id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0710.4799 | EDA Publishing Association | O. Ozturk, H. Saputra, M. Kandemir, I. Kolcu | Access Pattern-Based Code Compression for Memory-Constrained Embedded
Systems | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.OH | null | As compared to a large spectrum of performance optimizations, relatively
little effort has been dedicated to optimize other aspects of embedded
applications such as memory space requirements, power, real-time
predictability, and reliability. In particular, many modern embedded systems
operate under tight memory space constraints. One way of satisfying these
constraints is to compress executable code and data as much as possible. While
research on code compression have studied efficient hardware and software based
code strategies, many of these techniques do not take application behavior into
account, that is, the same compression/decompression strategy is used
irrespective of the application being optimized. This paper presents a code
compression strategy based on control flow graph (CFG) representation of the
embedded program. The idea is to start with a memory image wherein all basic
blocks are compressed, and decompress only the blocks that are predicted to be
needed in the near future. When the current access to a basic block is over,
our approach also decides the point at which the block could be compressed. We
propose several compression and decompression strategies that try to reduce
memory requirements without excessively increasing the original instruction
cycle counts.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 11:54:46 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Ozturk",
"O.",
""
],
[
"Saputra",
"H.",
""
],
[
"Kandemir",
"M.",
""
],
[
"Kolcu",
"I.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0710.4800 | EDA Publishing Association | Hala A. Farouk, Magdy Saeb | An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption
Algorithm (MHHEA) for Data Communication Security | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.CR | null | The hybrid hiding encryption algorithm, as its name implies, embraces
concepts from both steganography and cryptography. In this exertion, an
improved micro-architecture Field Programmable Gate Array (FPGA) implementation
of this algorithm is presented. This design overcomes the observed limitations
of a previously-designed micro-architecture. These observed limitations are: no
exploitation of the possibility of parallel bit replacement, and the fact that
the input plaintext was encrypted serially, which caused a dependency between
the throughput and the nature of the used secret key. This dependency can be
viewed by some as vulnerability in the security of the implemented
micro-architecture. The proposed modified micro-architecture is constructed
using five basic modules. These modules are; the message cache, the message
alignment module, the key cache, the comparator, and at last the encryption
module. In this work, we provide comprehensive simulation and implementation
results. These are: the timing diagrams, the post-implementation timing and
routing reports, and finally the floor plan. Moreover, a detailed comparison
with other FPGA implementations is made available and discussed.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 11:55:19 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Farouk",
"Hala A.",
""
],
[
"Saeb",
"Magdy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0710.4801 | EDA Publishing Association | R. Ruiz-Sautua, M. C. Molina, J. M. Mendias, R. Hermida | Behavioural Transformation to Improve Circuit Performance in High-Level
Synthesis | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | Early scheduling algorithms usually adjusted the clock cycle duration to the
execution time of the slowest operation. This resulted in large slack times
wasted in those cycles executing faster operations. To reduce the wasted times
multi-cycle and chaining techniques have been employed. While these techniques
have produced successful designs, its effectiveness is often limited due to the
area increment that may derive from chaining, and the extra latencies that may
derive from multicycling. In this paper we present an optimization method that
solves the time-constrained scheduling problem by transforming behavioural
specifications into new ones whose subsequent synthesis substantially improves
circuit performance. Our proposal breaks up some of the specification
operations, allowing their execution during several possibly unconsecutive
cycles, and also the calculation of several data-dependent operation fragments
in the same cycle. To do so, it takes into account the circuit latency and the
execution time of every specification operation. The experimental results
carried out show that circuits obtained from the optimized specification are on
average 60% faster than those synthesized from the original specification, with
only slight increments in the circuit area.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 11:55:59 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Ruiz-Sautua",
"R.",
""
],
[
"Molina",
"M. C.",
""
],
[
"Mendias",
"J. M.",
""
],
[
"Hermida",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4802 | EDA Publishing Association | M. Scholive, V. Beroulle, C. Robach, M. L. Flottes (LIRMM), B.
Rouzeyre (LIRMM) | Mutation Sampling Technique for the Generation of Structural Test Data | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.OH | null | Our goal is to produce validation data that can be used as an efficient (pre)
test set for structural stuck-at faults. In this paper, we detail an original
test-oriented mutation sampling technique used for generating such data and we
present a first evaluation on these validation data with regard to a structural
test.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 11:56:47 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Scholive",
"M.",
"",
"LIRMM"
],
[
"Beroulle",
"V.",
"",
"LIRMM"
],
[
"Robach",
"C.",
"",
"LIRMM"
],
[
"Flottes",
"M. L.",
"",
"LIRMM"
],
[
"Rouzeyre",
"B.",
"",
"LIRMM"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0710.4803 | EDA Publishing Association | R. Elbaz, L. Torres (LIRMM), G. Sassatelli (LIRMM), P. Guillemin, C.
Anguille, M. Bardouillet, C. Buatois, J. B. Rigaud | Hardware Engines for Bus Encryption: A Survey of Existing Techniques | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.CR | null | The widening spectrum of applications and services provided by portable and
embedded devices bring a new dimension of concerns in security. Most of those
embedded systems (pay-TV, PDAs, mobile phones, etc...) make use of external
memory. As a result, the main problem is that data and instructions are
constantly exchanged between memory (RAM) and CPU in clear form on the bus.
This memory may contain confidential data like commercial software or private
contents, which either the end-user or the content provider is willing to
protect. The goal of this paper is to clearly describe the problem of
processor-memory bus communications in this regard and the existing techniques
applied to secure the communication channel through encryption - Performance
overheads implied by those solutions will be extensively discussed in this
paper.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 11:57:22 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Elbaz",
"R.",
"",
"LIRMM"
],
[
"Torres",
"L.",
"",
"LIRMM"
],
[
"Sassatelli",
"G.",
"",
"LIRMM"
],
[
"Guillemin",
"P.",
""
],
[
"Anguille",
"C.",
""
],
[
"Bardouillet",
"M.",
""
],
[
"Buatois",
"C.",
""
],
[
"Rigaud",
"J. B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0710.4805 | EDA Publishing Association | Hannu Heusala, Jussi Liedes | Modeling of a Reconfigurable OFDM IP Block Family For an RF System
Simulator | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | The idea of design domain specific Mother Model of IP block family as a base
of modeling of system integration is presented here. A common reconfigurable
Mother Model for ten different standardized digital OFDM transmitters has been
developed. By means of a set of parameters, the mother model can be
reconfigured to any of the ten selected standards. So far the applicability of
the proposed reconfiguration and analog-digital co-modeling methods have been
proved by modeling the function of the digital parts of three, 802.11a, ADSL
and DRM, transmitters in an RF system simulator. The model is intended to be
used as signal source template in RF system simulations. The concept is not
restricted to signal sources, it can be applied to any IP block development.
The idea of the Mother Model will be applied in other design domains to prove
that in certain application areas, OFDM transceivers in this case, the design
process can progress simultaneously in different design domains - mixed signal,
system and RTL-architectural - without the need of high-level synthesis. Only
the Mother Models of three design domains are needed to be formally proved to
function as specified.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 11:57:50 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Heusala",
"Hannu",
""
],
[
"Liedes",
"Jussi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4806 | EDA Publishing Association | Kris Tiri, Ingrid Verbauwhede | A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | This paper presents a digital VLSI design flow to create secure, side-channel
attack (SCA) resistant integrated circuits. The design flow starts from a
normal design in a hardware description language such as VHDL or Verilog and
provides a direct path to a SCA resistant layout. Instead of a full custom
layout or an iterative design process with extensive simulations, a few key
modifications are incorporated in a regular synchronous CMOS standard cell
design flow. We discuss the basis for side-channel attack resistance and adjust
the library databases and constraints files of the synthesis and place & route
procedures accordingly. Experimental results show that a DPA attack on a
regular single ended CMOS standard cell implementation of a module of the DES
algorithm discloses the secret key after 200 measurements. The same attack on a
secure version still does not disclose the secret key after more than 2000
measurements.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 11:57:56 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Tiri",
"Kris",
""
],
[
"Verbauwhede",
"Ingrid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4807 | EDA Publishing Association | G. Chen, M. Kandemir, M. Karakoy | A Constraint Network Based Approach to Memory Layout Optimization | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.PL | null | While loop restructuring based code optimization for array intensive
applications has been successful in the past, it has several problems such as
the requirement of checking dependences (legality issues) and transformation of
all of the array references within the loop body indiscriminately (while some
of the references can benefit from the transformation, others may not). As a
result, data transformations, i.e., transformations that modify memory layout
of array data instead of loop structure have been proposed. One of the problems
associated with data transformations is the difficulty of selecting a memory
layout for an array that is acceptable to the entire program (not just to a
single loop). In this paper, we formulate the problem of determining the memory
layouts of arrays as a constraint network, and explore several methods of
solution in a systematic way. Our experiments provide strong support in favor
of employing constraint processing, and point out future research directions.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 11:59:01 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Chen",
"G.",
""
],
[
"Kandemir",
"M.",
""
],
[
"Karakoy",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0710.4808 | EDA Publishing Association | Young-Taek Kim, Taehun Kim, Youngduk Kim, Chulho Shin, Eui-Young
Chung, Kyu-Myung Choi, Jeong-Taek Kong, Soo-Kwan Eo | Fast and Accurate Transaction Level Modeling of an Extended AMBA2.0 Bus
Architecture | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | Transaction Level Modeling (TLM) approach is used to meet the simulation
speed as well as cycle accuracy for large scale SoC performance analysis. We
implemented a transaction-level model of a proprietary bus called AHB+ which
supports an extended AMBA2.0 protocol. The AHB+ transaction-level model shows
353 times faster than pin-accurate RTL model while maintaining 97% of accuracy
on average. We also present the development procedure of TLM of a bus
architecture.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 11:59:15 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Kim",
"Young-Taek",
""
],
[
"Kim",
"Taehun",
""
],
[
"Kim",
"Youngduk",
""
],
[
"Shin",
"Chulho",
""
],
[
"Chung",
"Eui-Young",
""
],
[
"Choi",
"Kyu-Myung",
""
],
[
"Kong",
"Jeong-Taek",
""
],
[
"Eo",
"Soo-Kwan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4809 | EDA Publishing Association | Andres Takach, Bryan Bowyer, Thomas Bollaert | C Based Hardware Design for Wireless Applications | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | The algorithms used in wireless applications are increasingly more
sophisticated and consequently more challenging to implement in hardware.
Traditional design flows require developing the micro architecture, coding the
RTL, and verifying the generated RTL against the original functional C or
MATLAB specification. This paper describes a C-based design flow that is well
suited for the hardware implementation of DSP algorithms commonly found in
wireless applications. The C design flow relies on guided synthesis to generate
the RTL directly from the untimed C algorithm. The specifics of the C-based
design flow are described using a simple DSP filtering algorithm consisting of
a forward adaptive equalizer, a 64-QAM slicer and an adaptive decision feedback
equalizer. The example illustrates some of the capabilities and advantages
offered by this flow.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 11:59:48 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Takach",
"Andres",
""
],
[
"Bowyer",
"Bryan",
""
],
[
"Bollaert",
"Thomas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4810 | EDA Publishing Association | Zoya Dyka, Peter Langendoerfer | Area Efficient Hardware Implementation of Elliptic Curve Cryptography by
Iteratively Applying Karatsuba's Method | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.CR | null | Securing communication channels is especially needed in wireless
environments. But applying cipher mechanisms in software is limited by the
calculation and energy resources of the mobile devices. If hardware is applied
to realize cryptographic operations cost becomes an issue. In this paper we
describe an approach which tackles all these three points. We implemented a
hardware accelerator for polynomial multiplication in extended Galois fields
(GF) applying Karatsuba's method iteratively. With this approach the area
consumption is reduced to 2.1 mm^2 in comparison to. 6.2 mm^2 for the standard
application of Karatsuba's method i.e. for recursive application. Our approach
also reduces the energy consumption to 60 per cent of the original approach.
The price we have to pay for these achievement is the increased execution time.
In our implementation a polynomial multiplication takes 3 clock cycles whereas
the recurisve Karatsuba approach needs only one clock cycle. But considering
area, energy and calculation speed we are convinced that the benefits of our
approach outweigh its drawback.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:00:04 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Dyka",
"Zoya",
""
],
[
"Langendoerfer",
"Peter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0710.4811 | EDA Publishing Association | Massimo Conti, Daniele Moretti | System Level Analysis of the Bluetooth Standard | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.OH | null | The SystemC modules of the Link Manager Layer and Baseband Layer have been
designed in this work at behavioral level to analyze the performances of the
Bluetooth standard. In particular the probability of the creation of a piconet
in presence of noise in the channel and the power reduction using the sniff and
hold mode have been investigated.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:00:26 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Conti",
"Massimo",
""
],
[
"Moretti",
"Daniele",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0710.4812 | EDA Publishing Association | Sandro V. Silva, Sergio Bampi | Area and Throughput Trade-Offs in the Design of Pipelined Discrete
Wavelet Transform Architectures | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | The JPEG2000 standard defines the discrete wavelet transform (DWT) as a
linear space-to-frequency transform of the image domain in an irreversible
compression. This irreversible discrete wavelet transform is implemented by FIR
filter using 9/7 Daubechies coefficients or a lifting scheme of factorizated
coefficients from 9/7 Daubechies coefficients. This work investigates the
tradeoffs between area, power and data throughput (or operating frequency) of
several implementations of the Discrete Wavelet Transform using the lifting
scheme in various pipeline designs. This paper shows the results of five
different architectures synthesized and simulated in FPGAs. It concludes that
the descriptions with pipelined operators provide the best area-power-operating
frequency trade-off over non-pipelined operators descriptions. Those
descriptions require around 40% more hardware to increase the maximum operating
frequency up to 100% and reduce power consumption to less than 50%. Starting
from behavioral HDL descriptions provide the best area-power-operating
frequency trade-off, improving hardware cost and maximum operating frequency
around 30% in comparison to structural descriptions for the same power
requirement.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:00:41 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Silva",
"Sandro V.",
""
],
[
"Bampi",
"Sergio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4813 | EDA Publishing Association | I. Papaefstathiou, T. Orphanoudakis, G. Kornaros, C. Kachris, I.
Mavroidis, A. Nikologiannis | Queue Management in Network Processors | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | One of the main bottlenecks when designing a network processing system is
very often its memory subsystem. This is mainly due to the state-of-the-art
network links operating at very high speeds and to the fact that in order to
support advanced Quality of Service (QoS), a large number of independent queues
is desirable. In this paper we analyze the performance bottlenecks of various
data memory managers integrated in typical Network Processing Units (NPUs). We
expose the performance limitations of software implementations utilizing the
RISC processing cores typically found in most NPU architectures and we identify
the requirements for hardware assisted memory management in order to achieve
wire-speed operation at gigabit per second rates. Furthermore, we describe the
architecture and performance of a hardware memory manager that fulfills those
requirements. This memory manager, although it is implemented in a
reconfigurable technology, it can provide up to 6.2Gbps of aggregate
throughput, while handling 32K independent queues.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:00:48 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Papaefstathiou",
"I.",
""
],
[
"Orphanoudakis",
"T.",
""
],
[
"Kornaros",
"G.",
""
],
[
"Kachris",
"C.",
""
],
[
"Mavroidis",
"I.",
""
],
[
"Nikologiannis",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4814 | EDA Publishing Association | Andrew Duller, Daniel Towner, Gajinder Panesar, Alan Gray, Will
Robbins | picoArray Technology: The Tool's Story | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | This paper briefly describes the picoArray? architecture, and in particular
the deterministic internal communication fabric. The methods that have been
developed for debugging and verifying systems using devices from the picoArray
family are explained. In order to maximize the computational ability of these
devices, hardware debugging support has been kept to a minimum and the methods
and tools developed to take this into account.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:01:15 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Duller",
"Andrew",
""
],
[
"Towner",
"Daniel",
""
],
[
"Panesar",
"Gajinder",
""
],
[
"Gray",
"Alan",
""
],
[
"Robbins",
"Will",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4815 | EDA Publishing Association | Raul Blazquez, Fred Lee, David Wentzloff, Brian Ginsburg, Johnna
Powell, Anantha Chandrakasan | Direct Conversion Pulsed UWB Transceiver Architecture | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.NI | null | Ultra-wideband (UWB) communication is an emerging wireless technology that
promises high data rates over short distances and precise locationing. The
large available bandwidth and the constraint of a maximum power spectral
density drives a unique set of system challenges. This paper addresses these
challenges using two UWB transceivers and a discrete prototype platform.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:01:54 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Blazquez",
"Raul",
""
],
[
"Lee",
"Fred",
""
],
[
"Wentzloff",
"David",
""
],
[
"Ginsburg",
"Brian",
""
],
[
"Powell",
"Johnna",
""
],
[
"Chandrakasan",
"Anantha",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.4816 | EDA Publishing Association | T. Simunic | Power Saving Techniques for Wireless LANs | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.NI | null | Fast wireless access has rapidly become commonplace. Wireless access points
and Hotspot servers are sprouting everywhere. Battery lifetime continues to be
a critical issue in mobile computing. This paper first gives an overview of
WLAN energy saving strategies, followed by an illustration of a system-level
methodology for saving power in heterogeneous wireless environments.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:02:16 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Simunic",
"T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.4817 | EDA Publishing Association | Daniel Thull, Roberto Sannino | Performance Considerations for an Embedded Implementation of OMA DRM 2 | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.CR | null | As digital content services gain importance in the mobile world, Digital
Rights Management (DRM) applications will become a key component of mobile
terminals. This paper examines the effect dedicated hardware macros for
specific cryptographic functions have on the performance of a mobile terminal
that supports version 2 of the open standard for Digital Rights Management
defined by the Open Mobile Alliance (OMA). Following a general description of
the standard, the paper contains a detailed analysis of the cryptographic
operations that have to be carried out before protected content can be
accessed. The combination of this analysis with data on execution times for
specific algorithms realized in hardware and software has made it possible to
build a model which has allowed us to assert that hardware acceleration for
specific cryptographic algorithms can significantly reduce the impact DRM has
on a mobile terminal's processing performance and battery life.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:02:24 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Thull",
"Daniel",
""
],
[
"Sannino",
"Roberto",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0710.4818 | EDA Publishing Association | Keith Holt | Wireless LAN: Past, Present, and Future | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.NI | null | This paper retraces the historical development of wireless LAN technology in
the context of the pursuit of ever higher data rate, describes the significant
technical breakthroughs that are now occurring, and speculates on future
directions that the technology may take over the remainder of the decade. The
challenges that these developments have created for low power operation are
considered, as well as some of the opportunities that are presented to mitigate
them. The importance of MIMO as an emerging technology for 802.11 is
specifically highlighted, both in terms of the significant increase in data
rate and range that it enables as well as the considerable challenge that it
presents for the development of low power wireless LAN products.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:02:38 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Holt",
"Keith",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.4819 | EDA Publishing Association | S. Lopez, G. M. Callico, J. F. Lopez, R. Sarmiento | A High Quality/Low Computational Cost Technique for Block Matching
Motion Estimation | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.MM | null | Motion estimation is the most critical process in video coding systems. First
of all, it has a definitive impact on the rate-distortion performance given by
the video encoder. Secondly, it is the most computationally intensive process
within the encoding loop. For these reasons, the design of high-performance
low-cost motion estimators is a crucial task in the video compression field. An
adaptive cost block matching (ACBM) motion estimation technique is presented in
this paper, featuring an excellent tradeoff between the quality of the
reconstructed video sequences and the computational effort. Simulation results
demonstrate that the ACBM algorithm achieves a slight better rate-distortion
performance than the one given by the well-known full search algorithm block
matching algorithm with reductions of up to 95% in the computational load.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:03:15 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Lopez",
"S.",
""
],
[
"Callico",
"G. M.",
""
],
[
"Lopez",
"J. F.",
""
],
[
"Sarmiento",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0710.4820 | EDA Publishing Association | Partha Biswas, Sudarshan Banerjee, Nikil Dutt, Laura Pozzi, Paolo
Ienne | ISEGEN: Generation of High-Quality Instruction Set Extensions by
Iterative Improvement | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005) | null | null | cs.AR | null | Customization of processor architectures through Instruction Set Extensions
(ISEs) is an effective way to meet the growing performance demands of embedded
applications. A high-quality ISE generation approach needs to obtain results
close to those achieved by experienced designers, particularly for complex
applications that exhibit regularity: expert designers are able to exploit
manually such regularity in the data flow graphs to generate high-quality ISEs.
In this paper, we present ISEGEN, an approach that identifies high-quality ISEs
by iterative improvement following the basic principles of the well-known
Kernighan-Lin (K-L) min-cut heuristic. Experimental results on a number of
MediaBench, EEMBC and cryptographic applications show that our approach matches
the quality of the optimal solution obtained by exhaustive search. We also show
that our ISEGEN technique is on average 20x faster than a genetic formulation
that generates equivalent solutions. Furthermore, the ISEs identified by our
technique exhibit 35% more speedup than the genetic solution on a large
cryptographic application (AES) by effectively exploiting its regular
structure.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:04:11 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Biswas",
"Partha",
""
],
[
"Banerjee",
"Sudarshan",
""
],
[
"Dutt",
"Nikil",
""
],
[
"Pozzi",
"Laura",
""
],
[
"Ienne",
"Paolo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4821 | EDA Publishing Association | Wayne Wolf | Multimedia Applications of Multiprocessor Systems-on-Chips | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.MM | null | This paper surveys the characteristics of multimedia systems. Multimedia
applications today are dominated by compression and decompression, but
multimedia devices must also implement many other functions such as security
and file management. We introduce some basic concepts of multimedia algorithms
and the larger set of functions that multimedia systems-on-chips must
implement.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:04:15 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Wolf",
"Wayne",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0710.4823 | EDA Publishing Association | W. Stechele, L. Alvado Carcel, S. Herrmann, J. Lidon Simon | A Coprocessor for Accelerating Visual Information Processing | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.MM | null | Visual information processing will play an increasingly important role in
future electronics systems. In many applications, e.g. video surveillance
cameras, data throughput of microprocessors is not sufficient and power
consumption is too high. Instruction profiling on a typical test algorithm has
shown that pixel address calculations are the dominant operations to be
optimized. Therefore AddressLib, a structured scheme for pixel addressing was
developed, that can be accelerated by AddressEngine, a coprocessor for visual
information processing. In this paper, the architectural design of
AddressEngine is described, which in the first step supports a subset of the
AddressLib. Dataflow and memory organization are optimized during architectural
design. AddressEngine was implemented in a FPGA and was tested with MPEG-7
Global Motion Estimation algorithm. Results on processing speed and circuit
complexity are given and compared to a pure software implementation. The next
step will be the support for the full AddressLib, including segment addressing.
An outlook on further investigations on dynamic reconfiguration capabilities is
given.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:04:42 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Stechele",
"W.",
""
],
[
"Carcel",
"L. Alvado",
""
],
[
"Herrmann",
"S.",
""
],
[
"Simon",
"J. Lidon",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0710.4824 | EDA Publishing Association | R. Pradeep, S. Vinay, Sanjay Burman, V. Kamakoti | FPGA based Agile Algorithm-On-Demand Co-Processor | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | With growing computational needs of many real-world applications, frequently
changing specifications of standards, and the high design and NRE costs of
ASICs, an algorithm-agile FPGA based co-processor has become a viable
alternative. In this article, we report about the general design of an
algorith-agile co-processor and the proof-of-concept implementation.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:04:43 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Pradeep",
"R.",
""
],
[
"Vinay",
"S.",
""
],
[
"Burman",
"Sanjay",
""
],
[
"Kamakoti",
"V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4825 | EDA Publishing Association | Wayne Lyons | Meeting the Embedded Design Needs of Automotive Applications | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | The importance of embedded systems in driving innovation in automotive
applications continues to grow. Understanding the specific needs of developers
targeting this market is also helping to drive innovation in RISC core design.
This paper describes how a RISC instruction set architecture has evolved to
better meet those needs, and the key implementation features in two very
different RISC cores are used to demonstrate the challenges of designing for
real-time automotive systems.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:05:33 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Lyons",
"Wayne",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4826 | EDA Publishing Association | C. Jeffrey, R. Cutajar, S. Prosser, M. Lickess, A. Richardson, S.
Riches | The Integration of On-Line Monitoring and Reconfiguration Functions
using EDAA - European design and Automation Association1149.4 Into a Safety
Critical Automotive Electronic Control Unit | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | This paper presents an innovative application of EDAA - European design and
Automation Association 1149.4 and the Integrated Diagnostic Reconfiguration
(IDR) as tools for the implementation of an embedded test solution for an
Automotive Electronic Control Unit implemented as a fully integrated mixed
signal system. The paper described how the test architecture can be used for
fault avoidance with results from a hardware prototype presented. The paper
concludes that fault avoidance can be integrated into mixed signal electronic
systems to handle key failure modes.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:06:43 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Jeffrey",
"C.",
""
],
[
"Cutajar",
"R.",
""
],
[
"Prosser",
"S.",
""
],
[
"Lickess",
"M.",
""
],
[
"Richardson",
"A.",
""
],
[
"Riches",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4827 | EDA Publishing Association | A. Mayer, H. Siebert, K.D. Mcdonald-Maier | Debug Support, Calibration and Emulation for Multiple Processor and
Powertrain Control SoCs | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | The introduction of complex SoCs with multiple processor cores presents new
development challenges, such that development support is now a decisive factor
when choosing a System-on-Chip (SoC). The presented developments support
strategy addresses the challenges using both architecture and technology
approaches. The Multi-Core Debug Support (MCDS) architecture provides flexible
triggering using cross triggers and a multiple core break and suspend switch.
Temporal trace ordering is guaranteed down to cycle level by on-chip time
stamping. The Package Sized-ICE (PSI) approach is a novel method of including
trace buffers, overlay memories, processing resources and communication
interfaces without changing device behavior. PSI requires no external emulation
box, as the debug host interfaces directly with the SoC using a standard
interface.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:07:17 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Mayer",
"A.",
""
],
[
"Siebert",
"H.",
""
],
[
"Mcdonald-Maier",
"K. D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4828 | Hossein Hajiabolhassan | Hossein Hajiabolhassan and Abbas Cheraghi | Bounds for Visual Cryptography Schemes | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate the best pixel expansion of the various models
of visual cryptography schemes. In this regard, we consider visual cryptography
schemes introduced by Tzeng and Hu [13]. In such a model, only minimal
qualified sets can recover the secret image and that the recovered secret image
can be darker or lighter than the background. Blundo et al. [4] introduced a
lower bound for the best pixel expansion of this scheme in terms of minimal
qualified sets. We present another lower bound for the best pixel expansion of
the scheme. As a corollary, we introduce a lower bound, based on an induced
matching of hypergraph of qualified sets, for the best pixel expansion of the
aforementioned model and the traditional model of visual cryptography realized
by basis matrices. Finally, we study access structures based on graphs and we
present an upper bound for the smallest pixel expansion in terms of strong
chromatic index.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:17:15 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Oct 2008 01:49:21 GMT"
},
{
"version": "v3",
"created": "Sat, 6 Jun 2009 07:08:14 GMT"
},
{
"version": "v4",
"created": "Mon, 7 Sep 2009 03:55:32 GMT"
},
{
"version": "v5",
"created": "Thu, 3 Dec 2009 11:57:02 GMT"
}
] | 2009-12-03T00:00:00 | [
[
"Hajiabolhassan",
"Hossein",
""
],
[
"Cheraghi",
"Abbas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0710.4829 | EDA Publishing Association | Dirk Ziegenbein, Peter Braun, Ulrich Freund, Andreas Bauer, Jan
Romberg, Bernhard Schatz | AutoMoDe - Model-Based Development of Automotive Software | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.SE | null | This paper describes first results from the AutoMoDe (Automotive Model-Based
Development) project. The overall goal of the project is to develop an
integrated methodology for model-based development of automotive control
software, based on problem-specific design notations with an explicit formal
foundation. Based on the existing AutoFOCUS framework, a tool prototype is
being developed in order to illustrate and validate the key elements of our
approach.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:08:52 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Ziegenbein",
"Dirk",
""
],
[
"Braun",
"Peter",
""
],
[
"Freund",
"Ulrich",
""
],
[
"Bauer",
"Andreas",
""
],
[
"Romberg",
"Jan",
""
],
[
"Schatz",
"Bernhard",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0710.4831 | EDA Publishing Association | Pavel Horsky | LC Oscillator Driver for Safety Critical Applications | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.OH | null | A CMOS harmonic signal LC oscillator driver for automotive applications
working in a harsh environment with high safety critical requirements is
described. The driver can be used with a wide range of external components
parameters (LC resonance network of a sensor). Quality factor of the external
LC network can vary two decades. Amplitude regulation of the driver is
digitally controlled and the DAC is constructed as exponential with
piece-wise-linear (PWL) approximation. Low current consumption for high quality
resonance networks is achieved. Realized oscillator is robust, used in safety
critical application and has low EMC emissions.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:09:44 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Horsky",
"Pavel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0710.4832 | EDA Publishing Association | Massimo Conti | SystemC Analysis of a New Dynamic Power Management Architecture | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | This paper presents a new dynamic power management architecture of a System
on Chip. The Power State Machine describing the status of the core follows the
recommendations of the ACPI standard. The algorithm controls the power states
of each block on the basis of battery status, chip temperature and a user
defined task priority.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:10:19 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Conti",
"Massimo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4833 | EDA Publishing Association | Steve Chappell, Alistair Macarthur, Dan Preston, Dave Olmstead, Bob
Flint, Chris Sullivan | Exploiting Real-Time FPGA Based Adaptive Systems Technology for
Real-Time Sensor Fusion in Next Generation Automotive Safety Systems | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | We present a system for the boresighting of sensors using inertial
measurement devices as the basis for developing a range of dynamic real-time
sensor fusion applications. The proof of concept utilizes a COTS FPGA platform
for sensor fusion and real-time correction of a misaligned video sensor. We
exploit a custom-designed 32-bit soft processor core and C-based design &
synthesis for rapid, platform-neutral development. Kalman filter and sensor
fusion techniques established in advanced aviation systems are applied to
automotive vehicles with results exceeding typical industry requirements for
sensor alignment. Results of the static and the dynamic tests demonstrate that
using inexpensive accelerometers mounted on (or during assembly of) a sensor
and an Inertial Measurement Unit (IMU) fixed to a vehicle can be used to
compute the misalignment of the sensor to the IMU and thus vehicle. In some
cases the model predications and test results exceeded the requirements by an
order of magnitude with a 3-sigma or 99% confidence.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:11:11 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Chappell",
"Steve",
""
],
[
"Macarthur",
"Alistair",
""
],
[
"Preston",
"Dan",
""
],
[
"Olmstead",
"Dave",
""
],
[
"Flint",
"Bob",
""
],
[
"Sullivan",
"Chris",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4834 | EDA Publishing Association | L. Fanucci, A. Giambastiani, F. Iozzi, C. Marino, A. Rocchi | Platform Based Design for Automotive Sensor Conditioning | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | In this paper a general architecture suitable to interface several kinds of
sensors for automotive applications is presented. A platform based design
approach is pursued to improve system performance while minimizing
time-to-market.. The platform is composed by an analog front-end and a digital
section. The latter is based on a microcontroller core (8051 IP by Oregano)
plus a set of dedicated hardware dedicated to the complex signal processing
required for sensor conditioning. The microcontroller handles also the
communication with external devices (as a PC) for data output and fast
prototyping. A case study is presented concerning the conditioning of a Gyro
yaw rate sensor for automotive applications. Measured performance results
outperform current state-of-the-art commercial devices.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:12:03 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Fanucci",
"L.",
""
],
[
"Giambastiani",
"A.",
""
],
[
"Iozzi",
"F.",
""
],
[
"Marino",
"C.",
""
],
[
"Rocchi",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4835 | EDA Publishing Association | K.-U. Kirstein, J. Sedivy, T. Salo, C. Hagleitner, T. Vancura, A.
Hierlemann | A CMOS-Based Tactile Sensor for Continuous Blood Pressure Monitoring | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.OH | null | A monolithic integrated tactile sensor array is presented, which is used to
perform non-invasive blood pressure monitoring of a patient. The advantage of
this device compared to a hand cuff based approach is the capability of
recording continuous blood pressure data. The capacitive, membrane-based sensor
device is fabricated in an industrial CMOS-technology combined with post-CMOS
micromachining. The capacitance change is detected by a S?-modulator. The
modulator is operated at a sampling rate of 128kS/s and achieves a resolution
of 12bit with an external decimation filter and an OSR of 128.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:13:35 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Kirstein",
"K. -U.",
""
],
[
"Sedivy",
"J.",
""
],
[
"Salo",
"T.",
""
],
[
"Hagleitner",
"C.",
""
],
[
"Vancura",
"T.",
""
],
[
"Hierlemann",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0710.4836 | EDA Publishing Association | Momchil Milev, Rod Burt | A Tool and Methodology for AC-Stability Analysis of Continuous-Time
Closed-Loop Systems | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.OH | null | Presented are a methodology and a DFII-based tool for AC-stability analysis
of a wide variety of closed-loop continuous-time (operational amplifiers and
other linear circuits). The methodology used allows for easy identification and
diagnostics of ac-stability problems including not only main-loop effects but
also local-instability loops in current mirrors, bias circuits and emitter or
source followers without breaking the loop. The results of the analysis are
easy to interpret. Estimated phase margin is readily available. Instability
nodes and loops along with their respective oscillation frequencies are
immediately identified and mapped to the existing circuit nodes thus offering
significant advantages compared to traditional "black-box" methods of stability
analysis (Transient Overshoot, Bode and Phase margin plots etc.). The tool for
AC-Stability analysis is written in SKILL? and is fully integrated in DFII?
environment. Its "push-button" graphical user interface (GUI) is easy to use
and understand. The tool can be invoked directly from Composer? schematic and
does not require active Analog Artist? session. The tool is not dependent on
the use of a specific fabrication technology or Process Design Kit
customization. It requires OCEAN?, Spectre? and Waveform calculator
capabilities to run.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:14:32 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Milev",
"Momchil",
""
],
[
"Burt",
"Rod",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0710.4838 | EDA Publishing Association | Christoph Sandner, Martin Clara, Andreas Santner, Thomas Hartig, Franz
Kuttner | A 6bit, 1.2GSps Low-Power Flash-ADC in 0.13$\mu$m Digital CMOS | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | A 6bit flash-ADC with 1.2GSps, wide analog bandwidth and low power, realized
in a standard digital 0.13 $\mu$m CMOS copper technology is presented.
Employing capacitive interpolation gives various advantages when designing for
low power: no need for a reference resistor ladder, implicit sample-and-hold
operation, no edge effects in the interpolation network (as compared to
resistive interpolation), and a very low input capacitance of only 400fF, which
leads to an easily drivable analog converter interface. Operating at 1.2GSps
the ADC achieves an effective resolution bandwidth (ERBW) of 700MHz, while
consuming 160mW of power. At 600MSps we achieve an ERBW of 600MHz with only
90mW power consumption, both from a 1.5V supply. This corresponds to
outstanding Figure-of-Merit numbers (FoM) of 2.2 and 1.5pJ/convstep,
respectively. The module area is 0.12mm^2.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:15:35 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Sandner",
"Christoph",
""
],
[
"Clara",
"Martin",
""
],
[
"Santner",
"Andreas",
""
],
[
"Hartig",
"Thomas",
""
],
[
"Kuttner",
"Franz",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4839 | EDA Publishing Association | Terje N. Andersen, Atle Briskemyr, Frode Telsto, Johnny Bjornsen,
Thomas E. Bonnerud, Bjornar Hernes, Oystein Moldsvor | A 97mW 110MS/s 12b Pipeline ADC Implemented in 0.18$\mu$m Digital CMOS | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | A 12 bit Pipeline ADC fabricated in a 0.18 $\mu$m pure digital CMOS
technology is presented. Its nominal conversion rate is 110MS/s and the nominal
supply voltage is 1.8V. The effective number of bits is 10.4 when a 10MHz input
signal with 2V_{P-P} signal swing is applied. The occupied silicon area is
0.86mm^2 and the power consumption equals 97mW. A switched capacitor bias
current circuit scale the bias current automatically with the conversion rate,
which gives scaleable power consumption and full performance of the ADC from 20
to 140MS/s.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:16:26 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Andersen",
"Terje N.",
""
],
[
"Briskemyr",
"Atle",
""
],
[
"Telsto",
"Frode",
""
],
[
"Bjornsen",
"Johnny",
""
],
[
"Bonnerud",
"Thomas E.",
""
],
[
"Hernes",
"Bjornar",
""
],
[
"Moldsvor",
"Oystein",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4840 | EDA Publishing Association | P. Bernardi, G. Masera, F. Quaglio, M. Sonza Reorda | Testing Logic Cores using a BIST P1500 Compliant Approach: A Case of
Study | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | In this paper we describe how we applied a BIST-based approach to the test of
a logic core to be included in System-on-a-chip (SoC) environments. The
approach advantages are the ability to protect the core IP, the simple test
interface (thanks also to the adoption of the P1500 standard), the possibility
to run the test at-speed, the reduced test time, and the good diagnostic
capabilities. The paper reports figures about the achieved fault coverage, the
required area overhead, and the performance slowdown, and compares the figures
with those for alternative approaches, such as those based on full scan and
sequential ATPG.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:17:29 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Bernardi",
"P.",
""
],
[
"Masera",
"G.",
""
],
[
"Quaglio",
"F.",
""
],
[
"Reorda",
"M. Sonza",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4842 | EDA Publishing Association | Dan Hillman | Using Mobilize Power Management IP for Dynamic & Static Power Reduction
in SoC at 130 nm | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | At 130 nm and 90 nm, power consumption (both dynamic and static) has become a
barrier in the roadmap for SoC designs targeting battery powered, mobile
applications. This paper presents the results of dynamic and static power
reduction achieved implementing Tensilica's 32-bit Xtensa microprocessor core,
using Virtual Silicon's Power Management IP. Independent voltage islands are
created using Virtual Silicon's VIP PowerSaver standard cells by using voltage
level shifting cells and voltage isolation cells to implement power islands.
The VIP PowerSaver standard cells are characterized at 1.2V, 1.0V and 0.8V, to
accommodate voltage scaling. Power islands can also be turned off completely.
Designers can significantly lower both the dynamic power and the quiescent or
leakage power of their SoC designs, with very little impact on speed or area
using Virtual Silicon's VIP Gate Bias standard cells.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:18:38 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Hillman",
"Dan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4843 | EDA Publishing Association | Aline Mello, Leandro Moller, Ney Calazans, Fernando Moraes | MultiNoC: A Multiprocessing System Enabled by a Network on Chip | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | The MultiNoC system implements a programmable on-chip multiprocessing
platform built on top of an efficient, low area overhead intra-chip
interconnection scheme. The employed interconnection structure is a Network on
Chip, or NoC. NoCs are emerging as a viable alternative to increasing demands
on interconnection architectures, due to the following characteristics: (i)
energy efficiency and reliability; (ii) scalability of bandwidth, when compared
to traditional bus architectures; (iii) reusability; (iv) distributed routing
decisions. An external host computer feeds MultiNoC with application
instructions and data. After this initialization procedure, MultiNoC executes
some algorithm. After finishing execution of the algorithm, output data can be
read back by the host. Sequential or parallel algorithms conveniently adapted
to the MultiNoC structure can be executed. The main motivation to propose this
design is to enable the investigation of current trends to increase the number
of embedded processors in SoCs, leading to the concept of "sea of processors"
systems.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:19:07 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Mello",
"Aline",
""
],
[
"Moller",
"Leandro",
""
],
[
"Calazans",
"Ney",
""
],
[
"Moraes",
"Fernando",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4844 | EDA Publishing Association | M. D. Galanis, A. Milidonis, G. Theodoridis, D. Soudris, C. E. Goutis | A Partitioning Methodology for Accelerating Applications in Hybrid
Reconfigurable Platforms | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | In this paper, we propose a methodology for partitioning and mapping
computational intensive applications in reconfigurable hardware blocks of
different granularity. A generic hybrid reconfigurable architecture is
considered so as the methodology can be applicable to a large number of
heterogeneous reconfigurable platforms. The methodology mainly consists of two
stages, the analysis and the mapping of the application onto fine and
coarse-grain hardware resources. A prototype framework consisting of analysis,
partitioning and mapping tools has been also developed. For the coarse-grain
reconfigurable hardware, we use our previous-developed high-performance
coarse-grain data-path. In this work, the methodology is validated using two
real-world applications, an OFDM transmitter and a JPEG encoder. In the case of
the OFDM transmitter, a maximum clock cycles decrease of 82% relative to the
ones in an all fine-grain mapping solution is achieved. The corresponding
performance improvement for the JPEG is 43%.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:20:27 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Galanis",
"M. D.",
""
],
[
"Milidonis",
"A.",
""
],
[
"Theodoridis",
"G.",
""
],
[
"Soudris",
"D.",
""
],
[
"Goutis",
"C. E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4845 | EDA Publishing Association | Tero Rissa, Adam Donlin, Wayne Luk | Evaluation of SystemC Modelling of Reconfigurable Embedded Systems | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | This paper evaluates the use of pin and cycle accurate SystemC models for
embedded system design exploration and early software development. The target
system is MicroBlaze VanillaNet Platform running MicroBlaze uClinux operating
system. The paper compares Register Transfer Level (RTL) Hardware Description
Language (HDL) simulation speed to the simulation speed of several different
SystemC models. It is shown that simulation speed of pin and cycle accurate
models can go up to 150 kHz, compared to 100 Hz range of HDL simulation.
Furthermore, utilising techniques that temporarily compromise cycle accuracy,
effective simulation speed of up to 500 kHz can be obtained.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:21:19 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Rissa",
"Tero",
""
],
[
"Donlin",
"Adam",
""
],
[
"Luk",
"Wayne",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4846 | EDA Publishing Association | M. Borgatti, A. Capello, U. Rossi, J.-L. Lambert, I. Moussa, F. Fummi,
G. Pravadelli | An Integrated Design and Verification Methodology for Reconfigurable
Multimedia Systems | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.MM cs.LO | null | Recently a lot of multimedia applications are emerging on portable
appliances. They require both the flexibility of upgradeable devices
(traditionally software based) and a powerful computing engine (typically
hardware). In this context, programmable HW and dynamic reconfiguration allow
novel approaches to the migration of algorithms from SW to HW. Thus, in the
frame of the Symbad project, we propose an industrial design flow for
reconfigurable SoC's. The goal of Symbad consists of developing a system level
design platform for hardware and software SoC systems including formal and
semi-formal verification techniques.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:24:16 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Borgatti",
"M.",
""
],
[
"Capello",
"A.",
""
],
[
"Rossi",
"U.",
""
],
[
"Lambert",
"J. -L.",
""
],
[
"Moussa",
"I.",
""
],
[
"Fummi",
"F.",
""
],
[
"Pravadelli",
"G.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0710.4847 | Savas Dayanik | Savas Dayanik, Christian Goulding, H. Vincent Poor | Bayesian sequential change diagnosis | null | null | null | null | math.PR cs.IT math.IT math.ST stat.TH | null | Sequential change diagnosis is the joint problem of detection and
identification of a sudden and unobservable change in the distribution of a
random sequence. In this problem, the common probability law of a sequence of
i.i.d. random variables suddenly changes at some disorder time to one of
finitely many alternatives. This disorder time marks the start of a new regime,
whose fingerprint is the new law of observations. Both the disorder time and
the identity of the new regime are unknown and unobservable. The objective is
to detect the regime-change as soon as possible, and, at the same time, to
determine its identity as accurately as possible. Prompt and correct diagnosis
is crucial for quick execution of the most appropriate measures in response to
the new regime, as in fault detection and isolation in industrial processes,
and target detection and identification in national defense. The problem is
formulated in a Bayesian framework. An optimal sequential decision strategy is
found, and an accurate numerical scheme is described for its implementation.
Geometrical properties of the optimal strategy are illustrated via numerical
examples. The traditional problems of Bayesian change-detection and Bayesian
sequential multi-hypothesis testing are solved as special cases. In addition, a
solution is obtained for the problem of detection and identification of
component failure(s) in a system with suspended animation.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 14:38:18 GMT"
}
] | 2007-10-29T00:00:00 | [
[
"Dayanik",
"Savas",
""
],
[
"Goulding",
"Christian",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0710.4848 | EDA Publishing Association | Yasushi Umezawa, Takeshi Shimizu | A Formal Verification Methodology for Checking Data Integrity | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.LO | null | Formal verification techniques have been playing an important role in
pre-silicon validation processes. One of the most important points considered
in performing formal verification is to define good verification scopes; we
should define clearly what to be verified formally upon designs under tests. We
considered the following three practical requirements when we defined the scope
of formal verification. They are (a) hard to verify (b) small to handle, and
(c) easy to understand. Our novel approach is to break down generic properties
for system into stereotype properties in block level and to define requirements
for Verifiable RTL. Consequently, each designer instead of verification experts
can describe properties of the design easily, and formal model checking can be
applied systematically and thoroughly to all the leaf modules. During the
development of a component chip for server platforms, we focused on RAS
(Reliability, Availability, and Serviceability) features and described more
than 2000 properties in PSL. As a result of the formal verification, we found
several critical logic bugs in a short time with limited resources, and
successfully verified all of them. This paper presents a study of the
functional verification methodology.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:24:36 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Umezawa",
"Yasushi",
""
],
[
"Shimizu",
"Takeshi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0710.4850 | EDA Publishing Association | Michael Ullmann, Wansheng Jin, Jurgen Becker | Hardware Support for QoS-based Function Allocation in Reconfigurable
Systems | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.AR | null | This contribution presents a new approach for allocating suitable
function-implementation variants depending on given quality-of-service
function-requirements for run-time reconfigurable multi-device systems. Our
approach adapts methodologies from the domain of knowledge-based systems which
can be used for doing run-time hardware/software resource usage optimizations.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:24:59 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Ullmann",
"Michael",
""
],
[
"Jin",
"Wansheng",
""
],
[
"Becker",
"Jurgen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0710.4851 | EDA Publishing Association | Giuseppe Falconeri, Walid Naifer, Nizar Romdhane | Common Reusable Verification Environment for BCA and RTL Models | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.LO | null | This paper deals with a common verification methodology and environment for
SystemC BCA and RTL models. The aim is to save effort by avoiding the same work
done twice by different people and to reuse the same environment for the two
design views. Applying this methodology the verification task starts as soon as
the functional specification is signed off and it runs in parallel to the
models and design development. The verification environment is modeled with the
aid of dedicated verification languages and it is applied to both the models.
The test suite is exactly the same and thus it's possible to verify the
alignment between the two models. In fact the final step is to check the
cycle-by-cycle match of the interface behavior. A regression tool and a bus
analyzer have been developed to help the verification and the alignment
process. The former is used to automate the testbench generation and to run the
two test suites. The latter is used to verify the alignment between the two
models comparing the waveforms obtained in each run. The quality metrics used
to validate the flow are full functional coverage and full alignment at each IP
port.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:25:32 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Falconeri",
"Giuseppe",
""
],
[
"Naifer",
"Walid",
""
],
[
"Romdhane",
"Nizar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0710.4852 | EDA Publishing Association | John S. Macbeth, Dietmar Heinz, Ken Gray | An Assembler Driven Verification Methodology (ADVM) | Submitted on behalf of EDAA (http://www.edaa.com/) | Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005) | null | null | cs.OH | null | This paper presents an overview of an assembler driven verification
methodology (ADVM) that was created and implemented for a chip card project at
Infineon Technologies AG. The primary advantage of this methodology is that it
enables rapid porting of directed tests to new targets and derivatives, with
only a minimum amount of code refactoring. As a consequence, considerable
verification development time and effort was saved.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:25:35 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Macbeth",
"John S.",
""
],
[
"Heinz",
"Dietmar",
""
],
[
"Gray",
"Ken",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0710.4903 | Parvathinathan Venkitasubramaniam | Parvathinathan Venkitasubramaniam, Ting He and Lang Tong | Anonymous Networking amidst Eavesdroppers | null | null | null | null | cs.IT math.IT | null | The problem of security against timing based traffic analysis in wireless
networks is considered in this work. An analytical measure of anonymity in
eavesdropped networks is proposed using the information theoretic concept of
equivocation. For a physical layer with orthogonal transmitter directed
signaling, scheduling and relaying techniques are designed to maximize
achievable network performance for any given level of anonymity. The network
performance is measured by the achievable relay rates from the sources to
destinations under latency and medium access constraints. In particular,
analytical results are presented for two scenarios:
For a two-hop network with maximum anonymity, achievable rate regions for a
general m x 1 relay are characterized when nodes generate independent Poisson
transmission schedules. The rate regions are presented for both strict and
average delay constraints on traffic flow through the relay.
For a multihop network with an arbitrary anonymity requirement, the problem
of maximizing the sum-rate of flows (network throughput) is considered. A
selective independent scheduling strategy is designed for this purpose, and
using the analytical results for the two-hop network, the achievable throughput
is characterized as a function of the anonymity level. The throughput-anonymity
relation for the proposed strategy is shown to be equivalent to an information
theoretic rate-distortion function.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 16:18:49 GMT"
}
] | 2007-10-26T00:00:00 | [
[
"Venkitasubramaniam",
"Parvathinathan",
""
],
[
"He",
"Ting",
""
],
[
"Tong",
"Lang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.4905 | Oliver Kosut | Oliver Kosut, Lang Tong | Distributed Source Coding in the Presence of Byzantine Sensors | 14 pages. Submitted to IEEE Trans. on IT, Information-theoretic
Security special issue, February 2007. Revised October 2007 | null | 10.1109/TIT.2008.921867 | null | cs.IT math.IT | null | The distributed source coding problem is considered when the sensors, or
encoders, are under Byzantine attack; that is, an unknown group of sensors have
been reprogrammed by a malicious intruder to undermine the reconstruction at
the fusion center. Three different forms of the problem are considered. The
first is a variable-rate setup, in which the decoder adaptively chooses the
rates at which the sensors transmit. An explicit characterization of the
variable-rate achievable sum rates is given for any number of sensors and any
groups of traitors. The converse is proved constructively by letting the
traitors simulate a fake distribution and report the generated values as the
true ones. This fake distribution is chosen so that the decoder cannot
determine which sensors are traitors while maximizing the required rate to
decode every value. Achievability is proved using a scheme in which the decoder
receives small packets of information from a sensor until its message can be
decoded, before moving on to the next sensor. The sensors use randomization to
choose from a set of coding functions, which makes it probabilistically
impossible for the traitors to cause the decoder to make an error. Two forms of
the fixed-rate problem are considered, one with deterministic coding and one
with randomized coding. The achievable rate regions are given for both these
problems, and it is shown that lower rates can be achieved with randomized
coding.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 16:22:59 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Kosut",
"Oliver",
""
],
[
"Tong",
"Lang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.4911 | Cosma Rohilla Shalizi | Cosma Rohilla Shalizi | Social Media as Windows on the Social Life of the Mind | 6 pages, 1 figure, AAAI format, submitted to AAAI spring 2008
symposium on "Social Information Processing" | null | null | null | cs.CY physics.soc-ph | null | This is a programmatic paper, marking out two directions in which the study
of social media can contribute to broader problems of social science:
understanding cultural evolution and understanding collective cognition. Under
the first heading, I discuss some difficulties with the usual, adaptationist
explanations of cultural phenomena, alternative explanations involving network
diffusion effects, and some ways these could be tested using social-media data.
Under the second I describe some of the ways in which social media could be
used to study how the social organization of an epistemic community supports
its collective cognitive performance.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 16:40:20 GMT"
}
] | 2007-10-26T00:00:00 | [
[
"Shalizi",
"Cosma Rohilla",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0710.4965 | Andrzej Kwasniewski | A.K.Kwasniewski | On compositions of numbers and graphs | 12 pages, 4 figures | Bull. Soc. Sci. Lett. Lodz, 59, No1 , (2009),103-116 | null | null | math.CO cs.DM | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The main purpose of this note is to pose a couple of problems which are
easily formulated thought some seem to be not yet solved. These problems are of
general interest for discrete mathematics including a new twig of a bough of
theory of graphs i.e. a given graph compositions. The problems result from and
are served in the entourage of series of exercises with hints based
predominantly on the second reference and other related recent papers.
| [
{
"version": "v1",
"created": "Thu, 25 Oct 2007 22:16:35 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Nov 2010 21:16:17 GMT"
}
] | 2010-11-16T00:00:00 | [
[
"Kwasniewski",
"A. K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0710.4975 | Yoshiharu Maeno | Yoshiharu Maeno | Node discovery problem for a social network | null | Connections vol.29, pp.62-76 (2009) | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Methods to solve a node discovery problem for a social network are presented.
Covert nodes refer to the nodes which are not observable directly. They
transmit the influence and affect the resulting collaborative activities among
the persons in a social network, but do not appear in the surveillance logs
which record the participants of the collaborative activities. Discovering the
covert nodes is identifying the suspicious logs where the covert nodes would
appear if the covert nodes became overt. The performance of the methods is
demonstrated with a test dataset generated from computationally synthesized
networks and a real organization.
| [
{
"version": "v1",
"created": "Fri, 26 Oct 2007 01:32:47 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Aug 2009 04:18:43 GMT"
}
] | 2010-09-28T00:00:00 | [
[
"Maeno",
"Yoshiharu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0710.4982 | Sebastian Roch | Christian Borgs, Jennifer Chayes, Constantinos Daskalakis, Sebastien
Roch | First to Market is not Everything: an Analysis of Preferential
Attachment with Fitness | null | null | null | null | math.PR cs.SI | null | In this paper, we provide a rigorous analysis of preferential attachment with
fitness, a random graph model introduced by Bianconi and Barabasi. Depending on
the shape of the fitness distribution, we observe three distinct phases: a
first-mover-advantage phase, a fit-get-richer phase and an innovation-pays-off
phase.
| [
{
"version": "v1",
"created": "Fri, 26 Oct 2007 03:22:57 GMT"
}
] | 2011-09-07T00:00:00 | [
[
"Borgs",
"Christian",
""
],
[
"Chayes",
"Jennifer",
""
],
[
"Daskalakis",
"Constantinos",
""
],
[
"Roch",
"Sebastien",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
}
] |
0710.4987 | Akisato Kimura | Akisato Kimura, Tomohiko Uyematsu, Shigeaki Kuzuoka, Shun Watanabe | Universal source coding over generalized complementary delivery networks | 18 pages, one column, submitted to IEEE Transactions on Information
Theory, presented at a recent result session in ISIT2007 | IEEE Transactions on Information Theory, Vol.55, No.3,
pp.1360-1373, March 2009. | 10.1109/TIT.2008.2011438 | null | cs.IT math.IT | null | This paper deals with a universal coding problem for a certain kind of
multiterminal source coding network called a generalized complementary delivery
network. In this network, messages from multiple correlated sources are jointly
encoded, and each decoder has access to some of the messages to enable it to
reproduce the other messages. Both fixed-to-fixed length and fixed-to-variable
length lossless coding schemes are considered. Explicit constructions of
universal codes and the bounds of the error probabilities are clarified by
using methods of types and graph-theoretical analysis.
| [
{
"version": "v1",
"created": "Fri, 26 Oct 2007 04:58:43 GMT"
}
] | 2009-04-02T00:00:00 | [
[
"Kimura",
"Akisato",
""
],
[
"Uyematsu",
"Tomohiko",
""
],
[
"Kuzuoka",
"Shigeaki",
""
],
[
"Watanabe",
"Shun",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.4999 | Willemien Visser | Willemien Visser (INRIA Rocquencourt) | L'analyse de l'expertise du point de vue de l'ergonomie cognitive | null | Dans Les expertises sensorielles : Nature et acquisition (2006)
1-12 | null | null | cs.HC | null | This paper presents a review of methods for collecting and analysing data on
complex activities. Starting with methods developed for design, we examine the
possibility to transpose them to other complex activities, especially
activities referring to sensorial expertise. R\'esum\'e Ce texte pr\'esente une
revue de m\'ethodes pour recueillir et analyser des donn\'ees sur des
actvit\'es complexes. A partir de m\'ethodes d\'evelopp\'ees pour des
actvit\'es de conception, nous examinons la possibilit\'e de les transposer \`a
d'autres actvit\'es complexes, notamment des actvit\'es faisant \`a appel \`a
des expertises sensorielles.
| [
{
"version": "v1",
"created": "Fri, 26 Oct 2007 06:32:22 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Nov 2007 08:56:00 GMT"
}
] | 2007-11-08T00:00:00 | [
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0710.5002 | Boris Skoric | B. Skoric | The entropy of keys derived from laser speckle | null | null | null | null | cs.CR cs.CV | null | Laser speckle has been proposed in a number of papers as a high-entropy
source of unpredictable bits for use in security applications. Bit strings
derived from speckle can be used for a variety of security purposes such as
identification, authentication, anti-counterfeiting, secure key storage, random
number generation and tamper protection. The choice of laser speckle as a
source of random keys is quite natural, given the chaotic properties of
speckle. However, this same chaotic behaviour also causes reproducibility
problems. Cryptographic protocols require either zero noise or very low noise
in their inputs; hence the issue of error rates is critical to applications of
laser speckle in cryptography. Most of the literature uses an error reduction
method based on Gabor filtering. Though the method is successful, it has not
been thoroughly analysed.
In this paper we present a statistical analysis of Gabor-filtered speckle
patterns. We introduce a model in which perturbations are described as random
phase changes in the source plane. Using this model we compute the second and
fourth order statistics of Gabor coefficients. We determine the mutual
information between perturbed and unperturbed Gabor coefficients and the bit
error rate in the derived bit string. The mutual information provides an
absolute upper bound on the number of secure bits that can be reproducibly
extracted from noisy measurements.
| [
{
"version": "v1",
"created": "Fri, 26 Oct 2007 06:56:23 GMT"
}
] | 2007-10-29T00:00:00 | [
[
"Skoric",
"B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0710.5006 | Paul Gardner-Stephen | Paul Gardner-Stephen | CANE: The Content Addressed Network Environment | 18 pages, 1 figure | null | null | null | cs.NI cs.CR cs.DC | null | The fragmented nature and asymmetry of local and remote file access and
network access, combined with the current lack of robust authenticity and
privacy, hamstrings the current internet. The collection of disjoint and often
ad-hoc technologies currently in use are at least partially responsible for the
magnitude and potency of the plagues besetting the information economy, of
which spam and email borne virii are canonical examples. The proposed
replacement for the internet, Internet Protocol Version 6 (IPv6), does little
to tackle these underlying issues, instead concentrating on addressing the
technical issues of a decade ago.
This paper introduces CANE, a Content Addressed Network Environment, and
compares it against current internet and related technologies. Specifically,
CANE presents a simple computing environment in which location is abstracted
away in favour of identity, and trust is explicitly defined. Identity is
cryptographically verified and yet remains pervasively open in nature. It is
argued that this approach is capable of being generalised such that file
storage and network access can be unified and subsequently combined with human
interfaces to result in a Unified Theory of Access, which addresses many of the
significant problems besetting the internet community of the early 21st
century.
| [
{
"version": "v1",
"created": "Fri, 26 Oct 2007 07:20:13 GMT"
}
] | 2007-10-29T00:00:00 | [
[
"Gardner-Stephen",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0710.5054 | Massimiliano Zanin | Massimiliano Zanin | WWW Spiders: an introduction | 41 pages, 6 figures | null | null | null | cs.CY | null | In recent years, the study of complex networks has received a lot of
attention. Real systems have gained importance in scientific publications,
despite of an important drawback: the difficulty of retrieving and manage such
great quantity of information. This paper wants to be an introduction to the
construction of spiders and scrapers: specifically, how to program and deploy
safely these kind of software applications. The aim is to show how software can
be prepared to automatically surf the net and retrieve information for the user
with high efficiency and safety.
| [
{
"version": "v1",
"created": "Fri, 26 Oct 2007 11:49:33 GMT"
}
] | 2007-10-29T00:00:00 | [
[
"Zanin",
"Massimiliano",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0710.5116 | Taneli Mielik\"ainen | Matti K\"a\"ari\"ainen, Niels Landwehr, Sampsa Lappalainen and Taneli
Mielik\"ainen | Combining haplotypers | null | null | null | C-2007-57 | cs.LG cs.CE q-bio.QM | null | Statistically resolving the underlying haplotype pair for a genotype
measurement is an important intermediate step in gene mapping studies, and has
received much attention recently. Consequently, a variety of methods for this
problem have been developed. Different methods employ different statistical
models, and thus implicitly encode different assumptions about the nature of
the underlying haplotype structure. Depending on the population sample in
question, their relative performance can vary greatly, and it is unclear which
method to choose for a particular sample. Instead of choosing a single method,
we explore combining predictions returned by different methods in a principled
way, and thereby circumvent the problem of method selection.
We propose several techniques for combining haplotype reconstructions and
analyze their computational properties. In an experimental study on real-world
haplotype data we show that such techniques can provide more accurate and
robust reconstructions, and are useful for outlier detection. Typically, the
combined prediction is at least as accurate as or even more accurate than the
best individual method, effectively circumventing the method selection problem.
| [
{
"version": "v1",
"created": "Fri, 26 Oct 2007 15:13:21 GMT"
}
] | 2007-10-29T00:00:00 | [
[
"Kääriäinen",
"Matti",
""
],
[
"Landwehr",
"Niels",
""
],
[
"Lappalainen",
"Sampsa",
""
],
[
"Mielikäinen",
"Taneli",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0710.5130 | Manfred Kufleitner | Manfred Kufleitner (LaBRI) | A Proof of the Factorization Forest Theorem | 4 pages | null | null | null | cs.LO | null | We show that for every homomorphism $\Gamma^+ \to S$ where $S$ is a finite
semigroup there exists a factorization forest of height $\leq 3 \abs{S}$. The
proof is based on Green's relations.
| [
{
"version": "v1",
"created": "Fri, 26 Oct 2007 15:59:56 GMT"
}
] | 2007-10-29T00:00:00 | [
[
"Kufleitner",
"Manfred",
"",
"LaBRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0710.5144 | Gusztav Morvai | Gusztav Morvai and Benjamin Weiss | Forecasting for stationary binary time series | null | Acta Appl. Math. 79 (2003), no. 1-2, 25--34 | null | null | math.PR cs.IT math.IT | null | The forecasting problem for a stationary and ergodic binary time series
$\{X_n\}_{n=0}^{\infty}$ is to estimate the probability that $X_{n+1}=1$ based
on the observations $X_i$, $0\le i\le n$ without prior knowledge of the
distribution of the process $\{X_n\}$. It is known that this is not possible if
one estimates at all values of $n$. We present a simple procedure which will
attempt to make such a prediction infinitely often at carefully selected
stopping times chosen by the algorithm. We show that the proposed procedure is
consistent under certain conditions, and we estimate the growth rate of the
stopping times.
| [
{
"version": "v1",
"created": "Fri, 26 Oct 2007 17:10:06 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Morvai",
"Gusztav",
""
],
[
"Weiss",
"Benjamin",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.5161 | Sudhir R. Ghorpade | Sudhir R. Ghorpade, Arunkumar R. Patil, and Harish K. Pillai | Decomposable Subspaces, Linear Sections of Grassmann Varieties, and
Higher Weights of Grassmann Codes | 16 pages | Finite Fields Appl. 15 (2009), no. 1, 54--68. | 10.1016/j.ffa.2008.08.001 | null | math.AG cs.IT math.IT | null | Given a homogeneous component of an exterior algebra, we characterize those
subspaces in which every nonzero element is decomposable. In geometric terms,
this corresponds to characterizing the projective linear subvarieties of the
Grassmann variety with its Plucker embedding. When the base field is finite, we
consider the more general question of determining the maximum number of points
on sections of Grassmannians by linear subvarieties of a fixed (co)dimension.
This corresponds to a known open problem of determining the complete weight
hierarchy of linear error correcting codes associated to Grassmann varieties.
We recover most of the known results as well as prove some new results. In the
process we obtain, and utilize, a simple generalization of the Griesmer-Wei
bound for arbitrary linear codes.
| [
{
"version": "v1",
"created": "Fri, 26 Oct 2007 19:10:35 GMT"
}
] | 2009-03-31T00:00:00 | [
[
"Ghorpade",
"Sudhir R.",
""
],
[
"Patil",
"Arunkumar R.",
""
],
[
"Pillai",
"Harish K.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.5190 | Ioannis Kontoyiannis | H.M. Aktulga, I. Kontoyiannis, L.A. Lyznik, L. Szpankowski, A.Y. Grama
and W. Szpankowski | Identifying statistical dependence in genomic sequences via mutual
information estimates | Preliminary version. Final version in EURASIP Journal on
Bioinformatics and Systems Biology. See http://www.hindawi.com/journals/bsb/ | null | null | null | q-bio.GN cs.IT math.IT | null | Questions of understanding and quantifying the representation and amount of
information in organisms have become a central part of biological research, as
they potentially hold the key to fundamental advances. In this paper, we
demonstrate the use of information-theoretic tools for the task of identifying
segments of biomolecules (DNA or RNA) that are statistically correlated. We
develop a precise and reliable methodology, based on the notion of mutual
information, for finding and extracting statistical as well as structural
dependencies. A simple threshold function is defined, and its use in
quantifying the level of significance of dependencies between biological
segments is explored. These tools are used in two specific applications. First,
for the identification of correlations between different parts of the maize
zmSRp32 gene. There, we find significant dependencies between the 5'
untranslated region in zmSRp32 and its alternatively spliced exons. This
observation may indicate the presence of as-yet unknown alternative splicing
mechanisms or structural scaffolds. Second, using data from the FBI's Combined
DNA Index System (CODIS), we demonstrate that our approach is particularly well
suited for the problem of discovering short tandem repeats, an application of
importance in genetic profiling.
| [
{
"version": "v1",
"created": "Fri, 26 Oct 2007 22:26:36 GMT"
}
] | 2007-10-30T00:00:00 | [
[
"Aktulga",
"H. M.",
""
],
[
"Kontoyiannis",
"I.",
""
],
[
"Lyznik",
"L. A.",
""
],
[
"Szpankowski",
"L.",
""
],
[
"Grama",
"A. Y.",
""
],
[
"Szpankowski",
"W.",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.5194 | Masoud Ebrahimi | Masoud Ebrahimi and Amir K. Khandani | Rate-Constrained Wireless Networks with Fading Channels:
Interference-Limited and Noise-Limited Regimes | Submitted to IEEE Trans. Information Theory | null | null | null | cs.IT math.IT | null | A network of $n$ wireless communication links is considered in a Rayleigh
fading environment. It is assumed that each link can be active and transmit
with a constant power $P$ or remain silent. The objective is to maximize the
number of active links such that each active link can transmit with a constant
rate $\lambda$. An upper bound is derived that shows the number of active links
scales at most like $\frac{1}{\lambda} \log n$. To obtain a lower bound, a
decentralized link activation strategy is described and analyzed. It is shown
that for small values of $\lambda$, the number of supported links by this
strategy meets the upper bound; however, as $\lambda$ grows, this number
becomes far below the upper bound. To shrink the gap between the upper bound
and the achievability result, a modified link activation strategy is proposed
and analyzed based on some results from random graph theory. It is shown that
this modified strategy performs very close to the optimum. Specifically, this
strategy is \emph{asymptotically almost surely} optimum when $\lambda$
approaches $\infty$ or 0. It turns out the optimality results are obtained in
an interference-limited regime. It is demonstrated that, by proper selection of
the algorithm parameters, the proposed scheme also allows the network to
operate in a noise-limited regime in which the transmission rates can be
adjusted by the transmission powers. The price for this flexibility is a
decrease in the throughput scaling law by a multiplicative factor of $\log \log
n$.
| [
{
"version": "v1",
"created": "Fri, 26 Oct 2007 23:36:59 GMT"
}
] | 2007-10-30T00:00:00 | [
[
"Ebrahimi",
"Masoud",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.5230 | Guangwen Li | Guangwen Li, Guangzeng Feng | Generalized reliability-based syndrome decoding for LDPC codes | 9 pages, 3 figures | null | null | null | cs.IT math.IT | null | Aiming at bridging the gap between the maximum likelihood decoding (MLD) and
the suboptimal iterative decodings for short or medium length LDPC codes, we
present a generalized ordered statistic decoding (OSD) in the form of syndrome
decoding, to cascade with the belief propagation (BP) or enhanced min-sum
decoding. The OSD is invoked only when the decoding failures are obtained for
the preceded iterative decoding method. With respect to the existing OSD which
is based on the accumulated log-likelihood ratio (LLR) metric, we extend the
accumulative metric to the situation where the BP decoding is in the
probability domain. Moreover, after generalizing the accumulative metric to the
context of the normalized or offset min-sum decoding, the OSD shows appealing
tradeoff between performance and complexity. In the OSD implementation, when
deciding the true error pattern among many candidates, an alternative proposed
proves to be effective to reduce the number of real additions without
performance loss. Simulation results demonstrate that the cascade connection of
enhanced min-sum and OSD decodings outperforms the BP alone significantly, in
terms of either performance or complexity.
| [
{
"version": "v1",
"created": "Sat, 27 Oct 2007 14:31:16 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2008 22:54:02 GMT"
}
] | 2008-05-16T00:00:00 | [
[
"Li",
"Guangwen",
""
],
[
"Feng",
"Guangzeng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.5235 | Massimiliano Laddomada Ph.D. | F. Daneshgaran, Massimiliano Laddomada, F. Mesiti, M. Mondin | Unsaturated Throughput Analysis of IEEE 802.11 in Presence of Non Ideal
Transmission Channel and Capture Effects | To appear on IEEE Transactions on Wireless Communications, 2008 | null | 10.1109/TWC.2008.060859 | null | cs.NI | null | In this paper, we provide a throughput analysis of the IEEE 802.11 protocol
at the data link layer in non-saturated traffic conditions taking into account
the impact of both transmission channel and capture effects in Rayleigh fading
environment. The impact of both non-ideal channel and capture become important
in terms of the actual observed throughput in typical network conditions
whereby traffic is mainly unsaturated, especially in an environment of high
interference.
We extend the multi-dimensional Markovian state transition model
characterizing the behavior at the MAC layer by including transmission states
that account for packet transmission failures due to errors caused by
propagation through the channel, along with a state characterizing the system
when there are no packets to be transmitted in the buffer of a station.
Finally, we derive a linear model of the throughput along with its interval of
validity.
Simulation results closely match the theoretical derivations confirming the
effectiveness of the proposed model.
| [
{
"version": "v1",
"created": "Sat, 27 Oct 2007 15:49:39 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Daneshgaran",
"F.",
""
],
[
"Laddomada",
"Massimiliano",
""
],
[
"Mesiti",
"F.",
""
],
[
"Mondin",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.5236 | Massimiliano Laddomada Ph.D. | F. Daneshgaran, Massimiliano Laddomada, F. Mesiti, M. Mondin | Saturation Throughput Analysis of IEEE 802.11 in Presence of Non Ideal
Transmission Channel and Capture Effects | To appear on IEEE Transactions on Communications, 2008 | null | 10.1109/TCOMM.2008.060397 | null | cs.NI | null | In this paper, we provide a saturation throughput analysis of the IEEE 802.11
protocol at the data link layer by including the impact of both transmission
channel and capture effects in Rayleigh fading environment. Impacts of both
non-ideal channel and capture effects, specially in an environment of high
interference, become important in terms of the actual observed throughput. As
far as the 4-way handshaking mechanism is concerned, we extend the
multi-dimensional Markovian state transition model characterizing the behavior
at the MAC layer by including transmission states that account for packet
transmission failures due to errors caused by propagation through the channel.
This way, any channel model characterizing the physical transmission medium can
be accommodated, including AWGN and fading channels. We also extend the Markov
model in order to consider the behavior of the contention window when employing
the basic 2-way handshaking mechanism.
Under the usual assumptions regarding the traffic generated per node and
independence of packet collisions, we solve for the stationary probabilities of
the Markov chain and develop expressions for the saturation throughput as a
function of the number of terminals, packet sizes, raw channel error rates,
capture probability, and other key system parameters. The theoretical
derivations are then compared to simulation results confirming the
effectiveness of the proposed models.
| [
{
"version": "v1",
"created": "Sat, 27 Oct 2007 15:57:49 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Daneshgaran",
"F.",
""
],
[
"Laddomada",
"Massimiliano",
""
],
[
"Mesiti",
"F.",
""
],
[
"Mondin",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.5238 | Massimiliano Laddomada Ph.D. | F. Daneshgaran, Massimiliano Laddomada, F. Mesiti, M. Mondin | On The Linear Behaviour of the Throughput of IEEE 802.11 DCF in
Non-Saturated Conditions | To appear on IEEE Communications Letters, November 2007 | null | 10.1109/LCOMM.2007.071149 | null | cs.NI | null | We propose a linear model of the throughput of the IEEE 802.11 Distributed
Coordination Function (DCF) protocol at the data link layer in non-saturated
traffic conditions. We show that the throughput is a linear function of the
packet arrival rate (PAR) $\lambda$ with a slope depending on both the number
of contending stations and the average payload length. We also derive the
interval of validity of the proposed model by showing the presence of a
critical $\lambda$, above which the station begins operating in saturated
traffic conditions.
The analysis is based on the multi-dimensional Markovian state transition
model proposed by Liaw \textit{et al.} with the aim of describing the behaviour
of the MAC layer in unsaturated traffic conditions. Simulation results closely
match the theoretical derivations, confirming the effectiveness of the proposed
linear model.
| [
{
"version": "v1",
"created": "Sat, 27 Oct 2007 16:04:49 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Daneshgaran",
"F.",
""
],
[
"Laddomada",
"Massimiliano",
""
],
[
"Mesiti",
"F.",
""
],
[
"Mondin",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.5241 | Massimiliano Laddomada Ph.D. | F. Daneshgaran, Massimiliano Laddomada, M. Mondin | Connection Between System Parameters and Localization Probability in
Network of Randomly Distributed Nodes | To appear on IEEE Transactions on Wireless Communications, November
2007 | null | 10.1109/TWC.2007.05785 | null | cs.NI cs.DM cs.IT math.IT | null | This article deals with localization probability in a network of randomly
distributed communication nodes contained in a bounded domain. A fraction of
the nodes denoted as L-nodes are assumed to have localization information while
the rest of the nodes denoted as NL nodes do not. The basic model assumes each
node has a certain radio coverage within which it can make relative distance
measurements. We model both the case radio coverage is fixed and the case radio
coverage is determined by signal strength measurements in a Log-Normal
Shadowing environment. We apply the probabilistic method to determine the
probability of NL-node localization as a function of the coverage area to
domain area ratio and the density of L-nodes. We establish analytical
expressions for this probability and the transition thresholds with respect to
key parameters whereby marked change in the probability behavior is observed.
The theoretical results presented in the article are supported by simulations.
| [
{
"version": "v1",
"created": "Sat, 27 Oct 2007 16:13:44 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Daneshgaran",
"F.",
""
],
[
"Laddomada",
"Massimiliano",
""
],
[
"Mondin",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.5242 | Massimiliano Laddomada Ph.D. | F. Daneshgaran, Massimiliano Laddomada, F. Mesiti, M. Mondin | A Model of the IEEE 802.11 DCF in Presence of Non Ideal Transmission
Channel and Capture Effects | Accepted for oral presentation to IEEE Globecom 2007, Washington
D.C., November 2007 | null | 10.1109/GLOCOM.2007.969 | null | cs.NI | null | In this paper, we provide a throughput analysis of the IEEE 802.11 protocol
at the data link layer in non-saturated traffic conditions taking into account
the impact of both transmission channel and capture effects in Rayleigh fading
environment. Impacts of both non-ideal channel and capture become important in
terms of the actual observed throughput in typical network conditions whereby
traffic is mainly unsaturated, specially in an environment of high
interference.
We extend the multi-dimensional Markovian state transition model
characterizing the behavior at the MAC layer by including transmission states
that account for packet transmission failures due to errors caused by
propagation through the channel, along with a state characterizing the system
when there are no packets to be transmitted in the buffer of a station.
| [
{
"version": "v1",
"created": "Sat, 27 Oct 2007 16:32:03 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Daneshgaran",
"F.",
""
],
[
"Laddomada",
"Massimiliano",
""
],
[
"Mesiti",
"F.",
""
],
[
"Mondin",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.5327 | Paul Gardner-Stephen | Paul Gardner-Stephen | Escalating The War On SPAM Through Practical POW Exchange | To be presented at the IEEE Conference On Networking, Adelaide,
Australia, November 19-21, 2007 | null | 10.1109/ICON.2007.4444132 | null | cs.NI cs.CR | null | Proof-of-work (POW) schemes have been proposed in the past. One prominent
system is HASHCASH (Back, 2002) which uses cryptographic puzzles . However,
work by Laurie and Clayton (2004) has shown that for a uniform proof-of-work
scheme on email to have an impact on SPAM, it would also be onerous enough to
impact on senders of "legitimate" email. I suggest that a non-uniform
proof-of-work scheme on email may be a solution to this problem, and describe a
framework that has the potential to limit SPAM, without unduly penalising
legitimate senders, and is constructed using only current SPAM filter
technology, and a small change to the SMTP (Simple Mail Transfer Protocol).
Specifically, I argue that it is possible to make sending SPAM 1,000 times more
expensive than sending "legitimate" email (so called HAM). Also, unlike the
system proposed by Debin Liu and Jean Camp (2006), it does not require the
complications of maintaining a reputation system.
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 02:01:09 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Gardner-Stephen",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0710.5333 | Haibin Wang | Haibin Wang, Rajshekhar Sunderraman, Florentin Smarandache, Andre
Rogatko | Neutrosophic Relational Data Model | null | null | null | null | cs.DB | null | In this paper, we present a generalization of the relational data model based
on interval neutrosophic set. Our data model is capable of manipulating
incomplete as well as inconsistent information. Fuzzy relation or
intuitionistic fuzzy relation can only handle incomplete information.
Associated with each relation are two membership functions one is called
truth-membership function T which keeps track of the extent to which we believe
the tuple is in the relation, another is called falsity-membership function F
which keeps track of the extent to which we believe that it is not in the
relation. A neutrosophic relation is inconsistent if there exists one tuple a
such that T(a) + F(a) > 1 . In order to handle inconsistent situation, we
propose an operator called "split" to transform inconsistent neutrosophic
relations into pseudo-consistent neutrosophic relations and do the
set-theoretic and relation-theoretic operations on them and finally use another
operator called "combine" to transform the result back to neutrosophic
relation. For this data model, we define algebraic operators that are
generalizations of the usual operators such as intersection, union, selection,
join on fuzzy relations. Our data model can underlie any database and
knowledge-base management system that deals with incomplete and inconsistent
information.
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 19:46:58 GMT"
}
] | 2007-10-30T00:00:00 | [
[
"Wang",
"Haibin",
""
],
[
"Sunderraman",
"Rajshekhar",
""
],
[
"Smarandache",
"Florentin",
""
],
[
"Rogatko",
"Andre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0710.5338 | Toshiya Itoh | Toshiya Itoh and Osamu Watanabe | Weighted Random Popular Matchings | 13 pages, 2 figures | Random Structures and Algorithms, 37(4), pp.477-494, 2010 | 10.1002/rsa.20316 | null | cs.DM cs.CC | null | For a set A of n applicants and a set I of m items, we consider a problem of
computing a matching of applicants to items, i.e., a function M mapping A to I;
here we assume that each applicant $x \in A$ provides a preference list on
items in I. We say that an applicant $x \in A$ prefers an item p than an item q
if p is located at a higher position than q in its preference list, and we say
that x prefers a matching M over a matching M' if x prefers M(x) over M'(x).
For a given matching problem A, I, and preference lists, we say that M is more
popular than M' if the number of applicants preferring M over M' is larger than
that of applicants preferring M' over M, and M is called a popular matching if
there is no other matching that is more popular than M. Here we consider the
situation that A is partitioned into $A_{1},A_{2},...,A_{k}$, and that each
$A_{i}$ is assigned a weight $w_{i}>0$ such that w_{1}>w_{2}>...>w_{k}>0$. For
such a matching problem, we say that M is more popular than M' if the total
weight of applicants preferring M over M' is larger than that of applicants
preferring M' over M, and we call M an k-weighted popular matching if there is
no other matching that is more popular than M. In this paper, we analyze the
2-weighted matching problem, and we show that (lower bound) if
$m/n^{4/3}=o(1)$, then a random instance of the 2-weighted matching problem
with $w_{1} \geq 2w_{2}$ has a 2-weighted popular matching with probability
o(1); and (upper bound) if $n^{4/3}/m = o(1)$, then a random instance of the
2-weighted matching problem with $w_{1} \geq 2w_{2}$ has a 2-weighted popular
matching with probability 1-o(1).
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 04:41:03 GMT"
}
] | 2011-09-29T00:00:00 | [
[
"Itoh",
"Toshiya",
""
],
[
"Watanabe",
"Osamu",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0710.5340 | Salah Aly A | Salah A. Aly, Vishal Kapoor, Jie Meng, Andreas Klappenecker | Bounds on the Network Coding Capacity for Wireless Random Networks | Netcoding07 | null | null | null | cs.IT cs.NI math.IT | null | Recently, it has been shown that the max flow capacity can be achieved in a
multicast network using network coding. In this paper, we propose and analyze a
more realistic model for wireless random networks. We prove that the capacity
of network coding for this model is concentrated around the expected value of
its minimum cut. Furthermore, we establish upper and lower bounds for wireless
nodes using Chernoff bound. Our experiments show that our theoretical
predictions are well matched by simulation results.
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 05:55:03 GMT"
}
] | 2008-11-11T00:00:00 | [
[
"Aly",
"Salah A.",
""
],
[
"Kapoor",
"Vishal",
""
],
[
"Meng",
"Jie",
""
],
[
"Klappenecker",
"Andreas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.5348 | Virginie Legrand Contes | Cristian Ruz (INRIA Sophia Antipolis), Fran\c{c}oise Baude (INRIA
Sophia Antipolis), Virginie Legrand Contes (INRIA Sophia Antipolis) | Towards Grid Monitoring and deployment in Jade, using ProActive | null | null | null | null | cs.DC | null | This document describes our current effort to gridify Jade, a java-based
environment for the autonomic management of clustered J2EE application servers,
developed in the INRIA SARDES research team. Towards this objective, we use the
java ProActive grid technology. We first present some of the challenges to turn
such an autonomic management system initially dedicated to distributed
applications running on clusters of machines, into one that can provide
self-management capabilities to large-scale systems, i.e. deployed on grid
infrastructures. This leads us to a brief state of the art on grid monitoring
systems. Then, we recall the architecture of Jade, and consequently propose to
reorganize it in a potentially more scalable way. Practical experiments pertain
to the use of the grid deployment feature offered by ProActive to easily
conduct the deployment of the Jade system or its revised version on any sort of
grid.
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 10:44:35 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Ruz",
"Cristian",
"",
"INRIA Sophia Antipolis"
],
[
"Baude",
"Françoise",
"",
"INRIA\n Sophia Antipolis"
],
[
"Contes",
"Virginie Legrand",
"",
"INRIA Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0710.5376 | Stephan Tinguely | Shraga Bross, Amos Lapidoth, Stephan Tinguely | Broadcasting Correlated Gaussians | submitted to the IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the transmission of a memoryless bivariate Gaussian source over
an average-power-constrained one-to-two Gaussian broadcast channel. The
transmitter observes the source and describes it to the two receivers by means
of an average-power-constrained signal. Each receiver observes the transmitted
signal corrupted by a different additive white Gaussian noise and wishes to
estimate the source component intended for it. That is, Receiver~1 wishes to
estimate the first source component and Receiver~2 wishes to estimate the
second source component. Our interest is in the pairs of expected squared-error
distortions that are simultaneously achievable at the two receivers.
We prove that an uncoded transmission scheme that sends a linear combination
of the source components achieves the optimal power-versus-distortion trade-off
whenever the signal-to-noise ratio is below a certain threshold. The threshold
is a function of the source correlation and the distortion at the receiver with
the weaker noise.
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 10:26:27 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Oct 2008 10:05:47 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Mar 2009 13:22:24 GMT"
}
] | 2009-03-20T00:00:00 | [
[
"Bross",
"Shraga",
""
],
[
"Lapidoth",
"Amos",
""
],
[
"Tinguely",
"Stephan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.5382 | Stergos Afantenos | Stergos D. Afantenos | Some Reflections on the Task of Content Determination in the Context of
Multi-Document Summarization of Evolving Events | 5 pages, 2 figures | Edited by Galia Angelova, Kalina Bontcheva, Ruslan Mitkov, Nicolas
Nicolov, and Nikolai Nikolov, Recent Advances in Natural Language Processing
(RANLP 2007). Borovets, Bulgaria: INCOMA, 12-16 | null | null | cs.CL | null | Despite its importance, the task of summarizing evolving events has received
small attention by researchers in the field of multi-document summariztion. In
a previous paper (Afantenos et al. 2007) we have presented a methodology for
the automatic summarization of documents, emitted by multiple sources, which
describe the evolution of an event. At the heart of this methodology lies the
identification of similarities and differences between the various documents,
in two axes: the synchronic and the diachronic. This is achieved by the
introduction of the notion of Synchronic and Diachronic Relations. Those
relations connect the messages that are found in the documents, resulting thus
in a graph which we call grid. Although the creation of the grid completes the
Document Planning phase of a typical NLG architecture, it can be the case that
the number of messages contained in a grid is very large, exceeding thus the
required compression rate. In this paper we provide some initial thoughts on a
probabilistic model which can be applied at the Content Determination stage,
and which tries to alleviate this problem.
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 10:48:48 GMT"
}
] | 2007-10-30T00:00:00 | [
[
"Afantenos",
"Stergos D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0710.5386 | Orlando Panella | Paolo Rocchi and Orlando Panella | Acquisition of Information is Achieved by the Measurement Process in
Classical and Quantum Physics | Prepared for : Quantum Theory: Reconsideration of Foundations - 4
(QTFR-4), Vaxjo, Sweden, 6-11 June 2007. To be published by the American
Institute of Physics in the AIP Conference Proceedings series. Talk presented
by Paolo Rocchi | AIP Conf. Proc. -- December 3, 2007 -- Volume 962, pp. 206-214.
ISBN:978-0-7354-0479-3, ISSN: 0094-243X | 10.1063/1.2827305 | null | quant-ph cs.IT hep-th math.IT | null | No consensus seems to exist as to what constitutes a measurement which is
still considered somewhat mysterious in many respects in quantum mechanics. At
successive stages mathematical theory of measure, metrology and measurement
theory tried to systematize this field but significant questions remain open
about the nature of measurement, about the characterization of the observer,
about the reliability of measurement processes etc. The present paper attempts
to talk about these questions through the information science. We start from
the idea, rather common and intuitive, that the measurement process basically
acquires information. Next we expand this idea through four formal definitions
and infer some corollaries regarding the measurement process from those
definitions. Relativity emerges as the basic property of measurement from the
present logical framework and this rather surprising result collides with the
feeling of physicists who take measurement as a myth. In the closing this paper
shows how the measurement relativity wholly consists with some effects
calculated in QM and in Einstein's theory.
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 11:25:35 GMT"
}
] | 2008-11-21T00:00:00 | [
[
"Rocchi",
"Paolo",
""
],
[
"Panella",
"Orlando",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "hep-th",
"description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.",
"span": "(High Energy Physics - Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.5425 | {\L}ukasz Chmielewski Mr. | {\L}ukasz Chmielewski and Jaap-Henk Hoepman | Fuzzy Private Matching (Extended Abstract) | null | null | null | null | cs.CR | null | In the private matching problem, a client and a server each hold a set of $n$
input elements. The client wants to privately compute the intersection of these
two sets: he learns which elements he has in common with the server (and
nothing more), while the server gains no information at all. In certain
applications it would be useful to have a private matching protocol that
reports a match even if two elements are only similar instead of equal. Such a
private matching protocol is called \emph{fuzzy}, and is useful, for instance,
when elements may be inaccurate or corrupted by errors.
We consider the fuzzy private matching problem, in a semi-honest environment.
Elements are similar if they match on $t$ out of $T$ attributes. First we show
that the original solution proposed by Freedman et al. is incorrect.
Subsequently we present two fuzzy private matching protocols. The first,
simple, protocol has bit message complexity $O(n \binom{T}{t} (T
\log{|D|}+k))$. The second, improved, protocol has a much better bit message
complexity of $O(n T (\log{|D|}+k))$, but here the client incurs a O(n) factor
time complexity. Additionally, we present protocols based on the computation of
the Hamming distance and on oblivious transfer, that have different, sometimes
more efficient, performance characteristics.
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 13:35:36 GMT"
}
] | 2007-10-30T00:00:00 | [
[
"Chmielewski",
"Łukasz",
""
],
[
"Hoepman",
"Jaap-Henk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0710.5455 | Shujun Li Dr. | Shujun Li, Gonzalo Alvarez, Zhong Li and Wolfgang A. Halang | Analog Chaos-based Secure Communications and Cryptanalysis: A Brief
Survey | 6 pages, 3 figures, ieeeconf.cls | 3rd International IEEE Scientific Conference on Physics and
Control (PhysCon 2007), http://lib.physcon.ru/?item=1368 | null | null | nlin.CD cs.CR | null | A large number of analog chaos-based secure communication systems have been
proposed since the early 1990s exploiting the technique of chaos
synchronization. A brief survey of these chaos-based cryptosystems and of
related cryptanalytic results is given. Some recently proposed countermeasures
against known attacks are also introduced.
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 15:22:26 GMT"
}
] | 2010-06-23T00:00:00 | [
[
"Li",
"Shujun",
""
],
[
"Alvarez",
"Gonzalo",
""
],
[
"Li",
"Zhong",
""
],
[
"Halang",
"Wolfgang A.",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0710.5465 | Shujun Li Dr. | David Arroyo, Chengqing Li, Shujun Li, Gonzalo Alvarez and Wolfgang A.
Halang | Cryptanalysis of an image encryption scheme based on a new total
shuffling algorithm | 8 pages, 2 figures, 1 table | Chaos, Solitons & Fractals, vol. 41, no. 5, pp. 2613-2616, 2009 | 10.1016/j.chaos.2008.09.051 | null | nlin.CD cs.CR cs.MM | null | Chaotic systems have been broadly exploited through the last two decades to
build encryption methods. Recently, two new image encryption schemes have been
proposed, where the encryption process involves a permutation operation and an
XOR-like transformation of the shuffled pixels, which are controlled by three
chaotic systems. This paper discusses some defects of the schemes and how to
break them with a chosen-plaintext attack.
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 16:00:56 GMT"
}
] | 2010-06-23T00:00:00 | [
[
"Arroyo",
"David",
""
],
[
"Li",
"Chengqing",
""
],
[
"Li",
"Shujun",
""
],
[
"Alvarez",
"Gonzalo",
""
],
[
"Halang",
"Wolfgang A.",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0710.5471 | Shujun Li Dr. | David Arroyo, Chengqing Li, Shujun Li and Gonzalo Alvarez | Cryptanalysis of a computer cryptography scheme based on a filter bank | 6 pages, 1 figure | Chaos, Solitons & Fractals, vol. 41, no. 1, pp. 410-413, 2009 | 10.1016/j.chaos.2008.01.020 | null | nlin.CD cs.CR | null | This paper analyzes the security of a recently-proposed signal encryption
scheme based on a filter bank. A very critical weakness of this new signal
encryption procedure is exploited in order to successfully recover the
associated secret key.
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 16:18:59 GMT"
}
] | 2010-06-23T00:00:00 | [
[
"Arroyo",
"David",
""
],
[
"Li",
"Chengqing",
""
],
[
"Li",
"Shujun",
""
],
[
"Alvarez",
"Gonzalo",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0710.5501 | Ulrich Sorger | Uli Sorger | Discriminated Belief Propagation | null | null | null | TR-CSC-07-01, University of Luxembourg | cs.IT cs.AI math.IT | null | Near optimal decoding of good error control codes is generally a difficult
task. However, for a certain type of (sufficiently) good codes an efficient
decoding algorithm with near optimal performance exists. These codes are
defined via a combination of constituent codes with low complexity trellis
representations. Their decoding algorithm is an instance of (loopy) belief
propagation and is based on an iterative transfer of constituent beliefs. The
beliefs are thereby given by the symbol probabilities computed in the
constituent trellises. Even though weak constituent codes are employed close to
optimal performance is obtained, i.e., the encoder/decoder pair (almost)
achieves the information theoretic capacity. However, (loopy) belief
propagation only performs well for a rather specific set of codes, which limits
its applicability.
In this paper a generalisation of iterative decoding is presented. It is
proposed to transfer more values than just the constituent beliefs. This is
achieved by the transfer of beliefs obtained by independently investigating
parts of the code space. This leads to the concept of discriminators, which are
used to improve the decoder resolution within certain areas and defines
discriminated symbol beliefs. It is shown that these beliefs approximate the
overall symbol probabilities. This leads to an iteration rule that (below
channel capacity) typically only admits the solution of the overall decoding
problem. Via a Gauss approximation a low complexity version of this algorithm
is derived. Moreover, the approach may then be applied to a wide range of
channel maps without significant complexity increase.
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 19:01:48 GMT"
}
] | 2007-10-30T00:00:00 | [
[
"Sorger",
"Uli",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.5512 | Santiago Moreno | U. Horst, S. Moreno | Risk Minimization and Optimal Derivative Design in a Principal Agent
Game | 28 pages, 4 figures | null | null | null | cs.CE | null | We consider the problem of Adverse Selection and optimal derivative design
within a Principal-Agent framework. The principal's income is exposed to
non-hedgeable risk factors arising, for instance, from weather or climate
phenomena. She evaluates her risk using a coherent and law invariant risk
measure and tries minimize her exposure by selling derivative securities on her
income to individual agents. The agents have mean-variance preferences with
heterogeneous risk aversion coefficients. An agent's degree of risk aversion is
private information and hidden to the principal who only knows the overall
distribution. We show that the principal's risk minimization problem has a
solution and illustrate the effects of risk transfer on her income by means of
two specific examples. Our model extends earlier work of Barrieu and El Karoui
(2005) and Carlier, Ekeland and Touzi (2007).
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 20:00:15 GMT"
}
] | 2007-10-31T00:00:00 | [
[
"Horst",
"U.",
""
],
[
"Moreno",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0710.5547 | Miguel Angel Miron C.E. | M. Miron Bernal, H. Coyote Estrada, J. Figueroa Nazuno | Code Similarity on High Level Programs | Proceedings of the 18th Autumn Meeting on Communications, Computers,
Electronics and Industrial Exposition. (IEEE - ROCC07). Acapulco, Guerrero,
Mexico. 2007 | null | null | null | cs.CV cs.DS | null | This paper presents a new approach for code similarity on High Level
programs. Our technique is based on Fast Dynamic Time Warping, that builds a
warp path or points relation with local restrictions. The source code is
represented into Time Series using the operators inside programming languages
that makes possible the comparison. This makes possible subsequence detection
that represent similar code instructions. In contrast with other code
similarity algorithms, we do not make features extraction. The experiments show
that two source codes are similar when their respective Time Series are
similar.
| [
{
"version": "v1",
"created": "Mon, 29 Oct 2007 22:39:21 GMT"
}
] | 2007-10-31T00:00:00 | [
[
"Bernal",
"M. Miron",
""
],
[
"Estrada",
"H. Coyote",
""
],
[
"Nazuno",
"J. Figueroa",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0710.5582 | Constantinos Daskalakis | Constantinos Daskalakis, Christos Papadimitriou | Computing Equilibria in Anonymous Games | null | null | null | null | cs.GT cs.CC cs.DM | null | We present efficient approximation algorithms for finding Nash equilibria in
anonymous games, that is, games in which the players utilities, though
different, do not differentiate between other players. Our results pertain to
such games with many players but few strategies. We show that any such game has
an approximate pure Nash equilibrium, computable in polynomial time, with
approximation O(s^2 L), where s is the number of strategies and L is the
Lipschitz constant of the utilities. Finally, we show that there is a PTAS for
finding an epsilon
| [
{
"version": "v1",
"created": "Tue, 30 Oct 2007 07:32:37 GMT"
}
] | 2007-10-31T00:00:00 | [
[
"Daskalakis",
"Constantinos",
""
],
[
"Papadimitriou",
"Christos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0710.5640 | Massimiliano Laddomada Ph.D. | F. Daneshgaran, Massimiliano Laddomada, M. Mondin | LDPC-Based Iterative Algorithm for Compression of Correlated Sources at
Rates Approaching the Slepian-Wolf Bound | Submitted to European Transactions in Telecommunications, July 2007 | null | null | null | cs.IT math.IT | null | This article proposes a novel iterative algorithm based on Low Density Parity
Check (LDPC) codes for compression of correlated sources at rates approaching
the Slepian-Wolf bound. The setup considered in the article looks at the
problem of compressing one source at a rate determined based on the knowledge
of the mean source correlation at the encoder, and employing the other
correlated source as side information at the decoder which decompresses the
first source based on the estimates of the actual correlation. We demonstrate
that depending on the extent of the actual source correlation estimated through
an iterative paradigm, significant compression can be obtained relative to the
case the decoder does not use the implicit knowledge of the existence of
correlation.
| [
{
"version": "v1",
"created": "Tue, 30 Oct 2007 13:14:20 GMT"
}
] | 2007-10-31T00:00:00 | [
[
"Daneshgaran",
"F.",
""
],
[
"Laddomada",
"Massimiliano",
""
],
[
"Mondin",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.5659 | Wolfgang Thomas | Stefan W\"ohrle and Wolfgang Thomas | Model Checking Synchronized Products of Infinite Transition Systems | 18 pages | Logical Methods in Computer Science, Volume 3, Issue 4 (November
5, 2007) lmcs:755 | 10.2168/LMCS-3(4:5)2007 | null | cs.LO | null | Formal verification using the model checking paradigm has to deal with two
aspects: The system models are structured, often as products of components, and
the specification logic has to be expressive enough to allow the formalization
of reachability properties. The present paper is a study on what can be
achieved for infinite transition systems under these premises. As models we
consider products of infinite transition systems with different synchronization
constraints. We introduce finitely synchronized transition systems, i.e.
product systems which contain only finitely many (parameterized) synchronized
transitions, and show that the decidability of FO(R), first-order logic
extended by reachability predicates, of the product system can be reduced to
the decidability of FO(R) of the components. This result is optimal in the
following sense: (1) If we allow semifinite synchronization, i.e. just in one
component infinitely many transitions are synchronized, the FO(R)-theory of the
product system is in general undecidable. (2) We cannot extend the expressive
power of the logic under consideration. Already a weak extension of first-order
logic with transitive closure, where we restrict the transitive closure
operators to arity one and nesting depth two, is undecidable for an
asynchronous (and hence finitely synchronized) product, namely for the infinite
grid.
| [
{
"version": "v1",
"created": "Tue, 30 Oct 2007 14:39:09 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Nov 2007 11:46:10 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Wöhrle",
"Stefan",
""
],
[
"Thomas",
"Wolfgang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0710.5666 | Saikat Guha | Saikat Guha, Baris I. Erkmen, Jeffrey H. Shapiro | The Entropy Photon-Number Inequality and its Consequences | 3 pages, submitted to "Open Problems Session, ITA 2008, UCSD" | null | null | null | quant-ph cs.IT math.IT | null | Determining the ultimate classical information carrying capacity of
electromagnetic waves requires quantum-mechanical analysis to properly account
for the bosonic nature of these waves. Recent work has established capacity
theorems for bosonic single-user, broadcast, and wiretap channels, under the
presumption of two minimum output entropy conjectures. Despite considerable
accumulated evidence that supports the validity of these conjectures, they have
yet to be proven. Here we show that the preceding minimum output entropy
conjectures are simple consequences of an Entropy Photon-Number Inequality,
which is a conjectured quantum-mechanical analog of the Entropy Power
Inequality (EPI) from classical information theory.
| [
{
"version": "v1",
"created": "Tue, 30 Oct 2007 16:42:29 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Nov 2007 15:16:16 GMT"
}
] | 2008-02-10T00:00:00 | [
[
"Guha",
"Saikat",
""
],
[
"Erkmen",
"Baris I.",
""
],
[
"Shapiro",
"Jeffrey H.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.5674 | Mounira Kourjieh | Yannick Chevalier (IRIT), Mounira Kourjieh (IRIT) | Key Substitution in the Symbolic Analysis of Cryptographic Protocols
(extended version) | null | null | null | null | cs.CR | null | Key substitution vulnerable signature schemes are signature schemes that
permit an intruder, given a public verification key and a signed message, to
compute a pair of signature and verification keys such that the message appears
to be signed with the new signature key. A digital signature scheme is said to
be vulnerable to destructive exclusive ownership property (DEO) If it is
computationaly feasible for an intruder, given a public verification key and a
pair of message and its valid signature relatively to the given public key, to
compute a pair of signature and verification keys and a new message such that
the given signature appears to be valid for the new message relatively to the
new verification key. In this paper, we prove decidability of the insecurity
problem of cryptographic protocols where the signature schemes employed in the
concrete realisation have this two properties.
| [
{
"version": "v1",
"created": "Tue, 30 Oct 2007 15:13:47 GMT"
}
] | 2007-10-31T00:00:00 | [
[
"Chevalier",
"Yannick",
"",
"IRIT"
],
[
"Kourjieh",
"Mounira",
"",
"IRIT"
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0710.5697 | Kristina Lerman | Kristina Lerman | Social Browsing & Information Filtering in Social Media | null | null | null | null | cs.CY cs.HC | null | Social networks are a prominent feature of many social media sites, a new
generation of Web sites that allow users to create and share content. Sites
such as Digg, Flickr, and Del.icio.us allow users to designate others as
"friends" or "contacts" and provide a single-click interface to track friends'
activity. How are these social networks used? Unlike pure social networking
sites (e.g., LinkedIn and Facebook), which allow users to articulate their
online professional and personal relationships, social media sites are not, for
the most part, aimed at helping users create or foster online relationships.
Instead, we claim that social media users create social networks to express
their tastes and interests, and use them to filter the vast stream of new
submissions to find interesting content. Social networks, in fact, facilitate
new ways of interacting with information: what we call social browsing. Through
an extensive analysis of data from Digg and Flickr, we show that social
browsing is one of the primary usage modalities on these social media sites.
This finding has implications for how social media sites rate and personalize
content.
| [
{
"version": "v1",
"created": "Tue, 30 Oct 2007 16:38:54 GMT"
}
] | 2007-10-31T00:00:00 | [
[
"Lerman",
"Kristina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0710.5758 | Behrouz Khoshnevis | Behrouz Khoshnevis, Wei Yu, and Raviraj Adve | Grassmannian Beamforming for MIMO Amplify-and-Forward Relaying | Submitted to IEEE Journal of Selected Areas in Communications,
Special Issue on Exploiting Limited Feedback in Tomorrows Wireless
Communication Networks | null | 10.1109/JSAC.2008.081006 | null | cs.IT math.IT | null | In this paper, we derive the optimal transmitter/ receiver beamforming
vectors and relay weighting matrix for the multiple-input multiple-output
amplify-and-forward relay channel. The analysis is accomplished in two steps.
In the first step, the direct link between the transmitter (Tx) and receiver
(Rx) is ignored and we show that the transmitter and the relay should map their
signals to the strongest right singular vectors of the Tx-relay and relay-Rx
channels. Based on the distributions of these vectors for independent
identically distributed (i.i.d.) Rayleigh channels, the Grassmannian codebooks
are used for quantizing and sending back the channel information to the
transmitter and the relay. The simulation results show that even a few number
of bits can considerably increase the link reliability in terms of bit error
rate. For the second step, the direct link is considered in the problem model
and we derive the optimization problem that identifies the optimal Tx
beamforming vector. For the i.i.d Rayleigh channels, we show that the solution
to this problem is uniformly distributed on the unit sphere and we justify the
appropriateness of the Grassmannian codebook (for determining the optimal
beamforming vector), both analytically and by simulation. Finally, a modified
quantizing scheme is presented which introduces a negligible degradation in the
system performance but significantly reduces the required number of feedback
bits.
| [
{
"version": "v1",
"created": "Tue, 30 Oct 2007 21:08:55 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Khoshnevis",
"Behrouz",
""
],
[
"Yu",
"Wei",
""
],
[
"Adve",
"Raviraj",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.5830 | Thomas Voice | Thomas Voice, Gaurav Raina | Stability analysis of a max-min fair Rate Control Protocol (RCP) in a
small buffer regime | 13 pages, no figures. Submitted to IEEE Transactions on Automatic
Control | null | 10.1109/TAC.2009.2022115 | null | cs.NI | null | In this note we analyse various stability properties of the max-min fair Rate
Control Protocol (RCP) operating with small buffers. We first tackle the issue
of stability for networks with arbitrary topologies. We prove that the max-min
fair RCP fluid model is globally stable in the absence of propagation delays,
and also derive a set of conditions for local stability when arbitrary
heterogeneous propagation delays are present. The network delay stability
result assumes that, at equilibrium, there is only one bottleneck link along
each route. Lastly, in the simpler setting of a single link, single delay
model, we investigate the impact of the loss of local stability via a Hopf
bifurcation.
| [
{
"version": "v1",
"created": "Wed, 31 Oct 2007 10:44:21 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Voice",
"Thomas",
""
],
[
"Raina",
"Gaurav",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0710.5893 | Paul Hurley | Paul Hurley, Ted Hurley | Codes from Zero-divisors and Units in Group Rings | null | null | null | null | cs.IT math.IT | null | We describe and present a new construction method for codes using encodings
from group rings. They consist primarily of two types: zero-divisor and
unit-derived codes. Previous codes from group rings focused on ideals; for
example cyclic codes are ideals in the group ring over a cyclic group. The
fresh focus is on the encodings themselves, which only under very limited
conditions result in ideals. We use the result that a group ring is isomorphic
to a certain well-defined ring of matrices, and thus every group ring element
has an associated matrix. This allows matrix algebra to be used as needed in
the study and production of codes, enabling the creation of standard generator
and check matrices. Group rings are a fruitful source of units and
zero-divisors from which new codes result. Many code properties, such as being
LDPC or self-dual, may be expressed as properties within the group ring thus
enabling the construction of codes with these properties. The methods are
general enabling the construction of codes with many types of group rings.
There is no restriction on the ring and thus codes over the integers, over
matrix rings or even over group rings themselves are possible and fruitful.
| [
{
"version": "v1",
"created": "Wed, 31 Oct 2007 15:57:31 GMT"
}
] | 2007-11-01T00:00:00 | [
[
"Hurley",
"Paul",
""
],
[
"Hurley",
"Ted",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0710.5895 | Wim Vanhoof | Francois Gobert, Baudouin Le Charlier | Source-to-source optimizing transformations of Prolog programs based on
abstract interpretation | Paper presented at the 17th Workshop on Logic-based Methods in
Programming Environments (WLPE2007) | null | null | null | cs.PL cs.LO cs.SE | null | Making a Prolog program more efficient by transforming its source code,
without changing its operational semantics, is not an obvious task. It requires
the user to have a clear understanding of how the Prolog compiler works, and in
particular, of the effects of impure features like the cut. The way a Prolog
code is written - e.g., the order of clauses, the order of literals in a
clause, the use of cuts or negations - influences its efficiency. Furthermore,
different optimization techniques may be redundant or conflicting when they are
applied together, depending on the way a procedure is called - e.g., inserting
cuts and enabling indexing. We present an optimiser, based on abstract
interpretation, that automatically performs safe code transformations of Prolog
procedures in the context of some class of input calls. The method is more
effective if procedures are annotated with additional information about modes,
types, sharing, number of solutions and the like. Thus the approach is similar
to Mercury. It applies to any Prolog program, however.
| [
{
"version": "v1",
"created": "Wed, 31 Oct 2007 15:59:50 GMT"
}
] | 2007-11-01T00:00:00 | [
[
"Gobert",
"Francois",
""
],
[
"Charlier",
"Baudouin Le",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0711.0048 | Lee Naish | Lee Naish | Declarative Diagnosis of Floundering | 12 pages, 0 figures, uses llncs.sty In Proceedings of the 17th
Workshop on Logic-based methods in Programming Environments, Eds. Patricia
Hill and Wim Vanhoof, pp 48-60, September 2007, Porto, Portugal | null | null | null | cs.PL cs.SE | null | Many logic programming languages have delay primitives which allow
coroutining. This introduces a class of bug symptoms -- computations can
flounder when they are intended to succeed or finitely fail. For concurrent
logic programs this is normally called deadlock. Similarly, constraint logic
programs can fail to invoke certain constraint solvers because variables are
insufficiently instantiated or constrained. Diagnosing such faults has received
relatively little attention to date. Since delay primitives affect the
procedural but not the declarative view of programs, it may be expected that
debugging would have to consider the often complex details of interleaved
execution. However, recent work on semantics has suggested an alternative
approach. In this paper we show how the declarative debugging paradigm can be
used to diagnose unexpected floundering, insulating the user from the
complexities of the execution.
Keywords: logic programming, coroutining, delay, debugging, floundering,
deadlock, constraints
| [
{
"version": "v1",
"created": "Thu, 1 Nov 2007 01:40:50 GMT"
}
] | 2007-11-06T00:00:00 | [
[
"Naish",
"Lee",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0711.0086 | Sergey Gubin | Sergey Gubin | Convex and linear models of NP-problems | In part, the results were presented on WCECS 2007/ICCSA 2007. V2
edited | null | null | null | cs.DM cs.CC cs.DS math.CO | null | Reducing the NP-problems to the convex/linear analysis on the Birkhoff
polytope.
| [
{
"version": "v1",
"created": "Thu, 1 Nov 2007 08:33:07 GMT"
},
{
"version": "v2",
"created": "Sun, 4 Nov 2007 06:11:22 GMT"
}
] | 2007-11-04T00:00:00 | [
[
"Gubin",
"Sergey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0711.0110 | Florent Krzakala | Florent Krzakala and Lenka Zdeborov\'a | Phase Transitions and Computational Difficulty in Random Constraint
Satisfaction Problems | 10 pages, Proceedings of the International Workshop on
Statistical-Mechanical Informatics 2007, Kyoto (Japan) September 16-19, 2007 | 2008 J. Phys.: Conf. Ser. 95 012012 | 10.1088/1742-6596/95/1/012012 | null | cs.CC cond-mat.stat-mech | null | We review the understanding of the random constraint satisfaction problems,
focusing on the q-coloring of large random graphs, that has been achieved using
the cavity method of the physicists. We also discuss the properties of the
phase diagram in temperature, the connections with the glass transition
phenomenology in physics, and the related algorithmic issues.
| [
{
"version": "v1",
"created": "Thu, 1 Nov 2007 13:42:44 GMT"
}
] | 2008-02-04T00:00:00 | [
[
"Krzakala",
"Florent",
""
],
[
"Zdeborová",
"Lenka",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
}
] |
0711.0114 | Mathieu Couture | Prosenjit Bose, Paz Carmi, Mathieu Couture, Anil Maheshwari, Michiel
Smid and Norbert Zeh | Geometric Spanners With Small Chromatic Number | null | null | null | TR-07-15 | cs.CG | null | Given an integer $k \geq 2$, we consider the problem of computing the
smallest real number $t(k)$ such that for each set $P$ of points in the plane,
there exists a $t(k)$-spanner for $P$ that has chromatic number at most $k$. We
prove that $t(2) = 3$, $t(3) = 2$, $t(4) = \sqrt{2}$, and give upper and lower
bounds on $t(k)$ for $k>4$. We also show that for any $\epsilon >0$, there
exists a $(1+\epsilon)t(k)$-spanner for $P$ that has $O(|P|)$ edges and
chromatic number at most $k$. Finally, we consider an on-line variant of the
problem where the points of $P$ are given one after another, and the color of a
point must be assigned at the moment the point is given. In this setting, we
prove that $t(2) = 3$, $t(3) = 1+ \sqrt{3}$, $t(4) = 1+ \sqrt{2}$, and give
upper and lower bounds on $t(k)$ for $k>4$.
| [
{
"version": "v1",
"created": "Thu, 1 Nov 2007 13:46:14 GMT"
}
] | 2007-11-02T00:00:00 | [
[
"Bose",
"Prosenjit",
""
],
[
"Carmi",
"Paz",
""
],
[
"Couture",
"Mathieu",
""
],
[
"Maheshwari",
"Anil",
""
],
[
"Smid",
"Michiel",
""
],
[
"Zeh",
"Norbert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.