id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0711.0128
Manoj Kumar
Manoj Kumar
Security Analysis of a Remote User Authentication Scheme with Smart Cards
null
null
null
null
cs.CR
null
Yoon et al. proposed a new efficient remote user authentication scheme using smart cards to solve the security problems of W. C. Ku and S. M. Chen scheme. This paper reviews Yoon et al. scheme and then proves that the password change phase of Yoon et al. scheme is still insecure. This paper also proves that the Yoon et al. is still vulnerable to parallel session attack.
[ { "version": "v1", "created": "Thu, 1 Nov 2007 14:24:41 GMT" } ]
2007-11-02T00:00:00
[ [ "Kumar", "Manoj", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0711.0189
Ulrike von Luxburg
Ulrike von Luxburg
A Tutorial on Spectral Clustering
null
Statistics and Computing 17(4), 2007
null
null
cs.DS cs.LG
null
In recent years, spectral clustering has become one of the most popular modern clustering algorithms. It is simple to implement, can be solved efficiently by standard linear algebra software, and very often outperforms traditional clustering algorithms such as the k-means algorithm. On the first glance spectral clustering appears slightly mysterious, and it is not obvious to see why it works at all and what it really does. The goal of this tutorial is to give some intuition on those questions. We describe different graph Laplacians and their basic properties, present the most common spectral clustering algorithms, and derive those algorithms from scratch by several different approaches. Advantages and disadvantages of the different spectral clustering algorithms are discussed.
[ { "version": "v1", "created": "Thu, 1 Nov 2007 19:04:43 GMT" } ]
2007-11-02T00:00:00
[ [ "von Luxburg", "Ulrike", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0711.0194
Dexter Kozen
Dexter Kozen
Coinductive Proof Principles for Stochastic Processes
16 pages, 2 figures. Preliminary version appeared in: Rajeev Alur, ed., Proc. 21st Symp. Logic in Computer Science (LICS'06), pages 359-366. IEEE, August 2006
Logical Methods in Computer Science, Volume 3, Issue 4 (November 12, 2007) lmcs:1098
10.2168/LMCS-3(4:8)2007
null
cs.LO
null
We give an explicit coinduction principle for recursively-defined stochastic processes. The principle applies to any closed property, not just equality, and works even when solutions are not unique. The rule encapsulates low-level analytic arguments, allowing reasoning about such processes at a higher algebraic level. We illustrate the use of the rule in deriving properties of a simple coin-flip process.
[ { "version": "v1", "created": "Thu, 1 Nov 2007 19:25:13 GMT" }, { "version": "v2", "created": "Mon, 12 Nov 2007 09:28:32 GMT" } ]
2015-07-01T00:00:00
[ [ "Kozen", "Dexter", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0711.0237
Anand Sarwate
Krishnan Eswaran, Anand D. Sarwate, Anant Sahai, and Michael Gastpar
Zero-rate feedback can achieve the empirical capacity
Revised version of paper originally submitted to IEEE Transactions on Information Theory, Nov. 2007. This version contains further revisions and clarifications
null
10.1109/TIT.2009.2034779
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The utility of limited feedback for coding over an individual sequence of DMCs is investigated. This study complements recent results showing how limited or noisy feedback can boost the reliability of communication. A strategy with fixed input distribution $P$ is given that asymptotically achieves rates arbitrarily close to the mutual information induced by $P$ and the state-averaged channel. When the capacity achieving input distribution is the same over all channel states, this achieves rates at least as large as the capacity of the state averaged channel, sometimes called the empirical capacity.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 02:00:55 GMT" }, { "version": "v2", "created": "Wed, 14 Jan 2009 01:58:46 GMT" }, { "version": "v3", "created": "Mon, 10 Aug 2009 22:22:36 GMT" } ]
2016-11-17T00:00:00
[ [ "Eswaran", "Krishnan", "" ], [ "Sarwate", "Anand D.", "" ], [ "Sahai", "Anant", "" ], [ "Gastpar", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.0251
Rogers Mathew
Telikepalli Kavitha and Rogers Mathew
Faster Algorithms for Online Topological Ordering
null
null
null
IISC-CSA-TR-2007-12
cs.DS
null
We present two algorithms for maintaining the topological order of a directed acyclic graph with n vertices, under an online edge insertion sequence of m edges. Efficient algorithms for online topological ordering have many applications, including online cycle detection, which is to discover the first edge that introduces a cycle under an arbitrary sequence of edge insertions in a directed graph. In this paper we present efficient algorithms for the online topological ordering problem. We first present a simple algorithm with running time O(n^{5/2}) for the online topological ordering problem. This is the current fastest algorithm for this problem on dense graphs, i.e., when m > n^{5/3}. We then present an algorithm with running time O((m + nlog n)\sqrt{m}); this is more efficient for sparse graphs. Our results yield an improved upper bound of O(min(n^{5/2}, (m + nlog n)sqrt{m})) for the online topological ordering problem.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 06:42:43 GMT" } ]
2007-11-05T00:00:00
[ [ "Kavitha", "Telikepalli", "" ], [ "Mathew", "Rogers", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0711.0259
Sudhir Singh
Sudhir Kumar Singh, Vwani P. Roychowdhury, Himawan Gunadhi, Behnam A. Rezaei
Diversification in the Internet Economy:The Role of For-Profit Mediators
20 pages, subsumes arXiv:0707.1057
null
null
null
cs.GT
null
We investigate market forces that would lead to the emergence of new classes of players in the sponsored search market. We report a 3-fold diversification triggered by two inherent features of the sponsored search market, namely, capacity constraints and collusion-vulnerability of current mechanisms. In the first scenario, we present a comparative study of two models motivated by capacity constraints - one where the additional capacity is provided by for-profit agents, who compete for slots in the original auction, draw traffic, and run their own sub-auctions, and the other, where the additional capacity is provided by the auctioneer herself, by essentially acting as a mediator and running a single combined auction. This study was initiated by us in \cite{SRGR07}, where the mediator-based model was studied. In the present work, we study the auctioneer-based model and show that this model seems inferior to the mediator-based model in terms of revenue or efficiency guarantee due to added capacity. In the second scenario, we initiate a game theoretic study of current sponsored search auctions, involving incentive driven mediators who exploit the fact that these mechanisms are not collusion-resistant. In particular, we show that advertisers can improve their payoffs by using the services of the mediator compared to directly participating in the auction, and that the mediator can also obtain monetary benefit, without violating incentive constraints from the advertisers who do not use its services. We also point out that the auctioneer can not do very much via mechanism design to avoid such for-profit mediation without losing badly in terms of revenue, and therefore, the mediators are likely to prevail.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 08:38:40 GMT" } ]
2007-11-05T00:00:00
[ [ "Singh", "Sudhir Kumar", "" ], [ "Roychowdhury", "Vwani P.", "" ], [ "Gunadhi", "Himawan", "" ], [ "Rezaei", "Behnam A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0711.0261
Tadashi Wadyama
Tadashi Wadayama, Keisuke Nakamura, Masayuki Yagita, Yuuki Funahashi, Shogo Usami, Ichi Takumi
Gradient Descent Bit Flipping Algorithms for Decoding LDPC Codes
6 pages, 8 figures
null
null
null
cs.IT math.IT
null
A novel class of bit-flipping (BF) algorithms for decoding low-density parity-check (LDPC) codes is presented. The proposed algorithms, which are called gradient descent bit flipping (GDBF) algorithms, can be regarded as simplified gradient descent algorithms. Based on gradient descent formulation, the proposed algorithms are naturally derived from a simple non-linear objective function.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 08:59:46 GMT" }, { "version": "v2", "created": "Tue, 8 Apr 2008 03:27:57 GMT" } ]
2008-04-08T00:00:00
[ [ "Wadayama", "Tadashi", "" ], [ "Nakamura", "Keisuke", "" ], [ "Yagita", "Masayuki", "" ], [ "Funahashi", "Yuuki", "" ], [ "Usami", "Shogo", "" ], [ "Takumi", "Ichi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.0277
Nihar Jindal
Nihar Jindal, Jeffrey G. Andrews, Steven Weber
Bandwidth Partitioning in Decentralized Wireless Networks
Revised for IEEE Trans. Wireless Communications, April 2008 (initially submitted Nov. 2007). Results shown to apply to the exact outage probability/transmitter density, rather than to nearest neighbor bound
null
10.1109/T-WC.2008.071220
null
cs.IT math.IT
null
This paper addresses the following question, which is of interest in the design of a multiuser decentralized network. Given a total system bandwidth of W Hz and a fixed data rate constraint of R bps for each transmission, how many frequency slots N of size W/N should the band be partitioned into in order to maximize the number of simultaneous links in the network? Dividing the available spectrum results in two competing effects. On the positive side, a larger N allows for more parallel, noninterfering communications to take place in the same area. On the negative side, a larger N increases the SINR requirement for each link because the same information rate must be achieved over less bandwidth. Exploring this tradeoff and determining the optimum value of N in terms of the system parameters is the focus of the paper. Using stochastic geometry, the optimal SINR threshold - which directly corresponds to the optimal spectral efficiency - is derived for both the low SNR (power-limited) and high SNR (interference-limited) regimes. This leads to the optimum choice of the number of frequency bands N in terms of the path loss exponent, power and noise spectral density, desired rate, and total bandwidth.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 12:54:30 GMT" }, { "version": "v2", "created": "Wed, 2 Apr 2008 16:54:26 GMT" } ]
2016-11-17T00:00:00
[ [ "Jindal", "Nihar", "" ], [ "Andrews", "Jeffrey G.", "" ], [ "Weber", "Steven", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.0301
Reuven Cohen
Reuven Cohen, Niloofar Fazlollahi and David Starobinski
Throughput Optimal On-Line Algorithms for Advanced Resource Reservation in Ultra High-Speed Networks
9 pages, 8 figures
null
null
null
cs.NI
null
Advanced channel reservation is emerging as an important feature of ultra high-speed networks requiring the transfer of large files. Applications include scientific data transfers and database backup. In this paper, we present two new, on-line algorithms for advanced reservation, called BatchAll and BatchLim, that are guaranteed to achieve optimal throughput performance, based on multi-commodity flow arguments. Both algorithms are shown to have polynomial-time complexity and provable bounds on the maximum delay for 1+epsilon bandwidth augmented networks. The BatchLim algorithm returns the completion time of a connection immediately as a request is placed, but at the expense of a slightly looser competitive ratio than that of BatchAll. We also present a simple approach that limits the number of parallel paths used by the algorithms while provably bounding the maximum reduction factor in the transmission throughput. We show that, although the number of different paths can be exponentially large, the actual number of paths needed to approximate the flow is quite small and proportional to the number of edges in the network. Simulations for a number of topologies show that, in practice, 3 to 5 parallel paths are sufficient to achieve close to optimal performance. The performance of the competitive algorithms are also compared to a greedy benchmark, both through analysis and simulation.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 12:54:21 GMT" } ]
2007-11-05T00:00:00
[ [ "Cohen", "Reuven", "" ], [ "Fazlollahi", "Niloofar", "" ], [ "Starobinski", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0711.0311
H. Georg Buesching
H. Georg Buesching
Improving the LP bound of a MILP by branching concurrently
21 pages of a possibly new theory submitted by a hobby researcher. Uses algorithmic.sty
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We'll measure the differences of the dual variables and the gain of the objective function when creating new problems, which each has one inequality more than the starting LP-instance. These differences of the dual variables are naturally connected to the branches. Then we'll choose those differences of dual variables, so that for all combinations of choices at the connected branches, all dual inequalities will hold for sure. By adding the gain of each chosen branching, we get a total gain, which gives a better limit of the original problem. By this technique it is also possible to create cuts.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 13:57:41 GMT" }, { "version": "v2", "created": "Fri, 21 Nov 2008 20:33:30 GMT" } ]
2008-11-21T00:00:00
[ [ "Buesching", "H. Georg", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0711.0314
Aleksandar Lazarevic
Aleksandar Lazarevic, Lionel Sacks
Resource and Application Models for Advanced Grid Schedulers
null
London Communications Symposium 2003
null
null
cs.DC
null
As Grid computing is becoming an inevitable future, managing, scheduling and monitoring dynamic, heterogeneous resources will present new challenges. Solutions will have to be agile and adaptive, support self-organization and autonomous management, while maintaining optimal resource utilisation. Presented in this paper are basic principles and architectural concepts for efficient resource allocation in heterogeneous Grid environment.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 14:03:46 GMT" } ]
2007-11-05T00:00:00
[ [ "Lazarevic", "Aleksandar", "" ], [ "Sacks", "Lionel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0711.0315
Aleksandar Lazarevic
Aleksandar Lazarevic, Lionel Sacks
Measuring and Monitoring Grid Resource Utilisation
null
London Communications Symposium 2004
null
null
cs.DC
null
Effective resource utilisation monitoring and highly granular yet adaptive measurements are prerequisites for a more efficient Grid scheduler. We present a suite of measurement applications able to monitor per-process resource utilisation, and a customisable tool for emulating observed utilisation models.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 14:12:27 GMT" } ]
2007-11-05T00:00:00
[ [ "Lazarevic", "Aleksandar", "" ], [ "Sacks", "Lionel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0711.0316
Aleksandar Lazarevic
Aleksandar Lazarevic, Lionel Sacks
A Study of Grid Applications: Scheduling Perspective
null
London Communications Symposium 2005
null
null
cs.DC
null
As the Grid evolves from a high performance cluster middleware to a multipurpose utility computing framework, a good understanding of Grid applications, their statistics and utilisation patterns is required. This study looks at job execution times and resource utilisations in a Grid environment, and their significance in cluster and network dimensioning, local level scheduling and resource management.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 14:15:45 GMT" } ]
2007-11-05T00:00:00
[ [ "Lazarevic", "Aleksandar", "" ], [ "Sacks", "Lionel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0711.0325
Aleksandar Lazarevic
Ioannis Liabotis, Ognjen Prnjat, Tope Olukemi, Adrian Li Mow Ching, Aleksandar Lazarevic, Lionel Sacks, Mike Fisher, Paul McKee
Self-Organising management of Grid environments
null
International Symposium on Telecommunications 2003
null
null
cs.DC
null
This paper presents basic concepts, architectural principles and algorithms for efficient resource and security management in cluster computing environments and the Grid. The work presented in this paper is funded by BTExacT and the EPSRC project SO-GRM (GR/S21939).
[ { "version": "v1", "created": "Fri, 2 Nov 2007 15:26:48 GMT" } ]
2007-11-05T00:00:00
[ [ "Liabotis", "Ioannis", "" ], [ "Prnjat", "Ognjen", "" ], [ "Olukemi", "Tope", "" ], [ "Ching", "Adrian Li Mow", "" ], [ "Lazarevic", "Aleksandar", "" ], [ "Sacks", "Lionel", "" ], [ "Fisher", "Mike", "" ], [ "McKee", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0711.0326
Aleksandar Lazarevic
Aleksandar Lazarevic, Lionel Sacks, Ognjen Prnjat
Enabling Adaptive Grid Scheduling and Resource Management
null
International Symposium on Integrated Network Management 2005
null
null
cs.DC
null
Wider adoption of the Grid concept has led to an increasing amount of federated computational, storage and visualisation resources being available to scientists and researchers. Distributed and heterogeneous nature of these resources renders most of the legacy cluster monitoring and management approaches inappropriate, and poses new challenges in workflow scheduling on such systems. Effective resource utilisation monitoring and highly granular yet adaptive measurements are prerequisites for a more efficient Grid scheduler. We present a suite of measurement applications able to monitor per-process resource utilisation, and a customisable tool for emulating observed utilisation models. We also outline our future work on a predictive and probabilistic Grid scheduler. The research is undertaken as part of UK e-Science EPSRC sponsored project SO-GRM (Self-Organising Grid Resource Management) in cooperation with BT.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 15:30:53 GMT" } ]
2007-11-05T00:00:00
[ [ "Lazarevic", "Aleksandar", "" ], [ "Sacks", "Lionel", "" ], [ "Prnjat", "Ognjen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0711.0327
Aleksandar Lazarevic
Aleksandar Lazarevic, Lionel Sacks, Ognjen Prnjat
Managing Uncertainty: A Case for Probabilistic Grid Scheduling
null
null
null
null
cs.DC
null
The Grid technology is evolving into a global, service-orientated architecture, a universal platform for delivering future high demand computational services. Strong adoption of the Grid and the utility computing concept is leading to an increasing number of Grid installations running a wide range of applications of different size and complexity. In this paper we address the problem of elivering deadline/economy based scheduling in a heterogeneous application environment using statistical properties of job historical executions and its associated meta-data. This approach is motivated by a study of six-month computational load generated by Grid applications in a multi-purpose Grid cluster serving a community of twenty e-Science projects. The observed job statistics, resource utilisation and user behaviour is discussed in the context of management approaches and models most suitable for supporting a probabilistic and autonomous scheduling architecture.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 15:36:36 GMT" } ]
2007-11-05T00:00:00
[ [ "Lazarevic", "Aleksandar", "" ], [ "Sacks", "Lionel", "" ], [ "Prnjat", "Ognjen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0711.0344
Wim Vanhoof
Guillem Marpons-Ucero, Julio Mari\~no, \'Angel Herranz, Lars-{\AA}ke Fredlund, Manuel Carro, Juan Jos\'e Moreno-Navarro
Automatic Coding Rule Conformance Checking Using Logic Programs
Paper presented at the 17th Workshop on Logic-based Methods in Programming Environments (WLPE2007)
null
null
null
cs.PL cs.SE
null
Some approaches to increasing program reliability involve a disciplined use of programming languages so as to minimise the hazards introduced by error-prone features. This is realised by writing code that is constrained to a subset of the a priori admissible programs, and that, moreover, may use only a subset of the language. These subsets are determined by a collection of so-called coding rules.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 16:53:34 GMT" } ]
2007-11-06T00:00:00
[ [ "Marpons-Ucero", "Guillem", "" ], [ "Mariño", "Julio", "" ], [ "Herranz", "Ángel", "" ], [ "Fredlund", "Lars-Åke", "" ], [ "Carro", "Manuel", "" ], [ "Moreno-Navarro", "Juan José", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0711.0345
Wim Vanhoof
Roberto Bagnara, Patricia Hill, Enea Zaffanella
A Prolog-based Environment for Reasoning about Programming Languages (Extended abstract)
Paper presented at the 17th Workshop on Logic-based Methods in Programming Environments (WLPE2007)
null
null
null
cs.PL cs.SE
null
ECLAIR is a Prolog-based prototype system aiming to provide a functionally complete environment for the study, development and evaluation of programming language analysis and implementation tools. In this paper, we sketch the overall structure of the system, outlining the main methodologies and technologies underlying its components. We also discuss the appropriateness of Prolog as the implementation language for the system: besides highlighting its strengths, we also point out a few potential weaknesses, hinting at possible solutions.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 16:40:10 GMT" } ]
2007-11-06T00:00:00
[ [ "Bagnara", "Roberto", "" ], [ "Hill", "Patricia", "" ], [ "Zaffanella", "Enea", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0711.0348
Wim Vanhoof
Bernd Bra{\ss}el, Michael Hanus and Marion Muller
Compiling ER Specifications into Declarative Programs
Paper presented at the 17th Workshop on Logic-based Methods in Programming Environments (WLPE2007)
null
null
null
cs.PL cs.SE
null
This paper proposes an environment to support high-level database programming in a declarative programming language. In order to ensure safe database updates, all access and update operations related to the database are generated from high-level descriptions in the entity- relationship (ER) model. We propose a representation of ER diagrams in the declarative language Curry so that they can be constructed by various tools and then translated into this representation. Furthermore, we have implemented a compiler from this representation into a Curry program that provides access and update operations based on a high-level API for database programming.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 16:49:30 GMT" } ]
2007-11-06T00:00:00
[ [ "Braßel", "Bernd", "" ], [ "Hanus", "Michael", "" ], [ "Muller", "Marion", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0711.0350
Gusztav Morvai
G. Morvai and B. Weiss
Intermittent estimation of stationary time series
null
Test 13 (2004), no. 2, 525--542
null
null
math.PR cs.IT math.IT
null
Let $\{X_n\}_{n=0}^{\infty}$ be a stationary real-valued time series with unknown distribution. Our goal is to estimate the conditional expectation of $X_{n+1}$ based on the observations $X_i$, $0\le i\le n$ in a strongly consistent way. Bailey and Ryabko proved that this is not possible even for ergodic binary time series if one estimates at all values of $n$. We propose a very simple algorithm which will make prediction infinitely often at carefully selected stopping times chosen by our rule. We show that under certain conditions our procedure is strongly (pointwise) consistent, and $L_2$ consistent without any condition. An upper bound on the growth of the stopping times is also presented in this paper.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 18:21:37 GMT" } ]
2008-06-19T00:00:00
[ [ "Morvai", "G.", "" ], [ "Weiss", "B.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.0351
Falk Unger
Falk Unger
Noise threshold for universality of 2-input gates
International Symposium on Information Theory, 2007, minor corrections in v2
null
null
null
cs.IT cs.CC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Evans and Pippenger showed in 1998 that noisy gates with 2 inputs are universal for arbitrary computation (i.e. can compute any function with bounded error), if all gates fail independently with probability epsilon and epsilon<theta, where theta is roughly 8.856%. We show that formulas built from gates with 2 inputs, in which each gate fails with probability at least theta cannot be universal. Hence, there is a threshold on the tolerable noise for formulas with 2-input gates and it is theta. We conjecture that the same threshold also holds for circuits.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 16:58:21 GMT" }, { "version": "v2", "created": "Sat, 6 Sep 2008 16:18:09 GMT" } ]
2008-09-06T00:00:00
[ [ "Unger", "Falk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.0366
Mehmet Ak\c{c}akaya
Mehmet Ak\c{c}akaya and Vahid Tarokh
Shannon Theoretic Limits on Noisy Compressive Sampling
21 pages, submitted
null
null
null
cs.IT math.IT
null
In this paper, we study the number of measurements required to recover a sparse signal in ${\mathbb C}^M$ with $L$ non-zero coefficients from compressed samples in the presence of noise. For a number of different recovery criteria, we prove that $O(L)$ (an asymptotically linear multiple of $L$) measurements are necessary and sufficient if $L$ grows linearly as a function of $M$. This improves on the existing literature that is mostly focused on variants of a specific recovery algorithm based on convex programming, for which $O(L\log(M-L))$ measurements are required. We also show that $O(L\log(M-L))$ measurements are required in the sublinear regime ($L = o(M)$).
[ { "version": "v1", "created": "Fri, 2 Nov 2007 19:04:38 GMT" } ]
2007-11-05T00:00:00
[ [ "Akçakaya", "Mehmet", "" ], [ "Tarokh", "Vahid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.0367
Gusztav Morvai
G. Morvai, S. Yakowitz, and L. Gyorfi
Nonparametric inference for ergodic, stationary time series
null
Ann. Statist. 24 (1996), no. 1, 370--379
null
null
math.PR cs.IT math.IT
null
The setting is a stationary, ergodic time series. The challenge is to construct a sequence of functions, each based on only finite segments of the past, which together provide a strongly consistent estimator for the conditional probability of the next observation, given the infinite past. Ornstein gave such a construction for the case that the values are from a finite set, and recently Algoet extended the scheme to time series with coordinates in a Polish space. The present study relates a different solution to the challenge. The algorithm is simple and its verification is fairly transparent. Some extensions to regression, pattern recognition, and on-line forecasting are mentioned.
[ { "version": "v1", "created": "Fri, 2 Nov 2007 18:16:01 GMT" } ]
2008-06-19T00:00:00
[ [ "Morvai", "G.", "" ], [ "Yakowitz", "S.", "" ], [ "Gyorfi", "L.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.0436
Ewa Krot-Sieniawska
Ewa Krot-Sieniawska
An example of algebraization of analysis and Fibonacci cobweb poset characterization
16 pages, submitted to publication
null
null
null
math.CO cs.DM math.GM
null
In recent Kwasniewski's papers inspired by O. V. Viskov it was shown that the $\psi$-calculus in parts appears to be almost automatic, natural extension of classical operator calculus of Rota - Mullin or equivalently - of umbral calculus of Roman and Rota. At the same time this calculus is an example of the algebraization of the analysis - here restricted to the algebra of polynomials. The first part of the article is the review of the recent author's contribution. The main definitions and theorems of Finite Fibonomial Operator Calculus which is a special case of $\psi$-extented Rota's finite operator calculus are presented there. In the second part the characterization of Fibonacci Cobweb poset P as DAG and oDAG is given. The dim 2 poset such that its Hasse diagram coincide with digraf of P is constructed.
[ { "version": "v1", "created": "Sat, 3 Nov 2007 08:33:10 GMT" } ]
2008-02-09T00:00:00
[ [ "Krot-Sieniawska", "Ewa", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.GM", "description": "Mathematical material of general interest, topics not covered elsewhere", "span": "(General Mathematics)" } ]
0711.0471
Gusztav Morvai
G. Morvai and B. Weiss
Prediction for discrete time series
null
Probab. Theory Related Fields 132 (2005), no. 1, 1--12
null
null
math.PR cs.IT math.IT
null
Let $\{X_n\}$ be a stationary and ergodic time series taking values from a finite or countably infinite set ${\cal X}$. Assume that the distribution of the process is otherwise unknown. We propose a sequence of stopping times $\lambda_n$ along which we will be able to estimate the conditional probability $P(X_{\lambda_n+1}=x|X_0,...,X_{\lambda_n})$ from data segment $(X_0,...,X_{\lambda_n})$ in a pointwise consistent way for a restricted class of stationary and ergodic finite or countably infinite alphabet time series which includes among others all stationary and ergodic finitarily Markovian processes. If the stationary and ergodic process turns out to be finitarily Markovian (among others, all stationary and ergodic Markov chains are included in this class) then $ \lim_{n\to \infty} {n\over \lambda_n}>0$ almost surely. If the stationary and ergodic process turns out to possess finite entropy rate then $\lambda_n$ is upperbounded by a polynomial, eventually almost surely.
[ { "version": "v1", "created": "Sat, 3 Nov 2007 19:24:35 GMT" } ]
2008-06-19T00:00:00
[ [ "Morvai", "G.", "" ], [ "Weiss", "B.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.0472
Gusztav Morvai
G. Morvai and B. Weiss
Order estimation of Markov chains
null
IEEE Trans. Inform. Theory 51 (2005), no. 4, 1496--1497
null
null
math.PR cs.IT math.IT
null
We describe estimators $\chi_n(X_0,X_1,...,X_n)$, which when applied to an unknown stationary process taking values from a countable alphabet ${\cal X}$, converge almost surely to $k$ in case the process is a $k$-th order Markov chain and to infinity otherwise.
[ { "version": "v1", "created": "Sat, 3 Nov 2007 19:30:25 GMT" } ]
2008-06-19T00:00:00
[ [ "Morvai", "G.", "" ], [ "Weiss", "B.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.0486
George Bell
George I. Bell
Triangular Peg Solitaire Unlimited
12 pages, 10 figures; minor error fixed in Table 1
The Games and Puzzles Journal, Issue 36, November-December 2004 http://gpj.connectfree.co.uk/gpjr.htm
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Triangular peg solitaire is a well-known one-person game or puzzle. When one peg captures many pegs consecutively, this is called a sweep. We investigate whether the game can end in a dramatic fashion, with one peg sweeping all remaining pegs off the board. For triangular boards of side 6 and 8 (with 21 and 36 holes, respectively) the geometrically longest sweep can occur as the final move in a game. On larger triangular boards, we demonstrate how to construct solutions that finish with arbitrarily long sweeps. We also consider the problem of finding solutions that minimize the total number of moves (where a move is one or more consecutive jumps by the same peg).
[ { "version": "v1", "created": "Mon, 5 Nov 2007 15:36:32 GMT" }, { "version": "v2", "created": "Thu, 4 Dec 2008 16:17:16 GMT" } ]
2008-12-04T00:00:00
[ [ "Bell", "George I.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0711.0528
L.T. Handoko
Z. Akbar and L.T. Handoko
Web-based Interface in Public Cluster
9 pages, Proceeding of the 9th International Conference on Information Integration and Web-based Applications and Services 2007
null
null
FISIKALIPI-07016
cs.DC cs.CY
null
A web-based interface dedicated for cluster computer which is publicly accessible for free is introduced. The interface plays an important role to enable secure public access, while providing user-friendly computational environment for end-users and easy maintainance for administrators as well. The whole architecture which integrates both aspects of hardware and software is briefly explained. It is argued that the public cluster is globally a unique approach, and could be a new kind of e-learning system especially for parallel programming communities.
[ { "version": "v1", "created": "Sun, 4 Nov 2007 16:39:47 GMT" } ]
2007-11-06T00:00:00
[ [ "Akbar", "Z.", "" ], [ "Handoko", "L. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0711.0538
Grenville Croll
Thomas A. Grossman
Spreadsheet Engineering: A Research Framework
12 Pages
Proc. European Spreadsheet Risks Int. Grp. 2002 23-34 ISBN 1 86166 182 7
null
null
cs.SE
null
Spreadsheet engineering adapts the lessons of software engineering to spreadsheets, providing eight principles as a framework for organizing spreadsheet programming recommendations. Spreadsheets raise issues inadequately addressed by software engineering. Spreadsheets are a powerful modeling language, allowing strategic rapid model change, and enabling exploratory modeling. Spreadsheets users learn slowly with experience because they focus on the problem domain not programming. The heterogeneity of spreadsheet users requires a taxonomy to guide recommendations. Deployment of best practices is difficult and merits research.
[ { "version": "v1", "created": "Sun, 4 Nov 2007 19:24:57 GMT" } ]
2007-11-06T00:00:00
[ [ "Grossman", "Thomas A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0711.0557
Takao Inoue
Takao Inoue and Robert W. Heath Jr
Kerdock Codes for Limited Feedback Precoded MIMO Systems
A correction is made in Eq.(22), first matrix S0
null
null
null
cs.IT math.IT
null
A codebook based limited feedback strategy is a practical way to obtain partial channel state information at the transmitter in a precoded multiple-input multiple-output (MIMO) wireless system. Conventional codebook designs use Grassmannian packing, equiangular frames, vector quantization, or Fourier based constructions. While the capacity and error rate performance of conventional codebook constructions have been extensively investigated, constructing these codebooks is notoriously difficult relying on techniques such as nonlinear search or iterative algorithms. Further, the resulting codebooks may not have a systematic structure to facilitate storage of the codebook and low search complexity. In this paper, we propose a new systematic codebook design based on Kerdock codes and mutually unbiased bases. The proposed Kerdock codebook consists of multiple mutually unbiased unitary bases matrices with quaternary entries and the identity matrix. We propose to derive the beamforming and precoding codebooks from this base codebook, eliminating the requirement to store multiple codebooks. The propose structure requires little memory to store and, as we show, the quaternary structure facilitates codeword search. We derive the chordal distance for two antenna and four antenna codebooks, showing that the proposed codebooks compare favorably with prior designs. Monte Carlo simulations are used to compare achievable rates and error rates for different codebooks sizes.
[ { "version": "v1", "created": "Mon, 5 Nov 2007 01:28:35 GMT" }, { "version": "v2", "created": "Fri, 7 Mar 2008 14:35:36 GMT" } ]
2008-03-07T00:00:00
[ [ "Inoue", "Takao", "" ], [ "Heath", "Robert W.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.0574
Damien Chablat
Mazen Zein (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Singular Curves in the Joint Space and Cusp Points of 3-RPR parallel manipulators
null
Robotica 25, 6 (2007) 717-724
10.1017/S0263574707003785
null
cs.RO
null
This paper investigates the singular curves in the joint space of a family of planar parallel manipulators. It focuses on special points, referred to as cusp points, which may appear on these curves. Cusp points play an important role in the kinematic behavior of parallel manipulators since they make possible a nonsingular change of assembly mode. The purpose of this study is twofold. First, it exposes a method to compute joint space singular curves of 3-RPR planar parallel manipulators. Second, it presents an algorithm for detecting and computing all cusp points in the joint space of these same manipulators.
[ { "version": "v1", "created": "Mon, 5 Nov 2007 08:14:07 GMT" } ]
2007-11-06T00:00:00
[ [ "Zein", "Mazen", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0711.0607
Bart Van Rompaey
Bart Van Rompaey and Serge Demeyer
Exploring the Composition of Unit Test Suites
null
null
null
UA TR2007-01
cs.SE
null
In agile software development, test code can considerably contribute to the overall source code size. Being a valuable asset both in terms of verification and documentation, the composition of a test suite needs to be well understood in order to identify opportunities as well as weaknesses for further evolution. In this paper, we argue that the visualization of structural characteristics is a viable means to support the exploration of test suites. Thanks to general agreement on a limited set of key test design principles, such visualizations are relatively easy to interpret. In particular, we present visualizations that support testers in (i) locating test cases; (ii) examining the relation between test code and production code; and (iii) studying the composition of and dependencies within test cases. By means of two case studies, we demonstrate how visual patterns help to identify key test suite characteristics. This approach forms the first step in assisting a developer to build up understanding about test suites beyond code reading.
[ { "version": "v1", "created": "Mon, 5 Nov 2007 11:05:42 GMT" } ]
2007-11-06T00:00:00
[ [ "Van Rompaey", "Bart", "" ], [ "Demeyer", "Serge", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0711.0618
Wim Vanhoof
Jan Wielemaker, Anjo Anjewierden
PIDoc: Wiki style Literate Programming for Prolog
Paper presented at the 17th Workshop on Logic-based Methods in Programming Environments (WLPE2007)
null
null
null
cs.PL cs.SE
null
This document introduces PlDoc, a literate programming system for Prolog. Starting point for PlDoc was minimal distraction from the programming task and maximal immediate reward, attempting to seduce the programmer to use the system. Minimal distraction is achieved using structured comments that are as closely as possible related to common Prolog documentation practices. Immediate reward is provided by a web interface powered from the Prolog development environment that integrates searching and browsing application and system documentation. When accessed from localhost, it is possible to go from documentation shown in a browser to the source code displayed in the user's editor of choice.
[ { "version": "v1", "created": "Mon, 5 Nov 2007 12:13:12 GMT" } ]
2007-11-06T00:00:00
[ [ "Wielemaker", "Jan", "" ], [ "Anjewierden", "Anjo", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0711.0643
Simon Portegies Zwart
Simon Portegies Zwart (Amsterdam), Steve McMillan (Drexel), Derek Groen (Amsterdam), Alessia Gualandris (Rochester), Michael Sipior (Astron), Willem Vermin (SARA)
A parallel gravitational N-body kernel
21 pages, New Astronomy (in press)
null
10.1016/j.newast.2007.11.002
null
astro-ph cs.DC
null
We describe source code level parallelization for the {\tt kira} direct gravitational $N$-body integrator, the workhorse of the {\tt starlab} production environment for simulating dense stellar systems. The parallelization strategy, called ``j-parallelization'', involves the partition of the computational domain by distributing all particles in the system among the available processors. Partial forces on the particles to be advanced are calculated in parallel by their parent processors, and are then summed in a final global operation. Once total forces are obtained, the computing elements proceed to the computation of their particle trajectories. We report the results of timing measurements on four different parallel computers, and compare them with theoretical predictions. The computers employ either a high-speed interconnect, a NUMA architecture to minimize the communication overhead or are distributed in a grid. The code scales well in the domain tested, which ranges from 1024 - 65536 stars on 1 - 128 processors, providing satisfactory speedup. Running the production environment on a grid becomes inefficient for more than 60 processors distributed across three sites.
[ { "version": "v1", "created": "Mon, 5 Nov 2007 14:11:32 GMT" } ]
2009-11-13T00:00:00
[ [ "Zwart", "Simon Portegies", "", "Amsterdam" ], [ "McMillan", "Steve", "", "Drexel" ], [ "Groen", "Derek", "", "Amsterdam" ], [ "Gualandris", "Alessia", "", "Rochester" ], [ "Sipior", "Michael", "", "Astron" ], [ "Vermin", "Willem", "", "SARA" ] ]
[ null, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0711.0666
Bouselmi Ghazi
Ghazi Bouselmi (INRIA Lorraine - LORIA), Dominique Fohr (INRIA Lorraine - LORIA), Irina Illina (INRIA Lorraine - LORIA), Jean-Paul Haton (INRIA Lorraine - LORIA)
Discriminative Phoneme Sequences Extraction for Non-Native Speaker's Origin Classification
null
Dans ISSPA, International Symposium on Signal Processing and its Applications (2007)
null
null
cs.CL
null
In this paper we present an automated method for the classification of the origin of non-native speakers. The origin of non-native speakers could be identified by a human listener based on the detection of typical pronunciations for each nationality. Thus we suppose the existence of several phoneme sequences that might allow the classification of the origin of non-native speakers. Our new method is based on the extraction of discriminative sequences of phonemes from a non-native English speech database. These sequences are used to construct a probabilistic classifier for the speakers' origin. The existence of discriminative phone sequences in non-native speech is a significant result of this work. The system that we have developed achieved a significant correct classification rate of 96.3% and a significant error reduction compared to some other tested techniques.
[ { "version": "v1", "created": "Mon, 5 Nov 2007 15:20:47 GMT" } ]
2007-11-06T00:00:00
[ [ "Bouselmi", "Ghazi", "", "INRIA Lorraine - LORIA" ], [ "Fohr", "Dominique", "", "INRIA\n Lorraine - LORIA" ], [ "Illina", "Irina", "", "INRIA Lorraine - LORIA" ], [ "Haton", "Jean-Paul", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0711.0692
Jean-Yves Marion
Anne Bonfante (INRIA Lorraine - LORIA), Jean-Yves Marion (INRIA Lorraine - LORIA)
On the defence notion
null
Journal in Computer Virology 3, 4 (2007) 247-251
10.1007/s11416-007-0058-9
null
cs.CR
null
'Trojan horses', 'logic bombs', 'armoured viruses' and 'cryptovirology' are terms recalling war gears. In fact, concepts of attack and defence drive the world of computer virology, which looks like a war universe in an information society. This war has several shapes, from invasions of a network by worms, to military and industrial espionage ...
[ { "version": "v1", "created": "Mon, 5 Nov 2007 17:02:25 GMT" } ]
2007-11-06T00:00:00
[ [ "Bonfante", "Anne", "", "INRIA Lorraine - LORIA" ], [ "Marion", "Jean-Yves", "", "INRIA\n Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0711.0694
Bruno Scherrer
Bruno Scherrer (INRIA Lorraine - LORIA)
Performance Bounds for Lambda Policy Iteration and Application to the Game of Tetris
No. RR-6348 (2011)
null
null
null
cs.AI cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the discrete-time infinite-horizon optimal control problem formalized by Markov Decision Processes. We revisit the work of Bertsekas and Ioffe, that introduced $\lambda$ Policy Iteration, a family of algorithms parameterized by $\lambda$ that generalizes the standard algorithms Value Iteration and Policy Iteration, and has some deep connections with the Temporal Differences algorithm TD($\lambda$) described by Sutton and Barto. We deepen the original theory developped by the authors by providing convergence rate bounds which generalize standard bounds for Value Iteration described for instance by Puterman. Then, the main contribution of this paper is to develop the theory of this algorithm when it is used in an approximate form and show that this is sound. Doing so, we extend and unify the separate analyses developped by Munos for Approximate Value Iteration and Approximate Policy Iteration. Eventually, we revisit the use of this algorithm in the training of a Tetris playing controller as originally done by Bertsekas and Ioffe. We provide an original performance bound that can be applied to such an undiscounted control problem. Our empirical results are different from those of Bertsekas and Ioffe (which were originally qualified as "paradoxical" and "intriguing"), and much more conform to what one would expect from a learning experiment. We discuss the possible reason for such a difference.
[ { "version": "v1", "created": "Mon, 5 Nov 2007 17:07:22 GMT" }, { "version": "v2", "created": "Fri, 9 Nov 2007 15:46:43 GMT" }, { "version": "v3", "created": "Tue, 13 Nov 2007 12:34:37 GMT" }, { "version": "v4", "created": "Mon, 3 Oct 2011 11:58:38 GMT" }, { "version": "v5", "created": "Tue, 11 Oct 2011 12:42:24 GMT" } ]
2015-03-13T00:00:00
[ [ "Scherrer", "Bruno", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0711.0705
Brooke Shrader
Brooke Shrader, Haim Permuter
Feedback Capacity of the Compound Channel
34 pages, 2 figures, submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2023727
null
cs.IT math.IT
null
In this work we find the capacity of a compound finite-state channel with time-invariant deterministic feedback. The model we consider involves the use of fixed length block codes. Our achievability result includes a proof of the existence of a universal decoder for the family of finite-state channels with feedback. As a consequence of our capacity result, we show that feedback does not increase the capacity of the compound Gilbert-Elliot channel. Additionally, we show that for a stationary and uniformly ergodic Markovian channel, if the compound channel capacity is zero without feedback then it is zero with feedback. Finally, we use our result on the finite-state channel to show that the feedback capacity of the memoryless compound channel is given by $\inf_{\theta} \max_{Q_X} I(X;Y|\theta)$.
[ { "version": "v1", "created": "Mon, 5 Nov 2007 17:42:17 GMT" } ]
2016-11-15T00:00:00
[ [ "Shrader", "Brooke", "" ], [ "Permuter", "Haim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.0708
Danilo Silva
Danilo Silva, Frank R. Kschischang, Ralf K\"otter
A Rank-Metric Approach to Error Control in Random Network Coding
Minor corrections; 42 pages, to be published at the IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, vol. 54, no. 9, pp. 3951-3967, Sep. 2008
10.1109/TIT.2008.928291
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of error control in random linear network coding is addressed from a matrix perspective that is closely related to the subspace perspective of K\"otter and Kschischang. A large class of constant-dimension subspace codes is investigated. It is shown that codes in this class can be easily constructed from rank-metric codes, while preserving their distance properties. Moreover, it is shown that minimum distance decoding of such subspace codes can be reformulated as a generalized decoding problem for rank-metric codes where partial information about the error is available. This partial information may be in the form of erasures (knowledge of an error location but not its value) and deviations (knowledge of an error value but not its location). Taking erasures and deviations into account (when they occur) strictly increases the error correction capability of a code: if $\mu$ erasures and $\delta$ deviations occur, then errors of rank $t$ can always be corrected provided that $2t \leq d - 1 + \mu + \delta$, where $d$ is the minimum rank distance of the code. For Gabidulin codes, an important family of maximum rank distance codes, an efficient decoding algorithm is proposed that can properly exploit erasures and deviations. In a network coding application where $n$ packets of length $M$ over $F_q$ are transmitted, the complexity of the decoding algorithm is given by $O(dM)$ operations in an extension field $F_{q^n}$.
[ { "version": "v1", "created": "Mon, 5 Nov 2007 18:02:23 GMT" }, { "version": "v2", "created": "Tue, 10 Jun 2008 16:13:41 GMT" } ]
2019-05-07T00:00:00
[ [ "Silva", "Danilo", "" ], [ "Kschischang", "Frank R.", "" ], [ "Kötter", "Ralf", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.0711
Yingbin Liang
Yingbin Liang, H. Vincent Poor and Shlomo Shamai (Shitz)
Information-Theoretic Security in Wireless Networks
From the Proceedings of the 2007 Joint Workshop on Coding and Communications, Durnstein, Austria, October 14 - 16, 2007
null
null
null
cs.IT cs.CR math.IT
null
This paper summarizes recent contributions of the authors and their co-workers in the area of information-theoretic security.
[ { "version": "v1", "created": "Mon, 5 Nov 2007 18:21:14 GMT" } ]
2007-11-06T00:00:00
[ [ "Liang", "Yingbin", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.0784
Philip Baback Alipour
Philip B. Alipour
Addendum to Research MMMCV; A Man/Microbio/Megabio/Computer Vision
LaTeX, 10 pages, 4 figures (1 algorithm); An addendum to a research proposal on biovielectroluminescence and MMMCV for postgraduate academic bodies and research departments. The contents of this paper are mostly related and referenced to Article: [arXiv:0710.0410]
null
null
null
cs.CV cs.CE
null
In October 2007, a Research Proposal for the University of Sydney, Australia, the author suggested that biovie-physical phenomenon as `electrodynamic dependant biological vision', is governed by relativistic quantum laws and biovision. The phenomenon on the basis of `biovielectroluminescence', satisfies man/microbio/megabio/computer vision (MMMCV), as a robust candidate for physical and visual sciences. The general aim of this addendum is to present a refined text of Sections 1-3 of that proposal and highlighting the contents of its Appendix in form of a `Mechanisms' Section. We then briefly remind in an article aimed for December 2007, by appending two more equations into Section 3, a theoretical II-time scenario as a time model well-proposed for the phenomenon. The time model within the core of the proposal, plays a significant role in emphasizing the principle points on Objectives no. 1-8, Sub-hypothesis 3.1.2, mentioned in Article [arXiv:0710.0410]. It also expresses the time concept in terms of causing quantized energy f(|E|) of time |t|, emit in regard to shortening the probability of particle loci as predictable patterns of particle's un-occurred motion, a solution to Heisenberg's uncertainty principle (HUP) into a simplistic manner. We conclude that, practical frames via a time algorithm to this model, fixates such predictable patterns of motion of scenery bodies onto recordable observation points of a MMMCV system. It even suppresses/predicts superposition phenomena coming from a human subject and/or other bio-subjects for any decision making event, e.g., brainwave quantum patterns based on vision. Maintaining the existential probability of Riemann surfaces of II-time scenarios in the context of biovielectroluminescence, makes motion-prediction a possibility.
[ { "version": "v1", "created": "Tue, 6 Nov 2007 19:41:22 GMT" } ]
2016-09-08T00:00:00
[ [ "Alipour", "Philip B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0711.0811
Bouselmi Ghazi
Ghazi Bouselmi (INRIA Lorraine - LORIA), Dominique Fohr (INRIA Lorraine - LORIA), Irina Illina (INRIA Lorraine - LORIA)
Combined Acoustic and Pronunciation Modelling for Non-Native Speech Recognition
null
Dans InterSpeech 2007 (2007)
null
null
cs.CL
null
In this paper, we present several adaptation methods for non-native speech recognition. We have tested pronunciation modelling, MLLR and MAP non-native pronunciation adaptation and HMM models retraining on the HIWIRE foreign accented English speech database. The ``phonetic confusion'' scheme we have developed consists in associating to each spoken phone several sequences of confused phones. In our experiments, we have used different combinations of acoustic models representing the canonical and the foreign pronunciations: spoken and native models, models adapted to the non-native accent with MAP and MLLR. The joint use of pronunciation modelling and acoustic adaptation led to further improvements in recognition accuracy. The best combination of the above mentioned techniques resulted in a relative word error reduction ranging from 46% to 71%.
[ { "version": "v1", "created": "Tue, 6 Nov 2007 08:23:49 GMT" } ]
2007-11-07T00:00:00
[ [ "Bouselmi", "Ghazi", "", "INRIA Lorraine - LORIA" ], [ "Fohr", "Dominique", "", "INRIA\n Lorraine - LORIA" ], [ "Illina", "Irina", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0711.0829
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Instruction sequences with indirect jumps
23 pages; typos corrected, phrasing improved, reference replaced
Scientific Annals of Computer Science, 17:19--46, 2007. http://www.infoiasi.ro/bin/download/Annals/XVII/XVII_1.pdf
null
PRG0709
cs.PL
null
We study sequential programs that are instruction sequences with direct and indirect jump instructions. The intuition is that indirect jump instructions are jump instructions where the position of the instruction to jump to is the content of some memory cell. We consider several kinds of indirect jump instructions. For each kind, we define the meaning of programs with indirect jump instructions of that kind by means of a translation into programs without indirect jump instructions. For each kind, the intended behaviour of a program with indirect jump instructions of that kind under execution is the behaviour of the translated program under execution on interaction with some memory device.
[ { "version": "v1", "created": "Tue, 6 Nov 2007 10:26:03 GMT" }, { "version": "v2", "created": "Tue, 11 Dec 2007 07:58:45 GMT" } ]
2008-04-08T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0711.0834
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
An interface group for process components
26 pages; section on non-associativity of component composition added, examples added
Fundamenta Informaticae, 99(4):355--382, 2010
10.3233/FI-2010-254
PRG0707
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We take a process component as a pair of an interface and a behaviour. We study the composition of interacting process components in the setting of process algebra. We formalize the interfaces of interacting process components by means of an interface group. An interesting feature of the interface group is that it allows for distinguishing between expectations and promises in interfaces of process components. This distinction comes into play in case components with both client and server behaviour are involved.
[ { "version": "v1", "created": "Tue, 6 Nov 2007 10:45:02 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2008 08:19:38 GMT" } ]
2010-07-12T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0711.0836
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Machine structure oriented control code logic
32 pages; phrasing improved, references added, connection with Janlert's "dark programming" explained
Acta Informatica, 46(5):375--401, 2009
10.1007/s00236-009-0099-2
PRG0704
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Control code is a concept that is closely related to a frequently occurring practitioner's view on what is a program: code that is capable of controlling the behaviour of some machine. We present a logical approach to explain issues concerning control codes that are independent of the details of the behaviours that are controlled. Using this approach, such issues can be explained at a very abstract level. We illustrate this among other things by means of an example about the production of a new compiler from an existing one. The approach is based on abstract machine models, called machine structures. We introduce a model of systems that provide execution environments for the executable codes of machine structures and use it to go into portability of control codes.
[ { "version": "v1", "created": "Tue, 6 Nov 2007 11:01:21 GMT" }, { "version": "v2", "created": "Fri, 23 May 2008 10:12:36 GMT" }, { "version": "v3", "created": "Wed, 4 Mar 2009 09:47:36 GMT" } ]
2009-09-02T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0711.0838
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
On the operating unit size of load/store architectures
23 pages; minor errors corrected, explanations added, references replaced
Mathematical Structures in Computer Science, 20(3):395--417, 2010
10.1017/S0960129509990314
PRG0703
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a strict version of the concept of a load/store instruction set architecture in the setting of Maurer machines. We take the view that transformations on the states of a Maurer machine are achieved by applying threads as considered in thread algebra to the Maurer machine. We study how the transformations on the states of the main memory of a strict load/store instruction set architecture that can be achieved by applying threads depend on the operating unit size, the cardinality of the instruction set, and the maximal number of states of the threads.
[ { "version": "v1", "created": "Tue, 6 Nov 2007 11:16:34 GMT" }, { "version": "v2", "created": "Tue, 25 Nov 2008 08:46:40 GMT" } ]
2010-05-12T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0711.0840
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
A thread calculus with molecular dynamics
47 pages; examples and results added, phrasing improved, references replaced
Information and Computation, 208(7):817-844, 2010
10.1016/j.ic.2010.01.004
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a theory of threads, interleaving of threads, and interaction between threads and services with features of molecular dynamics, a model of computation that bears on computations in which dynamic data structures are involved. Threads can interact with services of which the states consist of structured data objects and computations take place by means of actions which may change the structure of the data objects. The features introduced include restriction of the scope of names used in threads to refer to data objects. Because that feature makes it troublesome to provide a model based on structural operational semantics and bisimulation, we construct a projective limit model for the theory.
[ { "version": "v1", "created": "Tue, 6 Nov 2007 11:25:20 GMT" }, { "version": "v2", "created": "Tue, 18 Nov 2008 09:29:03 GMT" } ]
2010-05-18T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0711.0892
Alessandro Mei
Alessandro Mei and Julinda Stefa
Routing in Outer Space: Improved Security and Energy-Efficiency in Multi-Hop Wireless Networks
Short version invited to INFOCOM 2008 mini-conference
null
null
null
cs.NI
null
In this paper we consider security-related and energy-efficiency issues in multi-hop wireless networks. We start our work from the observation, known in the literature, that shortest path routing creates congested areas in multi-hop wireless networks. These areas are critical--they generate both security and energy efficiency issues. We attack these problems and set out routing in outer space, a new routing mechanism that transforms any shortest path routing protocol (or approximated versions of it) into a new protocol that, in case of uniform traffic, guarantees that every node of the network is responsible for relaying the same number of messages, on expectation. We can show that a network that uses routing in outer space does not have congested areas, does not have the associated security-related issues, does not encourage selfish positioning, and, in spite of using more energy globally, lives longer of the same network using the original routing protocol.
[ { "version": "v1", "created": "Tue, 6 Nov 2007 15:05:47 GMT" } ]
2007-11-07T00:00:00
[ [ "Mei", "Alessandro", "" ], [ "Stefa", "Julinda", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0711.0917
Jan Wielemaker
Jan Wielemaker, Zhisheng Huang and Lourens van der Meij
SWI-Prolog and the Web
31 pages, 24 figures and 2 tables. To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL cs.SC
null
Where Prolog is commonly seen as a component in a Web application that is either embedded or communicates using a proprietary protocol, we propose an architecture where Prolog communicates to other components in a Web application using the standard HTTP protocol. By avoiding embedding in external Web servers development and deployment become much easier. To support this architecture, in addition to the transfer protocol, we must also support parsing, representing and generating the key Web document types such as HTML, XML and RDF. This paper motivates the design decisions in the libraries and extensions to Prolog for handling Web documents and protocols. The design has been guided by the requirement to handle large documents efficiently. The described libraries support a wide range of Web applications ranging from HTML and XML documents to Semantic Web RDF processing. To appear in Theory and Practice of Logic Programming (TPLP)
[ { "version": "v1", "created": "Tue, 6 Nov 2007 16:22:39 GMT" } ]
2007-11-07T00:00:00
[ [ "Wielemaker", "Jan", "" ], [ "Huang", "Zhisheng", "" ], [ "van der Meij", "Lourens", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0711.1016
Florian Widmann
Pietro Abate, Rajeev Gor\'e and Florian Widmann
An On-the-fly Tableau-based Decision Procedure for PDL-Satisfiability
26 pages, longer version of article in Methods for Modalities 2007; improved readability of proofs
null
null
null
cs.LO
null
We present a tableau-based algorithm for deciding satisfiability for propositional dynamic logic (PDL) which builds a finite rooted tree with ancestor loops and passes extra information from children to parents to separate good loops from bad loops during backtracking. It is easy to implement, with potential for parallelisation, because it constructs a pseudo-model ``on the fly'' by exploring each tableau branch independently. But its worst-case behaviour is 2EXPTIME rather than EXPTIME. A prototype implementation in the TWB (http://twb.rsise.anu.edu.au) is available.
[ { "version": "v1", "created": "Wed, 7 Nov 2007 06:11:13 GMT" }, { "version": "v2", "created": "Tue, 8 Jan 2008 05:23:26 GMT" } ]
2008-01-08T00:00:00
[ [ "Abate", "Pietro", "" ], [ "Goré", "Rajeev", "" ], [ "Widmann", "Florian", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0711.1038
Bouselmi Ghazi
Ghazi Bouselmi (INRIA Lorraine - LORIA), Dominique Fohr (INRIA Lorraine - LORIA), Irina Illina (INRIA Lorraine - LORIA), Jean-Paul Haton (INRIA Lorraine - LORIA)
Am\'elioration des Performances des Syst\`emes Automatiques de Reconnaissance de la Parole pour la Parole Non Native
null
Dans TAIMA'07, Traitement et Analyse de l'Information : M\'ethodes et Applications (2007)
null
null
cs.CL
null
In this article, we present an approach for non native automatic speech recognition (ASR). We propose two methods to adapt existing ASR systems to the non-native accents. The first method is based on the modification of acoustic models through integration of acoustic models from the mother tong. The phonemes of the target language are pronounced in a similar manner to the native language of speakers. We propose to combine the models of confused phonemes so that the ASR system could recognize both concurrent pronounciations. The second method we propose is a refinment of the pronounciation error detection through the introduction of graphemic constraints. Indeed, non native speakers may rely on the writing of words in their uttering. Thus, the pronounctiation errors might depend on the characters composing the words. The average error rate reduction that we observed is (22.5%) relative for the sentence error rate, and 34.5% (relative) in word error rate.
[ { "version": "v1", "created": "Wed, 7 Nov 2007 08:51:09 GMT" } ]
2007-11-08T00:00:00
[ [ "Bouselmi", "Ghazi", "", "INRIA Lorraine - LORIA" ], [ "Fohr", "Dominique", "", "INRIA\n Lorraine - LORIA" ], [ "Illina", "Irina", "", "INRIA Lorraine - LORIA" ], [ "Haton", "Jean-Paul", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0711.1055
Klas Olof Daniel Andersson
Daniel Andersson, Kristoffer Arnsfelt Hansen, Peter Bro Miltersen, Troels Bjerre Sorensen
Simple Recursive Games
null
null
null
null
cs.GT cs.DS
null
We define the class of "simple recursive games". A simple recursive game is defined as a simple stochastic game (a notion due to Anne Condon), except that we allow arbitrary real payoffs but disallow moves of chance. We study the complexity of solving simple recursive games and obtain an almost-linear time comparison-based algorithm for computing an equilibrium of such a game. The existence of a linear time comparison-based algorithm remains an open problem.
[ { "version": "v1", "created": "Wed, 7 Nov 2007 10:23:47 GMT" } ]
2007-11-08T00:00:00
[ [ "Andersson", "Daniel", "" ], [ "Hansen", "Kristoffer Arnsfelt", "" ], [ "Miltersen", "Peter Bro", "" ], [ "Sorensen", "Troels Bjerre", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0711.1056
Igal Sason
Igal Sason and Gil Wiechman
Bounds on the Number of Iterations for Turbo-Like Ensembles over the Binary Erasure Channe
Submitted to the IEEE Trans. on Information Theory, November 7th, 2007
null
null
null
cs.IT math.IT
null
This paper provides simple lower bounds on the number of iterations which is required for successful message-passing decoding of some important families of graph-based code ensembles (including low-density parity-check codes and variations of repeat-accumulate codes). The transmission of the code ensembles is assumed to take place over a binary erasure channel, and the bounds refer to the asymptotic case where we let the block length tend to infinity. The simplicity of the bounds derived in this paper stems from the fact that they are easily evaluated and are expressed in terms of some basic parameters of the ensemble which include the fraction of degree-2 variable nodes, the target bit erasure probability and the gap between the channel capacity and the design rate of the ensemble. This paper demonstrates that the number of iterations which is required for successful message-passing decoding scales at least like the inverse of the gap (in rate) to capacity, provided that the fraction of degree-2 variable nodes of these turbo-like ensembles does not vanish (hence, the number of iterations becomes unbounded as the gap to capacity vanishes).
[ { "version": "v1", "created": "Wed, 7 Nov 2007 10:17:48 GMT" } ]
2007-11-08T00:00:00
[ [ "Sason", "Igal", "" ], [ "Wiechman", "Gil", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.1161
Deniz Gunduz
Deniz Gunduz, Elza Erkip
Joint Source-Channel Codes for MIMO Block Fading Channels
36 pages, 11 figures
null
null
null
cs.IT math.IT
null
We consider transmission of a continuous amplitude source over an L-block Rayleigh fading $M_t \times M_r$ MIMO channel when the channel state information is only available at the receiver. Since the channel is not ergodic, Shannon's source-channel separation theorem becomes obsolete and the optimal performance requires a joint source -channel approach. Our goal is to minimize the expected end-to-end distortion, particularly in the high SNR regime. The figure of merit is the distortion exponent, defined as the exponential decay rate of the expected distortion with increasing SNR. We provide an upper bound and lower bounds for the distortion exponent with respect to the bandwidth ratio among the channel and source bandwidths. For the lower bounds, we analyze three different strategies based on layered source coding concatenated with progressive, superposition or hybrid digital/analog transmission. In each case, by adjusting the system parameters we optimize the distortion exponent as a function of the bandwidth ratio. We prove that the distortion exponent upper bound can be achieved when the channel has only one degree of freedom, that is L=1, and $\min\{M_t,M_r\}=1$. When we have more degrees of freedom, our achievable distortion exponents meet the upper bound for only certain ranges of the bandwidth ratio. We demonstrate that our results, which were derived for a complex Gaussian source, can be extended to more general source distributions as well.
[ { "version": "v1", "created": "Wed, 7 Nov 2007 21:18:30 GMT" } ]
2007-11-09T00:00:00
[ [ "Gunduz", "Deniz", "" ], [ "Erkip", "Elza", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.1177
Alfredo von Reckow
Alfredo von Reckow
Considerations on P vs NP
null
null
null
null
cs.CC cs.LO
null
In order to prove that the P of problems is different to the NP class, we consider the satisfability problem of propositional calculus formulae, which is an NP-complete problem. It is shown that, for every search algorithm A, there is a set E(A) containing propositional calculus formulae, each of which requires the algorithm A to take non-polynomial time to find the truth-values of its propositional letters satisfying it. Moreover, E(A)'s size is an exponential function of n, which makes it impossible to detect such formulae in a polynomial time. Hence, the satisfability problem does not have a polynomial complexity
[ { "version": "v1", "created": "Wed, 7 Nov 2007 22:32:41 GMT" } ]
2007-11-09T00:00:00
[ [ "von Reckow", "Alfredo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0711.1189
David Wood
David R. Wood
Clique Minors in Cartesian Products of Graphs
null
New York J. Mathematics 17:627-682, 2011
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A "clique minor" in a graph G can be thought of as a set of connected subgraphs in G that are pairwise disjoint and pairwise adjacent. The "Hadwiger number" h(G) is the maximum cardinality of a clique minor in G. This paper studies clique minors in the Cartesian product G*H. Our main result is a rough structural characterisation theorem for Cartesian products with bounded Hadwiger number. It implies that if the product of two sufficiently large graphs has bounded Hadwiger number then it is one of the following graphs: - a planar grid with a vortex of bounded width in the outerface, - a cylindrical grid with a vortex of bounded width in each of the two `big' faces, or - a toroidal grid. Motivation for studying the Hadwiger number of a graph includes Hadwiger's Conjecture, which states that the chromatic number chi(G) <= h(G). It is open whether Hadwiger's Conjecture holds for every Cartesian product. We prove that if |V(H)|-1 >= chi(G) >= chi(H) then Hadwiger's Conjecture holds for G*H. On the other hand, we prove that Hadwiger's Conjecture holds for all Cartesian products if and only if it holds for all G * K_2. We then show that h(G * K_2) is tied to the treewidth of G. We also develop connections with pseudoachromatic colourings and connected dominating sets that imply near-tight bounds on the Hadwiger number of grid graphs (Cartesian products of paths) and Hamming graphs (Cartesian products of cliques).
[ { "version": "v1", "created": "Thu, 8 Nov 2007 00:05:45 GMT" }, { "version": "v2", "created": "Thu, 3 Jan 2008 14:09:56 GMT" }, { "version": "v3", "created": "Wed, 9 Dec 2009 03:59:42 GMT" }, { "version": "v4", "created": "Fri, 23 Sep 2011 02:18:23 GMT" } ]
2011-10-05T00:00:00
[ [ "Wood", "David R.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0711.1226
Willemien Visser
Willemien Visser (INRIA Rocquencourt)
Dynamic aspects of individual design activities. A cognitive ergonomics viewpoint
null
Human behaviour in design Springer Verlag (Ed.) (2003) 87-96
null
null
cs.HC
null
This paper focuses on the use of knowledge possessed by designers. Data collection was based on observations (by the cognitive ergonomics researcher) and simultaneous verbalisations (by the designers) in empirical studies conducted in the context of industrial design projects. The contribution of this research is typical of cognitive ergonomics, in that it provides data on actual activities implemented by designers in their actual work situation (rather than on prescribed and/or idealised processes and methods). Data presented concern global strategies (the way in which designers actually organise their activity) and local strategies (reuse in design). Results from cognitive ergonomics and other research that challenges the way in which people are supposed to work with existing systems are generally not received warmly. Abundant corroboration of such results is required before industry may consider taking them into account. The opportunistic organisation of design activity is taken here as an example of this reluctance. The results concerning this aspect of design have been verified repeatedly, but only prototypes and experimental systems implementing some of the requirements formulated on their basis, are under development.
[ { "version": "v1", "created": "Thu, 8 Nov 2007 09:29:57 GMT" } ]
2007-11-09T00:00:00
[ [ "Visser", "Willemien", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0711.1227
Willemien Visser
Willemien Visser (INRIA Rocquencourt)
Designing as Construction of Representations: A Dynamic Viewpoint in Cognitive Design Research
null
Human-Computer Interaction 21, 1 (2006) 103-152
null
null
cs.HC
null
This article presents a cognitively oriented viewpoint on design. It focuses on cognitive, dynamic aspects of real design, i.e., the actual cognitive activity implemented by designers during their work on professional design projects. Rather than conceiving de-signing as problem solving - Simon's symbolic information processing (SIP) approach - or as a reflective practice or some other form of situated activity - the situativity (SIT) approach - we consider that, from a cognitive viewpoint, designing is most appropriately characterised as a construction of representations. After a critical discussion of the SIP and SIT approaches to design, we present our view-point. This presentation concerns the evolving nature of representations regarding levels of abstraction and degrees of precision, the function of external representations, and specific qualities of representation in collective design. Designing is described at three levels: the organisation of the activity, its strategies, and its design-representation construction activities (different ways to generate, trans-form, and evaluate representations). Even if we adopt a "generic design" stance, we claim that design can take different forms depending on the nature of the artefact, and we propose some candidates for dimensions that allow a distinction to be made between these forms of design. We discuss the potential specificity of HCI design, and the lack of cognitive design research occupied with the quality of design. We close our discussion of representational structures and activities by an outline of some directions regarding their functional linkages.
[ { "version": "v1", "created": "Thu, 8 Nov 2007 09:33:19 GMT" } ]
2007-11-09T00:00:00
[ [ "Visser", "Willemien", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0711.1231
Veronika Rehn-Sonigo
Anne Benoit (INRIA Rh\^one-Alpes / LIP Laboratoire d'Informatique du Parall\'elisme, LIP), Veronika Rehn-Sonigo (INRIA Rh\^one-Alpes / LIP Laboratoire d'Informatique du Parall\'elisme, LIP), Yves Robert (INRIA Rh\^one-Alpes / LIP Laboratoire d'Informatique du Parall\'elisme, LIP)
Optimizing Latency and Reliability of Pipeline Workflow Applications
null
null
null
null
cs.DC
null
Mapping applications onto heterogeneous platforms is a difficult challenge, even for simple application patterns such as pipeline graphs. The problem is even more complex when processors are subject to failure during the execution of the application. In this paper, we study the complexity of a bi-criteria mapping which aims at optimizing the latency (i.e., the response time) and the reliability (i.e., the probability that the computation will be successful) of the application. Latency is minimized by using faster processors, while reliability is increased by replicating computations on a set of processors. However, replication increases latency (additional communications, slower processors). The application fails to be executed only if all the processors fail during execution. While simple polynomial algorithms can be found for fully homogeneous platforms, the problem becomes NP-hard when tackling heterogeneous platforms. This is yet another illustration of the additional complexity added by heterogeneity.
[ { "version": "v1", "created": "Thu, 8 Nov 2007 14:45:12 GMT" }, { "version": "v2", "created": "Tue, 25 Mar 2008 10:43:50 GMT" }, { "version": "v3", "created": "Wed, 26 Mar 2008 09:36:18 GMT" } ]
2008-03-26T00:00:00
[ [ "Benoit", "Anne", "", "INRIA Rhône-Alpes / LIP Laboratoire d'Informatique du\n Parallélisme, LIP" ], [ "Rehn-Sonigo", "Veronika", "", "INRIA Rhône-Alpes / LIP\n Laboratoire d'Informatique du Parallélisme, LIP" ], [ "Robert", "Yves", "", "INRIA\n Rhône-Alpes / LIP Laboratoire d'Informatique du Parallélisme, LIP" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0711.1242
Paul Goldberg
P.W. Goldberg, P. Polpinit
The Price of Selfish Stackelberg Leadership in a Network Game
18 pages, 1 figure
null
null
null
cs.GT
null
We study a class of games in which a finite number of agents each controls a quantity of flow to be routed through a network, and are able to split their own flow between multiple paths through the network. Recent work on this model has contrasted the social cost of Nash equilibria with the best possible social cost. Here we show that additional costs are incurred in situations where a selfish ``leader'' agent allocates his flow, and then commits to that choice so that other agents are compelled to minimise their own cost based on the first agent's choice. We find that even in simple networks, the leader can often improve his own cost at the expense of increased social cost. Focusing on the 2-player case, we give upper and lower bounds on the worst-case additional cost incurred.
[ { "version": "v1", "created": "Thu, 8 Nov 2007 10:50:00 GMT" } ]
2007-11-09T00:00:00
[ [ "Goldberg", "P. W.", "" ], [ "Polpinit", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0711.1269
Tolga Girici
Tolga Girici, Chenxi Zhu, Jonathan R. Agre, Anthony Ephremides
Fair Scheduling in OFDMA-based Wireless Systems with QoS Constraints
Presented at International OFDM Workshop, Hamburg Germany on Aug. 30th 2007 (Inowo 07)
International OFDM Workshop, Hamburg Germany on Aug. 30th 2007 (Inowo 07)
null
null
cs.NI
null
In this work we consider the problem of downlink resource allocation for proportional fairness of long term received rates of data users and quality of service for real time sessions in an OFDMA-based wireless system. The base station allocates available power and bandwidth to individual users based on long term average received rates, QoS based rate constraints and channel conditions. We solve the underlying constrained optimization problem and propose an algorithm that achieves the optimal allocation. Numerical evaluation results show that the proposed algorithm provides better QoS to voice and video sessions while providing more and fair rates to data users in comparison with existing schemes.
[ { "version": "v1", "created": "Thu, 8 Nov 2007 13:07:49 GMT" } ]
2007-11-09T00:00:00
[ [ "Girici", "Tolga", "" ], [ "Zhu", "Chenxi", "" ], [ "Agre", "Jonathan R.", "" ], [ "Ephremides", "Anthony", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0711.1273
Tolga Girici
Tolga Girici, Chenxi Zhu, Jonathan R. Agre, Anthony Ephremides
Practical Resource Allocation Algorithms for QoS in OFDMA-based Wireless Systems
To be presented at 2nd IEEE International Broadband Wireless Access Workshop. Las Vegas, Nevada USA Jan 12 2008
To be presented at 2nd IEEE International Broadband Wireless Access Workshop. Las Vegas, Nevada USA Jan 12 2008
10.1109/ccnc08.2007.209
null
cs.NI
null
In this work we propose an efficient resource allocation algorithm for OFDMA based wireless systems supporting heterogeneous traffic. The proposed algorithm provides proportionally fairness to data users and short term rate guarantees to real-time users. Based on the QoS requirements, buffer occupancy and channel conditions, we propose a scheme for rate requirement determination for delay constrained sessions. Then we formulate and solve the proportional fair rate allocation problem subject to those rate requirements and power/bandwidth constraints. Simulations results show that the proposed algorithm provides significant improvement with respect to the benchmark algorithm.
[ { "version": "v1", "created": "Thu, 8 Nov 2007 13:39:15 GMT" } ]
2016-11-18T00:00:00
[ [ "Girici", "Tolga", "" ], [ "Zhu", "Chenxi", "" ], [ "Agre", "Jonathan R.", "" ], [ "Ephremides", "Anthony", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0711.1290
Willemien Visser
Willemien Visser (INRIA Rocquencourt)
Conception individuelle et collective. Approche de l'ergonomie cognitive [Individual and Collective Design. The Cognitive-Ergonomics Approach]
null
Cognition et cr\'eation. Explorations cognitives des processus de conception (Cognition and creation. Cognitive explorations of design processes) Mardaga (Ed.) (2002) 311-327
null
null
cs.OH
null
This text presents the cognitive-ergonomics approach to design, in both its individual and collective form. It focuses on collective design with respect to individual design. The theoretical framework adopted is that of information processing, specified for design problems. The cognitive characteristics of design problems are presented: the effects of their ill-defined character and of the different types of representation implemented in solving these problems, amongst others the more or less "satisficing" character of the different possible solutions. The text first describes the cognitive activities implemented in both individual and collective design: different types of control activities and of the executive activities of solution development and evaluation. Specific collective-design characteristics are then presented: co-design and distributed-design activities, temporo-operative and cognitive synchronisation, and different types of argumentation, of co-designers' intervention modes in the design process, of solution-proposals evaluation. The paper concludes by a confrontation between the two types of design, individual and collective.
[ { "version": "v1", "created": "Thu, 8 Nov 2007 14:48:44 GMT" } ]
2007-11-09T00:00:00
[ [ "Visser", "Willemien", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.1295
Yi Hong Dr
Emanuele Viterbo and Yi Hong
On the performance of Golden space-time trellis coded modulation over MIMO block fading channels
appear in IEEE Trans WCOM
null
null
null
cs.IT math.IT
null
The Golden space-time trellis coded modulation (GST-TCM) scheme was proposed in \cite{Hong06} for a high rate $2\times 2$ multiple-input multiple-output (MIMO) system over slow fading channels. In this letter, we present the performance analysis of GST-TCM over block fading channels, where the channel matrix is constant over a fraction of the codeword length and varies from one fraction to another, independently. In practice, it is not useful to design such codes for specific block fading channel parameters and a robust solution is preferable. We then show both analytically and by simulation that the GST-TCM designed for slow fading channels are indeed robust to all block fading channel conditions.
[ { "version": "v1", "created": "Thu, 8 Nov 2007 15:20:11 GMT" } ]
2007-11-09T00:00:00
[ [ "Viterbo", "Emanuele", "" ], [ "Hong", "Yi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.1360
Damian H. Zanette
Damian H. Zanette
Analytical approach to bit-string models of language evolution
To appear in Int. J. Mod. Phys. C
null
10.1142/S0129183108012340
null
physics.soc-ph cs.CL
null
A formulation of bit-string models of language evolution, based on differential equations for the population speaking each language, is introduced and preliminarily studied. Connections with replicator dynamics and diffusion processes are pointed out. The stability of the dominance state, where most of the population speaks a single language, is analyzed within a mean-field-like approximation, while the homogeneous state, where the population is evenly distributed among languages, can be exactly studied. This analysis discloses the existence of a bistability region, where dominance coexists with homogeneity as possible asymptotic states. Numerical resolution of the differential system validates these findings.
[ { "version": "v1", "created": "Thu, 8 Nov 2007 21:05:38 GMT" } ]
2009-11-13T00:00:00
[ [ "Zanette", "Damian H.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0711.1383
Navin Kashyap
Navin Kashyap
On Minimal Tree Realizations of Linear Codes
Submitted to IEEE Transactions on Information Theory; 29 pages, 11 figures
null
10.1109/TIT.2009.2023718
null
cs.IT math.IT
null
A tree decomposition of the coordinates of a code is a mapping from the coordinate set to the set of vertices of a tree. A tree decomposition can be extended to a tree realization, i.e., a cycle-free realization of the code on the underlying tree, by specifying a state space at each edge of the tree, and a local constraint code at each vertex of the tree. The constraint complexity of a tree realization is the maximum dimension of any of its local constraint codes. A measure of the complexity of maximum-likelihood decoding for a code is its treewidth, which is the least constraint complexity of any of its tree realizations. It is known that among all tree realizations of a code that extends a given tree decomposition, there exists a unique minimal realization that minimizes the state space dimension at each vertex of the underlying tree. In this paper, we give two new constructions of these minimal realizations. As a by-product of the first construction, a generalization of the state-merging procedure for trellis realizations, we obtain the fact that the minimal tree realization also minimizes the local constraint code dimension at each vertex of the underlying tree. The second construction relies on certain code decomposition techniques that we develop. We further observe that the treewidth of a code is related to a measure of graph complexity, also called treewidth. We exploit this connection to resolve a conjecture of Forney's regarding the gap between the minimum trellis constraint complexity and the treewidth of a code. We present a family of codes for which this gap can be arbitrarily large.
[ { "version": "v1", "created": "Fri, 9 Nov 2007 00:24:38 GMT" } ]
2016-11-17T00:00:00
[ [ "Kashyap", "Navin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.1401
Keki Burjorjee
Keki Burjorjee
Towards a Sound Theory of Adaptation for the Simple Genetic Algorithm
Typos corrected. No material changes to content
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The pace of progress in the fields of Evolutionary Computation and Machine Learning is currently limited -- in the former field, by the improbability of making advantageous extensions to evolutionary algorithms when their capacity for adaptation is poorly understood, and in the latter by the difficulty of finding effective semi-principled reductions of hard real-world problems to relatively simple optimization problems. In this paper we explain why a theory which can accurately explain the simple genetic algorithm's remarkable capacity for adaptation has the potential to address both these limitations. We describe what we believe to be the impediments -- historic and analytic -- to the discovery of such a theory and highlight the negative role that the building block hypothesis (BBH) has played. We argue based on experimental results that a fundamental limitation which is widely believed to constrain the SGA's adaptive ability (and is strongly implied by the BBH) is in fact illusionary and does not exist. The SGA therefore turns out to be more powerful than it is currently thought to be. We give conditions under which it becomes feasible to numerically approximate and study the multivariate marginals of the search distribution of an infinite population SGA over multiple generations even when its genomes are long, and explain why this analysis is relevant to the riddle of the SGA's remarkable adaptive abilities.
[ { "version": "v1", "created": "Fri, 9 Nov 2007 02:28:12 GMT" }, { "version": "v2", "created": "Fri, 3 Apr 2009 15:28:06 GMT" } ]
2009-04-03T00:00:00
[ [ "Burjorjee", "Keki", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0711.1466
Yoshiharu Maeno
Yoshiharu Maeno and Yukio Ohsawa
Predicting relevant empty spots in social interaction
11 pages, 5 figures, submitted to J. Systems Science and Complexity
Journal of Systems Science and Complexity vol.21, pp.161-171 (2008)
null
null
cs.AI
null
An empty spot refers to an empty hard-to-fill space which can be found in the records of the social interaction, and is the clue to the persons in the underlying social network who do not appear in the records. This contribution addresses a problem to predict relevant empty spots in social interaction. Homogeneous and inhomogeneous networks are studied as a model underlying the social interaction. A heuristic predictor function approach is presented as a new method to address the problem. Simulation experiment is demonstrated over a homogeneous network. A test data in the form of baskets is generated from the simulated communication. Precision to predict the empty spots is calculated to demonstrate the performance of the presented approach.
[ { "version": "v1", "created": "Fri, 9 Nov 2007 13:54:30 GMT" }, { "version": "v2", "created": "Fri, 11 Jan 2008 14:34:55 GMT" }, { "version": "v3", "created": "Thu, 21 Feb 2008 05:26:32 GMT" } ]
2010-09-28T00:00:00
[ [ "Maeno", "Yoshiharu", "" ], [ "Ohsawa", "Yukio", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0711.1478
Stefano Galatolo
Stefano Galatolo, Mathieu Hoyrup and Cristobal Rojas
A constructive Borel-Cantelli Lemma. Constructing orbits with required statistical properties
Revised version. Several results are generalized
null
null
null
math.CA cs.IT math.DS math.IT math.PR math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the general context of computable metric spaces and computable measures we prove a kind of constructive Borel-Cantelli lemma: given a sequence (constructive in some way) of sets $A_{i}$ with effectively summable measures, there are computable points which are not contained in infinitely many $A_{i}$. As a consequence of this we obtain the existence of computable points which follow the \emph{typical statistical behavior} of a dynamical system (they satisfy the Birkhoff theorem) for a large class of systems, having computable invariant measure and a certain ``logarithmic'' speed of convergence of Birkhoff averages over Lipshitz observables. This is applied to uniformly hyperbolic systems, piecewise expanding maps, systems on the interval with an indifferent fixed point and it directly implies the existence of computable numbers which are normal with respect to any base.
[ { "version": "v1", "created": "Fri, 9 Nov 2007 15:12:51 GMT" }, { "version": "v2", "created": "Mon, 30 Jun 2008 15:56:40 GMT" } ]
2008-06-30T00:00:00
[ [ "Galatolo", "Stefano", "" ], [ "Hoyrup", "Mathieu", "" ], [ "Rojas", "Cristobal", "" ] ]
[ { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0711.1533
Lalana Kagal
Tim Berners-Lee, Dan Connolly, Lalana Kagal, Yosi Scharf, and Jim Hendler
N3Logic: A Logical Framework For the World Wide Web
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.NI
null
The Semantic Web drives towards the use of the Web for interacting with logically interconnected data. Through knowledge models such as Resource Description Framework (RDF), the Semantic Web provides a unifying representation of richly structured data. Adding logic to the Web implies the use of rules to make inferences, choose courses of action, and answer questions. This logic must be powerful enough to describe complex properties of objects but not so powerful that agents can be tricked by being asked to consider a paradox. The Web has several characteristics that can lead to problems when existing logics are used, in particular, the inconsistencies that inevitably arise due to the openness of the Web, where anyone can assert anything. N3Logic is a logic that allows rules to be expressed in a Web environment. It extends RDF with syntax for nested graphs and quantified variables and with predicates for implication and accessing resources on the Web, and functions including cryptographic, string, math. The main goal of N3Logic is to be a minimal extension to the RDF data model such that the same language can be used for logic and data. In this paper, we describe N3Logic and illustrate through examples why it is an appropriate logic for the Web.
[ { "version": "v1", "created": "Fri, 9 Nov 2007 20:41:53 GMT" } ]
2007-11-12T00:00:00
[ [ "Berners-Lee", "Tim", "" ], [ "Connolly", "Dan", "" ], [ "Kagal", "Lalana", "" ], [ "Scharf", "Yosi", "" ], [ "Hendler", "Jim", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0711.1565
Hamidreza Farmanbar
Hamid Farmanbar, Shahab Oveis Gharan, and Amir Keyvan Khandani
Channel Code Design with Causal Side Information at the Encoder
28 pages, 6 figures, Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
The problem of channel code design for the $M$-ary input AWGN channel with additive $Q$-ary interference where the sequence of i.i.d. interference symbols is known causally at the encoder is considered. The code design criterion at high SNR is derived by defining a new distance measure between the input symbols of the Shannon's \emph{associated} channel. For the case of binary-input channel, i.e., M=2, it is shown that it is sufficient to use only two (out of $2^Q$) input symbols of the \emph{associated} channel in the encoding as far as the distance spectrum of code is concerned. This reduces the problem of channel code design for the binary-input AWGN channel with known interference at the encoder to design of binary codes for the binary symmetric channel where the Hamming distance among codewords is the major factor in the performance of the code.
[ { "version": "v1", "created": "Mon, 12 Nov 2007 15:25:00 GMT" } ]
2007-11-13T00:00:00
[ [ "Farmanbar", "Hamid", "" ], [ "Gharan", "Shahab Oveis", "" ], [ "Khandani", "Amir Keyvan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.1569
Sudhir Singh
Sudhir Kumar Singh, Vwani P. Roychowdhury
Capacity as a Fundamental Metric for Mechanism Design in the Information Economy
12 pages
null
null
null
cs.GT
null
The auction theory literature has so far focused mostly on the design of mechanisms that takes the revenue or the efficiency as a yardstick. However, scenarios where the {\it capacity}, which we define as \textit{``the number of bidders the auctioneer wants to have a positive probability of getting the item''}, is a fundamental concern are ubiquitous in the information economy. For instance, in sponsored search auctions (SSA's) or in online ad-exchanges, the true value of an ad-slot for an advertiser is inherently derived from the conversion-rate, which in turn depends on whether the advertiser actually obtained the ad-slot or not; thus, unless the capacity of the underlying auction is large, key parameters, such as true valuations and advertiser-specific conversion rates, will remain unknown or uncertain leading to inherent inefficiencies in the system. In general, the same holds true for all information goods/digital goods. We initiate a study of mechanisms, which take capacity as a yardstick, in addition to revenue/efficiency. We show that in the case of a single indivisible item one simple way to incorporate capacity constraints is via designing mechanisms to sell probability distributions, and that under certain conditions, such optimal probability distributions could be identified using a Linear programming approach. We define a quantity called {\it price of capacity} to capture the tradeoff between capacity and revenue/efficiency. We also study the case of sponsored search auctions. Finally, we discuss how general such an approach via probability spikes can be made, and potential directions for future investigations.
[ { "version": "v1", "created": "Sat, 10 Nov 2007 04:30:58 GMT" } ]
2007-11-13T00:00:00
[ [ "Singh", "Sudhir Kumar", "" ], [ "Roychowdhury", "Vwani P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0711.1573
Wenyi Zhang
Wenyi Zhang, Shivaprasad Kotagiri, J. Nicholas Laneman
Outage-Efficient Downlink Transmission Without Transmit Channel State Information
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
This paper investigates downlink transmission over a quasi-static fading Gaussian broadcast channel (BC), to model delay-sensitive applications over slowly time-varying fading channels. System performance is characterized by outage achievable rate regions. In contrast to most previous work, here the problem is studied under the key assumption that the transmitter only knows the probability distributions of the fading coefficients, but not their realizations. For scalar-input channels, two coding schemes are proposed. The first scheme is called blind dirty paper coding (B-DPC), which utilizes a robustness property of dirty paper coding to perform precoding at the transmitter. The second scheme is called statistical superposition coding (S-SC), in which each receiver adaptively performs successive decoding with the process statistically governed by the realized fading. Both B-DPC and S-SC schemes lead to the same outage achievable rate region, which always dominates that of time-sharing, irrespective of the particular fading distributions. The S-SC scheme can be extended to BCs with multiple transmit antennas.
[ { "version": "v1", "created": "Sat, 10 Nov 2007 05:59:11 GMT" } ]
2007-11-13T00:00:00
[ [ "Zhang", "Wenyi", "" ], [ "Kotagiri", "Shivaprasad", "" ], [ "Laneman", "J. Nicholas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.1605
Himanshu Asnani
Himanshu Asnani and Abhay Karandikar
Asymptotic Capacity of Wireless Ad Hoc Networks with Realistic Links under a Honey Comb Topology
This paper has been withdrawn by the authors. 3 pages, 1 figure, Submitted to IEEE Communication Letters
null
null
null
cs.IT math.IT
null
We consider the effects of Rayleigh fading and lognormal shadowing in the physical interference model for all the successful transmissions of traffic across the network. New bounds are derived for the capacity of a given random ad hoc wireless network that reflect packet drop or capture probability of the transmission links. These bounds are based on a simplified network topology termed as honey-comb topology under a given routing and scheduling scheme.
[ { "version": "v1", "created": "Sat, 10 Nov 2007 18:00:38 GMT" }, { "version": "v2", "created": "Tue, 5 Oct 2010 00:47:31 GMT" } ]
2010-10-06T00:00:00
[ [ "Asnani", "Himanshu", "" ], [ "Karandikar", "Abhay", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.1669
James Cusick
James Cusick
Applying Software Defect Estimations: Using a Risk Matrix for Tuning Test Effort
null
null
null
null
cs.SE cs.OH
null
Applying software defect esimation techniques and presenting this information in a compact and impactful decision table can clearly illustrate to collaborative groups how critical this position is in the overall development cycle. The Test Risk Matrix described here has proven to be a valuable addition to the management tools and approaches used in developing large scale software on several releases. Use of this matrix in development planning meetings can clarify the attendant risks and possible consequences of carrying out or bypassing specific test activities.
[ { "version": "v1", "created": "Sun, 11 Nov 2007 18:56:53 GMT" } ]
2007-11-13T00:00:00
[ [ "Cusick", "James", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.1682
Loukas Georgiadis
Loukas Georgiadis, Haim Kaplan, Nira Shafrir, Robert E. Tarjan, Renato F. Werneck
Data Structures for Mergeable Trees
null
null
null
null
cs.DS
null
Motivated by an application in computational topology, we consider a novel variant of the problem of efficiently maintaining dynamic rooted trees. This variant requires merging two paths in a single operation. In contrast to the standard problem, in which only one tree arc changes at a time, a single merge operation can change many arcs. In spite of this, we develop a data structure that supports merges on an n-node forest in O(log^2 n) amortized time and all other standard tree operations in O(log n) time (amortized, worst-case, or randomized depending on the underlying data structure). For the special case that occurs in the motivating application, in which arbitrary arc deletions (cuts) are not allowed, we give a data structure with an O(log n) time bound per operation. This is asymptotically optimal under certain assumptions. For the even-more special case in which both cuts and parent queries are disallowed, we give an alternative O(log n)-time solution that uses standard dynamic trees as a black box. This solution also applies to the motivating application. Our methods use previous work on dynamic trees in various ways, but the analysis of each algorithm requires novel ideas. We also investigate lower bounds for the problem under various assumptions.
[ { "version": "v1", "created": "Sun, 11 Nov 2007 21:28:20 GMT" } ]
2007-11-13T00:00:00
[ [ "Georgiadis", "Loukas", "" ], [ "Kaplan", "Haim", "" ], [ "Shafrir", "Nira", "" ], [ "Tarjan", "Robert E.", "" ], [ "Werneck", "Renato F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0711.1723
Jinshan Zhang
Jinshan Zhang, Yan Huo, and Fengshan Bai
An analysis of a random algorithm for estimating all the matchings
18 pages
null
null
null
cs.CC cs.DM
null
Counting the number of all the matchings on a bipartite graph has been transformed into calculating the permanent of a matrix obtained from the extended bipartite graph by Yan Huo, and Rasmussen presents a simple approach (RM) to approximate the permanent, which just yields a critical ratio O($n\omega(n)$) for almost all the 0-1 matrices, provided it's a simple promising practical way to compute this #P-complete problem. In this paper, the performance of this method will be shown when it's applied to compute all the matchings based on that transformation. The critical ratio will be proved to be very large with a certain probability, owning an increasing factor larger than any polynomial of $n$ even in the sense for almost all the 0-1 matrices. Hence, RM fails to work well when counting all the matchings via computing the permanent of the matrix. In other words, we must carefully utilize the known methods of estimating the permanent to count all the matchings through that transformation.
[ { "version": "v1", "created": "Mon, 12 Nov 2007 08:15:39 GMT" }, { "version": "v2", "created": "Thu, 15 Nov 2007 15:35:11 GMT" } ]
2007-11-15T00:00:00
[ [ "Zhang", "Jinshan", "" ], [ "Huo", "Yan", "" ], [ "Bai", "Fengshan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0711.1765
Damien Chablat
Anatoly Pashkevich (ROBOTIC Laboratory, Irccyn), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Kinematic calibration of orthoglide-type mechanisms
null
Information Control Problems in Manufacturing 2006, Elsevier (Ed.) (2006) 149-154
null
null
cs.RO
null
The paper proposes a novel calibration approach for the Orthoglide-type mechanisms based on observations of the manipulator leg parallelism during mo-tions between the prespecified test postures. It employs a low-cost measuring system composed of standard comparator indicators attached to the universal magnetic stands. They are sequentially used for measuring the deviation of the relevant leg location while the manipulator moves the TCP along the Cartesian axes. Using the measured differences, the developed algorithm estimates the joint offsets that are treated as the most essential parameters to be adjusted. The sensitivity of the meas-urement methods and the calibration accuracy are also studied. Experimental re-sults are presented that demonstrate validity of the proposed calibration technique
[ { "version": "v1", "created": "Mon, 12 Nov 2007 12:57:46 GMT" } ]
2007-11-13T00:00:00
[ [ "Pashkevich", "Anatoly", "", "ROBOTIC Laboratory, Irccyn" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0711.1766
Yuval Kochman
Ram Zamir, Yuval Kochman and Uri Erez
Achieving the Gaussian Rate-Distortion Function by Prediction
To appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
The "water-filling" solution for the quadratic rate-distortion function of a stationary Gaussian source is given in terms of its power spectrum. This formula naturally lends itself to a frequency domain "test-channel" realization. We provide an alternative time-domain realization for the rate-distortion function, based on linear prediction. This solution has some interesting implications, including the optimality at all distortion levels of pre/post filtered vector-quantized differential pulse code modulation (DPCM), and a duality relationship with decision-feedback equalization (DFE) for inter-symbol interference (ISI) channels.
[ { "version": "v1", "created": "Mon, 12 Nov 2007 13:45:05 GMT" }, { "version": "v2", "created": "Sun, 18 Nov 2007 08:53:43 GMT" }, { "version": "v3", "created": "Mon, 24 Dec 2007 08:39:06 GMT" }, { "version": "v4", "created": "Mon, 18 Feb 2008 08:39:00 GMT" } ]
2008-02-18T00:00:00
[ [ "Zamir", "Ram", "" ], [ "Kochman", "Yuval", "" ], [ "Erez", "Uri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.1786
Cyril Dumont
Cyril Dumont (LACL), Fabrice Mourlin (LACL)
A Mobile Computing Architecture for Numerical Simulation
null
null
null
null
cs.DC
null
The domain of numerical simulation is a place where the parallelization of numerical code is common. The definition of a numerical context means the configuration of resources such as memory, processor load and communication graph, with an evolving feature: the resources availability. A feature is often missing: the adaptability. It is not predictable and the adaptable aspect is essential. Without calling into question these implementations of these codes, we create an adaptive use of these implementations. Because the execution has to be driven by the availability of main resources, the components of a numeric computation have to react when their context changes. This paper offers a new architecture, a mobile computing architecture, based on mobile agents and JavaSpace. At the end of this paper, we apply our architecture to several case studies and obtain our first results.
[ { "version": "v1", "created": "Mon, 12 Nov 2007 14:39:34 GMT" } ]
2007-11-13T00:00:00
[ [ "Dumont", "Cyril", "", "LACL" ], [ "Mourlin", "Fabrice", "", "LACL" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0711.1814
Francesca A. Lisi
Francesca A. Lisi
Building Rules on Top of Ontologies for the Semantic Web with Inductive Logic Programming
30 pages, 6 figures
null
null
null
cs.AI cs.LG
null
Building rules on top of ontologies is the ultimate goal of the logical layer of the Semantic Web. To this aim an ad-hoc mark-up language for this layer is currently under discussion. It is intended to follow the tradition of hybrid knowledge representation and reasoning systems such as $\mathcal{AL}$-log that integrates the description logic $\mathcal{ALC}$ and the function-free Horn clausal language \textsc{Datalog}. In this paper we consider the problem of automating the acquisition of these rules for the Semantic Web. We propose a general framework for rule induction that adopts the methodological apparatus of Inductive Logic Programming and relies on the expressive and deductive power of $\mathcal{AL}$-log. The framework is valid whatever the scope of induction (description vs. prediction) is. Yet, for illustrative purposes, we also discuss an instantiation of the framework which aims at description and turns out to be useful in Ontology Refinement. Keywords: Inductive Logic Programming, Hybrid Knowledge Representation and Reasoning Systems, Ontologies, Semantic Web. Note: To appear in Theory and Practice of Logic Programming (TPLP)
[ { "version": "v1", "created": "Mon, 12 Nov 2007 17:15:34 GMT" } ]
2007-11-13T00:00:00
[ [ "Lisi", "Francesca A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0711.1827
Joerg Rothe
Dorothea Baumeister and Joerg Rothe
The Three-Color and Two-Color Tantrix(TM) Rotation Puzzle Problems are NP-Complete via Parsimonious Reductions
30 pages, 25 figures
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Holzer and Holzer (Discrete Applied Mathematics 144(3):345--358, 2004) proved that the Tantrix(TM) rotation puzzle problem with four colors is NP-complete, and they showed that the infinite variant of this problem is undecidable. In this paper, we study the three-color and two-color Tantrix(TM) rotation puzzle problems (3-TRP and 2-TRP) and their variants. Restricting the number of allowed colors to three (respectively, to two) reduces the set of available Tantrix(TM) tiles from 56 to 14 (respectively, to 8). We prove that 3-TRP and 2-TRP are NP-complete, which answers a question raised by Holzer and Holzer in the affirmative. Since our reductions are parsimonious, it follows that the problems Unique-3-TRP and Unique-2-TRP are DP-complete under randomized reductions. We also show that the another-solution problems associated with 4-TRP, 3-TRP, and 2-TRP are NP-complete. Finally, we prove that the infinite variants of 3-TRP and 2-TRP are undecidable.
[ { "version": "v1", "created": "Mon, 12 Nov 2007 17:44:45 GMT" }, { "version": "v2", "created": "Mon, 19 Nov 2007 21:22:14 GMT" }, { "version": "v3", "created": "Mon, 9 Jun 2008 12:26:34 GMT" } ]
2008-06-09T00:00:00
[ [ "Baumeister", "Dorothea", "" ], [ "Rothe", "Joerg", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0711.1856
Sumanth Gangasani
Sumanth Kumar Reddy Gangasani
Testing Kak's Conjecture on Binary Reciprocal of Primes and Cryptographic Applications
5 pages, 4 figures
null
null
null
cs.CR
null
This note considers reciprocal of primes in binary representation and shows that the conjecture that 0s exceed 1s in most cases continues to hold for primes less one million. The conjecture has also been tested for ternary representation with similar results. Some applications of this result to cryptography are discussed.
[ { "version": "v1", "created": "Mon, 12 Nov 2007 23:48:53 GMT" }, { "version": "v2", "created": "Wed, 2 Jan 2008 21:24:44 GMT" } ]
2008-01-02T00:00:00
[ [ "Gangasani", "Sumanth Kumar Reddy", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0711.1890
Martin Haenggi
Martin Haenggi
A Geometric Interpretation of Fading in Wireless Networks: Theory and Applications
24 pages, 8 figures
null
null
null
cs.IT math.IT
null
In wireless networks with random node distribution, the underlying point process model and the channel fading process are usually considered separately. A unified framework is introduced that permits the geometric characterization of fading by incorporating the fading process into the point process model. Concretely, assuming nodes are distributed in a stationary Poisson point process in $\R^d$, the properties of the point processes that describe the path loss with fading are analyzed. The main applications are connectivity and broadcasting.
[ { "version": "v1", "created": "Mon, 12 Nov 2007 23:07:09 GMT" } ]
2007-11-14T00:00:00
[ [ "Haenggi", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.1986
Andrea Abrardo
Andrea Abrardo
Performance bounds and codes design criteria for channel decoding with a-priori information
21 pages, 9 figures
null
null
null
cs.IT math.IT
null
In this article we focus on the problem of channel decoding in presence of a-priori information. In particular, assuming that the a-priori information reliability is not perfectly estimated at the receiver, we derive a novel analytical framework for evaluating the decoder's performance. It is derived the important result that a "good code", i.e., a code which allows to fully exploit the potential benefit of a-priori information, must associate information sequences with high Hamming weights to codewords with low Hamming weights. Basing on the proposed analysis, we analyze the performance of convolutional codes, random codes, and turbo codes. Moreover, we consider the transmission of correlated binary sources from independent nodes, a problem which has several practical applications, e.g. in the case of sensor networks. In this context, we propose a very simple joint source-channel turbo decoding scheme where each decoder works by exploiting a-priori information given by the other decoder. In the case of block fading channels, it is shown that the inherent correlation between information signals provide a form of non-cooperative diversity, thus allowing joint source-channel decoding to outperform separation-based schemes.
[ { "version": "v1", "created": "Tue, 13 Nov 2007 14:22:32 GMT" } ]
2007-11-14T00:00:00
[ [ "Abrardo", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.1993
Michel Grabisch
Aoi Honda, Michel Grabisch (CES)
Entropy of capacities on lattices and set systems
null
Information Sciences 176 (2006) 3472-3489
null
null
cs.DM math.ST stat.TH
null
We propose a definition for the entropy of capacities defined on lattices. Classical capacities are monotone set functions and can be seen as a generalization of probability measures. Capacities on lattices address the general case where the family of subsets is not necessarily the Boolean lattice of all subsets. Our definition encompasses the classical definition of Shannon for probability measures, as well as the entropy of Marichal defined for classical capacities. Some properties and examples are given.
[ { "version": "v1", "created": "Tue, 13 Nov 2007 14:43:15 GMT" } ]
2007-11-14T00:00:00
[ [ "Honda", "Aoi", "", "CES" ], [ "Grabisch", "Michel", "", "CES" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0711.2010
Reiner Czerwinski
Reiner Czerwinski
A Polynomial Time Algorithm for Graph Isomorphism
null
null
null
null
cs.CC
http://creativecommons.org/licenses/by/4.0/
We claimed that there is a polynomial algorithm to test if two graphs are isomorphic. But the algorithm is wrong. It only tests if the adjacency matrices of two graphs have the same eigenvalues. There is a counterexample of two non-isomorphic graphs with the same eigenvalues.
[ { "version": "v1", "created": "Tue, 13 Nov 2007 15:51:33 GMT" }, { "version": "v2", "created": "Wed, 28 Nov 2007 20:23:00 GMT" }, { "version": "v3", "created": "Thu, 13 Dec 2007 14:51:55 GMT" }, { "version": "v4", "created": "Wed, 23 Jan 2008 15:10:16 GMT" }, { "version": "v5", "created": "Sat, 15 Oct 2022 15:56:47 GMT" } ]
2022-10-18T00:00:00
[ [ "Czerwinski", "Reiner", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0711.2023
Peter Turney
Peter D. Turney (National Research Council of Canada)
Empirical Evaluation of Four Tensor Decomposition Algorithms
related work available at http://purl.org/peter.turney/
null
null
ERB-1152, NRC-49877
cs.LG cs.CL cs.IR
null
Higher-order tensor decompositions are analogous to the familiar Singular Value Decomposition (SVD), but they transcend the limitations of matrices (second-order tensors). SVD is a powerful tool that has achieved impressive results in information retrieval, collaborative filtering, computational linguistics, computational vision, and other fields. However, SVD is limited to two-dimensional arrays of data (two modes), and many potential applications have three or more modes, which require higher-order tensor decompositions. This paper evaluates four algorithms for higher-order tensor decomposition: Higher-Order Singular Value Decomposition (HO-SVD), Higher-Order Orthogonal Iteration (HOOI), Slice Projection (SP), and Multislice Projection (MP). We measure the time (elapsed run time), space (RAM and disk space requirements), and fit (tensor reconstruction accuracy) of the four algorithms, under a variety of conditions. We find that standard implementations of HO-SVD and HOOI do not scale up to larger tensors, due to increasing RAM requirements. We recommend HOOI for tensors that are small enough for the available RAM and MP for larger tensors.
[ { "version": "v1", "created": "Tue, 13 Nov 2007 16:28:47 GMT" } ]
2007-11-14T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0711.2050
Hacene Belbachir
Kenza Guenda
Two Families of Quantum Codes Derived from Cyclic Codes
null
null
null
null
cs.IT math.IT
null
We characterize the affine-invariant maximal extended cyclic codes. Then by the CSS construction, we derive from these codes a family of pure quantum codes. Also for ordnq even, a new family of degenerate quantum stabilizer codes is derived from the classical duadic codes. This answer an open problem asked by Aly et al.
[ { "version": "v1", "created": "Tue, 13 Nov 2007 19:06:43 GMT" } ]
2007-11-14T00:00:00
[ [ "Guenda", "Kenza", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.2058
Igor M. Suslov
I. M. Suslov (P.L.Kapitza Institute for Physical Problems, Moscow, Russia)
Computer Model of a "Sense of Humour". I. General Algorithm
10 pages, 3 figures included; continuation of this series to appear
Biofizika SSSR 37, 318 (1992) [Biophysics 37, 242 (1992)]
null
null
q-bio.NC cs.AI
null
A computer model of a "sense of humour" is proposed. The humorous effect is interpreted as a specific malfunction in the course of information processing due to the need for the rapid deletion of the false version transmitted into consciousness. The biological function of a sense of humour consists in speeding up the bringing of information into consciousness and in fuller use of the resources of the brain.
[ { "version": "v1", "created": "Tue, 13 Nov 2007 19:00:32 GMT" } ]
2007-11-27T00:00:00
[ [ "Suslov", "I. M.", "", "P.L.Kapitza Institute for Physical Problems, Moscow,\n Russia" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0711.2061
Igor M. Suslov
I. M. Suslov (P.L.Kapitza Institute for Physical Problems, Moscow, Russia)
Computer Model of a "Sense of Humour". II. Realization in Neural Networks
13 pages, 5 figures included; continuation of this series to appear
Biofizika SSSR 37, 325 (1992) [Biophysics 37, 249 (1992)]
null
null
q-bio.NC cs.AI
null
The computer realization of a "sense of humour" requires the creation of an algorithm for solving the "linguistic problem", i.e. the problem of recognizing a continuous sequence of polysemantic images. Such algorithm may be realized in the Hopfield model of a neural network after its proper modification.
[ { "version": "v1", "created": "Tue, 13 Nov 2007 20:15:10 GMT" } ]
2007-11-27T00:00:00
[ [ "Suslov", "I. M.", "", "P.L.Kapitza Institute for Physical Problems, Moscow,\n Russia" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0711.2062
Thomas Sandholm
Thomas Sandholm
Autoregressive Time Series Forecasting of Computational Demand
null
null
null
null
cs.DC
null
We study the predictive power of autoregressive moving average models when forecasting demand in two shared computational networks, PlanetLab and Tycoon. Demand in these networks is very volatile, and predictive techniques to plan usage in advance can improve the performance obtained drastically. Our key finding is that a random walk predictor performs best for one-step-ahead forecasts, whereas ARIMA(1,1,0) and adaptive exponential smoothing models perform better for two and three-step-ahead forecasts. A Monte Carlo bootstrap test is proposed to evaluate the continuous prediction performance of different models with arbitrary confidence and statistical significance levels. Although the prediction results differ between the Tycoon and PlanetLab networks, we observe very similar overall statistical properties, such as volatility dynamics.
[ { "version": "v1", "created": "Wed, 14 Nov 2007 00:57:13 GMT" } ]
2007-11-15T00:00:00
[ [ "Sandholm", "Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0711.2087
Edna Ruckhaus
Edna Ruckhaus, Eduardo Ruiz, Maria-Esther Vidal
Query Evaluation and Optimization in the Semantic Web
18 pages, 8 figures, 7 tables. Presented at the ALPSWS2006 First International Workshop on Applications of Logic Programming in the Semantic Web and Semantic Web Services where it got a "Best Paper Award". To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.DB cs.LO
null
We address the problem of answering Web ontology queries efficiently. An ontology is formalized as a Deductive Ontology Base (DOB), a deductive database that comprises the ontology's inference axioms and facts. A cost-based query optimization technique for DOB is presented. A hybrid cost model is proposed to estimate the cost and cardinality of basic and inferred facts. Cardinality and cost of inferred facts are estimated using an adaptive sampling technique, while techniques of traditional relational cost models are used for estimating the cost of basic facts and conjunctive ontology queries. Finally, we implement a dynamic-programming optimization algorithm to identify query evaluation plans that minimize the number of intermediate inferred facts. We modeled a subset of the Web ontology language OWL Lite as a DOB, and performed an experimental study to analyze the predictive capacity of our cost model and the benefits of the query optimization technique. Our study has been conducted over synthetic and real-world OWL ontologies, and shows that the techniques are accurate and improve query performance. To appear in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Tue, 13 Nov 2007 22:31:09 GMT" } ]
2007-11-15T00:00:00
[ [ "Ruckhaus", "Edna", "" ], [ "Ruiz", "Eduardo", "" ], [ "Vidal", "Maria-Esther", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0711.2102
Gil Shamir
Gil I. Shamir
Patterns of i.i.d. Sequences and Their Entropy - Part II: Bounds for Some Distributions
null
null
null
null
cs.IT math.IT
null
A pattern of a sequence is a sequence of integer indices with each index describing the order of first occurrence of the respective symbol in the original sequence. In a recent paper, tight general bounds on the block entropy of patterns of sequences generated by independent and identically distributed (i.i.d.) sources were derived. In this paper, precise approximations are provided for the pattern block entropies for patterns of sequences generated by i.i.d. uniform and monotonic distributions, including distributions over the integers, and the geometric distribution. Numerical bounds on the pattern block entropies of these distributions are provided even for very short blocks. Tight bounds are obtained even for distributions that have infinite i.i.d. entropy rates. The approximations are obtained using general bounds and their derivation techniques. Conditional index entropy is also studied for distributions over smaller alphabets.
[ { "version": "v1", "created": "Wed, 14 Nov 2007 02:13:15 GMT" } ]
2007-11-15T00:00:00
[ [ "Shamir", "Gil I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.2104
Arthur Cunha
Arthur Cunha, Minh Do, and Martin Vetterli
On the Information Rates of the Plenoptic Function
submitted to IEEE Transactions in Information Theory
null
null
null
cs.IT cs.CV math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The {\it plenoptic function} (Adelson and Bergen, 91) describes the visual information available to an observer at any point in space and time. Samples of the plenoptic function (POF) are seen in video and in general visual content, and represent large amounts of information. In this paper we propose a stochastic model to study the compression limits of the plenoptic function. In the proposed framework, we isolate the two fundamental sources of information in the POF: the one representing the camera motion and the other representing the information complexity of the "reality" being acquired and transmitted. The sources of information are combined, generating a stochastic process that we study in detail. We first propose a model for ensembles of realities that do not change over time. The proposed model is simple in that it enables us to derive precise coding bounds in the information-theoretic sense that are sharp in a number of cases of practical interest. For this simple case of static realities and camera motion, our results indicate that coding practice is in accordance with optimal coding from an information-theoretic standpoint. The model is further extended to account for visual realities that change over time. We derive bounds on the lossless and lossy information rates for this dynamic reality model, stating conditions under which the bounds are tight. Examples with synthetic sources suggest that in the presence of scene dynamics, simple hybrid coding using motion/displacement estimation with DPCM performs considerably suboptimally relative to the true rate-distortion bound.
[ { "version": "v1", "created": "Wed, 14 Nov 2007 02:54:22 GMT" }, { "version": "v2", "created": "Mon, 19 Nov 2007 02:53:30 GMT" }, { "version": "v3", "created": "Fri, 7 Aug 2009 18:11:32 GMT" } ]
2009-08-08T00:00:00
[ [ "Cunha", "Arthur", "" ], [ "Do", "Minh", "" ], [ "Vetterli", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0711.2112
Michel Grabisch
Michel Grabisch (CES), Christophe Labreuche (TRT)
Bi-capacities -- Part II: the Choquet integral
null
Fuzzy Sets and Systems (2005) 237-259
null
null
cs.DM cs.GT
null
Bi-capacities arise as a natural generalization of capacities (or fuzzy measures) in a context of decision making where underlying scales are bipolar. They are able to capture a wide variety of decision behaviours, encompassing models such as Cumulative Prospect Theory (CPT). The aim of this paper in two parts is to present the machinery behind bi-capacities, and thus remains on a rather theoretical level, although some parts are firmly rooted in decision theory, notably cooperative game theory. The present second part focuses on the definition of Choquet integral. We give several expressions of it, including an expression w.r.t. the M\"obius transform. This permits to express the Choquet integral for 2-additive bi-capacities w.r.t. the interaction index.
[ { "version": "v1", "created": "Wed, 14 Nov 2007 06:11:57 GMT" } ]
2007-11-15T00:00:00
[ [ "Grabisch", "Michel", "", "CES" ], [ "Labreuche", "Christophe", "", "TRT" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0711.2114
Michel Grabisch
Michel Grabisch (CES), Christophe Labreuche (TRT)
Bi-capacities -- Part I: definition, M\"obius transform and interaction
null
Fuzzy Sets and Systems (2005) 211-236
null
null
cs.DM cs.GT
null
Bi-capacities arise as a natural generalization of capacities (or fuzzy measures) in a context of decision making where underlying scales are bipolar. They are able to capture a wide variety of decision behaviours, encompassing models such as Cumulative Prospect Theory (CPT). The aim of this paper in two parts is to present the machinery behind bi-capacities, and thus remains on a rather theoretical level, although some parts are firmly rooted in decision theory, notably cooperative game theory. The present first part is devoted to the introduction of bi-capacities and the structure on which they are defined. We define the M\"obius transform of bi-capacities, by just applying the well known theory of M\" obius functions as established by Rota to the particular case of bi-capacities. Then, we introduce derivatives of bi-capacities, by analogy with what was done for pseudo-Boolean functions (another view of capacities and set functions), and this is the key point to introduce the Shapley value and the interaction index for bi-capacities. This is done in a cooperative game theoretic perspective. In summary, all familiar notions used for fuzzy measures are available in this more general framework.
[ { "version": "v1", "created": "Wed, 14 Nov 2007 06:15:05 GMT" } ]
2007-11-15T00:00:00
[ [ "Grabisch", "Michel", "", "CES" ], [ "Labreuche", "Christophe", "", "TRT" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0711.2115
Michel Grabisch
Michel Grabisch (CES), Christophe Labreuche (TRT)
Derivative of functions over lattices as a basis for the notion of interaction between attributes
null
Annals of Mathematics and Artificial Intelligence 49 (2007) 151-170
null
null
cs.DM cs.GT
null
The paper proposes a general notion of interaction between attributes, which can be applied to many fields in decision making and data analysis. It generalizes the notion of interaction defined for criteria modelled by capacities, by considering functions defined on lattices. For a given problem, the lattice contains for each attribute the partially ordered set of remarkable points or levels. The interaction is based on the notion of derivative of a function defined on a lattice, and appears as a generalization of the Shapley value or other probabilistic values.
[ { "version": "v1", "created": "Wed, 14 Nov 2007 06:15:49 GMT" } ]
2007-11-15T00:00:00
[ [ "Grabisch", "Michel", "", "CES" ], [ "Labreuche", "Christophe", "", "TRT" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0711.2116
Frederic Vignat
Fr\'ed\'eric Vignat (LGS), Fran\c{c}ois Villeneuve (LGS)
A numerical approach for 3D manufacturing tolerances synthesis
null
Dans Proceedings of the 10th CIRP International Seminar on Computer Aided Tolerancing - 10th CIRP International Seminar on Computer Aided Tolerancing, Erlangen : Allemagne (2007)
null
null
cs.CE
null
Making a product conform to the functional requirements indicated by the customer suppose to be able to manage the manufacturing process chosen to realise the parts. A simulation step is generally performed to verify that the expected generated deviations fit with these requirements. It is then necessary to assess the actual deviations of the process in progress. This is usually done by the verification of the conformity of the workpiece to manufacturing tolerances at the end of each set-up. It is thus necessary to determine these manufacturing tolerances. This step is called "manufacturing tolerance synthesis". In this paper, a numerical method is proposed to perform 3D manufacturing tolerances synthesis. This method uses the result of the numerical analysis of tolerances to determine influent mall displacement of surfaces. These displacements are described by small displacements torsors. An algorithm is then proposed to determine suitable ISO manufacturing tolerances.
[ { "version": "v1", "created": "Wed, 14 Nov 2007 06:21:17 GMT" } ]
2007-11-15T00:00:00
[ [ "Vignat", "Frédéric", "", "LGS" ], [ "Villeneuve", "François", "", "LGS" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0711.2155
Stijn Heymans
Stijn Heymans, Jos de Bruijn, Livia Predoiu, Cristina Feier, Davy Van Nieuwenborgh
Guarded Hybrid Knowledge Bases
18 pages
null
null
null
cs.LO
null
Recently, there has been a lot of interest in the integration of Description Logics and rules on the Semantic Web.We define guarded hybrid knowledge bases (or g-hybrid knowledge bases) as knowledge bases that consist of a Description Logic knowledge base and a guarded logic program, similar to the DL+log knowledge bases from (Rosati 2006). G-hybrid knowledge bases enable an integration of Description Logics and Logic Programming where, unlike in other approaches, variables in the rules of a guarded program do not need to appear in positive non-DL atoms of the body, i.e. DL atoms can act as guards as well. Decidability of satisfiability checking of g-hybrid knowledge bases is shown for the particular DL DLRO, which is close to OWL DL, by a reduction to guarded programs under the open answer set semantics. Moreover, we show 2-EXPTIME-completeness for satisfiability checking of such g-hybrid knowledge bases. Finally, we discuss advantages and disadvantages of our approach compared with DL+log knowledge bases.
[ { "version": "v1", "created": "Wed, 14 Nov 2007 10:49:56 GMT" } ]
2007-11-15T00:00:00
[ [ "Heymans", "Stijn", "" ], [ "de Bruijn", "Jos", "" ], [ "Predoiu", "Livia", "" ], [ "Feier", "Cristina", "" ], [ "Van Nieuwenborgh", "Davy", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]