I. Mavroidis, A. Nikologiannis
Queue Management in Network Processors
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
One of the main bottlenecks when designing a network processing system is very often its memory subsystem. This is mainly due to the state-of-the-art network links operating at very high speeds and to the fact that in order to support advanced Quality of Service (QoS), a large number of independent queues is desirable. In this paper we analyze the performance bottlenecks of various data memory managers integrated in typical Network Processing Units (NPUs). We expose the performance limitations of software implementations utilizing the RISC processing cores typically found in most NPU architectures and we identify the requirements for hardware assisted memory management in order to achieve wire-speed operation at gigabit per second rates. Furthermore, we describe the architecture and performance of a hardware memory manager that fulfills those requirements. This memory manager, although it is implemented in a reconfigurable technology, it can provide up to 6.2Gbps of aggregate throughput, while handling 32K independent queues.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:00:48 GMT" } ]
2011-11-09T00:00:00
[ [ "Papaefstathiou", "I.", "" ], [ "Orphanoudakis", "T.", "" ], [ "Kornaros", "G.", "" ], [ "Kachris", "C.", "" ], [ "Mavroidis", "I.", "" ], [ "Nikologiannis", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4814
EDA Publishing Association
Andrew Duller, Daniel Towner, Gajinder Panesar, Alan Gray, Will Robbins
picoArray Technology: The Tool's Story
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
This paper briefly describes the picoArray? architecture, and in particular the deterministic internal communication fabric. The methods that have been developed for debugging and verifying systems using devices from the picoArray family are explained. In order to maximize the computational ability of these devices, hardware debugging support has been kept to a minimum and the methods and tools developed to take this into account.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:01:15 GMT" } ]
2011-11-09T00:00:00
[ [ "Duller", "Andrew", "" ], [ "Towner", "Daniel", "" ], [ "Panesar", "Gajinder", "" ], [ "Gray", "Alan", "" ], [ "Robbins", "Will", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4815
EDA Publishing Association
Raul Blazquez, Fred Lee, David Wentzloff, Brian Ginsburg, Johnna Powell, Anantha Chandrakasan
Direct Conversion Pulsed UWB Transceiver Architecture
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.NI
null
Ultra-wideband (UWB) communication is an emerging wireless technology that promises high data rates over short distances and precise locationing. The large available bandwidth and the constraint of a maximum power spectral density drives a unique set of system challenges. This paper addresses these challenges using two UWB transceivers and a discrete prototype platform.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:01:54 GMT" } ]
2011-11-09T00:00:00
[ [ "Blazquez", "Raul", "" ], [ "Lee", "Fred", "" ], [ "Wentzloff", "David", "" ], [ "Ginsburg", "Brian", "" ], [ "Powell", "Johnna", "" ], [ "Chandrakasan", "Anantha", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.4816
EDA Publishing Association
T. Simunic
Power Saving Techniques for Wireless LANs
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.NI
null
Fast wireless access has rapidly become commonplace. Wireless access points and Hotspot servers are sprouting everywhere. Battery lifetime continues to be a critical issue in mobile computing. This paper first gives an overview of WLAN energy saving strategies, followed by an illustration of a system-level methodology for saving power in heterogeneous wireless environments.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:02:16 GMT" } ]
2011-11-09T00:00:00
[ [ "Simunic", "T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.4817
EDA Publishing Association
Daniel Thull, Roberto Sannino
Performance Considerations for an Embedded Implementation of OMA DRM 2
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.CR
null
As digital content services gain importance in the mobile world, Digital Rights Management (DRM) applications will become a key component of mobile terminals. This paper examines the effect dedicated hardware macros for specific cryptographic functions have on the performance of a mobile terminal that supports version 2 of the open standard for Digital Rights Management defined by the Open Mobile Alliance (OMA). Following a general description of the standard, the paper contains a detailed analysis of the cryptographic operations that have to be carried out before protected content can be accessed. The combination of this analysis with data on execution times for specific algorithms realized in hardware and software has made it possible to build a model which has allowed us to assert that hardware acceleration for specific cryptographic algorithms can significantly reduce the impact DRM has on a mobile terminal's processing performance and battery life.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:02:24 GMT" } ]
2011-11-09T00:00:00
[ [ "Thull", "Daniel", "" ], [ "Sannino", "Roberto", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0710.4818
EDA Publishing Association
Keith Holt
Wireless LAN: Past, Present, and Future
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.NI
null
This paper retraces the historical development of wireless LAN technology in the context of the pursuit of ever higher data rate, describes the significant technical breakthroughs that are now occurring, and speculates on future directions that the technology may take over the remainder of the decade. The challenges that these developments have created for low power operation are considered, as well as some of the opportunities that are presented to mitigate them. The importance of MIMO as an emerging technology for 802.11 is specifically highlighted, both in terms of the significant increase in data rate and range that it enables as well as the considerable challenge that it presents for the development of low power wireless LAN products.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:02:38 GMT" } ]
2011-11-09T00:00:00
[ [ "Holt", "Keith", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.4819
EDA Publishing Association
S. Lopez, G. M. Callico, J. F. Lopez, R. Sarmiento
A High Quality/Low Computational Cost Technique for Block Matching Motion Estimation
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.MM
null
Motion estimation is the most critical process in video coding systems. First of all, it has a definitive impact on the rate-distortion performance given by the video encoder. Secondly, it is the most computationally intensive process within the encoding loop. For these reasons, the design of high-performance low-cost motion estimators is a crucial task in the video compression field. An adaptive cost block matching (ACBM) motion estimation technique is presented in this paper, featuring an excellent tradeoff between the quality of the reconstructed video sequences and the computational effort. Simulation results demonstrate that the ACBM algorithm achieves a slight better rate-distortion performance than the one given by the well-known full search algorithm block matching algorithm with reductions of up to 95% in the computational load.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:03:15 GMT" } ]
2011-11-09T00:00:00
[ [ "Lopez", "S.", "" ], [ "Callico", "G. M.", "" ], [ "Lopez", "J. F.", "" ], [ "Sarmiento", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0710.4820
EDA Publishing Association
Partha Biswas, Sudarshan Banerjee, Nikil Dutt, Laura Pozzi, Paolo Ienne
ISEGEN: Generation of High-Quality Instruction Set Extensions by Iterative Improvement
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
Customization of processor architectures through Instruction Set Extensions (ISEs) is an effective way to meet the growing performance demands of embedded applications. A high-quality ISE generation approach needs to obtain results close to those achieved by experienced designers, particularly for complex applications that exhibit regularity: expert designers are able to exploit manually such regularity in the data flow graphs to generate high-quality ISEs. In this paper, we present ISEGEN, an approach that identifies high-quality ISEs by iterative improvement following the basic principles of the well-known Kernighan-Lin (K-L) min-cut heuristic. Experimental results on a number of MediaBench, EEMBC and cryptographic applications show that our approach matches the quality of the optimal solution obtained by exhaustive search. We also show that our ISEGEN technique is on average 20x faster than a genetic formulation that generates equivalent solutions. Furthermore, the ISEs identified by our technique exhibit 35% more speedup than the genetic solution on a large cryptographic application (AES) by effectively exploiting its regular structure.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:04:11 GMT" } ]
2011-11-09T00:00:00
[ [ "Biswas", "Partha", "" ], [ "Banerjee", "Sudarshan", "" ], [ "Dutt", "Nikil", "" ], [ "Pozzi", "Laura", "" ], [ "Ienne", "Paolo", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4821
EDA Publishing Association
Wayne Wolf
Multimedia Applications of Multiprocessor Systems-on-Chips
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.MM
null
This paper surveys the characteristics of multimedia systems. Multimedia applications today are dominated by compression and decompression, but multimedia devices must also implement many other functions such as security and file management. We introduce some basic concepts of multimedia algorithms and the larger set of functions that multimedia systems-on-chips must implement.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:04:15 GMT" } ]
2011-11-09T00:00:00
[ [ "Wolf", "Wayne", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0710.4823
EDA Publishing Association
W. Stechele, L. Alvado Carcel, S. Herrmann, J. Lidon Simon
A Coprocessor for Accelerating Visual Information Processing
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.MM
null
Visual information processing will play an increasingly important role in future electronics systems. In many applications, e.g. video surveillance cameras, data throughput of microprocessors is not sufficient and power consumption is too high. Instruction profiling on a typical test algorithm has shown that pixel address calculations are the dominant operations to be optimized. Therefore AddressLib, a structured scheme for pixel addressing was developed, that can be accelerated by AddressEngine, a coprocessor for visual information processing. In this paper, the architectural design of AddressEngine is described, which in the first step supports a subset of the AddressLib. Dataflow and memory organization are optimized during architectural design. AddressEngine was implemented in a FPGA and was tested with MPEG-7 Global Motion Estimation algorithm. Results on processing speed and circuit complexity are given and compared to a pure software implementation. The next step will be the support for the full AddressLib, including segment addressing. An outlook on further investigations on dynamic reconfiguration capabilities is given.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:04:42 GMT" } ]
2011-11-09T00:00:00
[ [ "Stechele", "W.", "" ], [ "Carcel", "L. Alvado", "" ], [ "Herrmann", "S.", "" ], [ "Simon", "J. Lidon", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0710.4824
EDA Publishing Association
R. Pradeep, S. Vinay, Sanjay Burman, V. Kamakoti
FPGA based Agile Algorithm-On-Demand Co-Processor
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
With growing computational needs of many real-world applications, frequently changing specifications of standards, and the high design and NRE costs of ASICs, an algorithm-agile FPGA based co-processor has become a viable alternative. In this article, we report about the general design of an algorith-agile co-processor and the proof-of-concept implementation.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:04:43 GMT" } ]
2011-11-09T00:00:00
[ [ "Pradeep", "R.", "" ], [ "Vinay", "S.", "" ], [ "Burman", "Sanjay", "" ], [ "Kamakoti", "V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4825
EDA Publishing Association
Wayne Lyons
Meeting the Embedded Design Needs of Automotive Applications
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
The importance of embedded systems in driving innovation in automotive applications continues to grow. Understanding the specific needs of developers targeting this market is also helping to drive innovation in RISC core design. This paper describes how a RISC instruction set architecture has evolved to better meet those needs, and the key implementation features in two very different RISC cores are used to demonstrate the challenges of designing for real-time automotive systems.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:05:33 GMT" } ]
2011-11-09T00:00:00
[ [ "Lyons", "Wayne", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4826
EDA Publishing Association
C. Jeffrey, R. Cutajar, S. Prosser, M. Lickess, A. Richardson, S. Riches
The Integration of On-Line Monitoring and Reconfiguration Functions using EDAA - European design and Automation Association1149.4 Into a Safety Critical Automotive Electronic Control Unit
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
This paper presents an innovative application of EDAA - European design and Automation Association 1149.4 and the Integrated Diagnostic Reconfiguration (IDR) as tools for the implementation of an embedded test solution for an Automotive Electronic Control Unit implemented as a fully integrated mixed signal system. The paper described how the test architecture can be used for fault avoidance with results from a hardware prototype presented. The paper concludes that fault avoidance can be integrated into mixed signal electronic systems to handle key failure modes.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:06:43 GMT" } ]
2011-11-09T00:00:00
[ [ "Jeffrey", "C.", "" ], [ "Cutajar", "R.", "" ], [ "Prosser", "S.", "" ], [ "Lickess", "M.", "" ], [ "Richardson", "A.", "" ], [ "Riches", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4827
EDA Publishing Association
A. Mayer, H. Siebert, K.D. Mcdonald-Maier
Debug Support, Calibration and Emulation for Multiple Processor and Powertrain Control SoCs
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
The introduction of complex SoCs with multiple processor cores presents new development challenges, such that development support is now a decisive factor when choosing a System-on-Chip (SoC). The presented developments support strategy addresses the challenges using both architecture and technology approaches. The Multi-Core Debug Support (MCDS) architecture provides flexible triggering using cross triggers and a multiple core break and suspend switch. Temporal trace ordering is guaranteed down to cycle level by on-chip time stamping. The Package Sized-ICE (PSI) approach is a novel method of including trace buffers, overlay memories, processing resources and communication interfaces without changing device behavior. PSI requires no external emulation box, as the debug host interfaces directly with the SoC using a standard interface.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:07:17 GMT" } ]
2011-11-09T00:00:00
[ [ "Mayer", "A.", "" ], [ "Siebert", "H.", "" ], [ "Mcdonald-Maier", "K. D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4828
Hossein Hajiabolhassan
Hossein Hajiabolhassan and Abbas Cheraghi
Bounds for Visual Cryptography Schemes
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate the best pixel expansion of the various models of visual cryptography schemes. In this regard, we consider visual cryptography schemes introduced by Tzeng and Hu [13]. In such a model, only minimal qualified sets can recover the secret image and that the recovered secret image can be darker or lighter than the background. Blundo et al. [4] introduced a lower bound for the best pixel expansion of this scheme in terms of minimal qualified sets. We present another lower bound for the best pixel expansion of the scheme. As a corollary, we introduce a lower bound, based on an induced matching of hypergraph of qualified sets, for the best pixel expansion of the aforementioned model and the traditional model of visual cryptography realized by basis matrices. Finally, we study access structures based on graphs and we present an upper bound for the smallest pixel expansion in terms of strong chromatic index.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:17:15 GMT" }, { "version": "v2", "created": "Mon, 20 Oct 2008 01:49:21 GMT" }, { "version": "v3", "created": "Sat, 6 Jun 2009 07:08:14 GMT" }, { "version": "v4", "created": "Mon, 7 Sep 2009 03:55:32 GMT" }, { "version": "v5", "created": "Thu, 3 Dec 2009 11:57:02 GMT" } ]
2009-12-03T00:00:00
[ [ "Hajiabolhassan", "Hossein", "" ], [ "Cheraghi", "Abbas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0710.4829
EDA Publishing Association
Dirk Ziegenbein, Peter Braun, Ulrich Freund, Andreas Bauer, Jan Romberg, Bernhard Schatz
AutoMoDe - Model-Based Development of Automotive Software
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.SE
null
This paper describes first results from the AutoMoDe (Automotive Model-Based Development) project. The overall goal of the project is to develop an integrated methodology for model-based development of automotive control software, based on problem-specific design notations with an explicit formal foundation. Based on the existing AutoFOCUS framework, a tool prototype is being developed in order to illustrate and validate the key elements of our approach.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:08:52 GMT" } ]
2011-11-09T00:00:00
[ [ "Ziegenbein", "Dirk", "" ], [ "Braun", "Peter", "" ], [ "Freund", "Ulrich", "" ], [ "Bauer", "Andreas", "" ], [ "Romberg", "Jan", "" ], [ "Schatz", "Bernhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0710.4831
EDA Publishing Association
Pavel Horsky
LC Oscillator Driver for Safety Critical Applications
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.OH
null
A CMOS harmonic signal LC oscillator driver for automotive applications working in a harsh environment with high safety critical requirements is described. The driver can be used with a wide range of external components parameters (LC resonance network of a sensor). Quality factor of the external LC network can vary two decades. Amplitude regulation of the driver is digitally controlled and the DAC is constructed as exponential with piece-wise-linear (PWL) approximation. Low current consumption for high quality resonance networks is achieved. Realized oscillator is robust, used in safety critical application and has low EMC emissions.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:09:44 GMT" } ]
2011-11-09T00:00:00
[ [ "Horsky", "Pavel", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0710.4832
EDA Publishing Association
Massimo Conti
SystemC Analysis of a New Dynamic Power Management Architecture
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
This paper presents a new dynamic power management architecture of a System on Chip. The Power State Machine describing the status of the core follows the recommendations of the ACPI standard. The algorithm controls the power states of each block on the basis of battery status, chip temperature and a user defined task priority.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:10:19 GMT" } ]
2011-11-09T00:00:00
[ [ "Conti", "Massimo", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4833
EDA Publishing Association
Steve Chappell, Alistair Macarthur, Dan Preston, Dave Olmstead, Bob Flint, Chris Sullivan
Exploiting Real-Time FPGA Based Adaptive Systems Technology for Real-Time Sensor Fusion in Next Generation Automotive Safety Systems
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
We present a system for the boresighting of sensors using inertial measurement devices as the basis for developing a range of dynamic real-time sensor fusion applications. The proof of concept utilizes a COTS FPGA platform for sensor fusion and real-time correction of a misaligned video sensor. We exploit a custom-designed 32-bit soft processor core and C-based design & synthesis for rapid, platform-neutral development. Kalman filter and sensor fusion techniques established in advanced aviation systems are applied to automotive vehicles with results exceeding typical industry requirements for sensor alignment. Results of the static and the dynamic tests demonstrate that using inexpensive accelerometers mounted on (or during assembly of) a sensor and an Inertial Measurement Unit (IMU) fixed to a vehicle can be used to compute the misalignment of the sensor to the IMU and thus vehicle. In some cases the model predications and test results exceeded the requirements by an order of magnitude with a 3-sigma or 99% confidence.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:11:11 GMT" } ]
2011-11-09T00:00:00
[ [ "Chappell", "Steve", "" ], [ "Macarthur", "Alistair", "" ], [ "Preston", "Dan", "" ], [ "Olmstead", "Dave", "" ], [ "Flint", "Bob", "" ], [ "Sullivan", "Chris", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4834
EDA Publishing Association
L. Fanucci, A. Giambastiani, F. Iozzi, C. Marino, A. Rocchi
Platform Based Design for Automotive Sensor Conditioning
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
In this paper a general architecture suitable to interface several kinds of sensors for automotive applications is presented. A platform based design approach is pursued to improve system performance while minimizing time-to-market.. The platform is composed by an analog front-end and a digital section. The latter is based on a microcontroller core (8051 IP by Oregano) plus a set of dedicated hardware dedicated to the complex signal processing required for sensor conditioning. The microcontroller handles also the communication with external devices (as a PC) for data output and fast prototyping. A case study is presented concerning the conditioning of a Gyro yaw rate sensor for automotive applications. Measured performance results outperform current state-of-the-art commercial devices.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:12:03 GMT" } ]
2011-11-09T00:00:00
[ [ "Fanucci", "L.", "" ], [ "Giambastiani", "A.", "" ], [ "Iozzi", "F.", "" ], [ "Marino", "C.", "" ], [ "Rocchi", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4835
EDA Publishing Association
K.-U. Kirstein, J. Sedivy, T. Salo, C. Hagleitner, T. Vancura, A. Hierlemann
A CMOS-Based Tactile Sensor for Continuous Blood Pressure Monitoring
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.OH
null
A monolithic integrated tactile sensor array is presented, which is used to perform non-invasive blood pressure monitoring of a patient. The advantage of this device compared to a hand cuff based approach is the capability of recording continuous blood pressure data. The capacitive, membrane-based sensor device is fabricated in an industrial CMOS-technology combined with post-CMOS micromachining. The capacitance change is detected by a S?-modulator. The modulator is operated at a sampling rate of 128kS/s and achieves a resolution of 12bit with an external decimation filter and an OSR of 128.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:13:35 GMT" } ]
2011-11-09T00:00:00
[ [ "Kirstein", "K. -U.", "" ], [ "Sedivy", "J.", "" ], [ "Salo", "T.", "" ], [ "Hagleitner", "C.", "" ], [ "Vancura", "T.", "" ], [ "Hierlemann", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0710.4836
EDA Publishing Association
Momchil Milev, Rod Burt
A Tool and Methodology for AC-Stability Analysis of Continuous-Time Closed-Loop Systems
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.OH
null
Presented are a methodology and a DFII-based tool for AC-stability analysis of a wide variety of closed-loop continuous-time (operational amplifiers and other linear circuits). The methodology used allows for easy identification and diagnostics of ac-stability problems including not only main-loop effects but also local-instability loops in current mirrors, bias circuits and emitter or source followers without breaking the loop. The results of the analysis are easy to interpret. Estimated phase margin is readily available. Instability nodes and loops along with their respective oscillation frequencies are immediately identified and mapped to the existing circuit nodes thus offering significant advantages compared to traditional "black-box" methods of stability analysis (Transient Overshoot, Bode and Phase margin plots etc.). The tool for AC-Stability analysis is written in SKILL? and is fully integrated in DFII? environment. Its "push-button" graphical user interface (GUI) is easy to use and understand. The tool can be invoked directly from Composer? schematic and does not require active Analog Artist? session. The tool is not dependent on the use of a specific fabrication technology or Process Design Kit customization. It requires OCEAN?, Spectre? and Waveform calculator capabilities to run.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:14:32 GMT" } ]
2011-11-09T00:00:00
[ [ "Milev", "Momchil", "" ], [ "Burt", "Rod", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0710.4838
EDA Publishing Association
Christoph Sandner, Martin Clara, Andreas Santner, Thomas Hartig, Franz Kuttner
A 6bit, 1.2GSps Low-Power Flash-ADC in 0.13$\mu$m Digital CMOS
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
A 6bit flash-ADC with 1.2GSps, wide analog bandwidth and low power, realized in a standard digital 0.13 $\mu$m CMOS copper technology is presented. Employing capacitive interpolation gives various advantages when designing for low power: no need for a reference resistor ladder, implicit sample-and-hold operation, no edge effects in the interpolation network (as compared to resistive interpolation), and a very low input capacitance of only 400fF, which leads to an easily drivable analog converter interface. Operating at 1.2GSps the ADC achieves an effective resolution bandwidth (ERBW) of 700MHz, while consuming 160mW of power. At 600MSps we achieve an ERBW of 600MHz with only 90mW power consumption, both from a 1.5V supply. This corresponds to outstanding Figure-of-Merit numbers (FoM) of 2.2 and 1.5pJ/convstep, respectively. The module area is 0.12mm^2.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:15:35 GMT" } ]
2011-11-09T00:00:00
[ [ "Sandner", "Christoph", "" ], [ "Clara", "Martin", "" ], [ "Santner", "Andreas", "" ], [ "Hartig", "Thomas", "" ], [ "Kuttner", "Franz", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4839
EDA Publishing Association
Terje N. Andersen, Atle Briskemyr, Frode Telsto, Johnny Bjornsen, Thomas E. Bonnerud, Bjornar Hernes, Oystein Moldsvor
A 97mW 110MS/s 12b Pipeline ADC Implemented in 0.18$\mu$m Digital CMOS
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
A 12 bit Pipeline ADC fabricated in a 0.18 $\mu$m pure digital CMOS technology is presented. Its nominal conversion rate is 110MS/s and the nominal supply voltage is 1.8V. The effective number of bits is 10.4 when a 10MHz input signal with 2V_{P-P} signal swing is applied. The occupied silicon area is 0.86mm^2 and the power consumption equals 97mW. A switched capacitor bias current circuit scale the bias current automatically with the conversion rate, which gives scaleable power consumption and full performance of the ADC from 20 to 140MS/s.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:16:26 GMT" } ]
2011-11-09T00:00:00
[ [ "Andersen", "Terje N.", "" ], [ "Briskemyr", "Atle", "" ], [ "Telsto", "Frode", "" ], [ "Bjornsen", "Johnny", "" ], [ "Bonnerud", "Thomas E.", "" ], [ "Hernes", "Bjornar", "" ], [ "Moldsvor", "Oystein", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4840
EDA Publishing Association
P. Bernardi, G. Masera, F. Quaglio, M. Sonza Reorda
Testing Logic Cores using a BIST P1500 Compliant Approach: A Case of Study
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
In this paper we describe how we applied a BIST-based approach to the test of a logic core to be included in System-on-a-chip (SoC) environments. The approach advantages are the ability to protect the core IP, the simple test interface (thanks also to the adoption of the P1500 standard), the possibility to run the test at-speed, the reduced test time, and the good diagnostic capabilities. The paper reports figures about the achieved fault coverage, the required area overhead, and the performance slowdown, and compares the figures with those for alternative approaches, such as those based on full scan and sequential ATPG.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:17:29 GMT" } ]
2011-11-09T00:00:00
[ [ "Bernardi", "P.", "" ], [ "Masera", "G.", "" ], [ "Quaglio", "F.", "" ], [ "Reorda", "M. Sonza", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4842
EDA Publishing Association
Dan Hillman
Using Mobilize Power Management IP for Dynamic & Static Power Reduction in SoC at 130 nm
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
At 130 nm and 90 nm, power consumption (both dynamic and static) has become a barrier in the roadmap for SoC designs targeting battery powered, mobile applications. This paper presents the results of dynamic and static power reduction achieved implementing Tensilica's 32-bit Xtensa microprocessor core, using Virtual Silicon's Power Management IP. Independent voltage islands are created using Virtual Silicon's VIP PowerSaver standard cells by using voltage level shifting cells and voltage isolation cells to implement power islands. The VIP PowerSaver standard cells are characterized at 1.2V, 1.0V and 0.8V, to accommodate voltage scaling. Power islands can also be turned off completely. Designers can significantly lower both the dynamic power and the quiescent or leakage power of their SoC designs, with very little impact on speed or area using Virtual Silicon's VIP Gate Bias standard cells.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:18:38 GMT" } ]
2011-11-09T00:00:00
[ [ "Hillman", "Dan", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4843
EDA Publishing Association
Aline Mello, Leandro Moller, Ney Calazans, Fernando Moraes
MultiNoC: A Multiprocessing System Enabled by a Network on Chip
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
The MultiNoC system implements a programmable on-chip multiprocessing platform built on top of an efficient, low area overhead intra-chip interconnection scheme. The employed interconnection structure is a Network on Chip, or NoC. NoCs are emerging as a viable alternative to increasing demands on interconnection architectures, due to the following characteristics: (i) energy efficiency and reliability; (ii) scalability of bandwidth, when compared to traditional bus architectures; (iii) reusability; (iv) distributed routing decisions. An external host computer feeds MultiNoC with application instructions and data. After this initialization procedure, MultiNoC executes some algorithm. After finishing execution of the algorithm, output data can be read back by the host. Sequential or parallel algorithms conveniently adapted to the MultiNoC structure can be executed. The main motivation to propose this design is to enable the investigation of current trends to increase the number of embedded processors in SoCs, leading to the concept of "sea of processors" systems.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:19:07 GMT" } ]
2011-11-09T00:00:00
[ [ "Mello", "Aline", "" ], [ "Moller", "Leandro", "" ], [ "Calazans", "Ney", "" ], [ "Moraes", "Fernando", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4844
EDA Publishing Association
M. D. Galanis, A. Milidonis, G. Theodoridis, D. Soudris, C. E. Goutis
A Partitioning Methodology for Accelerating Applications in Hybrid Reconfigurable Platforms
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
In this paper, we propose a methodology for partitioning and mapping computational intensive applications in reconfigurable hardware blocks of different granularity. A generic hybrid reconfigurable architecture is considered so as the methodology can be applicable to a large number of heterogeneous reconfigurable platforms. The methodology mainly consists of two stages, the analysis and the mapping of the application onto fine and coarse-grain hardware resources. A prototype framework consisting of analysis, partitioning and mapping tools has been also developed. For the coarse-grain reconfigurable hardware, we use our previous-developed high-performance coarse-grain data-path. In this work, the methodology is validated using two real-world applications, an OFDM transmitter and a JPEG encoder. In the case of the OFDM transmitter, a maximum clock cycles decrease of 82% relative to the ones in an all fine-grain mapping solution is achieved. The corresponding performance improvement for the JPEG is 43%.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:20:27 GMT" } ]
2011-11-09T00:00:00
[ [ "Galanis", "M. D.", "" ], [ "Milidonis", "A.", "" ], [ "Theodoridis", "G.", "" ], [ "Soudris", "D.", "" ], [ "Goutis", "C. E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4845
EDA Publishing Association
Tero Rissa, Adam Donlin, Wayne Luk
Evaluation of SystemC Modelling of Reconfigurable Embedded Systems
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
This paper evaluates the use of pin and cycle accurate SystemC models for embedded system design exploration and early software development. The target system is MicroBlaze VanillaNet Platform running MicroBlaze uClinux operating system. The paper compares Register Transfer Level (RTL) Hardware Description Language (HDL) simulation speed to the simulation speed of several different SystemC models. It is shown that simulation speed of pin and cycle accurate models can go up to 150 kHz, compared to 100 Hz range of HDL simulation. Furthermore, utilising techniques that temporarily compromise cycle accuracy, effective simulation speed of up to 500 kHz can be obtained.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:21:19 GMT" } ]
2011-11-09T00:00:00
[ [ "Rissa", "Tero", "" ], [ "Donlin", "Adam", "" ], [ "Luk", "Wayne", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4846
EDA Publishing Association
M. Borgatti, A. Capello, U. Rossi, J.-L. Lambert, I. Moussa, F. Fummi, G. Pravadelli
An Integrated Design and Verification Methodology for Reconfigurable Multimedia Systems
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.MM cs.LO
null
Recently a lot of multimedia applications are emerging on portable appliances. They require both the flexibility of upgradeable devices (traditionally software based) and a powerful computing engine (typically hardware). In this context, programmable HW and dynamic reconfiguration allow novel approaches to the migration of algorithms from SW to HW. Thus, in the frame of the Symbad project, we propose an industrial design flow for reconfigurable SoC's. The goal of Symbad consists of developing a system level design platform for hardware and software SoC systems including formal and semi-formal verification techniques.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:24:16 GMT" } ]
2011-11-09T00:00:00
[ [ "Borgatti", "M.", "" ], [ "Capello", "A.", "" ], [ "Rossi", "U.", "" ], [ "Lambert", "J. -L.", "" ], [ "Moussa", "I.", "" ], [ "Fummi", "F.", "" ], [ "Pravadelli", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0710.4847
Savas Dayanik
Savas Dayanik, Christian Goulding, H. Vincent Poor
Bayesian sequential change diagnosis
null
null
null
null
math.PR cs.IT math.IT math.ST stat.TH
null
Sequential change diagnosis is the joint problem of detection and identification of a sudden and unobservable change in the distribution of a random sequence. In this problem, the common probability law of a sequence of i.i.d. random variables suddenly changes at some disorder time to one of finitely many alternatives. This disorder time marks the start of a new regime, whose fingerprint is the new law of observations. Both the disorder time and the identity of the new regime are unknown and unobservable. The objective is to detect the regime-change as soon as possible, and, at the same time, to determine its identity as accurately as possible. Prompt and correct diagnosis is crucial for quick execution of the most appropriate measures in response to the new regime, as in fault detection and isolation in industrial processes, and target detection and identification in national defense. The problem is formulated in a Bayesian framework. An optimal sequential decision strategy is found, and an accurate numerical scheme is described for its implementation. Geometrical properties of the optimal strategy are illustrated via numerical examples. The traditional problems of Bayesian change-detection and Bayesian sequential multi-hypothesis testing are solved as special cases. In addition, a solution is obtained for the problem of detection and identification of component failure(s) in a system with suspended animation.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 14:38:18 GMT" } ]
2007-10-29T00:00:00
[ [ "Dayanik", "Savas", "" ], [ "Goulding", "Christian", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0710.4848
EDA Publishing Association
Yasushi Umezawa, Takeshi Shimizu
A Formal Verification Methodology for Checking Data Integrity
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.LO
null
Formal verification techniques have been playing an important role in pre-silicon validation processes. One of the most important points considered in performing formal verification is to define good verification scopes; we should define clearly what to be verified formally upon designs under tests. We considered the following three practical requirements when we defined the scope of formal verification. They are (a) hard to verify (b) small to handle, and (c) easy to understand. Our novel approach is to break down generic properties for system into stereotype properties in block level and to define requirements for Verifiable RTL. Consequently, each designer instead of verification experts can describe properties of the design easily, and formal model checking can be applied systematically and thoroughly to all the leaf modules. During the development of a component chip for server platforms, we focused on RAS (Reliability, Availability, and Serviceability) features and described more than 2000 properties in PSL. As a result of the formal verification, we found several critical logic bugs in a short time with limited resources, and successfully verified all of them. This paper presents a study of the functional verification methodology.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:24:36 GMT" } ]
2011-11-09T00:00:00
[ [ "Umezawa", "Yasushi", "" ], [ "Shimizu", "Takeshi", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0710.4850
EDA Publishing Association
Michael Ullmann, Wansheng Jin, Jurgen Becker
Hardware Support for QoS-based Function Allocation in Reconfigurable Systems
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.AR
null
This contribution presents a new approach for allocating suitable function-implementation variants depending on given quality-of-service function-requirements for run-time reconfigurable multi-device systems. Our approach adapts methodologies from the domain of knowledge-based systems which can be used for doing run-time hardware/software resource usage optimizations.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:24:59 GMT" } ]
2011-11-09T00:00:00
[ [ "Ullmann", "Michael", "" ], [ "Jin", "Wansheng", "" ], [ "Becker", "Jurgen", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0710.4851
EDA Publishing Association
Giuseppe Falconeri, Walid Naifer, Nizar Romdhane
Common Reusable Verification Environment for BCA and RTL Models
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.LO
null
This paper deals with a common verification methodology and environment for SystemC BCA and RTL models. The aim is to save effort by avoiding the same work done twice by different people and to reuse the same environment for the two design views. Applying this methodology the verification task starts as soon as the functional specification is signed off and it runs in parallel to the models and design development. The verification environment is modeled with the aid of dedicated verification languages and it is applied to both the models. The test suite is exactly the same and thus it's possible to verify the alignment between the two models. In fact the final step is to check the cycle-by-cycle match of the interface behavior. A regression tool and a bus analyzer have been developed to help the verification and the alignment process. The former is used to automate the testbench generation and to run the two test suites. The latter is used to verify the alignment between the two models comparing the waveforms obtained in each run. The quality metrics used to validate the flow are full functional coverage and full alignment at each IP port.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:25:32 GMT" } ]
2011-11-09T00:00:00
[ [ "Falconeri", "Giuseppe", "" ], [ "Naifer", "Walid", "" ], [ "Romdhane", "Nizar", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0710.4852
EDA Publishing Association
John S. Macbeth, Dietmar Heinz, Ken Gray
An Assembler Driven Verification Methodology (ADVM)
Submitted on behalf of EDAA (http://www.edaa.com/)
Dans Design, Automation and Test in Europe | Designers'Forum - DATE'05, Munich : Allemagne (2005)
null
null
cs.OH
null
This paper presents an overview of an assembler driven verification methodology (ADVM) that was created and implemented for a chip card project at Infineon Technologies AG. The primary advantage of this methodology is that it enables rapid porting of directed tests to new targets and derivatives, with only a minimum amount of code refactoring. As a consequence, considerable verification development time and effort was saved.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 12:25:35 GMT" } ]
2011-11-09T00:00:00
[ [ "Macbeth", "John S.", "" ], [ "Heinz", "Dietmar", "" ], [ "Gray", "Ken", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0710.4903
Parvathinathan Venkitasubramaniam
Parvathinathan Venkitasubramaniam, Ting He and Lang Tong
Anonymous Networking amidst Eavesdroppers
null
null
null
null
cs.IT math.IT
null
The problem of security against timing based traffic analysis in wireless networks is considered in this work. An analytical measure of anonymity in eavesdropped networks is proposed using the information theoretic concept of equivocation. For a physical layer with orthogonal transmitter directed signaling, scheduling and relaying techniques are designed to maximize achievable network performance for any given level of anonymity. The network performance is measured by the achievable relay rates from the sources to destinations under latency and medium access constraints. In particular, analytical results are presented for two scenarios: For a two-hop network with maximum anonymity, achievable rate regions for a general m x 1 relay are characterized when nodes generate independent Poisson transmission schedules. The rate regions are presented for both strict and average delay constraints on traffic flow through the relay. For a multihop network with an arbitrary anonymity requirement, the problem of maximizing the sum-rate of flows (network throughput) is considered. A selective independent scheduling strategy is designed for this purpose, and using the analytical results for the two-hop network, the achievable throughput is characterized as a function of the anonymity level. The throughput-anonymity relation for the proposed strategy is shown to be equivalent to an information theoretic rate-distortion function.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 16:18:49 GMT" } ]
2007-10-26T00:00:00
[ [ "Venkitasubramaniam", "Parvathinathan", "" ], [ "He", "Ting", "" ], [ "Tong", "Lang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.4905
Oliver Kosut
Oliver Kosut, Lang Tong
Distributed Source Coding in the Presence of Byzantine Sensors
14 pages. Submitted to IEEE Trans. on IT, Information-theoretic Security special issue, February 2007. Revised October 2007
null
10.1109/TIT.2008.921867
null
cs.IT math.IT
null
The distributed source coding problem is considered when the sensors, or encoders, are under Byzantine attack; that is, an unknown group of sensors have been reprogrammed by a malicious intruder to undermine the reconstruction at the fusion center. Three different forms of the problem are considered. The first is a variable-rate setup, in which the decoder adaptively chooses the rates at which the sensors transmit. An explicit characterization of the variable-rate achievable sum rates is given for any number of sensors and any groups of traitors. The converse is proved constructively by letting the traitors simulate a fake distribution and report the generated values as the true ones. This fake distribution is chosen so that the decoder cannot determine which sensors are traitors while maximizing the required rate to decode every value. Achievability is proved using a scheme in which the decoder receives small packets of information from a sensor until its message can be decoded, before moving on to the next sensor. The sensors use randomization to choose from a set of coding functions, which makes it probabilistically impossible for the traitors to cause the decoder to make an error. Two forms of the fixed-rate problem are considered, one with deterministic coding and one with randomized coding. The achievable rate regions are given for both these problems, and it is shown that lower rates can be achieved with randomized coding.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 16:22:59 GMT" } ]
2016-11-15T00:00:00
[ [ "Kosut", "Oliver", "" ], [ "Tong", "Lang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.4911
Cosma Rohilla Shalizi
Cosma Rohilla Shalizi
Social Media as Windows on the Social Life of the Mind
6 pages, 1 figure, AAAI format, submitted to AAAI spring 2008 symposium on "Social Information Processing"
null
null
null
cs.CY physics.soc-ph
null
This is a programmatic paper, marking out two directions in which the study of social media can contribute to broader problems of social science: understanding cultural evolution and understanding collective cognition. Under the first heading, I discuss some difficulties with the usual, adaptationist explanations of cultural phenomena, alternative explanations involving network diffusion effects, and some ways these could be tested using social-media data. Under the second I describe some of the ways in which social media could be used to study how the social organization of an epistemic community supports its collective cognitive performance.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 16:40:20 GMT" } ]
2007-10-26T00:00:00
[ [ "Shalizi", "Cosma Rohilla", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0710.4965
Andrzej Kwasniewski
A.K.Kwasniewski
On compositions of numbers and graphs
12 pages, 4 figures
Bull. Soc. Sci. Lett. Lodz, 59, No1 , (2009),103-116
null
null
math.CO cs.DM
http://creativecommons.org/licenses/by-nc-sa/3.0/
The main purpose of this note is to pose a couple of problems which are easily formulated thought some seem to be not yet solved. These problems are of general interest for discrete mathematics including a new twig of a bough of theory of graphs i.e. a given graph compositions. The problems result from and are served in the entourage of series of exercises with hints based predominantly on the second reference and other related recent papers.
[ { "version": "v1", "created": "Thu, 25 Oct 2007 22:16:35 GMT" }, { "version": "v2", "created": "Fri, 12 Nov 2010 21:16:17 GMT" } ]
2010-11-16T00:00:00
[ [ "Kwasniewski", "A. K.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0710.4975
Yoshiharu Maeno
Yoshiharu Maeno
Node discovery problem for a social network
null
Connections vol.29, pp.62-76 (2009)
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Methods to solve a node discovery problem for a social network are presented. Covert nodes refer to the nodes which are not observable directly. They transmit the influence and affect the resulting collaborative activities among the persons in a social network, but do not appear in the surveillance logs which record the participants of the collaborative activities. Discovering the covert nodes is identifying the suspicious logs where the covert nodes would appear if the covert nodes became overt. The performance of the methods is demonstrated with a test dataset generated from computationally synthesized networks and a real organization.
[ { "version": "v1", "created": "Fri, 26 Oct 2007 01:32:47 GMT" }, { "version": "v2", "created": "Fri, 7 Aug 2009 04:18:43 GMT" } ]
2010-09-28T00:00:00
[ [ "Maeno", "Yoshiharu", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0710.4982
Sebastian Roch
Christian Borgs, Jennifer Chayes, Constantinos Daskalakis, Sebastien Roch
First to Market is not Everything: an Analysis of Preferential Attachment with Fitness
null
null
null
null
math.PR cs.SI
null
In this paper, we provide a rigorous analysis of preferential attachment with fitness, a random graph model introduced by Bianconi and Barabasi. Depending on the shape of the fitness distribution, we observe three distinct phases: a first-mover-advantage phase, a fit-get-richer phase and an innovation-pays-off phase.
[ { "version": "v1", "created": "Fri, 26 Oct 2007 03:22:57 GMT" } ]
2011-09-07T00:00:00
[ [ "Borgs", "Christian", "" ], [ "Chayes", "Jennifer", "" ], [ "Daskalakis", "Constantinos", "" ], [ "Roch", "Sebastien", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" } ]
0710.4987
Akisato Kimura
Akisato Kimura, Tomohiko Uyematsu, Shigeaki Kuzuoka, Shun Watanabe
Universal source coding over generalized complementary delivery networks
18 pages, one column, submitted to IEEE Transactions on Information Theory, presented at a recent result session in ISIT2007
IEEE Transactions on Information Theory, Vol.55, No.3, pp.1360-1373, March 2009.
10.1109/TIT.2008.2011438
null
cs.IT math.IT
null
This paper deals with a universal coding problem for a certain kind of multiterminal source coding network called a generalized complementary delivery network. In this network, messages from multiple correlated sources are jointly encoded, and each decoder has access to some of the messages to enable it to reproduce the other messages. Both fixed-to-fixed length and fixed-to-variable length lossless coding schemes are considered. Explicit constructions of universal codes and the bounds of the error probabilities are clarified by using methods of types and graph-theoretical analysis.
[ { "version": "v1", "created": "Fri, 26 Oct 2007 04:58:43 GMT" } ]
2009-04-02T00:00:00
[ [ "Kimura", "Akisato", "" ], [ "Uyematsu", "Tomohiko", "" ], [ "Kuzuoka", "Shigeaki", "" ], [ "Watanabe", "Shun", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.4999
Willemien Visser
Willemien Visser (INRIA Rocquencourt)
L'analyse de l'expertise du point de vue de l'ergonomie cognitive
null
Dans Les expertises sensorielles : Nature et acquisition (2006) 1-12
null
null
cs.HC
null
This paper presents a review of methods for collecting and analysing data on complex activities. Starting with methods developed for design, we examine the possibility to transpose them to other complex activities, especially activities referring to sensorial expertise. R\'esum\'e Ce texte pr\'esente une revue de m\'ethodes pour recueillir et analyser des donn\'ees sur des actvit\'es complexes. A partir de m\'ethodes d\'evelopp\'ees pour des actvit\'es de conception, nous examinons la possibilit\'e de les transposer \`a d'autres actvit\'es complexes, notamment des actvit\'es faisant \`a appel \`a des expertises sensorielles.
[ { "version": "v1", "created": "Fri, 26 Oct 2007 06:32:22 GMT" }, { "version": "v2", "created": "Thu, 8 Nov 2007 08:56:00 GMT" } ]
2007-11-08T00:00:00
[ [ "Visser", "Willemien", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0710.5002
Boris Skoric
B. Skoric
The entropy of keys derived from laser speckle
null
null
null
null
cs.CR cs.CV
null
Laser speckle has been proposed in a number of papers as a high-entropy source of unpredictable bits for use in security applications. Bit strings derived from speckle can be used for a variety of security purposes such as identification, authentication, anti-counterfeiting, secure key storage, random number generation and tamper protection. The choice of laser speckle as a source of random keys is quite natural, given the chaotic properties of speckle. However, this same chaotic behaviour also causes reproducibility problems. Cryptographic protocols require either zero noise or very low noise in their inputs; hence the issue of error rates is critical to applications of laser speckle in cryptography. Most of the literature uses an error reduction method based on Gabor filtering. Though the method is successful, it has not been thoroughly analysed. In this paper we present a statistical analysis of Gabor-filtered speckle patterns. We introduce a model in which perturbations are described as random phase changes in the source plane. Using this model we compute the second and fourth order statistics of Gabor coefficients. We determine the mutual information between perturbed and unperturbed Gabor coefficients and the bit error rate in the derived bit string. The mutual information provides an absolute upper bound on the number of secure bits that can be reproducibly extracted from noisy measurements.
[ { "version": "v1", "created": "Fri, 26 Oct 2007 06:56:23 GMT" } ]
2007-10-29T00:00:00
[ [ "Skoric", "B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0710.5006
Paul Gardner-Stephen
Paul Gardner-Stephen
CANE: The Content Addressed Network Environment
18 pages, 1 figure
null
null
null
cs.NI cs.CR cs.DC
null
The fragmented nature and asymmetry of local and remote file access and network access, combined with the current lack of robust authenticity and privacy, hamstrings the current internet. The collection of disjoint and often ad-hoc technologies currently in use are at least partially responsible for the magnitude and potency of the plagues besetting the information economy, of which spam and email borne virii are canonical examples. The proposed replacement for the internet, Internet Protocol Version 6 (IPv6), does little to tackle these underlying issues, instead concentrating on addressing the technical issues of a decade ago. This paper introduces CANE, a Content Addressed Network Environment, and compares it against current internet and related technologies. Specifically, CANE presents a simple computing environment in which location is abstracted away in favour of identity, and trust is explicitly defined. Identity is cryptographically verified and yet remains pervasively open in nature. It is argued that this approach is capable of being generalised such that file storage and network access can be unified and subsequently combined with human interfaces to result in a Unified Theory of Access, which addresses many of the significant problems besetting the internet community of the early 21st century.
[ { "version": "v1", "created": "Fri, 26 Oct 2007 07:20:13 GMT" } ]
2007-10-29T00:00:00
[ [ "Gardner-Stephen", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0710.5054
Massimiliano Zanin
Massimiliano Zanin
WWW Spiders: an introduction
41 pages, 6 figures
null
null
null
cs.CY
null
In recent years, the study of complex networks has received a lot of attention. Real systems have gained importance in scientific publications, despite of an important drawback: the difficulty of retrieving and manage such great quantity of information. This paper wants to be an introduction to the construction of spiders and scrapers: specifically, how to program and deploy safely these kind of software applications. The aim is to show how software can be prepared to automatically surf the net and retrieve information for the user with high efficiency and safety.
[ { "version": "v1", "created": "Fri, 26 Oct 2007 11:49:33 GMT" } ]
2007-10-29T00:00:00
[ [ "Zanin", "Massimiliano", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0710.5116
Taneli Mielik\"ainen
Matti K\"a\"ari\"ainen, Niels Landwehr, Sampsa Lappalainen and Taneli Mielik\"ainen
Combining haplotypers
null
null
null
C-2007-57
cs.LG cs.CE q-bio.QM
null
Statistically resolving the underlying haplotype pair for a genotype measurement is an important intermediate step in gene mapping studies, and has received much attention recently. Consequently, a variety of methods for this problem have been developed. Different methods employ different statistical models, and thus implicitly encode different assumptions about the nature of the underlying haplotype structure. Depending on the population sample in question, their relative performance can vary greatly, and it is unclear which method to choose for a particular sample. Instead of choosing a single method, we explore combining predictions returned by different methods in a principled way, and thereby circumvent the problem of method selection. We propose several techniques for combining haplotype reconstructions and analyze their computational properties. In an experimental study on real-world haplotype data we show that such techniques can provide more accurate and robust reconstructions, and are useful for outlier detection. Typically, the combined prediction is at least as accurate as or even more accurate than the best individual method, effectively circumventing the method selection problem.
[ { "version": "v1", "created": "Fri, 26 Oct 2007 15:13:21 GMT" } ]
2007-10-29T00:00:00
[ [ "Kääriäinen", "Matti", "" ], [ "Landwehr", "Niels", "" ], [ "Lappalainen", "Sampsa", "" ], [ "Mielikäinen", "Taneli", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0710.5130
Manfred Kufleitner
Manfred Kufleitner (LaBRI)
A Proof of the Factorization Forest Theorem
4 pages
null
null
null
cs.LO
null
We show that for every homomorphism $\Gamma^+ \to S$ where $S$ is a finite semigroup there exists a factorization forest of height $\leq 3 \abs{S}$. The proof is based on Green's relations.
[ { "version": "v1", "created": "Fri, 26 Oct 2007 15:59:56 GMT" } ]
2007-10-29T00:00:00
[ [ "Kufleitner", "Manfred", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0710.5144
Gusztav Morvai
Gusztav Morvai and Benjamin Weiss
Forecasting for stationary binary time series
null
Acta Appl. Math. 79 (2003), no. 1-2, 25--34
null
null
math.PR cs.IT math.IT
null
The forecasting problem for a stationary and ergodic binary time series $\{X_n\}_{n=0}^{\infty}$ is to estimate the probability that $X_{n+1}=1$ based on the observations $X_i$, $0\le i\le n$ without prior knowledge of the distribution of the process $\{X_n\}$. It is known that this is not possible if one estimates at all values of $n$. We present a simple procedure which will attempt to make such a prediction infinitely often at carefully selected stopping times chosen by the algorithm. We show that the proposed procedure is consistent under certain conditions, and we estimate the growth rate of the stopping times.
[ { "version": "v1", "created": "Fri, 26 Oct 2007 17:10:06 GMT" } ]
2008-06-19T00:00:00
[ [ "Morvai", "Gusztav", "" ], [ "Weiss", "Benjamin", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.5161
Sudhir R. Ghorpade
Sudhir R. Ghorpade, Arunkumar R. Patil, and Harish K. Pillai
Decomposable Subspaces, Linear Sections of Grassmann Varieties, and Higher Weights of Grassmann Codes
16 pages
Finite Fields Appl. 15 (2009), no. 1, 54--68.
10.1016/j.ffa.2008.08.001
null
math.AG cs.IT math.IT
null
Given a homogeneous component of an exterior algebra, we characterize those subspaces in which every nonzero element is decomposable. In geometric terms, this corresponds to characterizing the projective linear subvarieties of the Grassmann variety with its Plucker embedding. When the base field is finite, we consider the more general question of determining the maximum number of points on sections of Grassmannians by linear subvarieties of a fixed (co)dimension. This corresponds to a known open problem of determining the complete weight hierarchy of linear error correcting codes associated to Grassmann varieties. We recover most of the known results as well as prove some new results. In the process we obtain, and utilize, a simple generalization of the Griesmer-Wei bound for arbitrary linear codes.
[ { "version": "v1", "created": "Fri, 26 Oct 2007 19:10:35 GMT" } ]
2009-03-31T00:00:00
[ [ "Ghorpade", "Sudhir R.", "" ], [ "Patil", "Arunkumar R.", "" ], [ "Pillai", "Harish K.", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.5190
Ioannis Kontoyiannis
H.M. Aktulga, I. Kontoyiannis, L.A. Lyznik, L. Szpankowski, A.Y. Grama and W. Szpankowski
Identifying statistical dependence in genomic sequences via mutual information estimates
Preliminary version. Final version in EURASIP Journal on Bioinformatics and Systems Biology. See http://www.hindawi.com/journals/bsb/
null
null
null
q-bio.GN cs.IT math.IT
null
Questions of understanding and quantifying the representation and amount of information in organisms have become a central part of biological research, as they potentially hold the key to fundamental advances. In this paper, we demonstrate the use of information-theoretic tools for the task of identifying segments of biomolecules (DNA or RNA) that are statistically correlated. We develop a precise and reliable methodology, based on the notion of mutual information, for finding and extracting statistical as well as structural dependencies. A simple threshold function is defined, and its use in quantifying the level of significance of dependencies between biological segments is explored. These tools are used in two specific applications. First, for the identification of correlations between different parts of the maize zmSRp32 gene. There, we find significant dependencies between the 5' untranslated region in zmSRp32 and its alternatively spliced exons. This observation may indicate the presence of as-yet unknown alternative splicing mechanisms or structural scaffolds. Second, using data from the FBI's Combined DNA Index System (CODIS), we demonstrate that our approach is particularly well suited for the problem of discovering short tandem repeats, an application of importance in genetic profiling.
[ { "version": "v1", "created": "Fri, 26 Oct 2007 22:26:36 GMT" } ]
2007-10-30T00:00:00
[ [ "Aktulga", "H. M.", "" ], [ "Kontoyiannis", "I.", "" ], [ "Lyznik", "L. A.", "" ], [ "Szpankowski", "L.", "" ], [ "Grama", "A. Y.", "" ], [ "Szpankowski", "W.", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.5194
Masoud Ebrahimi
Masoud Ebrahimi and Amir K. Khandani
Rate-Constrained Wireless Networks with Fading Channels: Interference-Limited and Noise-Limited Regimes
Submitted to IEEE Trans. Information Theory
null
null
null
cs.IT math.IT
null
A network of $n$ wireless communication links is considered in a Rayleigh fading environment. It is assumed that each link can be active and transmit with a constant power $P$ or remain silent. The objective is to maximize the number of active links such that each active link can transmit with a constant rate $\lambda$. An upper bound is derived that shows the number of active links scales at most like $\frac{1}{\lambda} \log n$. To obtain a lower bound, a decentralized link activation strategy is described and analyzed. It is shown that for small values of $\lambda$, the number of supported links by this strategy meets the upper bound; however, as $\lambda$ grows, this number becomes far below the upper bound. To shrink the gap between the upper bound and the achievability result, a modified link activation strategy is proposed and analyzed based on some results from random graph theory. It is shown that this modified strategy performs very close to the optimum. Specifically, this strategy is \emph{asymptotically almost surely} optimum when $\lambda$ approaches $\infty$ or 0. It turns out the optimality results are obtained in an interference-limited regime. It is demonstrated that, by proper selection of the algorithm parameters, the proposed scheme also allows the network to operate in a noise-limited regime in which the transmission rates can be adjusted by the transmission powers. The price for this flexibility is a decrease in the throughput scaling law by a multiplicative factor of $\log \log n$.
[ { "version": "v1", "created": "Fri, 26 Oct 2007 23:36:59 GMT" } ]
2007-10-30T00:00:00
[ [ "Ebrahimi", "Masoud", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.5230
Guangwen Li
Guangwen Li, Guangzeng Feng
Generalized reliability-based syndrome decoding for LDPC codes
9 pages, 3 figures
null
null
null
cs.IT math.IT
null
Aiming at bridging the gap between the maximum likelihood decoding (MLD) and the suboptimal iterative decodings for short or medium length LDPC codes, we present a generalized ordered statistic decoding (OSD) in the form of syndrome decoding, to cascade with the belief propagation (BP) or enhanced min-sum decoding. The OSD is invoked only when the decoding failures are obtained for the preceded iterative decoding method. With respect to the existing OSD which is based on the accumulated log-likelihood ratio (LLR) metric, we extend the accumulative metric to the situation where the BP decoding is in the probability domain. Moreover, after generalizing the accumulative metric to the context of the normalized or offset min-sum decoding, the OSD shows appealing tradeoff between performance and complexity. In the OSD implementation, when deciding the true error pattern among many candidates, an alternative proposed proves to be effective to reduce the number of real additions without performance loss. Simulation results demonstrate that the cascade connection of enhanced min-sum and OSD decodings outperforms the BP alone significantly, in terms of either performance or complexity.
[ { "version": "v1", "created": "Sat, 27 Oct 2007 14:31:16 GMT" }, { "version": "v2", "created": "Thu, 15 May 2008 22:54:02 GMT" } ]
2008-05-16T00:00:00
[ [ "Li", "Guangwen", "" ], [ "Feng", "Guangzeng", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.5235
Massimiliano Laddomada Ph.D.
F. Daneshgaran, Massimiliano Laddomada, F. Mesiti, M. Mondin
Unsaturated Throughput Analysis of IEEE 802.11 in Presence of Non Ideal Transmission Channel and Capture Effects
To appear on IEEE Transactions on Wireless Communications, 2008
null
10.1109/TWC.2008.060859
null
cs.NI
null
In this paper, we provide a throughput analysis of the IEEE 802.11 protocol at the data link layer in non-saturated traffic conditions taking into account the impact of both transmission channel and capture effects in Rayleigh fading environment. The impact of both non-ideal channel and capture become important in terms of the actual observed throughput in typical network conditions whereby traffic is mainly unsaturated, especially in an environment of high interference. We extend the multi-dimensional Markovian state transition model characterizing the behavior at the MAC layer by including transmission states that account for packet transmission failures due to errors caused by propagation through the channel, along with a state characterizing the system when there are no packets to be transmitted in the buffer of a station. Finally, we derive a linear model of the throughput along with its interval of validity. Simulation results closely match the theoretical derivations confirming the effectiveness of the proposed model.
[ { "version": "v1", "created": "Sat, 27 Oct 2007 15:49:39 GMT" } ]
2016-11-17T00:00:00
[ [ "Daneshgaran", "F.", "" ], [ "Laddomada", "Massimiliano", "" ], [ "Mesiti", "F.", "" ], [ "Mondin", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.5236
Massimiliano Laddomada Ph.D.
F. Daneshgaran, Massimiliano Laddomada, F. Mesiti, M. Mondin
Saturation Throughput Analysis of IEEE 802.11 in Presence of Non Ideal Transmission Channel and Capture Effects
To appear on IEEE Transactions on Communications, 2008
null
10.1109/TCOMM.2008.060397
null
cs.NI
null
In this paper, we provide a saturation throughput analysis of the IEEE 802.11 protocol at the data link layer by including the impact of both transmission channel and capture effects in Rayleigh fading environment. Impacts of both non-ideal channel and capture effects, specially in an environment of high interference, become important in terms of the actual observed throughput. As far as the 4-way handshaking mechanism is concerned, we extend the multi-dimensional Markovian state transition model characterizing the behavior at the MAC layer by including transmission states that account for packet transmission failures due to errors caused by propagation through the channel. This way, any channel model characterizing the physical transmission medium can be accommodated, including AWGN and fading channels. We also extend the Markov model in order to consider the behavior of the contention window when employing the basic 2-way handshaking mechanism. Under the usual assumptions regarding the traffic generated per node and independence of packet collisions, we solve for the stationary probabilities of the Markov chain and develop expressions for the saturation throughput as a function of the number of terminals, packet sizes, raw channel error rates, capture probability, and other key system parameters. The theoretical derivations are then compared to simulation results confirming the effectiveness of the proposed models.
[ { "version": "v1", "created": "Sat, 27 Oct 2007 15:57:49 GMT" } ]
2016-11-17T00:00:00
[ [ "Daneshgaran", "F.", "" ], [ "Laddomada", "Massimiliano", "" ], [ "Mesiti", "F.", "" ], [ "Mondin", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.5238
Massimiliano Laddomada Ph.D.
F. Daneshgaran, Massimiliano Laddomada, F. Mesiti, M. Mondin
On The Linear Behaviour of the Throughput of IEEE 802.11 DCF in Non-Saturated Conditions
To appear on IEEE Communications Letters, November 2007
null
10.1109/LCOMM.2007.071149
null
cs.NI
null
We propose a linear model of the throughput of the IEEE 802.11 Distributed Coordination Function (DCF) protocol at the data link layer in non-saturated traffic conditions. We show that the throughput is a linear function of the packet arrival rate (PAR) $\lambda$ with a slope depending on both the number of contending stations and the average payload length. We also derive the interval of validity of the proposed model by showing the presence of a critical $\lambda$, above which the station begins operating in saturated traffic conditions. The analysis is based on the multi-dimensional Markovian state transition model proposed by Liaw \textit{et al.} with the aim of describing the behaviour of the MAC layer in unsaturated traffic conditions. Simulation results closely match the theoretical derivations, confirming the effectiveness of the proposed linear model.
[ { "version": "v1", "created": "Sat, 27 Oct 2007 16:04:49 GMT" } ]
2016-11-17T00:00:00
[ [ "Daneshgaran", "F.", "" ], [ "Laddomada", "Massimiliano", "" ], [ "Mesiti", "F.", "" ], [ "Mondin", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.5241
Massimiliano Laddomada Ph.D.
F. Daneshgaran, Massimiliano Laddomada, M. Mondin
Connection Between System Parameters and Localization Probability in Network of Randomly Distributed Nodes
To appear on IEEE Transactions on Wireless Communications, November 2007
null
10.1109/TWC.2007.05785
null
cs.NI cs.DM cs.IT math.IT
null
This article deals with localization probability in a network of randomly distributed communication nodes contained in a bounded domain. A fraction of the nodes denoted as L-nodes are assumed to have localization information while the rest of the nodes denoted as NL nodes do not. The basic model assumes each node has a certain radio coverage within which it can make relative distance measurements. We model both the case radio coverage is fixed and the case radio coverage is determined by signal strength measurements in a Log-Normal Shadowing environment. We apply the probabilistic method to determine the probability of NL-node localization as a function of the coverage area to domain area ratio and the density of L-nodes. We establish analytical expressions for this probability and the transition thresholds with respect to key parameters whereby marked change in the probability behavior is observed. The theoretical results presented in the article are supported by simulations.
[ { "version": "v1", "created": "Sat, 27 Oct 2007 16:13:44 GMT" } ]
2016-11-17T00:00:00
[ [ "Daneshgaran", "F.", "" ], [ "Laddomada", "Massimiliano", "" ], [ "Mondin", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.5242
Massimiliano Laddomada Ph.D.
F. Daneshgaran, Massimiliano Laddomada, F. Mesiti, M. Mondin
A Model of the IEEE 802.11 DCF in Presence of Non Ideal Transmission Channel and Capture Effects
Accepted for oral presentation to IEEE Globecom 2007, Washington D.C., November 2007
null
10.1109/GLOCOM.2007.969
null
cs.NI
null
In this paper, we provide a throughput analysis of the IEEE 802.11 protocol at the data link layer in non-saturated traffic conditions taking into account the impact of both transmission channel and capture effects in Rayleigh fading environment. Impacts of both non-ideal channel and capture become important in terms of the actual observed throughput in typical network conditions whereby traffic is mainly unsaturated, specially in an environment of high interference. We extend the multi-dimensional Markovian state transition model characterizing the behavior at the MAC layer by including transmission states that account for packet transmission failures due to errors caused by propagation through the channel, along with a state characterizing the system when there are no packets to be transmitted in the buffer of a station.
[ { "version": "v1", "created": "Sat, 27 Oct 2007 16:32:03 GMT" } ]
2016-11-17T00:00:00
[ [ "Daneshgaran", "F.", "" ], [ "Laddomada", "Massimiliano", "" ], [ "Mesiti", "F.", "" ], [ "Mondin", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.5327
Paul Gardner-Stephen
Paul Gardner-Stephen
Escalating The War On SPAM Through Practical POW Exchange
To be presented at the IEEE Conference On Networking, Adelaide, Australia, November 19-21, 2007
null
10.1109/ICON.2007.4444132
null
cs.NI cs.CR
null
Proof-of-work (POW) schemes have been proposed in the past. One prominent system is HASHCASH (Back, 2002) which uses cryptographic puzzles . However, work by Laurie and Clayton (2004) has shown that for a uniform proof-of-work scheme on email to have an impact on SPAM, it would also be onerous enough to impact on senders of "legitimate" email. I suggest that a non-uniform proof-of-work scheme on email may be a solution to this problem, and describe a framework that has the potential to limit SPAM, without unduly penalising legitimate senders, and is constructed using only current SPAM filter technology, and a small change to the SMTP (Simple Mail Transfer Protocol). Specifically, I argue that it is possible to make sending SPAM 1,000 times more expensive than sending "legitimate" email (so called HAM). Also, unlike the system proposed by Debin Liu and Jean Camp (2006), it does not require the complications of maintaining a reputation system.
[ { "version": "v1", "created": "Mon, 29 Oct 2007 02:01:09 GMT" } ]
2016-11-17T00:00:00
[ [ "Gardner-Stephen", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0710.5333
Haibin Wang
Haibin Wang, Rajshekhar Sunderraman, Florentin Smarandache, Andre Rogatko
Neutrosophic Relational Data Model
null
null
null
null
cs.DB
null
In this paper, we present a generalization of the relational data model based on interval neutrosophic set. Our data model is capable of manipulating incomplete as well as inconsistent information. Fuzzy relation or intuitionistic fuzzy relation can only handle incomplete information. Associated with each relation are two membership functions one is called truth-membership function T which keeps track of the extent to which we believe the tuple is in the relation, another is called falsity-membership function F which keeps track of the extent to which we believe that it is not in the relation. A neutrosophic relation is inconsistent if there exists one tuple a such that T(a) + F(a) > 1 . In order to handle inconsistent situation, we propose an operator called "split" to transform inconsistent neutrosophic relations into pseudo-consistent neutrosophic relations and do the set-theoretic and relation-theoretic operations on them and finally use another operator called "combine" to transform the result back to neutrosophic relation. For this data model, we define algebraic operators that are generalizations of the usual operators such as intersection, union, selection, join on fuzzy relations. Our data model can underlie any database and knowledge-base management system that deals with incomplete and inconsistent information.
[ { "version": "v1", "created": "Mon, 29 Oct 2007 19:46:58 GMT" } ]
2007-10-30T00:00:00
[ [ "Wang", "Haibin", "" ], [ "Sunderraman", "Rajshekhar", "" ], [ "Smarandache", "Florentin", "" ], [ "Rogatko", "Andre", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0710.5338
Toshiya Itoh
Toshiya Itoh and Osamu Watanabe
Weighted Random Popular Matchings
13 pages, 2 figures
Random Structures and Algorithms, 37(4), pp.477-494, 2010
10.1002/rsa.20316
null
cs.DM cs.CC
null
For a set A of n applicants and a set I of m items, we consider a problem of computing a matching of applicants to items, i.e., a function M mapping A to I; here we assume that each applicant $x \in A$ provides a preference list on items in I. We say that an applicant $x \in A$ prefers an item p than an item q if p is located at a higher position than q in its preference list, and we say that x prefers a matching M over a matching M' if x prefers M(x) over M'(x). For a given matching problem A, I, and preference lists, we say that M is more popular than M' if the number of applicants preferring M over M' is larger than that of applicants preferring M' over M, and M is called a popular matching if there is no other matching that is more popular than M. Here we consider the situation that A is partitioned into $A_{1},A_{2},...,A_{k}$, and that each $A_{i}$ is assigned a weight $w_{i}>0$ such that w_{1}>w_{2}>...>w_{k}>0$. For such a matching problem, we say that M is more popular than M' if the total weight of applicants preferring M over M' is larger than that of applicants preferring M' over M, and we call M an k-weighted popular matching if there is no other matching that is more popular than M. In this paper, we analyze the 2-weighted matching problem, and we show that (lower bound) if $m/n^{4/3}=o(1)$, then a random instance of the 2-weighted matching problem with $w_{1} \geq 2w_{2}$ has a 2-weighted popular matching with probability o(1); and (upper bound) if $n^{4/3}/m = o(1)$, then a random instance of the 2-weighted matching problem with $w_{1} \geq 2w_{2}$ has a 2-weighted popular matching with probability 1-o(1).
[ { "version": "v1", "created": "Mon, 29 Oct 2007 04:41:03 GMT" } ]
2011-09-29T00:00:00
[ [ "Itoh", "Toshiya", "" ], [ "Watanabe", "Osamu", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0710.5340
Salah Aly A
Salah A. Aly, Vishal Kapoor, Jie Meng, Andreas Klappenecker
Bounds on the Network Coding Capacity for Wireless Random Networks
Netcoding07
null
null
null
cs.IT cs.NI math.IT
null
Recently, it has been shown that the max flow capacity can be achieved in a multicast network using network coding. In this paper, we propose and analyze a more realistic model for wireless random networks. We prove that the capacity of network coding for this model is concentrated around the expected value of its minimum cut. Furthermore, we establish upper and lower bounds for wireless nodes using Chernoff bound. Our experiments show that our theoretical predictions are well matched by simulation results.
[ { "version": "v1", "created": "Mon, 29 Oct 2007 05:55:03 GMT" } ]
2008-11-11T00:00:00
[ [ "Aly", "Salah A.", "" ], [ "Kapoor", "Vishal", "" ], [ "Meng", "Jie", "" ], [ "Klappenecker", "Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.5348
Virginie Legrand Contes
Cristian Ruz (INRIA Sophia Antipolis), Fran\c{c}oise Baude (INRIA Sophia Antipolis), Virginie Legrand Contes (INRIA Sophia Antipolis)
Towards Grid Monitoring and deployment in Jade, using ProActive
null
null
null
null
cs.DC
null
This document describes our current effort to gridify Jade, a java-based environment for the autonomic management of clustered J2EE application servers, developed in the INRIA SARDES research team. Towards this objective, we use the java ProActive grid technology. We first present some of the challenges to turn such an autonomic management system initially dedicated to distributed applications running on clusters of machines, into one that can provide self-management capabilities to large-scale systems, i.e. deployed on grid infrastructures. This leads us to a brief state of the art on grid monitoring systems. Then, we recall the architecture of Jade, and consequently propose to reorganize it in a potentially more scalable way. Practical experiments pertain to the use of the grid deployment feature offered by ProActive to easily conduct the deployment of the Jade system or its revised version on any sort of grid.
[ { "version": "v1", "created": "Mon, 29 Oct 2007 10:44:35 GMT" } ]
2009-09-29T00:00:00
[ [ "Ruz", "Cristian", "", "INRIA Sophia Antipolis" ], [ "Baude", "Françoise", "", "INRIA\n Sophia Antipolis" ], [ "Contes", "Virginie Legrand", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0710.5376
Stephan Tinguely
Shraga Bross, Amos Lapidoth, Stephan Tinguely
Broadcasting Correlated Gaussians
submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the transmission of a memoryless bivariate Gaussian source over an average-power-constrained one-to-two Gaussian broadcast channel. The transmitter observes the source and describes it to the two receivers by means of an average-power-constrained signal. Each receiver observes the transmitted signal corrupted by a different additive white Gaussian noise and wishes to estimate the source component intended for it. That is, Receiver~1 wishes to estimate the first source component and Receiver~2 wishes to estimate the second source component. Our interest is in the pairs of expected squared-error distortions that are simultaneously achievable at the two receivers. We prove that an uncoded transmission scheme that sends a linear combination of the source components achieves the optimal power-versus-distortion trade-off whenever the signal-to-noise ratio is below a certain threshold. The threshold is a function of the source correlation and the distortion at the receiver with the weaker noise.
[ { "version": "v1", "created": "Mon, 29 Oct 2007 10:26:27 GMT" }, { "version": "v2", "created": "Fri, 24 Oct 2008 10:05:47 GMT" }, { "version": "v3", "created": "Fri, 20 Mar 2009 13:22:24 GMT" } ]
2009-03-20T00:00:00
[ [ "Bross", "Shraga", "" ], [ "Lapidoth", "Amos", "" ], [ "Tinguely", "Stephan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.5382
Stergos Afantenos
Stergos D. Afantenos
Some Reflections on the Task of Content Determination in the Context of Multi-Document Summarization of Evolving Events
5 pages, 2 figures
Edited by Galia Angelova, Kalina Bontcheva, Ruslan Mitkov, Nicolas Nicolov, and Nikolai Nikolov, Recent Advances in Natural Language Processing (RANLP 2007). Borovets, Bulgaria: INCOMA, 12-16
null
null
cs.CL
null
Despite its importance, the task of summarizing evolving events has received small attention by researchers in the field of multi-document summariztion. In a previous paper (Afantenos et al. 2007) we have presented a methodology for the automatic summarization of documents, emitted by multiple sources, which describe the evolution of an event. At the heart of this methodology lies the identification of similarities and differences between the various documents, in two axes: the synchronic and the diachronic. This is achieved by the introduction of the notion of Synchronic and Diachronic Relations. Those relations connect the messages that are found in the documents, resulting thus in a graph which we call grid. Although the creation of the grid completes the Document Planning phase of a typical NLG architecture, it can be the case that the number of messages contained in a grid is very large, exceeding thus the required compression rate. In this paper we provide some initial thoughts on a probabilistic model which can be applied at the Content Determination stage, and which tries to alleviate this problem.
[ { "version": "v1", "created": "Mon, 29 Oct 2007 10:48:48 GMT" } ]
2007-10-30T00:00:00
[ [ "Afantenos", "Stergos D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0710.5386
Orlando Panella
Paolo Rocchi and Orlando Panella
Acquisition of Information is Achieved by the Measurement Process in Classical and Quantum Physics
Prepared for : Quantum Theory: Reconsideration of Foundations - 4 (QTFR-4), Vaxjo, Sweden, 6-11 June 2007. To be published by the American Institute of Physics in the AIP Conference Proceedings series. Talk presented by Paolo Rocchi
AIP Conf. Proc. -- December 3, 2007 -- Volume 962, pp. 206-214. ISBN:978-0-7354-0479-3, ISSN: 0094-243X
10.1063/1.2827305
null
quant-ph cs.IT hep-th math.IT
null
No consensus seems to exist as to what constitutes a measurement which is still considered somewhat mysterious in many respects in quantum mechanics. At successive stages mathematical theory of measure, metrology and measurement theory tried to systematize this field but significant questions remain open about the nature of measurement, about the characterization of the observer, about the reliability of measurement processes etc. The present paper attempts to talk about these questions through the information science. We start from the idea, rather common and intuitive, that the measurement process basically acquires information. Next we expand this idea through four formal definitions and infer some corollaries regarding the measurement process from those definitions. Relativity emerges as the basic property of measurement from the present logical framework and this rather surprising result collides with the feeling of physicists who take measurement as a myth. In the closing this paper shows how the measurement relativity wholly consists with some effects calculated in QM and in Einstein's theory.
[ { "version": "v1", "created": "Mon, 29 Oct 2007 11:25:35 GMT" } ]
2008-11-21T00:00:00
[ [ "Rocchi", "Paolo", "" ], [ "Panella", "Orlando", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "hep-th", "description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.", "span": "(High Energy Physics - Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.5425
{\L}ukasz Chmielewski Mr.
{\L}ukasz Chmielewski and Jaap-Henk Hoepman
Fuzzy Private Matching (Extended Abstract)
null
null
null
null
cs.CR
null
In the private matching problem, a client and a server each hold a set of $n$ input elements. The client wants to privately compute the intersection of these two sets: he learns which elements he has in common with the server (and nothing more), while the server gains no information at all. In certain applications it would be useful to have a private matching protocol that reports a match even if two elements are only similar instead of equal. Such a private matching protocol is called \emph{fuzzy}, and is useful, for instance, when elements may be inaccurate or corrupted by errors. We consider the fuzzy private matching problem, in a semi-honest environment. Elements are similar if they match on $t$ out of $T$ attributes. First we show that the original solution proposed by Freedman et al. is incorrect. Subsequently we present two fuzzy private matching protocols. The first, simple, protocol has bit message complexity $O(n \binom{T}{t} (T \log{|D|}+k))$. The second, improved, protocol has a much better bit message complexity of $O(n T (\log{|D|}+k))$, but here the client incurs a O(n) factor time complexity. Additionally, we present protocols based on the computation of the Hamming distance and on oblivious transfer, that have different, sometimes more efficient, performance characteristics.
[ { "version": "v1", "created": "Mon, 29 Oct 2007 13:35:36 GMT" } ]
2007-10-30T00:00:00
[ [ "Chmielewski", "Łukasz", "" ], [ "Hoepman", "Jaap-Henk", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0710.5455
Shujun Li Dr.
Shujun Li, Gonzalo Alvarez, Zhong Li and Wolfgang A. Halang
Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey
6 pages, 3 figures, ieeeconf.cls
3rd International IEEE Scientific Conference on Physics and Control (PhysCon 2007), http://lib.physcon.ru/?item=1368
null
null
nlin.CD cs.CR
null
A large number of analog chaos-based secure communication systems have been proposed since the early 1990s exploiting the technique of chaos synchronization. A brief survey of these chaos-based cryptosystems and of related cryptanalytic results is given. Some recently proposed countermeasures against known attacks are also introduced.
[ { "version": "v1", "created": "Mon, 29 Oct 2007 15:22:26 GMT" } ]
2010-06-23T00:00:00
[ [ "Li", "Shujun", "" ], [ "Alvarez", "Gonzalo", "" ], [ "Li", "Zhong", "" ], [ "Halang", "Wolfgang A.", "" ] ]
[ { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0710.5465
Shujun Li Dr.
David Arroyo, Chengqing Li, Shujun Li, Gonzalo Alvarez and Wolfgang A. Halang
Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
8 pages, 2 figures, 1 table
Chaos, Solitons & Fractals, vol. 41, no. 5, pp. 2613-2616, 2009
10.1016/j.chaos.2008.09.051
null
nlin.CD cs.CR cs.MM
null
Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed, where the encryption process involves a permutation operation and an XOR-like transformation of the shuffled pixels, which are controlled by three chaotic systems. This paper discusses some defects of the schemes and how to break them with a chosen-plaintext attack.
[ { "version": "v1", "created": "Mon, 29 Oct 2007 16:00:56 GMT" } ]
2010-06-23T00:00:00
[ [ "Arroyo", "David", "" ], [ "Li", "Chengqing", "" ], [ "Li", "Shujun", "" ], [ "Alvarez", "Gonzalo", "" ], [ "Halang", "Wolfgang A.", "" ] ]
[ { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0710.5471
Shujun Li Dr.
David Arroyo, Chengqing Li, Shujun Li and Gonzalo Alvarez
Cryptanalysis of a computer cryptography scheme based on a filter bank
6 pages, 1 figure
Chaos, Solitons & Fractals, vol. 41, no. 1, pp. 410-413, 2009
10.1016/j.chaos.2008.01.020
null
nlin.CD cs.CR
null
This paper analyzes the security of a recently-proposed signal encryption scheme based on a filter bank. A very critical weakness of this new signal encryption procedure is exploited in order to successfully recover the associated secret key.
[ { "version": "v1", "created": "Mon, 29 Oct 2007 16:18:59 GMT" } ]
2010-06-23T00:00:00
[ [ "Arroyo", "David", "" ], [ "Li", "Chengqing", "" ], [ "Li", "Shujun", "" ], [ "Alvarez", "Gonzalo", "" ] ]
[ { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0710.5501
Ulrich Sorger
Uli Sorger
Discriminated Belief Propagation
null
null
null
TR-CSC-07-01, University of Luxembourg
cs.IT cs.AI math.IT
null
Near optimal decoding of good error control codes is generally a difficult task. However, for a certain type of (sufficiently) good codes an efficient decoding algorithm with near optimal performance exists. These codes are defined via a combination of constituent codes with low complexity trellis representations. Their decoding algorithm is an instance of (loopy) belief propagation and is based on an iterative transfer of constituent beliefs. The beliefs are thereby given by the symbol probabilities computed in the constituent trellises. Even though weak constituent codes are employed close to optimal performance is obtained, i.e., the encoder/decoder pair (almost) achieves the information theoretic capacity. However, (loopy) belief propagation only performs well for a rather specific set of codes, which limits its applicability. In this paper a generalisation of iterative decoding is presented. It is proposed to transfer more values than just the constituent beliefs. This is achieved by the transfer of beliefs obtained by independently investigating parts of the code space. This leads to the concept of discriminators, which are used to improve the decoder resolution within certain areas and defines discriminated symbol beliefs. It is shown that these beliefs approximate the overall symbol probabilities. This leads to an iteration rule that (below channel capacity) typically only admits the solution of the overall decoding problem. Via a Gauss approximation a low complexity version of this algorithm is derived. Moreover, the approach may then be applied to a wide range of channel maps without significant complexity increase.
[ { "version": "v1", "created": "Mon, 29 Oct 2007 19:01:48 GMT" } ]
2007-10-30T00:00:00
[ [ "Sorger", "Uli", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.5512
Santiago Moreno
U. Horst, S. Moreno
Risk Minimization and Optimal Derivative Design in a Principal Agent Game
28 pages, 4 figures
null
null
null
cs.CE
null
We consider the problem of Adverse Selection and optimal derivative design within a Principal-Agent framework. The principal's income is exposed to non-hedgeable risk factors arising, for instance, from weather or climate phenomena. She evaluates her risk using a coherent and law invariant risk measure and tries minimize her exposure by selling derivative securities on her income to individual agents. The agents have mean-variance preferences with heterogeneous risk aversion coefficients. An agent's degree of risk aversion is private information and hidden to the principal who only knows the overall distribution. We show that the principal's risk minimization problem has a solution and illustrate the effects of risk transfer on her income by means of two specific examples. Our model extends earlier work of Barrieu and El Karoui (2005) and Carlier, Ekeland and Touzi (2007).
[ { "version": "v1", "created": "Mon, 29 Oct 2007 20:00:15 GMT" } ]
2007-10-31T00:00:00
[ [ "Horst", "U.", "" ], [ "Moreno", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0710.5547
Miguel Angel Miron C.E.
M. Miron Bernal, H. Coyote Estrada, J. Figueroa Nazuno
Code Similarity on High Level Programs
Proceedings of the 18th Autumn Meeting on Communications, Computers, Electronics and Industrial Exposition. (IEEE - ROCC07). Acapulco, Guerrero, Mexico. 2007
null
null
null
cs.CV cs.DS
null
This paper presents a new approach for code similarity on High Level programs. Our technique is based on Fast Dynamic Time Warping, that builds a warp path or points relation with local restrictions. The source code is represented into Time Series using the operators inside programming languages that makes possible the comparison. This makes possible subsequence detection that represent similar code instructions. In contrast with other code similarity algorithms, we do not make features extraction. The experiments show that two source codes are similar when their respective Time Series are similar.
[ { "version": "v1", "created": "Mon, 29 Oct 2007 22:39:21 GMT" } ]
2007-10-31T00:00:00
[ [ "Bernal", "M. Miron", "" ], [ "Estrada", "H. Coyote", "" ], [ "Nazuno", "J. Figueroa", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0710.5582
Constantinos Daskalakis
Constantinos Daskalakis, Christos Papadimitriou
Computing Equilibria in Anonymous Games
null
null
null
null
cs.GT cs.CC cs.DM
null
We present efficient approximation algorithms for finding Nash equilibria in anonymous games, that is, games in which the players utilities, though different, do not differentiate between other players. Our results pertain to such games with many players but few strategies. We show that any such game has an approximate pure Nash equilibrium, computable in polynomial time, with approximation O(s^2 L), where s is the number of strategies and L is the Lipschitz constant of the utilities. Finally, we show that there is a PTAS for finding an epsilon
[ { "version": "v1", "created": "Tue, 30 Oct 2007 07:32:37 GMT" } ]
2007-10-31T00:00:00
[ [ "Daskalakis", "Constantinos", "" ], [ "Papadimitriou", "Christos", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0710.5640
Massimiliano Laddomada Ph.D.
F. Daneshgaran, Massimiliano Laddomada, M. Mondin
LDPC-Based Iterative Algorithm for Compression of Correlated Sources at Rates Approaching the Slepian-Wolf Bound
Submitted to European Transactions in Telecommunications, July 2007
null
null
null
cs.IT math.IT
null
This article proposes a novel iterative algorithm based on Low Density Parity Check (LDPC) codes for compression of correlated sources at rates approaching the Slepian-Wolf bound. The setup considered in the article looks at the problem of compressing one source at a rate determined based on the knowledge of the mean source correlation at the encoder, and employing the other correlated source as side information at the decoder which decompresses the first source based on the estimates of the actual correlation. We demonstrate that depending on the extent of the actual source correlation estimated through an iterative paradigm, significant compression can be obtained relative to the case the decoder does not use the implicit knowledge of the existence of correlation.
[ { "version": "v1", "created": "Tue, 30 Oct 2007 13:14:20 GMT" } ]
2007-10-31T00:00:00
[ [ "Daneshgaran", "F.", "" ], [ "Laddomada", "Massimiliano", "" ], [ "Mondin", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.5659
Wolfgang Thomas
Stefan W\"ohrle and Wolfgang Thomas
Model Checking Synchronized Products of Infinite Transition Systems
18 pages
Logical Methods in Computer Science, Volume 3, Issue 4 (November 5, 2007) lmcs:755
10.2168/LMCS-3(4:5)2007
null
cs.LO
null
Formal verification using the model checking paradigm has to deal with two aspects: The system models are structured, often as products of components, and the specification logic has to be expressive enough to allow the formalization of reachability properties. The present paper is a study on what can be achieved for infinite transition systems under these premises. As models we consider products of infinite transition systems with different synchronization constraints. We introduce finitely synchronized transition systems, i.e. product systems which contain only finitely many (parameterized) synchronized transitions, and show that the decidability of FO(R), first-order logic extended by reachability predicates, of the product system can be reduced to the decidability of FO(R) of the components. This result is optimal in the following sense: (1) If we allow semifinite synchronization, i.e. just in one component infinitely many transitions are synchronized, the FO(R)-theory of the product system is in general undecidable. (2) We cannot extend the expressive power of the logic under consideration. Already a weak extension of first-order logic with transitive closure, where we restrict the transitive closure operators to arity one and nesting depth two, is undecidable for an asynchronous (and hence finitely synchronized) product, namely for the infinite grid.
[ { "version": "v1", "created": "Tue, 30 Oct 2007 14:39:09 GMT" }, { "version": "v2", "created": "Mon, 5 Nov 2007 11:46:10 GMT" } ]
2015-07-01T00:00:00
[ [ "Wöhrle", "Stefan", "" ], [ "Thomas", "Wolfgang", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0710.5666
Saikat Guha
Saikat Guha, Baris I. Erkmen, Jeffrey H. Shapiro
The Entropy Photon-Number Inequality and its Consequences
3 pages, submitted to "Open Problems Session, ITA 2008, UCSD"
null
null
null
quant-ph cs.IT math.IT
null
Determining the ultimate classical information carrying capacity of electromagnetic waves requires quantum-mechanical analysis to properly account for the bosonic nature of these waves. Recent work has established capacity theorems for bosonic single-user, broadcast, and wiretap channels, under the presumption of two minimum output entropy conjectures. Despite considerable accumulated evidence that supports the validity of these conjectures, they have yet to be proven. Here we show that the preceding minimum output entropy conjectures are simple consequences of an Entropy Photon-Number Inequality, which is a conjectured quantum-mechanical analog of the Entropy Power Inequality (EPI) from classical information theory.
[ { "version": "v1", "created": "Tue, 30 Oct 2007 16:42:29 GMT" }, { "version": "v2", "created": "Fri, 9 Nov 2007 15:16:16 GMT" } ]
2008-02-10T00:00:00
[ [ "Guha", "Saikat", "" ], [ "Erkmen", "Baris I.", "" ], [ "Shapiro", "Jeffrey H.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.5674
Mounira Kourjieh
Yannick Chevalier (IRIT), Mounira Kourjieh (IRIT)
Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version)
null
null
null
null
cs.CR
null
Key substitution vulnerable signature schemes are signature schemes that permit an intruder, given a public verification key and a signed message, to compute a pair of signature and verification keys such that the message appears to be signed with the new signature key. A digital signature scheme is said to be vulnerable to destructive exclusive ownership property (DEO) If it is computationaly feasible for an intruder, given a public verification key and a pair of message and its valid signature relatively to the given public key, to compute a pair of signature and verification keys and a new message such that the given signature appears to be valid for the new message relatively to the new verification key. In this paper, we prove decidability of the insecurity problem of cryptographic protocols where the signature schemes employed in the concrete realisation have this two properties.
[ { "version": "v1", "created": "Tue, 30 Oct 2007 15:13:47 GMT" } ]
2007-10-31T00:00:00
[ [ "Chevalier", "Yannick", "", "IRIT" ], [ "Kourjieh", "Mounira", "", "IRIT" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0710.5697
Kristina Lerman
Kristina Lerman
Social Browsing & Information Filtering in Social Media
null
null
null
null
cs.CY cs.HC
null
Social networks are a prominent feature of many social media sites, a new generation of Web sites that allow users to create and share content. Sites such as Digg, Flickr, and Del.icio.us allow users to designate others as "friends" or "contacts" and provide a single-click interface to track friends' activity. How are these social networks used? Unlike pure social networking sites (e.g., LinkedIn and Facebook), which allow users to articulate their online professional and personal relationships, social media sites are not, for the most part, aimed at helping users create or foster online relationships. Instead, we claim that social media users create social networks to express their tastes and interests, and use them to filter the vast stream of new submissions to find interesting content. Social networks, in fact, facilitate new ways of interacting with information: what we call social browsing. Through an extensive analysis of data from Digg and Flickr, we show that social browsing is one of the primary usage modalities on these social media sites. This finding has implications for how social media sites rate and personalize content.
[ { "version": "v1", "created": "Tue, 30 Oct 2007 16:38:54 GMT" } ]
2007-10-31T00:00:00
[ [ "Lerman", "Kristina", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0710.5758
Behrouz Khoshnevis
Behrouz Khoshnevis, Wei Yu, and Raviraj Adve
Grassmannian Beamforming for MIMO Amplify-and-Forward Relaying
Submitted to IEEE Journal of Selected Areas in Communications, Special Issue on Exploiting Limited Feedback in Tomorrows Wireless Communication Networks
null
10.1109/JSAC.2008.081006
null
cs.IT math.IT
null
In this paper, we derive the optimal transmitter/ receiver beamforming vectors and relay weighting matrix for the multiple-input multiple-output amplify-and-forward relay channel. The analysis is accomplished in two steps. In the first step, the direct link between the transmitter (Tx) and receiver (Rx) is ignored and we show that the transmitter and the relay should map their signals to the strongest right singular vectors of the Tx-relay and relay-Rx channels. Based on the distributions of these vectors for independent identically distributed (i.i.d.) Rayleigh channels, the Grassmannian codebooks are used for quantizing and sending back the channel information to the transmitter and the relay. The simulation results show that even a few number of bits can considerably increase the link reliability in terms of bit error rate. For the second step, the direct link is considered in the problem model and we derive the optimization problem that identifies the optimal Tx beamforming vector. For the i.i.d Rayleigh channels, we show that the solution to this problem is uniformly distributed on the unit sphere and we justify the appropriateness of the Grassmannian codebook (for determining the optimal beamforming vector), both analytically and by simulation. Finally, a modified quantizing scheme is presented which introduces a negligible degradation in the system performance but significantly reduces the required number of feedback bits.
[ { "version": "v1", "created": "Tue, 30 Oct 2007 21:08:55 GMT" } ]
2016-11-17T00:00:00
[ [ "Khoshnevis", "Behrouz", "" ], [ "Yu", "Wei", "" ], [ "Adve", "Raviraj", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.5830
Thomas Voice
Thomas Voice, Gaurav Raina
Stability analysis of a max-min fair Rate Control Protocol (RCP) in a small buffer regime
13 pages, no figures. Submitted to IEEE Transactions on Automatic Control
null
10.1109/TAC.2009.2022115
null
cs.NI
null
In this note we analyse various stability properties of the max-min fair Rate Control Protocol (RCP) operating with small buffers. We first tackle the issue of stability for networks with arbitrary topologies. We prove that the max-min fair RCP fluid model is globally stable in the absence of propagation delays, and also derive a set of conditions for local stability when arbitrary heterogeneous propagation delays are present. The network delay stability result assumes that, at equilibrium, there is only one bottleneck link along each route. Lastly, in the simpler setting of a single link, single delay model, we investigate the impact of the loss of local stability via a Hopf bifurcation.
[ { "version": "v1", "created": "Wed, 31 Oct 2007 10:44:21 GMT" } ]
2016-11-18T00:00:00
[ [ "Voice", "Thomas", "" ], [ "Raina", "Gaurav", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0710.5893
Paul Hurley
Paul Hurley, Ted Hurley
Codes from Zero-divisors and Units in Group Rings
null
null
null
null
cs.IT math.IT
null
We describe and present a new construction method for codes using encodings from group rings. They consist primarily of two types: zero-divisor and unit-derived codes. Previous codes from group rings focused on ideals; for example cyclic codes are ideals in the group ring over a cyclic group. The fresh focus is on the encodings themselves, which only under very limited conditions result in ideals. We use the result that a group ring is isomorphic to a certain well-defined ring of matrices, and thus every group ring element has an associated matrix. This allows matrix algebra to be used as needed in the study and production of codes, enabling the creation of standard generator and check matrices. Group rings are a fruitful source of units and zero-divisors from which new codes result. Many code properties, such as being LDPC or self-dual, may be expressed as properties within the group ring thus enabling the construction of codes with these properties. The methods are general enabling the construction of codes with many types of group rings. There is no restriction on the ring and thus codes over the integers, over matrix rings or even over group rings themselves are possible and fruitful.
[ { "version": "v1", "created": "Wed, 31 Oct 2007 15:57:31 GMT" } ]
2007-11-01T00:00:00
[ [ "Hurley", "Paul", "" ], [ "Hurley", "Ted", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0710.5895
Wim Vanhoof
Francois Gobert, Baudouin Le Charlier
Source-to-source optimizing transformations of Prolog programs based on abstract interpretation
Paper presented at the 17th Workshop on Logic-based Methods in Programming Environments (WLPE2007)
null
null
null
cs.PL cs.LO cs.SE
null
Making a Prolog program more efficient by transforming its source code, without changing its operational semantics, is not an obvious task. It requires the user to have a clear understanding of how the Prolog compiler works, and in particular, of the effects of impure features like the cut. The way a Prolog code is written - e.g., the order of clauses, the order of literals in a clause, the use of cuts or negations - influences its efficiency. Furthermore, different optimization techniques may be redundant or conflicting when they are applied together, depending on the way a procedure is called - e.g., inserting cuts and enabling indexing. We present an optimiser, based on abstract interpretation, that automatically performs safe code transformations of Prolog procedures in the context of some class of input calls. The method is more effective if procedures are annotated with additional information about modes, types, sharing, number of solutions and the like. Thus the approach is similar to Mercury. It applies to any Prolog program, however.
[ { "version": "v1", "created": "Wed, 31 Oct 2007 15:59:50 GMT" } ]
2007-11-01T00:00:00
[ [ "Gobert", "Francois", "" ], [ "Charlier", "Baudouin Le", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0711.0048
Lee Naish
Lee Naish
Declarative Diagnosis of Floundering
12 pages, 0 figures, uses llncs.sty In Proceedings of the 17th Workshop on Logic-based methods in Programming Environments, Eds. Patricia Hill and Wim Vanhoof, pp 48-60, September 2007, Porto, Portugal
null
null
null
cs.PL cs.SE
null
Many logic programming languages have delay primitives which allow coroutining. This introduces a class of bug symptoms -- computations can flounder when they are intended to succeed or finitely fail. For concurrent logic programs this is normally called deadlock. Similarly, constraint logic programs can fail to invoke certain constraint solvers because variables are insufficiently instantiated or constrained. Diagnosing such faults has received relatively little attention to date. Since delay primitives affect the procedural but not the declarative view of programs, it may be expected that debugging would have to consider the often complex details of interleaved execution. However, recent work on semantics has suggested an alternative approach. In this paper we show how the declarative debugging paradigm can be used to diagnose unexpected floundering, insulating the user from the complexities of the execution. Keywords: logic programming, coroutining, delay, debugging, floundering, deadlock, constraints
[ { "version": "v1", "created": "Thu, 1 Nov 2007 01:40:50 GMT" } ]
2007-11-06T00:00:00
[ [ "Naish", "Lee", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0711.0086
Sergey Gubin
Sergey Gubin
Convex and linear models of NP-problems
In part, the results were presented on WCECS 2007/ICCSA 2007. V2 edited
null
null
null
cs.DM cs.CC cs.DS math.CO
null
Reducing the NP-problems to the convex/linear analysis on the Birkhoff polytope.
[ { "version": "v1", "created": "Thu, 1 Nov 2007 08:33:07 GMT" }, { "version": "v2", "created": "Sun, 4 Nov 2007 06:11:22 GMT" } ]
2007-11-04T00:00:00
[ [ "Gubin", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0711.0110
Florent Krzakala
Florent Krzakala and Lenka Zdeborov\'a
Phase Transitions and Computational Difficulty in Random Constraint Satisfaction Problems
10 pages, Proceedings of the International Workshop on Statistical-Mechanical Informatics 2007, Kyoto (Japan) September 16-19, 2007
2008 J. Phys.: Conf. Ser. 95 012012
10.1088/1742-6596/95/1/012012
null
cs.CC cond-mat.stat-mech
null
We review the understanding of the random constraint satisfaction problems, focusing on the q-coloring of large random graphs, that has been achieved using the cavity method of the physicists. We also discuss the properties of the phase diagram in temperature, the connections with the glass transition phenomenology in physics, and the related algorithmic issues.
[ { "version": "v1", "created": "Thu, 1 Nov 2007 13:42:44 GMT" } ]
2008-02-04T00:00:00
[ [ "Krzakala", "Florent", "" ], [ "Zdeborová", "Lenka", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" } ]
0711.0114
Mathieu Couture
Prosenjit Bose, Paz Carmi, Mathieu Couture, Anil Maheshwari, Michiel Smid and Norbert Zeh
Geometric Spanners With Small Chromatic Number
null
null
null
TR-07-15
cs.CG
null
Given an integer $k \geq 2$, we consider the problem of computing the smallest real number $t(k)$ such that for each set $P$ of points in the plane, there exists a $t(k)$-spanner for $P$ that has chromatic number at most $k$. We prove that $t(2) = 3$, $t(3) = 2$, $t(4) = \sqrt{2}$, and give upper and lower bounds on $t(k)$ for $k>4$. We also show that for any $\epsilon >0$, there exists a $(1+\epsilon)t(k)$-spanner for $P$ that has $O(|P|)$ edges and chromatic number at most $k$. Finally, we consider an on-line variant of the problem where the points of $P$ are given one after another, and the color of a point must be assigned at the moment the point is given. In this setting, we prove that $t(2) = 3$, $t(3) = 1+ \sqrt{3}$, $t(4) = 1+ \sqrt{2}$, and give upper and lower bounds on $t(k)$ for $k>4$.
[ { "version": "v1", "created": "Thu, 1 Nov 2007 13:46:14 GMT" } ]
2007-11-02T00:00:00
[ [ "Bose", "Prosenjit", "" ], [ "Carmi", "Paz", "" ], [ "Couture", "Mathieu", "" ], [ "Maheshwari", "Anil", "" ], [ "Smid", "Michiel", "" ], [ "Zeh", "Norbert", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]