id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0711.0128 | Manoj Kumar | Manoj Kumar | Security Analysis of a Remote User Authentication Scheme with Smart
Cards | null | null | null | null | cs.CR | null | Yoon et al. proposed a new efficient remote user authentication scheme using
smart cards to solve the security problems of W. C. Ku and S. M. Chen scheme.
This paper reviews Yoon et al. scheme and then proves that the password change
phase of Yoon et al. scheme is still insecure. This paper also proves that the
Yoon et al. is still vulnerable to parallel session attack.
| [
{
"version": "v1",
"created": "Thu, 1 Nov 2007 14:24:41 GMT"
}
] | 2007-11-02T00:00:00 | [
[
"Kumar",
"Manoj",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0711.0189 | Ulrike von Luxburg | Ulrike von Luxburg | A Tutorial on Spectral Clustering | null | Statistics and Computing 17(4), 2007 | null | null | cs.DS cs.LG | null | In recent years, spectral clustering has become one of the most popular
modern clustering algorithms. It is simple to implement, can be solved
efficiently by standard linear algebra software, and very often outperforms
traditional clustering algorithms such as the k-means algorithm. On the first
glance spectral clustering appears slightly mysterious, and it is not obvious
to see why it works at all and what it really does. The goal of this tutorial
is to give some intuition on those questions. We describe different graph
Laplacians and their basic properties, present the most common spectral
clustering algorithms, and derive those algorithms from scratch by several
different approaches. Advantages and disadvantages of the different spectral
clustering algorithms are discussed.
| [
{
"version": "v1",
"created": "Thu, 1 Nov 2007 19:04:43 GMT"
}
] | 2007-11-02T00:00:00 | [
[
"von Luxburg",
"Ulrike",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0711.0194 | Dexter Kozen | Dexter Kozen | Coinductive Proof Principles for Stochastic Processes | 16 pages, 2 figures. Preliminary version appeared in: Rajeev Alur,
ed., Proc. 21st Symp. Logic in Computer Science (LICS'06), pages 359-366.
IEEE, August 2006 | Logical Methods in Computer Science, Volume 3, Issue 4 (November
12, 2007) lmcs:1098 | 10.2168/LMCS-3(4:8)2007 | null | cs.LO | null | We give an explicit coinduction principle for recursively-defined stochastic
processes. The principle applies to any closed property, not just equality, and
works even when solutions are not unique. The rule encapsulates low-level
analytic arguments, allowing reasoning about such processes at a higher
algebraic level. We illustrate the use of the rule in deriving properties of a
simple coin-flip process.
| [
{
"version": "v1",
"created": "Thu, 1 Nov 2007 19:25:13 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Nov 2007 09:28:32 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Kozen",
"Dexter",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0711.0237 | Anand Sarwate | Krishnan Eswaran, Anand D. Sarwate, Anant Sahai, and Michael Gastpar | Zero-rate feedback can achieve the empirical capacity | Revised version of paper originally submitted to IEEE Transactions on
Information Theory, Nov. 2007. This version contains further revisions and
clarifications | null | 10.1109/TIT.2009.2034779 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The utility of limited feedback for coding over an individual sequence of
DMCs is investigated. This study complements recent results showing how limited
or noisy feedback can boost the reliability of communication. A strategy with
fixed input distribution $P$ is given that asymptotically achieves rates
arbitrarily close to the mutual information induced by $P$ and the
state-averaged channel. When the capacity achieving input distribution is the
same over all channel states, this achieves rates at least as large as the
capacity of the state averaged channel, sometimes called the empirical
capacity.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 02:00:55 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jan 2009 01:58:46 GMT"
},
{
"version": "v3",
"created": "Mon, 10 Aug 2009 22:22:36 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Eswaran",
"Krishnan",
""
],
[
"Sarwate",
"Anand D.",
""
],
[
"Sahai",
"Anant",
""
],
[
"Gastpar",
"Michael",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.0251 | Rogers Mathew | Telikepalli Kavitha and Rogers Mathew | Faster Algorithms for Online Topological Ordering | null | null | null | IISC-CSA-TR-2007-12 | cs.DS | null | We present two algorithms for maintaining the topological order of a directed
acyclic graph with n vertices, under an online edge insertion sequence of m
edges. Efficient algorithms for online topological ordering have many
applications, including online cycle detection, which is to discover the first
edge that introduces a cycle under an arbitrary sequence of edge insertions in
a directed graph. In this paper we present efficient algorithms for the online
topological ordering problem.
We first present a simple algorithm with running time O(n^{5/2}) for the
online topological ordering problem. This is the current fastest algorithm for
this problem on dense graphs, i.e., when m > n^{5/3}. We then present an
algorithm with running time O((m + nlog n)\sqrt{m}); this is more efficient for
sparse graphs. Our results yield an improved upper bound of O(min(n^{5/2}, (m +
nlog n)sqrt{m})) for the online topological ordering problem.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 06:42:43 GMT"
}
] | 2007-11-05T00:00:00 | [
[
"Kavitha",
"Telikepalli",
""
],
[
"Mathew",
"Rogers",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0711.0259 | Sudhir Singh | Sudhir Kumar Singh, Vwani P. Roychowdhury, Himawan Gunadhi, Behnam A.
Rezaei | Diversification in the Internet Economy:The Role of For-Profit Mediators | 20 pages, subsumes arXiv:0707.1057 | null | null | null | cs.GT | null | We investigate market forces that would lead to the emergence of new classes
of players in the sponsored search market. We report a 3-fold diversification
triggered by two inherent features of the sponsored search market, namely,
capacity constraints and collusion-vulnerability of current mechanisms. In the
first scenario, we present a comparative study of two models motivated by
capacity constraints - one where the additional capacity is provided by
for-profit agents, who compete for slots in the original auction, draw traffic,
and run their own sub-auctions, and the other, where the additional capacity is
provided by the auctioneer herself, by essentially acting as a mediator and
running a single combined auction. This study was initiated by us in
\cite{SRGR07}, where the mediator-based model was studied. In the present work,
we study the auctioneer-based model and show that this model seems inferior to
the mediator-based model in terms of revenue or efficiency guarantee due to
added capacity. In the second scenario, we initiate a game theoretic study of
current sponsored search auctions, involving incentive driven mediators who
exploit the fact that these mechanisms are not collusion-resistant. In
particular, we show that advertisers can improve their payoffs by using the
services of the mediator compared to directly participating in the auction, and
that the mediator can also obtain monetary benefit, without violating incentive
constraints from the advertisers who do not use its services. We also point out
that the auctioneer can not do very much via mechanism design to avoid such
for-profit mediation without losing badly in terms of revenue, and therefore,
the mediators are likely to prevail.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 08:38:40 GMT"
}
] | 2007-11-05T00:00:00 | [
[
"Singh",
"Sudhir Kumar",
""
],
[
"Roychowdhury",
"Vwani P.",
""
],
[
"Gunadhi",
"Himawan",
""
],
[
"Rezaei",
"Behnam A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0711.0261 | Tadashi Wadyama | Tadashi Wadayama, Keisuke Nakamura, Masayuki Yagita, Yuuki Funahashi,
Shogo Usami, Ichi Takumi | Gradient Descent Bit Flipping Algorithms for Decoding LDPC Codes | 6 pages, 8 figures | null | null | null | cs.IT math.IT | null | A novel class of bit-flipping (BF) algorithms for decoding low-density
parity-check (LDPC) codes is presented. The proposed algorithms, which are
called gradient descent bit flipping (GDBF) algorithms, can be regarded as
simplified gradient descent algorithms. Based on gradient descent formulation,
the proposed algorithms are naturally derived from a simple non-linear
objective function.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 08:59:46 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Apr 2008 03:27:57 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Wadayama",
"Tadashi",
""
],
[
"Nakamura",
"Keisuke",
""
],
[
"Yagita",
"Masayuki",
""
],
[
"Funahashi",
"Yuuki",
""
],
[
"Usami",
"Shogo",
""
],
[
"Takumi",
"Ichi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.0277 | Nihar Jindal | Nihar Jindal, Jeffrey G. Andrews, Steven Weber | Bandwidth Partitioning in Decentralized Wireless Networks | Revised for IEEE Trans. Wireless Communications, April 2008
(initially submitted Nov. 2007). Results shown to apply to the exact outage
probability/transmitter density, rather than to nearest neighbor bound | null | 10.1109/T-WC.2008.071220 | null | cs.IT math.IT | null | This paper addresses the following question, which is of interest in the
design of a multiuser decentralized network. Given a total system bandwidth of
W Hz and a fixed data rate constraint of R bps for each transmission, how many
frequency slots N of size W/N should the band be partitioned into in order to
maximize the number of simultaneous links in the network? Dividing the
available spectrum results in two competing effects. On the positive side, a
larger N allows for more parallel, noninterfering communications to take place
in the same area. On the negative side, a larger N increases the SINR
requirement for each link because the same information rate must be achieved
over less bandwidth. Exploring this tradeoff and determining the optimum value
of N in terms of the system parameters is the focus of the paper. Using
stochastic geometry, the optimal SINR threshold - which directly corresponds to
the optimal spectral efficiency - is derived for both the low SNR
(power-limited) and high SNR (interference-limited) regimes. This leads to the
optimum choice of the number of frequency bands N in terms of the path loss
exponent, power and noise spectral density, desired rate, and total bandwidth.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 12:54:30 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Apr 2008 16:54:26 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Jindal",
"Nihar",
""
],
[
"Andrews",
"Jeffrey G.",
""
],
[
"Weber",
"Steven",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.0301 | Reuven Cohen | Reuven Cohen, Niloofar Fazlollahi and David Starobinski | Throughput Optimal On-Line Algorithms for Advanced Resource Reservation
in Ultra High-Speed Networks | 9 pages, 8 figures | null | null | null | cs.NI | null | Advanced channel reservation is emerging as an important feature of ultra
high-speed networks requiring the transfer of large files. Applications include
scientific data transfers and database backup. In this paper, we present two
new, on-line algorithms for advanced reservation, called BatchAll and BatchLim,
that are guaranteed to achieve optimal throughput performance, based on
multi-commodity flow arguments. Both algorithms are shown to have
polynomial-time complexity and provable bounds on the maximum delay for
1+epsilon bandwidth augmented networks. The BatchLim algorithm returns the
completion time of a connection immediately as a request is placed, but at the
expense of a slightly looser competitive ratio than that of BatchAll. We also
present a simple approach that limits the number of parallel paths used by the
algorithms while provably bounding the maximum reduction factor in the
transmission throughput. We show that, although the number of different paths
can be exponentially large, the actual number of paths needed to approximate
the flow is quite small and proportional to the number of edges in the network.
Simulations for a number of topologies show that, in practice, 3 to 5 parallel
paths are sufficient to achieve close to optimal performance. The performance
of the competitive algorithms are also compared to a greedy benchmark, both
through analysis and simulation.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 12:54:21 GMT"
}
] | 2007-11-05T00:00:00 | [
[
"Cohen",
"Reuven",
""
],
[
"Fazlollahi",
"Niloofar",
""
],
[
"Starobinski",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0711.0311 | H. Georg Buesching | H. Georg Buesching | Improving the LP bound of a MILP by branching concurrently | 21 pages of a possibly new theory submitted by a hobby researcher.
Uses algorithmic.sty | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We'll measure the differences of the dual variables and the gain of the
objective function when creating new problems, which each has one inequality
more than the starting LP-instance. These differences of the dual variables are
naturally connected to the branches. Then we'll choose those differences of
dual variables, so that for all combinations of choices at the connected
branches, all dual inequalities will hold for sure. By adding the gain of each
chosen branching, we get a total gain, which gives a better limit of the
original problem. By this technique it is also possible to create cuts.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 13:57:41 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Nov 2008 20:33:30 GMT"
}
] | 2008-11-21T00:00:00 | [
[
"Buesching",
"H. Georg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0711.0314 | Aleksandar Lazarevic | Aleksandar Lazarevic, Lionel Sacks | Resource and Application Models for Advanced Grid Schedulers | null | London Communications Symposium 2003 | null | null | cs.DC | null | As Grid computing is becoming an inevitable future, managing, scheduling and
monitoring dynamic, heterogeneous resources will present new challenges.
Solutions will have to be agile and adaptive, support self-organization and
autonomous management, while maintaining optimal resource utilisation.
Presented in this paper are basic principles and architectural concepts for
efficient resource allocation in heterogeneous Grid environment.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 14:03:46 GMT"
}
] | 2007-11-05T00:00:00 | [
[
"Lazarevic",
"Aleksandar",
""
],
[
"Sacks",
"Lionel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0711.0315 | Aleksandar Lazarevic | Aleksandar Lazarevic, Lionel Sacks | Measuring and Monitoring Grid Resource Utilisation | null | London Communications Symposium 2004 | null | null | cs.DC | null | Effective resource utilisation monitoring and highly granular yet adaptive
measurements are prerequisites for a more efficient Grid scheduler. We present
a suite of measurement applications able to monitor per-process resource
utilisation, and a customisable tool for emulating observed utilisation models.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 14:12:27 GMT"
}
] | 2007-11-05T00:00:00 | [
[
"Lazarevic",
"Aleksandar",
""
],
[
"Sacks",
"Lionel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0711.0316 | Aleksandar Lazarevic | Aleksandar Lazarevic, Lionel Sacks | A Study of Grid Applications: Scheduling Perspective | null | London Communications Symposium 2005 | null | null | cs.DC | null | As the Grid evolves from a high performance cluster middleware to a
multipurpose utility computing framework, a good understanding of Grid
applications, their statistics and utilisation patterns is required. This study
looks at job execution times and resource utilisations in a Grid environment,
and their significance in cluster and network dimensioning, local level
scheduling and resource management.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 14:15:45 GMT"
}
] | 2007-11-05T00:00:00 | [
[
"Lazarevic",
"Aleksandar",
""
],
[
"Sacks",
"Lionel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0711.0325 | Aleksandar Lazarevic | Ioannis Liabotis, Ognjen Prnjat, Tope Olukemi, Adrian Li Mow Ching,
Aleksandar Lazarevic, Lionel Sacks, Mike Fisher, Paul McKee | Self-Organising management of Grid environments | null | International Symposium on Telecommunications 2003 | null | null | cs.DC | null | This paper presents basic concepts, architectural principles and algorithms
for efficient resource and security management in cluster computing
environments and the Grid. The work presented in this paper is funded by
BTExacT and the EPSRC project SO-GRM (GR/S21939).
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 15:26:48 GMT"
}
] | 2007-11-05T00:00:00 | [
[
"Liabotis",
"Ioannis",
""
],
[
"Prnjat",
"Ognjen",
""
],
[
"Olukemi",
"Tope",
""
],
[
"Ching",
"Adrian Li Mow",
""
],
[
"Lazarevic",
"Aleksandar",
""
],
[
"Sacks",
"Lionel",
""
],
[
"Fisher",
"Mike",
""
],
[
"McKee",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0711.0326 | Aleksandar Lazarevic | Aleksandar Lazarevic, Lionel Sacks, Ognjen Prnjat | Enabling Adaptive Grid Scheduling and Resource Management | null | International Symposium on Integrated Network Management 2005 | null | null | cs.DC | null | Wider adoption of the Grid concept has led to an increasing amount of
federated computational, storage and visualisation resources being available to
scientists and researchers. Distributed and heterogeneous nature of these
resources renders most of the legacy cluster monitoring and management
approaches inappropriate, and poses new challenges in workflow scheduling on
such systems. Effective resource utilisation monitoring and highly granular yet
adaptive measurements are prerequisites for a more efficient Grid scheduler. We
present a suite of measurement applications able to monitor per-process
resource utilisation, and a customisable tool for emulating observed
utilisation models. We also outline our future work on a predictive and
probabilistic Grid scheduler. The research is undertaken as part of UK
e-Science EPSRC sponsored project SO-GRM (Self-Organising Grid Resource
Management) in cooperation with BT.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 15:30:53 GMT"
}
] | 2007-11-05T00:00:00 | [
[
"Lazarevic",
"Aleksandar",
""
],
[
"Sacks",
"Lionel",
""
],
[
"Prnjat",
"Ognjen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0711.0327 | Aleksandar Lazarevic | Aleksandar Lazarevic, Lionel Sacks, Ognjen Prnjat | Managing Uncertainty: A Case for Probabilistic Grid Scheduling | null | null | null | null | cs.DC | null | The Grid technology is evolving into a global, service-orientated
architecture, a universal platform for delivering future high demand
computational services. Strong adoption of the Grid and the utility computing
concept is leading to an increasing number of Grid installations running a wide
range of applications of different size and complexity. In this paper we
address the problem of elivering deadline/economy based scheduling in a
heterogeneous application environment using statistical properties of job
historical executions and its associated meta-data. This approach is motivated
by a study of six-month computational load generated by Grid applications in a
multi-purpose Grid cluster serving a community of twenty e-Science projects.
The observed job statistics, resource utilisation and user behaviour is
discussed in the context of management approaches and models most suitable for
supporting a probabilistic and autonomous scheduling architecture.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 15:36:36 GMT"
}
] | 2007-11-05T00:00:00 | [
[
"Lazarevic",
"Aleksandar",
""
],
[
"Sacks",
"Lionel",
""
],
[
"Prnjat",
"Ognjen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0711.0344 | Wim Vanhoof | Guillem Marpons-Ucero, Julio Mari\~no, \'Angel Herranz, Lars-{\AA}ke
Fredlund, Manuel Carro, Juan Jos\'e Moreno-Navarro | Automatic Coding Rule Conformance Checking Using Logic Programs | Paper presented at the 17th Workshop on Logic-based Methods in
Programming Environments (WLPE2007) | null | null | null | cs.PL cs.SE | null | Some approaches to increasing program reliability involve a disciplined use
of programming languages so as to minimise the hazards introduced by
error-prone features. This is realised by writing code that is constrained to a
subset of the a priori admissible programs, and that, moreover, may use only a
subset of the language. These subsets are determined by a collection of
so-called coding rules.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 16:53:34 GMT"
}
] | 2007-11-06T00:00:00 | [
[
"Marpons-Ucero",
"Guillem",
""
],
[
"Mariño",
"Julio",
""
],
[
"Herranz",
"Ángel",
""
],
[
"Fredlund",
"Lars-Åke",
""
],
[
"Carro",
"Manuel",
""
],
[
"Moreno-Navarro",
"Juan José",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0711.0345 | Wim Vanhoof | Roberto Bagnara, Patricia Hill, Enea Zaffanella | A Prolog-based Environment for Reasoning about Programming Languages
(Extended abstract) | Paper presented at the 17th Workshop on Logic-based Methods in
Programming Environments (WLPE2007) | null | null | null | cs.PL cs.SE | null | ECLAIR is a Prolog-based prototype system aiming to provide a functionally
complete environment for the study, development and evaluation of programming
language analysis and implementation tools. In this paper, we sketch the
overall structure of the system, outlining the main methodologies and
technologies underlying its components. We also discuss the appropriateness of
Prolog as the implementation language for the system: besides highlighting its
strengths, we also point out a few potential weaknesses, hinting at possible
solutions.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 16:40:10 GMT"
}
] | 2007-11-06T00:00:00 | [
[
"Bagnara",
"Roberto",
""
],
[
"Hill",
"Patricia",
""
],
[
"Zaffanella",
"Enea",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0711.0348 | Wim Vanhoof | Bernd Bra{\ss}el, Michael Hanus and Marion Muller | Compiling ER Specifications into Declarative Programs | Paper presented at the 17th Workshop on Logic-based Methods in
Programming Environments (WLPE2007) | null | null | null | cs.PL cs.SE | null | This paper proposes an environment to support high-level database programming
in a declarative programming language. In order to ensure safe database
updates, all access and update operations related to the database are generated
from high-level descriptions in the entity- relationship (ER) model. We propose
a representation of ER diagrams in the declarative language Curry so that they
can be constructed by various tools and then translated into this
representation. Furthermore, we have implemented a compiler from this
representation into a Curry program that provides access and update operations
based on a high-level API for database programming.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 16:49:30 GMT"
}
] | 2007-11-06T00:00:00 | [
[
"Braßel",
"Bernd",
""
],
[
"Hanus",
"Michael",
""
],
[
"Muller",
"Marion",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0711.0350 | Gusztav Morvai | G. Morvai and B. Weiss | Intermittent estimation of stationary time series | null | Test 13 (2004), no. 2, 525--542 | null | null | math.PR cs.IT math.IT | null | Let $\{X_n\}_{n=0}^{\infty}$ be a stationary real-valued time series with
unknown distribution. Our goal is to estimate the conditional expectation of
$X_{n+1}$ based on the observations $X_i$, $0\le i\le n$ in a strongly
consistent way. Bailey and Ryabko proved that this is not possible even for
ergodic binary time series if one estimates at all values of $n$. We propose a
very simple algorithm which will make prediction infinitely often at carefully
selected stopping times chosen by our rule. We show that under certain
conditions our procedure is strongly (pointwise) consistent, and $L_2$
consistent without any condition. An upper bound on the growth of the stopping
times is also presented in this paper.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 18:21:37 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Morvai",
"G.",
""
],
[
"Weiss",
"B.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.0351 | Falk Unger | Falk Unger | Noise threshold for universality of 2-input gates | International Symposium on Information Theory, 2007, minor
corrections in v2 | null | null | null | cs.IT cs.CC math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Evans and Pippenger showed in 1998 that noisy gates with 2 inputs are
universal for arbitrary computation (i.e. can compute any function with bounded
error), if all gates fail independently with probability epsilon and
epsilon<theta, where theta is roughly 8.856%.
We show that formulas built from gates with 2 inputs, in which each gate
fails with probability at least theta cannot be universal. Hence, there is a
threshold on the tolerable noise for formulas with 2-input gates and it is
theta. We conjecture that the same threshold also holds for circuits.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 16:58:21 GMT"
},
{
"version": "v2",
"created": "Sat, 6 Sep 2008 16:18:09 GMT"
}
] | 2008-09-06T00:00:00 | [
[
"Unger",
"Falk",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.0366 | Mehmet Ak\c{c}akaya | Mehmet Ak\c{c}akaya and Vahid Tarokh | Shannon Theoretic Limits on Noisy Compressive Sampling | 21 pages, submitted | null | null | null | cs.IT math.IT | null | In this paper, we study the number of measurements required to recover a
sparse signal in ${\mathbb C}^M$ with $L$ non-zero coefficients from compressed
samples in the presence of noise. For a number of different recovery criteria,
we prove that $O(L)$ (an asymptotically linear multiple of $L$) measurements
are necessary and sufficient if $L$ grows linearly as a function of $M$. This
improves on the existing literature that is mostly focused on variants of a
specific recovery algorithm based on convex programming, for which
$O(L\log(M-L))$ measurements are required. We also show that $O(L\log(M-L))$
measurements are required in the sublinear regime ($L = o(M)$).
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 19:04:38 GMT"
}
] | 2007-11-05T00:00:00 | [
[
"Akçakaya",
"Mehmet",
""
],
[
"Tarokh",
"Vahid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.0367 | Gusztav Morvai | G. Morvai, S. Yakowitz, and L. Gyorfi | Nonparametric inference for ergodic, stationary time series | null | Ann. Statist. 24 (1996), no. 1, 370--379 | null | null | math.PR cs.IT math.IT | null | The setting is a stationary, ergodic time series. The challenge is to
construct a sequence of functions, each based on only finite segments of the
past, which together provide a strongly consistent estimator for the
conditional probability of the next observation, given the infinite past.
Ornstein gave such a construction for the case that the values are from a
finite set, and recently Algoet extended the scheme to time series with
coordinates in a Polish space.
The present study relates a different solution to the challenge. The
algorithm is simple and its verification is fairly transparent. Some extensions
to regression, pattern recognition, and on-line forecasting are mentioned.
| [
{
"version": "v1",
"created": "Fri, 2 Nov 2007 18:16:01 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Morvai",
"G.",
""
],
[
"Yakowitz",
"S.",
""
],
[
"Gyorfi",
"L.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.0436 | Ewa Krot-Sieniawska | Ewa Krot-Sieniawska | An example of algebraization of analysis and Fibonacci cobweb poset
characterization | 16 pages, submitted to publication | null | null | null | math.CO cs.DM math.GM | null | In recent Kwasniewski's papers inspired by O. V. Viskov it was shown that the
$\psi$-calculus in parts appears to be almost automatic, natural extension of
classical operator calculus of Rota - Mullin or equivalently - of umbral
calculus of Roman and Rota. At the same time this calculus is an example of the
algebraization of the analysis - here restricted to the algebra of polynomials.
The first part of the article is the review of the recent author's
contribution. The main definitions and theorems of Finite Fibonomial
Operator Calculus which is a special case of $\psi$-extented Rota's finite
operator calculus are presented there. In the second part the characterization
of Fibonacci Cobweb poset P as DAG and oDAG is given. The dim 2 poset such that
its Hasse diagram coincide with digraf of P is constructed.
| [
{
"version": "v1",
"created": "Sat, 3 Nov 2007 08:33:10 GMT"
}
] | 2008-02-09T00:00:00 | [
[
"Krot-Sieniawska",
"Ewa",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
}
] |
0711.0471 | Gusztav Morvai | G. Morvai and B. Weiss | Prediction for discrete time series | null | Probab. Theory Related Fields 132 (2005), no. 1, 1--12 | null | null | math.PR cs.IT math.IT | null | Let $\{X_n\}$ be a stationary and ergodic time series taking values from a
finite or countably infinite set ${\cal X}$. Assume that the distribution of
the process is otherwise unknown. We propose a sequence of stopping times
$\lambda_n$ along which we will be able to estimate the conditional probability
$P(X_{\lambda_n+1}=x|X_0,...,X_{\lambda_n})$ from data segment
$(X_0,...,X_{\lambda_n})$ in a pointwise consistent way for a restricted class
of stationary and ergodic finite or countably infinite alphabet time series
which includes among others all stationary and ergodic finitarily Markovian
processes. If the stationary and ergodic process turns out to be finitarily
Markovian (among others, all stationary and ergodic Markov chains are included
in this class) then $ \lim_{n\to \infty} {n\over \lambda_n}>0$ almost surely.
If the stationary and ergodic process turns out to possess finite entropy rate
then $\lambda_n$ is upperbounded by a polynomial, eventually almost surely.
| [
{
"version": "v1",
"created": "Sat, 3 Nov 2007 19:24:35 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Morvai",
"G.",
""
],
[
"Weiss",
"B.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.0472 | Gusztav Morvai | G. Morvai and B. Weiss | Order estimation of Markov chains | null | IEEE Trans. Inform. Theory 51 (2005), no. 4, 1496--1497 | null | null | math.PR cs.IT math.IT | null | We describe estimators $\chi_n(X_0,X_1,...,X_n)$, which when applied to an
unknown stationary process taking values from a countable alphabet ${\cal X}$,
converge almost surely to $k$ in case the process is a $k$-th order Markov
chain and to infinity otherwise.
| [
{
"version": "v1",
"created": "Sat, 3 Nov 2007 19:30:25 GMT"
}
] | 2008-06-19T00:00:00 | [
[
"Morvai",
"G.",
""
],
[
"Weiss",
"B.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.0486 | George Bell | George I. Bell | Triangular Peg Solitaire Unlimited | 12 pages, 10 figures; minor error fixed in Table 1 | The Games and Puzzles Journal, Issue 36, November-December 2004
http://gpj.connectfree.co.uk/gpjr.htm | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Triangular peg solitaire is a well-known one-person game or puzzle. When one
peg captures many pegs consecutively, this is called a sweep. We investigate
whether the game can end in a dramatic fashion, with one peg sweeping all
remaining pegs off the board. For triangular boards of side 6 and 8 (with 21
and 36 holes, respectively) the geometrically longest sweep can occur as the
final move in a game. On larger triangular boards, we demonstrate how to
construct solutions that finish with arbitrarily long sweeps. We also consider
the problem of finding solutions that minimize the total number of moves (where
a move is one or more consecutive jumps by the same peg).
| [
{
"version": "v1",
"created": "Mon, 5 Nov 2007 15:36:32 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Dec 2008 16:17:16 GMT"
}
] | 2008-12-04T00:00:00 | [
[
"Bell",
"George I.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0711.0528 | L.T. Handoko | Z. Akbar and L.T. Handoko | Web-based Interface in Public Cluster | 9 pages, Proceeding of the 9th International Conference on
Information Integration and Web-based Applications and Services 2007 | null | null | FISIKALIPI-07016 | cs.DC cs.CY | null | A web-based interface dedicated for cluster computer which is publicly
accessible for free is introduced. The interface plays an important role to
enable secure public access, while providing user-friendly computational
environment for end-users and easy maintainance for administrators as well. The
whole architecture which integrates both aspects of hardware and software is
briefly explained. It is argued that the public cluster is globally a unique
approach, and could be a new kind of e-learning system especially for parallel
programming communities.
| [
{
"version": "v1",
"created": "Sun, 4 Nov 2007 16:39:47 GMT"
}
] | 2007-11-06T00:00:00 | [
[
"Akbar",
"Z.",
""
],
[
"Handoko",
"L. T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0711.0538 | Grenville Croll | Thomas A. Grossman | Spreadsheet Engineering: A Research Framework | 12 Pages | Proc. European Spreadsheet Risks Int. Grp. 2002 23-34 ISBN 1 86166
182 7 | null | null | cs.SE | null | Spreadsheet engineering adapts the lessons of software engineering to
spreadsheets, providing eight principles as a framework for organizing
spreadsheet programming recommendations. Spreadsheets raise issues inadequately
addressed by software engineering. Spreadsheets are a powerful modeling
language, allowing strategic rapid model change, and enabling exploratory
modeling. Spreadsheets users learn slowly with experience because they focus on
the problem domain not programming. The heterogeneity of spreadsheet users
requires a taxonomy to guide recommendations. Deployment of best practices is
difficult and merits research.
| [
{
"version": "v1",
"created": "Sun, 4 Nov 2007 19:24:57 GMT"
}
] | 2007-11-06T00:00:00 | [
[
"Grossman",
"Thomas A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0711.0557 | Takao Inoue | Takao Inoue and Robert W. Heath Jr | Kerdock Codes for Limited Feedback Precoded MIMO Systems | A correction is made in Eq.(22), first matrix S0 | null | null | null | cs.IT math.IT | null | A codebook based limited feedback strategy is a practical way to obtain
partial channel state information at the transmitter in a precoded
multiple-input multiple-output (MIMO) wireless system. Conventional codebook
designs use Grassmannian packing, equiangular frames, vector quantization, or
Fourier based constructions. While the capacity and error rate performance of
conventional codebook constructions have been extensively investigated,
constructing these codebooks is notoriously difficult relying on techniques
such as nonlinear search or iterative algorithms. Further, the resulting
codebooks may not have a systematic structure to facilitate storage of the
codebook and low search complexity. In this paper, we propose a new systematic
codebook design based on Kerdock codes and mutually unbiased bases. The
proposed Kerdock codebook consists of multiple mutually unbiased unitary bases
matrices with quaternary entries and the identity matrix. We propose to derive
the beamforming and precoding codebooks from this base codebook, eliminating
the requirement to store multiple codebooks. The propose structure requires
little memory to store and, as we show, the quaternary structure facilitates
codeword search. We derive the chordal distance for two antenna and four
antenna codebooks, showing that the proposed codebooks compare favorably with
prior designs. Monte Carlo simulations are used to compare achievable rates and
error rates for different codebooks sizes.
| [
{
"version": "v1",
"created": "Mon, 5 Nov 2007 01:28:35 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Mar 2008 14:35:36 GMT"
}
] | 2008-03-07T00:00:00 | [
[
"Inoue",
"Takao",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.0574 | Damien Chablat | Mazen Zein (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN) | Singular Curves in the Joint Space and Cusp Points of 3-RPR parallel
manipulators | null | Robotica 25, 6 (2007) 717-724 | 10.1017/S0263574707003785 | null | cs.RO | null | This paper investigates the singular curves in the joint space of a family of
planar parallel manipulators. It focuses on special points, referred to as cusp
points, which may appear on these curves. Cusp points play an important role in
the kinematic behavior of parallel manipulators since they make possible a
nonsingular change of assembly mode. The purpose of this study is twofold.
First, it exposes a method to compute joint space singular curves of 3-RPR
planar parallel manipulators. Second, it presents an algorithm for detecting
and computing all cusp points in the joint space of these same manipulators.
| [
{
"version": "v1",
"created": "Mon, 5 Nov 2007 08:14:07 GMT"
}
] | 2007-11-06T00:00:00 | [
[
"Zein",
"Mazen",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0711.0607 | Bart Van Rompaey | Bart Van Rompaey and Serge Demeyer | Exploring the Composition of Unit Test Suites | null | null | null | UA TR2007-01 | cs.SE | null | In agile software development, test code can considerably contribute to the
overall source code size. Being a valuable asset both in terms of verification
and documentation, the composition of a test suite needs to be well understood
in order to identify opportunities as well as weaknesses for further evolution.
In this paper, we argue that the visualization of structural characteristics is
a viable means to support the exploration of test suites. Thanks to general
agreement on a limited set of key test design principles, such visualizations
are relatively easy to interpret. In particular, we present visualizations that
support testers in (i) locating test cases; (ii) examining the relation between
test code and production code; and (iii) studying the composition of and
dependencies within test cases. By means of two case studies, we demonstrate
how visual patterns help to identify key test suite characteristics. This
approach forms the first step in assisting a developer to build up
understanding about test suites beyond code reading.
| [
{
"version": "v1",
"created": "Mon, 5 Nov 2007 11:05:42 GMT"
}
] | 2007-11-06T00:00:00 | [
[
"Van Rompaey",
"Bart",
""
],
[
"Demeyer",
"Serge",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0711.0618 | Wim Vanhoof | Jan Wielemaker, Anjo Anjewierden | PIDoc: Wiki style Literate Programming for Prolog | Paper presented at the 17th Workshop on Logic-based Methods in
Programming Environments (WLPE2007) | null | null | null | cs.PL cs.SE | null | This document introduces PlDoc, a literate programming system for Prolog.
Starting point for PlDoc was minimal distraction from the programming task and
maximal immediate reward, attempting to seduce the programmer to use the
system. Minimal distraction is achieved using structured comments that are as
closely as possible related to common Prolog documentation practices. Immediate
reward is provided by a web interface powered from the Prolog development
environment that integrates searching and browsing application and system
documentation. When accessed from localhost, it is possible to go from
documentation shown in a browser to the source code displayed in the user's
editor of choice.
| [
{
"version": "v1",
"created": "Mon, 5 Nov 2007 12:13:12 GMT"
}
] | 2007-11-06T00:00:00 | [
[
"Wielemaker",
"Jan",
""
],
[
"Anjewierden",
"Anjo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0711.0643 | Simon Portegies Zwart | Simon Portegies Zwart (Amsterdam), Steve McMillan (Drexel), Derek
Groen (Amsterdam), Alessia Gualandris (Rochester), Michael Sipior (Astron),
Willem Vermin (SARA) | A parallel gravitational N-body kernel | 21 pages, New Astronomy (in press) | null | 10.1016/j.newast.2007.11.002 | null | astro-ph cs.DC | null | We describe source code level parallelization for the {\tt kira} direct
gravitational $N$-body integrator, the workhorse of the {\tt starlab}
production environment for simulating dense stellar systems. The
parallelization strategy, called ``j-parallelization'', involves the partition
of the computational domain by distributing all particles in the system among
the available processors. Partial forces on the particles to be advanced are
calculated in parallel by their parent processors, and are then summed in a
final global operation. Once total forces are obtained, the computing elements
proceed to the computation of their particle trajectories. We report the
results of timing measurements on four different parallel computers, and
compare them with theoretical predictions. The computers employ either a
high-speed interconnect, a NUMA architecture to minimize the communication
overhead or are distributed in a grid. The code scales well in the domain
tested, which ranges from 1024 - 65536 stars on 1 - 128 processors, providing
satisfactory speedup. Running the production environment on a grid becomes
inefficient for more than 60 processors distributed across three sites.
| [
{
"version": "v1",
"created": "Mon, 5 Nov 2007 14:11:32 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Zwart",
"Simon Portegies",
"",
"Amsterdam"
],
[
"McMillan",
"Steve",
"",
"Drexel"
],
[
"Groen",
"Derek",
"",
"Amsterdam"
],
[
"Gualandris",
"Alessia",
"",
"Rochester"
],
[
"Sipior",
"Michael",
"",
"Astron"
],
[
"Vermin",
"Willem",
"",
"SARA"
]
] | [
null,
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0711.0666 | Bouselmi Ghazi | Ghazi Bouselmi (INRIA Lorraine - LORIA), Dominique Fohr (INRIA
Lorraine - LORIA), Irina Illina (INRIA Lorraine - LORIA), Jean-Paul Haton
(INRIA Lorraine - LORIA) | Discriminative Phoneme Sequences Extraction for Non-Native Speaker's
Origin Classification | null | Dans ISSPA, International Symposium on Signal Processing and its
Applications (2007) | null | null | cs.CL | null | In this paper we present an automated method for the classification of the
origin of non-native speakers. The origin of non-native speakers could be
identified by a human listener based on the detection of typical pronunciations
for each nationality. Thus we suppose the existence of several phoneme
sequences that might allow the classification of the origin of non-native
speakers. Our new method is based on the extraction of discriminative sequences
of phonemes from a non-native English speech database. These sequences are used
to construct a probabilistic classifier for the speakers' origin. The existence
of discriminative phone sequences in non-native speech is a significant result
of this work. The system that we have developed achieved a significant correct
classification rate of 96.3% and a significant error reduction compared to some
other tested techniques.
| [
{
"version": "v1",
"created": "Mon, 5 Nov 2007 15:20:47 GMT"
}
] | 2007-11-06T00:00:00 | [
[
"Bouselmi",
"Ghazi",
"",
"INRIA Lorraine - LORIA"
],
[
"Fohr",
"Dominique",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Illina",
"Irina",
"",
"INRIA Lorraine - LORIA"
],
[
"Haton",
"Jean-Paul",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0711.0692 | Jean-Yves Marion | Anne Bonfante (INRIA Lorraine - LORIA), Jean-Yves Marion (INRIA
Lorraine - LORIA) | On the defence notion | null | Journal in Computer Virology 3, 4 (2007) 247-251 | 10.1007/s11416-007-0058-9 | null | cs.CR | null | 'Trojan horses', 'logic bombs', 'armoured viruses' and 'cryptovirology' are
terms recalling war gears. In fact, concepts of attack and defence drive the
world of computer virology, which looks like a war universe in an information
society. This war has several shapes, from invasions of a network by worms, to
military and industrial espionage ...
| [
{
"version": "v1",
"created": "Mon, 5 Nov 2007 17:02:25 GMT"
}
] | 2007-11-06T00:00:00 | [
[
"Bonfante",
"Anne",
"",
"INRIA Lorraine - LORIA"
],
[
"Marion",
"Jean-Yves",
"",
"INRIA\n Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0711.0694 | Bruno Scherrer | Bruno Scherrer (INRIA Lorraine - LORIA) | Performance Bounds for Lambda Policy Iteration and Application to the
Game of Tetris | No. RR-6348 (2011) | null | null | null | cs.AI cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the discrete-time infinite-horizon optimal control problem
formalized by Markov Decision Processes. We revisit the work of Bertsekas and
Ioffe, that introduced $\lambda$ Policy Iteration, a family of algorithms
parameterized by $\lambda$ that generalizes the standard algorithms Value
Iteration and Policy Iteration, and has some deep connections with the Temporal
Differences algorithm TD($\lambda$) described by Sutton and Barto. We deepen
the original theory developped by the authors by providing convergence rate
bounds which generalize standard bounds for Value Iteration described for
instance by Puterman. Then, the main contribution of this paper is to develop
the theory of this algorithm when it is used in an approximate form and show
that this is sound. Doing so, we extend and unify the separate analyses
developped by Munos for Approximate Value Iteration and Approximate Policy
Iteration. Eventually, we revisit the use of this algorithm in the training of
a Tetris playing controller as originally done by Bertsekas and Ioffe. We
provide an original performance bound that can be applied to such an
undiscounted control problem. Our empirical results are different from those of
Bertsekas and Ioffe (which were originally qualified as "paradoxical" and
"intriguing"), and much more conform to what one would expect from a learning
experiment. We discuss the possible reason for such a difference.
| [
{
"version": "v1",
"created": "Mon, 5 Nov 2007 17:07:22 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Nov 2007 15:46:43 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Nov 2007 12:34:37 GMT"
},
{
"version": "v4",
"created": "Mon, 3 Oct 2011 11:58:38 GMT"
},
{
"version": "v5",
"created": "Tue, 11 Oct 2011 12:42:24 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Scherrer",
"Bruno",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0711.0705 | Brooke Shrader | Brooke Shrader, Haim Permuter | Feedback Capacity of the Compound Channel | 34 pages, 2 figures, submitted to IEEE Transactions on Information
Theory | null | 10.1109/TIT.2009.2023727 | null | cs.IT math.IT | null | In this work we find the capacity of a compound finite-state channel with
time-invariant deterministic feedback. The model we consider involves the use
of fixed length block codes. Our achievability result includes a proof of the
existence of a universal decoder for the family of finite-state channels with
feedback. As a consequence of our capacity result, we show that feedback does
not increase the capacity of the compound Gilbert-Elliot channel. Additionally,
we show that for a stationary and uniformly ergodic Markovian channel, if the
compound channel capacity is zero without feedback then it is zero with
feedback. Finally, we use our result on the finite-state channel to show that
the feedback capacity of the memoryless compound channel is given by
$\inf_{\theta} \max_{Q_X} I(X;Y|\theta)$.
| [
{
"version": "v1",
"created": "Mon, 5 Nov 2007 17:42:17 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Shrader",
"Brooke",
""
],
[
"Permuter",
"Haim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.0708 | Danilo Silva | Danilo Silva, Frank R. Kschischang, Ralf K\"otter | A Rank-Metric Approach to Error Control in Random Network Coding | Minor corrections; 42 pages, to be published at the IEEE Transactions
on Information Theory | IEEE Transactions on Information Theory, vol. 54, no. 9, pp.
3951-3967, Sep. 2008 | 10.1109/TIT.2008.928291 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of error control in random linear network coding is addressed
from a matrix perspective that is closely related to the subspace perspective
of K\"otter and Kschischang. A large class of constant-dimension subspace codes
is investigated. It is shown that codes in this class can be easily constructed
from rank-metric codes, while preserving their distance properties. Moreover,
it is shown that minimum distance decoding of such subspace codes can be
reformulated as a generalized decoding problem for rank-metric codes where
partial information about the error is available. This partial information may
be in the form of erasures (knowledge of an error location but not its value)
and deviations (knowledge of an error value but not its location). Taking
erasures and deviations into account (when they occur) strictly increases the
error correction capability of a code: if $\mu$ erasures and $\delta$
deviations occur, then errors of rank $t$ can always be corrected provided that
$2t \leq d - 1 + \mu + \delta$, where $d$ is the minimum rank distance of the
code. For Gabidulin codes, an important family of maximum rank distance codes,
an efficient decoding algorithm is proposed that can properly exploit erasures
and deviations. In a network coding application where $n$ packets of length $M$
over $F_q$ are transmitted, the complexity of the decoding algorithm is given
by $O(dM)$ operations in an extension field $F_{q^n}$.
| [
{
"version": "v1",
"created": "Mon, 5 Nov 2007 18:02:23 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Jun 2008 16:13:41 GMT"
}
] | 2019-05-07T00:00:00 | [
[
"Silva",
"Danilo",
""
],
[
"Kschischang",
"Frank R.",
""
],
[
"Kötter",
"Ralf",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.0711 | Yingbin Liang | Yingbin Liang, H. Vincent Poor and Shlomo Shamai (Shitz) | Information-Theoretic Security in Wireless Networks | From the Proceedings of the 2007 Joint Workshop on Coding and
Communications, Durnstein, Austria, October 14 - 16, 2007 | null | null | null | cs.IT cs.CR math.IT | null | This paper summarizes recent contributions of the authors and their
co-workers in the area of information-theoretic security.
| [
{
"version": "v1",
"created": "Mon, 5 Nov 2007 18:21:14 GMT"
}
] | 2007-11-06T00:00:00 | [
[
"Liang",
"Yingbin",
"",
"Shitz"
],
[
"Poor",
"H. Vincent",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.0784 | Philip Baback Alipour | Philip B. Alipour | Addendum to Research MMMCV; A Man/Microbio/Megabio/Computer Vision | LaTeX, 10 pages, 4 figures (1 algorithm); An addendum to a research
proposal on biovielectroluminescence and MMMCV for postgraduate academic
bodies and research departments. The contents of this paper are mostly
related and referenced to Article: [arXiv:0710.0410] | null | null | null | cs.CV cs.CE | null | In October 2007, a Research Proposal for the University of Sydney, Australia,
the author suggested that biovie-physical phenomenon as `electrodynamic
dependant biological vision', is governed by relativistic quantum laws and
biovision. The phenomenon on the basis of `biovielectroluminescence', satisfies
man/microbio/megabio/computer vision (MMMCV), as a robust candidate for
physical and visual sciences. The general aim of this addendum is to present a
refined text of Sections 1-3 of that proposal and highlighting the contents of
its Appendix in form of a `Mechanisms' Section. We then briefly remind in an
article aimed for December 2007, by appending two more equations into Section
3, a theoretical II-time scenario as a time model well-proposed for the
phenomenon. The time model within the core of the proposal, plays a significant
role in emphasizing the principle points on Objectives no. 1-8, Sub-hypothesis
3.1.2, mentioned in Article [arXiv:0710.0410]. It also expresses the time
concept in terms of causing quantized energy f(|E|) of time |t|, emit in regard
to shortening the probability of particle loci as predictable patterns of
particle's un-occurred motion, a solution to Heisenberg's uncertainty principle
(HUP) into a simplistic manner. We conclude that, practical frames via a time
algorithm to this model, fixates such predictable patterns of motion of scenery
bodies onto recordable observation points of a MMMCV system. It even
suppresses/predicts superposition phenomena coming from a human subject and/or
other bio-subjects for any decision making event, e.g., brainwave quantum
patterns based on vision. Maintaining the existential probability of Riemann
surfaces of II-time scenarios in the context of biovielectroluminescence, makes
motion-prediction a possibility.
| [
{
"version": "v1",
"created": "Tue, 6 Nov 2007 19:41:22 GMT"
}
] | 2016-09-08T00:00:00 | [
[
"Alipour",
"Philip B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0711.0811 | Bouselmi Ghazi | Ghazi Bouselmi (INRIA Lorraine - LORIA), Dominique Fohr (INRIA
Lorraine - LORIA), Irina Illina (INRIA Lorraine - LORIA) | Combined Acoustic and Pronunciation Modelling for Non-Native Speech
Recognition | null | Dans InterSpeech 2007 (2007) | null | null | cs.CL | null | In this paper, we present several adaptation methods for non-native speech
recognition. We have tested pronunciation modelling, MLLR and MAP non-native
pronunciation adaptation and HMM models retraining on the HIWIRE foreign
accented English speech database. The ``phonetic confusion'' scheme we have
developed consists in associating to each spoken phone several sequences of
confused phones. In our experiments, we have used different combinations of
acoustic models representing the canonical and the foreign pronunciations:
spoken and native models, models adapted to the non-native accent with MAP and
MLLR. The joint use of pronunciation modelling and acoustic adaptation led to
further improvements in recognition accuracy. The best combination of the above
mentioned techniques resulted in a relative word error reduction ranging from
46% to 71%.
| [
{
"version": "v1",
"created": "Tue, 6 Nov 2007 08:23:49 GMT"
}
] | 2007-11-07T00:00:00 | [
[
"Bouselmi",
"Ghazi",
"",
"INRIA Lorraine - LORIA"
],
[
"Fohr",
"Dominique",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Illina",
"Irina",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0711.0829 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | Instruction sequences with indirect jumps | 23 pages; typos corrected, phrasing improved, reference replaced | Scientific Annals of Computer Science, 17:19--46, 2007.
http://www.infoiasi.ro/bin/download/Annals/XVII/XVII_1.pdf | null | PRG0709 | cs.PL | null | We study sequential programs that are instruction sequences with direct and
indirect jump instructions. The intuition is that indirect jump instructions
are jump instructions where the position of the instruction to jump to is the
content of some memory cell. We consider several kinds of indirect jump
instructions. For each kind, we define the meaning of programs with indirect
jump instructions of that kind by means of a translation into programs without
indirect jump instructions. For each kind, the intended behaviour of a program
with indirect jump instructions of that kind under execution is the behaviour
of the translated program under execution on interaction with some memory
device.
| [
{
"version": "v1",
"created": "Tue, 6 Nov 2007 10:26:03 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Dec 2007 07:58:45 GMT"
}
] | 2008-04-08T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0711.0834 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | An interface group for process components | 26 pages; section on non-associativity of component composition
added, examples added | Fundamenta Informaticae, 99(4):355--382, 2010 | 10.3233/FI-2010-254 | PRG0707 | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We take a process component as a pair of an interface and a behaviour. We
study the composition of interacting process components in the setting of
process algebra. We formalize the interfaces of interacting process components
by means of an interface group. An interesting feature of the interface group
is that it allows for distinguishing between expectations and promises in
interfaces of process components. This distinction comes into play in case
components with both client and server behaviour are involved.
| [
{
"version": "v1",
"created": "Tue, 6 Nov 2007 10:45:02 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2008 08:19:38 GMT"
}
] | 2010-07-12T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0711.0836 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | Machine structure oriented control code logic | 32 pages; phrasing improved, references added, connection with
Janlert's "dark programming" explained | Acta Informatica, 46(5):375--401, 2009 | 10.1007/s00236-009-0099-2 | PRG0704 | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Control code is a concept that is closely related to a frequently occurring
practitioner's view on what is a program: code that is capable of controlling
the behaviour of some machine. We present a logical approach to explain issues
concerning control codes that are independent of the details of the behaviours
that are controlled. Using this approach, such issues can be explained at a
very abstract level. We illustrate this among other things by means of an
example about the production of a new compiler from an existing one. The
approach is based on abstract machine models, called machine structures. We
introduce a model of systems that provide execution environments for the
executable codes of machine structures and use it to go into portability of
control codes.
| [
{
"version": "v1",
"created": "Tue, 6 Nov 2007 11:01:21 GMT"
},
{
"version": "v2",
"created": "Fri, 23 May 2008 10:12:36 GMT"
},
{
"version": "v3",
"created": "Wed, 4 Mar 2009 09:47:36 GMT"
}
] | 2009-09-02T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0711.0838 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | On the operating unit size of load/store architectures | 23 pages; minor errors corrected, explanations added, references
replaced | Mathematical Structures in Computer Science, 20(3):395--417, 2010 | 10.1017/S0960129509990314 | PRG0703 | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a strict version of the concept of a load/store instruction set
architecture in the setting of Maurer machines. We take the view that
transformations on the states of a Maurer machine are achieved by applying
threads as considered in thread algebra to the Maurer machine. We study how the
transformations on the states of the main memory of a strict load/store
instruction set architecture that can be achieved by applying threads depend on
the operating unit size, the cardinality of the instruction set, and the
maximal number of states of the threads.
| [
{
"version": "v1",
"created": "Tue, 6 Nov 2007 11:16:34 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Nov 2008 08:46:40 GMT"
}
] | 2010-05-12T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0711.0840 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | A thread calculus with molecular dynamics | 47 pages; examples and results added, phrasing improved, references
replaced | Information and Computation, 208(7):817-844, 2010 | 10.1016/j.ic.2010.01.004 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a theory of threads, interleaving of threads, and interaction
between threads and services with features of molecular dynamics, a model of
computation that bears on computations in which dynamic data structures are
involved. Threads can interact with services of which the states consist of
structured data objects and computations take place by means of actions which
may change the structure of the data objects. The features introduced include
restriction of the scope of names used in threads to refer to data objects.
Because that feature makes it troublesome to provide a model based on
structural operational semantics and bisimulation, we construct a projective
limit model for the theory.
| [
{
"version": "v1",
"created": "Tue, 6 Nov 2007 11:25:20 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Nov 2008 09:29:03 GMT"
}
] | 2010-05-18T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0711.0892 | Alessandro Mei | Alessandro Mei and Julinda Stefa | Routing in Outer Space: Improved Security and Energy-Efficiency in
Multi-Hop Wireless Networks | Short version invited to INFOCOM 2008 mini-conference | null | null | null | cs.NI | null | In this paper we consider security-related and energy-efficiency issues in
multi-hop wireless networks. We start our work from the observation, known in
the literature, that shortest path routing creates congested areas in multi-hop
wireless networks. These areas are critical--they generate both security and
energy efficiency issues. We attack these problems and set out routing in outer
space, a new routing mechanism that transforms any shortest path routing
protocol (or approximated versions of it) into a new protocol that, in case of
uniform traffic, guarantees that every node of the network is responsible for
relaying the same number of messages, on expectation. We can show that a
network that uses routing in outer space does not have congested areas, does
not have the associated security-related issues, does not encourage selfish
positioning, and, in spite of using more energy globally, lives longer of the
same network using the original routing protocol.
| [
{
"version": "v1",
"created": "Tue, 6 Nov 2007 15:05:47 GMT"
}
] | 2007-11-07T00:00:00 | [
[
"Mei",
"Alessandro",
""
],
[
"Stefa",
"Julinda",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0711.0917 | Jan Wielemaker | Jan Wielemaker, Zhisheng Huang and Lourens van der Meij | SWI-Prolog and the Web | 31 pages, 24 figures and 2 tables. To appear in Theory and Practice
of Logic Programming (TPLP) | null | null | null | cs.PL cs.SC | null | Where Prolog is commonly seen as a component in a Web application that is
either embedded or communicates using a proprietary protocol, we propose an
architecture where Prolog communicates to other components in a Web application
using the standard HTTP protocol. By avoiding embedding in external Web servers
development and deployment become much easier. To support this architecture, in
addition to the transfer protocol, we must also support parsing, representing
and generating the key Web document types such as HTML, XML and RDF.
This paper motivates the design decisions in the libraries and extensions to
Prolog for handling Web documents and protocols. The design has been guided by
the requirement to handle large documents efficiently. The described libraries
support a wide range of Web applications ranging from HTML and XML documents to
Semantic Web RDF processing.
To appear in Theory and Practice of Logic Programming (TPLP)
| [
{
"version": "v1",
"created": "Tue, 6 Nov 2007 16:22:39 GMT"
}
] | 2007-11-07T00:00:00 | [
[
"Wielemaker",
"Jan",
""
],
[
"Huang",
"Zhisheng",
""
],
[
"van der Meij",
"Lourens",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0711.1016 | Florian Widmann | Pietro Abate, Rajeev Gor\'e and Florian Widmann | An On-the-fly Tableau-based Decision Procedure for PDL-Satisfiability | 26 pages, longer version of article in Methods for Modalities 2007;
improved readability of proofs | null | null | null | cs.LO | null | We present a tableau-based algorithm for deciding satisfiability for
propositional dynamic logic (PDL) which builds a finite rooted tree with
ancestor loops and passes extra information from children to parents to
separate good loops from bad loops during backtracking. It is easy to
implement, with potential for parallelisation, because it constructs a
pseudo-model ``on the fly'' by exploring each tableau branch independently. But
its worst-case behaviour is 2EXPTIME rather than EXPTIME. A prototype
implementation in the TWB (http://twb.rsise.anu.edu.au) is available.
| [
{
"version": "v1",
"created": "Wed, 7 Nov 2007 06:11:13 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Jan 2008 05:23:26 GMT"
}
] | 2008-01-08T00:00:00 | [
[
"Abate",
"Pietro",
""
],
[
"Goré",
"Rajeev",
""
],
[
"Widmann",
"Florian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0711.1038 | Bouselmi Ghazi | Ghazi Bouselmi (INRIA Lorraine - LORIA), Dominique Fohr (INRIA
Lorraine - LORIA), Irina Illina (INRIA Lorraine - LORIA), Jean-Paul Haton
(INRIA Lorraine - LORIA) | Am\'elioration des Performances des Syst\`emes Automatiques de
Reconnaissance de la Parole pour la Parole Non Native | null | Dans TAIMA'07, Traitement et Analyse de l'Information : M\'ethodes
et Applications (2007) | null | null | cs.CL | null | In this article, we present an approach for non native automatic speech
recognition (ASR). We propose two methods to adapt existing ASR systems to the
non-native accents. The first method is based on the modification of acoustic
models through integration of acoustic models from the mother tong. The
phonemes of the target language are pronounced in a similar manner to the
native language of speakers. We propose to combine the models of confused
phonemes so that the ASR system could recognize both concurrent
pronounciations. The second method we propose is a refinment of the
pronounciation error detection through the introduction of graphemic
constraints. Indeed, non native speakers may rely on the writing of words in
their uttering. Thus, the pronounctiation errors might depend on the characters
composing the words. The average error rate reduction that we observed is
(22.5%) relative for the sentence error rate, and 34.5% (relative) in word
error rate.
| [
{
"version": "v1",
"created": "Wed, 7 Nov 2007 08:51:09 GMT"
}
] | 2007-11-08T00:00:00 | [
[
"Bouselmi",
"Ghazi",
"",
"INRIA Lorraine - LORIA"
],
[
"Fohr",
"Dominique",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Illina",
"Irina",
"",
"INRIA Lorraine - LORIA"
],
[
"Haton",
"Jean-Paul",
"",
"INRIA Lorraine - LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0711.1055 | Klas Olof Daniel Andersson | Daniel Andersson, Kristoffer Arnsfelt Hansen, Peter Bro Miltersen,
Troels Bjerre Sorensen | Simple Recursive Games | null | null | null | null | cs.GT cs.DS | null | We define the class of "simple recursive games". A simple recursive game is
defined as a simple stochastic game (a notion due to Anne Condon), except that
we allow arbitrary real payoffs but disallow moves of chance. We study the
complexity of solving simple recursive games and obtain an almost-linear time
comparison-based algorithm for computing an equilibrium of such a game. The
existence of a linear time comparison-based algorithm remains an open problem.
| [
{
"version": "v1",
"created": "Wed, 7 Nov 2007 10:23:47 GMT"
}
] | 2007-11-08T00:00:00 | [
[
"Andersson",
"Daniel",
""
],
[
"Hansen",
"Kristoffer Arnsfelt",
""
],
[
"Miltersen",
"Peter Bro",
""
],
[
"Sorensen",
"Troels Bjerre",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0711.1056 | Igal Sason | Igal Sason and Gil Wiechman | Bounds on the Number of Iterations for Turbo-Like Ensembles over the
Binary Erasure Channe | Submitted to the IEEE Trans. on Information Theory, November 7th,
2007 | null | null | null | cs.IT math.IT | null | This paper provides simple lower bounds on the number of iterations which is
required for successful message-passing decoding of some important families of
graph-based code ensembles (including low-density parity-check codes and
variations of repeat-accumulate codes). The transmission of the code ensembles
is assumed to take place over a binary erasure channel, and the bounds refer to
the asymptotic case where we let the block length tend to infinity. The
simplicity of the bounds derived in this paper stems from the fact that they
are easily evaluated and are expressed in terms of some basic parameters of the
ensemble which include the fraction of degree-2 variable nodes, the target bit
erasure probability and the gap between the channel capacity and the design
rate of the ensemble. This paper demonstrates that the number of iterations
which is required for successful message-passing decoding scales at least like
the inverse of the gap (in rate) to capacity, provided that the fraction of
degree-2 variable nodes of these turbo-like ensembles does not vanish (hence,
the number of iterations becomes unbounded as the gap to capacity vanishes).
| [
{
"version": "v1",
"created": "Wed, 7 Nov 2007 10:17:48 GMT"
}
] | 2007-11-08T00:00:00 | [
[
"Sason",
"Igal",
""
],
[
"Wiechman",
"Gil",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.1161 | Deniz Gunduz | Deniz Gunduz, Elza Erkip | Joint Source-Channel Codes for MIMO Block Fading Channels | 36 pages, 11 figures | null | null | null | cs.IT math.IT | null | We consider transmission of a continuous amplitude source over an L-block
Rayleigh fading $M_t \times M_r$ MIMO channel when the channel state
information is only available at the receiver. Since the channel is not
ergodic, Shannon's source-channel separation theorem becomes obsolete and the
optimal performance requires a joint source -channel approach. Our goal is to
minimize the expected end-to-end distortion, particularly in the high SNR
regime. The figure of merit is the distortion exponent, defined as the
exponential decay rate of the expected distortion with increasing SNR. We
provide an upper bound and lower bounds for the distortion exponent with
respect to the bandwidth ratio among the channel and source bandwidths. For the
lower bounds, we analyze three different strategies based on layered source
coding concatenated with progressive, superposition or hybrid digital/analog
transmission. In each case, by adjusting the system parameters we optimize the
distortion exponent as a function of the bandwidth ratio. We prove that the
distortion exponent upper bound can be achieved when the channel has only one
degree of freedom, that is L=1, and $\min\{M_t,M_r\}=1$. When we have more
degrees of freedom, our achievable distortion exponents meet the upper bound
for only certain ranges of the bandwidth ratio. We demonstrate that our
results, which were derived for a complex Gaussian source, can be extended to
more general source distributions as well.
| [
{
"version": "v1",
"created": "Wed, 7 Nov 2007 21:18:30 GMT"
}
] | 2007-11-09T00:00:00 | [
[
"Gunduz",
"Deniz",
""
],
[
"Erkip",
"Elza",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.1177 | Alfredo von Reckow | Alfredo von Reckow | Considerations on P vs NP | null | null | null | null | cs.CC cs.LO | null | In order to prove that the P of problems is different to the NP class, we
consider the satisfability problem of propositional calculus formulae, which is
an NP-complete problem. It is shown that, for every search algorithm A, there
is a set E(A) containing propositional calculus formulae, each of which
requires the algorithm A to take non-polynomial time to find the truth-values
of its propositional letters satisfying it. Moreover, E(A)'s size is an
exponential function of n, which makes it impossible to detect such formulae in
a polynomial time. Hence, the satisfability problem does not have a polynomial
complexity
| [
{
"version": "v1",
"created": "Wed, 7 Nov 2007 22:32:41 GMT"
}
] | 2007-11-09T00:00:00 | [
[
"von Reckow",
"Alfredo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0711.1189 | David Wood | David R. Wood | Clique Minors in Cartesian Products of Graphs | null | New York J. Mathematics 17:627-682, 2011 | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A "clique minor" in a graph G can be thought of as a set of connected
subgraphs in G that are pairwise disjoint and pairwise adjacent. The "Hadwiger
number" h(G) is the maximum cardinality of a clique minor in G. This paper
studies clique minors in the Cartesian product G*H.
Our main result is a rough structural characterisation theorem for Cartesian
products with bounded Hadwiger number. It implies that if the product of two
sufficiently large graphs has bounded Hadwiger number then it is one of the
following graphs:
- a planar grid with a vortex of bounded width in the outerface,
- a cylindrical grid with a vortex of bounded width in each of the two `big'
faces, or
- a toroidal grid.
Motivation for studying the Hadwiger number of a graph includes Hadwiger's
Conjecture, which states that the chromatic number chi(G) <= h(G). It is open
whether Hadwiger's Conjecture holds for every Cartesian product. We prove that
if |V(H)|-1 >= chi(G) >= chi(H) then Hadwiger's Conjecture holds for G*H. On
the other hand, we prove that Hadwiger's Conjecture holds for all Cartesian
products if and only if it holds for all G * K_2. We then show that h(G * K_2)
is tied to the treewidth of G.
We also develop connections with pseudoachromatic colourings and connected
dominating sets that imply near-tight bounds on the Hadwiger number of grid
graphs (Cartesian products of paths) and Hamming graphs (Cartesian products of
cliques).
| [
{
"version": "v1",
"created": "Thu, 8 Nov 2007 00:05:45 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Jan 2008 14:09:56 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Dec 2009 03:59:42 GMT"
},
{
"version": "v4",
"created": "Fri, 23 Sep 2011 02:18:23 GMT"
}
] | 2011-10-05T00:00:00 | [
[
"Wood",
"David R.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0711.1226 | Willemien Visser | Willemien Visser (INRIA Rocquencourt) | Dynamic aspects of individual design activities. A cognitive ergonomics
viewpoint | null | Human behaviour in design Springer Verlag (Ed.) (2003) 87-96 | null | null | cs.HC | null | This paper focuses on the use of knowledge possessed by designers. Data
collection was based on observations (by the cognitive ergonomics researcher)
and simultaneous verbalisations (by the designers) in empirical studies
conducted in the context of industrial design projects. The contribution of
this research is typical of cognitive ergonomics, in that it provides data on
actual activities implemented by designers in their actual work situation
(rather than on prescribed and/or idealised processes and methods). Data
presented concern global strategies (the way in which designers actually
organise their activity) and local strategies (reuse in design). Results from
cognitive ergonomics and other research that challenges the way in which people
are supposed to work with existing systems are generally not received warmly.
Abundant corroboration of such results is required before industry may consider
taking them into account. The opportunistic organisation of design activity is
taken here as an example of this reluctance. The results concerning this aspect
of design have been verified repeatedly, but only prototypes and experimental
systems implementing some of the requirements formulated on their basis, are
under development.
| [
{
"version": "v1",
"created": "Thu, 8 Nov 2007 09:29:57 GMT"
}
] | 2007-11-09T00:00:00 | [
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0711.1227 | Willemien Visser | Willemien Visser (INRIA Rocquencourt) | Designing as Construction of Representations: A Dynamic Viewpoint in
Cognitive Design Research | null | Human-Computer Interaction 21, 1 (2006) 103-152 | null | null | cs.HC | null | This article presents a cognitively oriented viewpoint on design. It focuses
on cognitive, dynamic aspects of real design, i.e., the actual cognitive
activity implemented by designers during their work on professional design
projects. Rather than conceiving de-signing as problem solving - Simon's
symbolic information processing (SIP) approach - or as a reflective practice or
some other form of situated activity - the situativity (SIT) approach - we
consider that, from a cognitive viewpoint, designing is most appropriately
characterised as a construction of representations. After a critical discussion
of the SIP and SIT approaches to design, we present our view-point. This
presentation concerns the evolving nature of representations regarding levels
of abstraction and degrees of precision, the function of external
representations, and specific qualities of representation in collective design.
Designing is described at three levels: the organisation of the activity, its
strategies, and its design-representation construction activities (different
ways to generate, trans-form, and evaluate representations). Even if we adopt a
"generic design" stance, we claim that design can take different forms
depending on the nature of the artefact, and we propose some candidates for
dimensions that allow a distinction to be made between these forms of design.
We discuss the potential specificity of HCI design, and the lack of cognitive
design research occupied with the quality of design. We close our discussion of
representational structures and activities by an outline of some directions
regarding their functional linkages.
| [
{
"version": "v1",
"created": "Thu, 8 Nov 2007 09:33:19 GMT"
}
] | 2007-11-09T00:00:00 | [
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0711.1231 | Veronika Rehn-Sonigo | Anne Benoit (INRIA Rh\^one-Alpes / LIP Laboratoire d'Informatique du
Parall\'elisme, LIP), Veronika Rehn-Sonigo (INRIA Rh\^one-Alpes / LIP
Laboratoire d'Informatique du Parall\'elisme, LIP), Yves Robert (INRIA
Rh\^one-Alpes / LIP Laboratoire d'Informatique du Parall\'elisme, LIP) | Optimizing Latency and Reliability of Pipeline Workflow Applications | null | null | null | null | cs.DC | null | Mapping applications onto heterogeneous platforms is a difficult challenge,
even for simple application patterns such as pipeline graphs. The problem is
even more complex when processors are subject to failure during the execution
of the application. In this paper, we study the complexity of a bi-criteria
mapping which aims at optimizing the latency (i.e., the response time) and the
reliability (i.e., the probability that the computation will be successful) of
the application. Latency is minimized by using faster processors, while
reliability is increased by replicating computations on a set of processors.
However, replication increases latency (additional communications, slower
processors). The application fails to be executed only if all the processors
fail during execution. While simple polynomial algorithms can be found for
fully homogeneous platforms, the problem becomes NP-hard when tackling
heterogeneous platforms. This is yet another illustration of the additional
complexity added by heterogeneity.
| [
{
"version": "v1",
"created": "Thu, 8 Nov 2007 14:45:12 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Mar 2008 10:43:50 GMT"
},
{
"version": "v3",
"created": "Wed, 26 Mar 2008 09:36:18 GMT"
}
] | 2008-03-26T00:00:00 | [
[
"Benoit",
"Anne",
"",
"INRIA Rhône-Alpes / LIP Laboratoire d'Informatique du\n Parallélisme, LIP"
],
[
"Rehn-Sonigo",
"Veronika",
"",
"INRIA Rhône-Alpes / LIP\n Laboratoire d'Informatique du Parallélisme, LIP"
],
[
"Robert",
"Yves",
"",
"INRIA\n Rhône-Alpes / LIP Laboratoire d'Informatique du Parallélisme, LIP"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0711.1242 | Paul Goldberg | P.W. Goldberg, P. Polpinit | The Price of Selfish Stackelberg Leadership in a Network Game | 18 pages, 1 figure | null | null | null | cs.GT | null | We study a class of games in which a finite number of agents each controls a
quantity of flow to be routed through a network, and are able to split their
own flow between multiple paths through the network. Recent work on this model
has contrasted the social cost of Nash equilibria with the best possible social
cost. Here we show that additional costs are incurred in situations where a
selfish ``leader'' agent allocates his flow, and then commits to that choice so
that other agents are compelled to minimise their own cost based on the first
agent's choice. We find that even in simple networks, the leader can often
improve his own cost at the expense of increased social cost. Focusing on the
2-player case, we give upper and lower bounds on the worst-case additional cost
incurred.
| [
{
"version": "v1",
"created": "Thu, 8 Nov 2007 10:50:00 GMT"
}
] | 2007-11-09T00:00:00 | [
[
"Goldberg",
"P. W.",
""
],
[
"Polpinit",
"P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0711.1269 | Tolga Girici | Tolga Girici, Chenxi Zhu, Jonathan R. Agre, Anthony Ephremides | Fair Scheduling in OFDMA-based Wireless Systems with QoS Constraints | Presented at International OFDM Workshop, Hamburg Germany on Aug.
30th 2007 (Inowo 07) | International OFDM Workshop, Hamburg Germany on Aug. 30th 2007
(Inowo 07) | null | null | cs.NI | null | In this work we consider the problem of downlink resource allocation for
proportional fairness of long term received rates of data users and quality of
service for real time sessions in an OFDMA-based wireless system. The base
station allocates available power and bandwidth to individual users based on
long term average received rates, QoS based rate constraints and channel
conditions. We solve the underlying constrained optimization problem and
propose an algorithm that achieves the optimal allocation. Numerical evaluation
results show that the proposed algorithm provides better QoS to voice and video
sessions while providing more and fair rates to data users in comparison with
existing schemes.
| [
{
"version": "v1",
"created": "Thu, 8 Nov 2007 13:07:49 GMT"
}
] | 2007-11-09T00:00:00 | [
[
"Girici",
"Tolga",
""
],
[
"Zhu",
"Chenxi",
""
],
[
"Agre",
"Jonathan R.",
""
],
[
"Ephremides",
"Anthony",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0711.1273 | Tolga Girici | Tolga Girici, Chenxi Zhu, Jonathan R. Agre, Anthony Ephremides | Practical Resource Allocation Algorithms for QoS in OFDMA-based Wireless
Systems | To be presented at 2nd IEEE International Broadband Wireless Access
Workshop. Las Vegas, Nevada USA Jan 12 2008 | To be presented at 2nd IEEE International Broadband Wireless
Access Workshop. Las Vegas, Nevada USA Jan 12 2008 | 10.1109/ccnc08.2007.209 | null | cs.NI | null | In this work we propose an efficient resource allocation algorithm for OFDMA
based wireless systems supporting heterogeneous traffic. The proposed algorithm
provides proportionally fairness to data users and short term rate guarantees
to real-time users. Based on the QoS requirements, buffer occupancy and channel
conditions, we propose a scheme for rate requirement determination for delay
constrained sessions. Then we formulate and solve the proportional fair rate
allocation problem subject to those rate requirements and power/bandwidth
constraints. Simulations results show that the proposed algorithm provides
significant improvement with respect to the benchmark algorithm.
| [
{
"version": "v1",
"created": "Thu, 8 Nov 2007 13:39:15 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Girici",
"Tolga",
""
],
[
"Zhu",
"Chenxi",
""
],
[
"Agre",
"Jonathan R.",
""
],
[
"Ephremides",
"Anthony",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0711.1290 | Willemien Visser | Willemien Visser (INRIA Rocquencourt) | Conception individuelle et collective. Approche de l'ergonomie cognitive
[Individual and Collective Design. The Cognitive-Ergonomics Approach] | null | Cognition et cr\'eation. Explorations cognitives des processus de
conception (Cognition and creation. Cognitive explorations of design
processes) Mardaga (Ed.) (2002) 311-327 | null | null | cs.OH | null | This text presents the cognitive-ergonomics approach to design, in both its
individual and collective form. It focuses on collective design with respect to
individual design. The theoretical framework adopted is that of information
processing, specified for design problems. The cognitive characteristics of
design problems are presented: the effects of their ill-defined character and
of the different types of representation implemented in solving these problems,
amongst others the more or less "satisficing" character of the different
possible solutions. The text first describes the cognitive activities
implemented in both individual and collective design: different types of
control activities and of the executive activities of solution development and
evaluation. Specific collective-design characteristics are then presented:
co-design and distributed-design activities, temporo-operative and cognitive
synchronisation, and different types of argumentation, of co-designers'
intervention modes in the design process, of solution-proposals evaluation. The
paper concludes by a confrontation between the two types of design, individual
and collective.
| [
{
"version": "v1",
"created": "Thu, 8 Nov 2007 14:48:44 GMT"
}
] | 2007-11-09T00:00:00 | [
[
"Visser",
"Willemien",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.1295 | Yi Hong Dr | Emanuele Viterbo and Yi Hong | On the performance of Golden space-time trellis coded modulation over
MIMO block fading channels | appear in IEEE Trans WCOM | null | null | null | cs.IT math.IT | null | The Golden space-time trellis coded modulation (GST-TCM) scheme was proposed
in \cite{Hong06} for a high rate $2\times 2$ multiple-input multiple-output
(MIMO) system over slow fading channels. In this letter, we present the
performance analysis of GST-TCM over block fading channels, where the channel
matrix is constant over a fraction of the codeword length and varies from one
fraction to another, independently. In practice, it is not useful to design
such codes for specific block fading channel parameters and a robust solution
is preferable. We then show both analytically and by simulation that the
GST-TCM designed for slow fading channels are indeed robust to all block fading
channel conditions.
| [
{
"version": "v1",
"created": "Thu, 8 Nov 2007 15:20:11 GMT"
}
] | 2007-11-09T00:00:00 | [
[
"Viterbo",
"Emanuele",
""
],
[
"Hong",
"Yi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.1360 | Damian H. Zanette | Damian H. Zanette | Analytical approach to bit-string models of language evolution | To appear in Int. J. Mod. Phys. C | null | 10.1142/S0129183108012340 | null | physics.soc-ph cs.CL | null | A formulation of bit-string models of language evolution, based on
differential equations for the population speaking each language, is introduced
and preliminarily studied. Connections with replicator dynamics and diffusion
processes are pointed out. The stability of the dominance state, where most of
the population speaks a single language, is analyzed within a mean-field-like
approximation, while the homogeneous state, where the population is evenly
distributed among languages, can be exactly studied. This analysis discloses
the existence of a bistability region, where dominance coexists with
homogeneity as possible asymptotic states. Numerical resolution of the
differential system validates these findings.
| [
{
"version": "v1",
"created": "Thu, 8 Nov 2007 21:05:38 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Zanette",
"Damian H.",
""
]
] | [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0711.1383 | Navin Kashyap | Navin Kashyap | On Minimal Tree Realizations of Linear Codes | Submitted to IEEE Transactions on Information Theory; 29 pages, 11
figures | null | 10.1109/TIT.2009.2023718 | null | cs.IT math.IT | null | A tree decomposition of the coordinates of a code is a mapping from the
coordinate set to the set of vertices of a tree. A tree decomposition can be
extended to a tree realization, i.e., a cycle-free realization of the code on
the underlying tree, by specifying a state space at each edge of the tree, and
a local constraint code at each vertex of the tree. The constraint complexity
of a tree realization is the maximum dimension of any of its local constraint
codes. A measure of the complexity of maximum-likelihood decoding for a code is
its treewidth, which is the least constraint complexity of any of its tree
realizations.
It is known that among all tree realizations of a code that extends a given
tree decomposition, there exists a unique minimal realization that minimizes
the state space dimension at each vertex of the underlying tree. In this paper,
we give two new constructions of these minimal realizations. As a by-product of
the first construction, a generalization of the state-merging procedure for
trellis realizations, we obtain the fact that the minimal tree realization also
minimizes the local constraint code dimension at each vertex of the underlying
tree. The second construction relies on certain code decomposition techniques
that we develop. We further observe that the treewidth of a code is related to
a measure of graph complexity, also called treewidth. We exploit this
connection to resolve a conjecture of Forney's regarding the gap between the
minimum trellis constraint complexity and the treewidth of a code. We present a
family of codes for which this gap can be arbitrarily large.
| [
{
"version": "v1",
"created": "Fri, 9 Nov 2007 00:24:38 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Kashyap",
"Navin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.1401 | Keki Burjorjee | Keki Burjorjee | Towards a Sound Theory of Adaptation for the Simple Genetic Algorithm | Typos corrected. No material changes to content | null | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The pace of progress in the fields of Evolutionary Computation and Machine
Learning is currently limited -- in the former field, by the improbability of
making advantageous extensions to evolutionary algorithms when their capacity
for adaptation is poorly understood, and in the latter by the difficulty of
finding effective semi-principled reductions of hard real-world problems to
relatively simple optimization problems. In this paper we explain why a theory
which can accurately explain the simple genetic algorithm's remarkable capacity
for adaptation has the potential to address both these limitations. We describe
what we believe to be the impediments -- historic and analytic -- to the
discovery of such a theory and highlight the negative role that the building
block hypothesis (BBH) has played. We argue based on experimental results that
a fundamental limitation which is widely believed to constrain the SGA's
adaptive ability (and is strongly implied by the BBH) is in fact illusionary
and does not exist. The SGA therefore turns out to be more powerful than it is
currently thought to be. We give conditions under which it becomes feasible to
numerically approximate and study the multivariate marginals of the search
distribution of an infinite population SGA over multiple generations even when
its genomes are long, and explain why this analysis is relevant to the riddle
of the SGA's remarkable adaptive abilities.
| [
{
"version": "v1",
"created": "Fri, 9 Nov 2007 02:28:12 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Apr 2009 15:28:06 GMT"
}
] | 2009-04-03T00:00:00 | [
[
"Burjorjee",
"Keki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0711.1466 | Yoshiharu Maeno | Yoshiharu Maeno and Yukio Ohsawa | Predicting relevant empty spots in social interaction | 11 pages, 5 figures, submitted to J. Systems Science and Complexity | Journal of Systems Science and Complexity vol.21, pp.161-171
(2008) | null | null | cs.AI | null | An empty spot refers to an empty hard-to-fill space which can be found in the
records of the social interaction, and is the clue to the persons in the
underlying social network who do not appear in the records. This contribution
addresses a problem to predict relevant empty spots in social interaction.
Homogeneous and inhomogeneous networks are studied as a model underlying the
social interaction. A heuristic predictor function approach is presented as a
new method to address the problem. Simulation experiment is demonstrated over a
homogeneous network. A test data in the form of baskets is generated from the
simulated communication. Precision to predict the empty spots is calculated to
demonstrate the performance of the presented approach.
| [
{
"version": "v1",
"created": "Fri, 9 Nov 2007 13:54:30 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Jan 2008 14:34:55 GMT"
},
{
"version": "v3",
"created": "Thu, 21 Feb 2008 05:26:32 GMT"
}
] | 2010-09-28T00:00:00 | [
[
"Maeno",
"Yoshiharu",
""
],
[
"Ohsawa",
"Yukio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0711.1478 | Stefano Galatolo | Stefano Galatolo, Mathieu Hoyrup and Cristobal Rojas | A constructive Borel-Cantelli Lemma. Constructing orbits with required
statistical properties | Revised version. Several results are generalized | null | null | null | math.CA cs.IT math.DS math.IT math.PR math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the general context of computable metric spaces and computable measures we
prove a kind of constructive Borel-Cantelli lemma: given a sequence
(constructive in some way) of sets $A_{i}$ with effectively summable measures,
there are computable points which are not contained in infinitely many $A_{i}$.
As a consequence of this we obtain the existence of computable points which
follow the \emph{typical statistical behavior} of a dynamical system (they
satisfy the Birkhoff theorem) for a large class of systems, having computable
invariant measure and a certain ``logarithmic'' speed of convergence of
Birkhoff averages over Lipshitz observables. This is applied to uniformly
hyperbolic systems, piecewise expanding maps, systems on the interval with an
indifferent fixed point and it directly implies the existence of computable
numbers which are normal with respect to any base.
| [
{
"version": "v1",
"created": "Fri, 9 Nov 2007 15:12:51 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jun 2008 15:56:40 GMT"
}
] | 2008-06-30T00:00:00 | [
[
"Galatolo",
"Stefano",
""
],
[
"Hoyrup",
"Mathieu",
""
],
[
"Rojas",
"Cristobal",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0711.1533 | Lalana Kagal | Tim Berners-Lee, Dan Connolly, Lalana Kagal, Yosi Scharf, and Jim
Hendler | N3Logic: A Logical Framework For the World Wide Web | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | null | cs.NI | null | The Semantic Web drives towards the use of the Web for interacting with
logically interconnected data. Through knowledge models such as Resource
Description Framework (RDF), the Semantic Web provides a unifying
representation of richly structured data. Adding logic to the Web implies the
use of rules to make inferences, choose courses of action, and answer
questions. This logic must be powerful enough to describe complex properties of
objects but not so powerful that agents can be tricked by being asked to
consider a paradox. The Web has several characteristics that can lead to
problems when existing logics are used, in particular, the inconsistencies that
inevitably arise due to the openness of the Web, where anyone can assert
anything. N3Logic is a logic that allows rules to be expressed in a Web
environment. It extends RDF with syntax for nested graphs and quantified
variables and with predicates for implication and accessing resources on the
Web, and functions including cryptographic, string, math. The main goal of
N3Logic is to be a minimal extension to the RDF data model such that the same
language can be used for logic and data. In this paper, we describe N3Logic and
illustrate through examples why it is an appropriate logic for the Web.
| [
{
"version": "v1",
"created": "Fri, 9 Nov 2007 20:41:53 GMT"
}
] | 2007-11-12T00:00:00 | [
[
"Berners-Lee",
"Tim",
""
],
[
"Connolly",
"Dan",
""
],
[
"Kagal",
"Lalana",
""
],
[
"Scharf",
"Yosi",
""
],
[
"Hendler",
"Jim",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0711.1565 | Hamidreza Farmanbar | Hamid Farmanbar, Shahab Oveis Gharan, and Amir Keyvan Khandani | Channel Code Design with Causal Side Information at the Encoder | 28 pages, 6 figures, Submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | null | The problem of channel code design for the $M$-ary input AWGN channel with
additive $Q$-ary interference where the sequence of i.i.d. interference symbols
is known causally at the encoder is considered. The code design criterion at
high SNR is derived by defining a new distance measure between the input
symbols of the Shannon's \emph{associated} channel. For the case of
binary-input channel, i.e., M=2, it is shown that it is sufficient to use only
two (out of $2^Q$) input symbols of the \emph{associated} channel in the
encoding as far as the distance spectrum of code is concerned. This reduces the
problem of channel code design for the binary-input AWGN channel with known
interference at the encoder to design of binary codes for the binary symmetric
channel where the Hamming distance among codewords is the major factor in the
performance of the code.
| [
{
"version": "v1",
"created": "Mon, 12 Nov 2007 15:25:00 GMT"
}
] | 2007-11-13T00:00:00 | [
[
"Farmanbar",
"Hamid",
""
],
[
"Gharan",
"Shahab Oveis",
""
],
[
"Khandani",
"Amir Keyvan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.1569 | Sudhir Singh | Sudhir Kumar Singh, Vwani P. Roychowdhury | Capacity as a Fundamental Metric for Mechanism Design in the Information
Economy | 12 pages | null | null | null | cs.GT | null | The auction theory literature has so far focused mostly on the design of
mechanisms that takes the revenue or the efficiency as a yardstick. However,
scenarios where the {\it capacity}, which we define as \textit{``the number of
bidders the auctioneer wants to have a positive probability of getting the
item''}, is a fundamental concern are ubiquitous in the information economy.
For instance, in sponsored search auctions (SSA's) or in online ad-exchanges,
the true value of an ad-slot for an advertiser is inherently derived from the
conversion-rate, which in turn depends on whether the advertiser actually
obtained the ad-slot or not; thus, unless the capacity of the underlying
auction is large, key parameters, such as true valuations and
advertiser-specific conversion rates, will remain unknown or uncertain leading
to inherent inefficiencies in the system. In general, the same holds true for
all information goods/digital goods. We initiate a study of mechanisms, which
take capacity as a yardstick, in addition to revenue/efficiency. We show that
in the case of a single indivisible item one simple way to incorporate capacity
constraints is via designing mechanisms to sell probability distributions, and
that under certain conditions, such optimal probability distributions could be
identified using a Linear programming approach. We define a quantity called
{\it price of capacity} to capture the tradeoff between capacity and
revenue/efficiency. We also study the case of sponsored search auctions.
Finally, we discuss how general such an approach via probability spikes can be
made, and potential directions for future investigations.
| [
{
"version": "v1",
"created": "Sat, 10 Nov 2007 04:30:58 GMT"
}
] | 2007-11-13T00:00:00 | [
[
"Singh",
"Sudhir Kumar",
""
],
[
"Roychowdhury",
"Vwani P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0711.1573 | Wenyi Zhang | Wenyi Zhang, Shivaprasad Kotagiri, J. Nicholas Laneman | Outage-Efficient Downlink Transmission Without Transmit Channel State
Information | Submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | This paper investigates downlink transmission over a quasi-static fading
Gaussian broadcast channel (BC), to model delay-sensitive applications over
slowly time-varying fading channels. System performance is characterized by
outage achievable rate regions. In contrast to most previous work, here the
problem is studied under the key assumption that the transmitter only knows the
probability distributions of the fading coefficients, but not their
realizations. For scalar-input channels, two coding schemes are proposed. The
first scheme is called blind dirty paper coding (B-DPC), which utilizes a
robustness property of dirty paper coding to perform precoding at the
transmitter. The second scheme is called statistical superposition coding
(S-SC), in which each receiver adaptively performs successive decoding with the
process statistically governed by the realized fading. Both B-DPC and S-SC
schemes lead to the same outage achievable rate region, which always dominates
that of time-sharing, irrespective of the particular fading distributions. The
S-SC scheme can be extended to BCs with multiple transmit antennas.
| [
{
"version": "v1",
"created": "Sat, 10 Nov 2007 05:59:11 GMT"
}
] | 2007-11-13T00:00:00 | [
[
"Zhang",
"Wenyi",
""
],
[
"Kotagiri",
"Shivaprasad",
""
],
[
"Laneman",
"J. Nicholas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.1605 | Himanshu Asnani | Himanshu Asnani and Abhay Karandikar | Asymptotic Capacity of Wireless Ad Hoc Networks with Realistic Links
under a Honey Comb Topology | This paper has been withdrawn by the authors. 3 pages, 1 figure,
Submitted to IEEE Communication Letters | null | null | null | cs.IT math.IT | null | We consider the effects of Rayleigh fading and lognormal shadowing in the
physical interference model for all the successful transmissions of traffic
across the network. New bounds are derived for the capacity of a given random
ad hoc wireless network that reflect packet drop or capture probability of the
transmission links. These bounds are based on a simplified network topology
termed as honey-comb topology under a given routing and scheduling scheme.
| [
{
"version": "v1",
"created": "Sat, 10 Nov 2007 18:00:38 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Oct 2010 00:47:31 GMT"
}
] | 2010-10-06T00:00:00 | [
[
"Asnani",
"Himanshu",
""
],
[
"Karandikar",
"Abhay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.1669 | James Cusick | James Cusick | Applying Software Defect Estimations: Using a Risk Matrix for Tuning
Test Effort | null | null | null | null | cs.SE cs.OH | null | Applying software defect esimation techniques and presenting this information
in a compact and impactful decision table can clearly illustrate to
collaborative groups how critical this position is in the overall development
cycle. The Test Risk Matrix described here has proven to be a valuable addition
to the management tools and approaches used in developing large scale software
on several releases. Use of this matrix in development planning meetings can
clarify the attendant risks and possible consequences of carrying out or
bypassing specific test activities.
| [
{
"version": "v1",
"created": "Sun, 11 Nov 2007 18:56:53 GMT"
}
] | 2007-11-13T00:00:00 | [
[
"Cusick",
"James",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.1682 | Loukas Georgiadis | Loukas Georgiadis, Haim Kaplan, Nira Shafrir, Robert E. Tarjan, Renato
F. Werneck | Data Structures for Mergeable Trees | null | null | null | null | cs.DS | null | Motivated by an application in computational topology, we consider a novel
variant of the problem of efficiently maintaining dynamic rooted trees. This
variant requires merging two paths in a single operation. In contrast to the
standard problem, in which only one tree arc changes at a time, a single merge
operation can change many arcs. In spite of this, we develop a data structure
that supports merges on an n-node forest in O(log^2 n) amortized time and all
other standard tree operations in O(log n) time (amortized, worst-case, or
randomized depending on the underlying data structure). For the special case
that occurs in the motivating application, in which arbitrary arc deletions
(cuts) are not allowed, we give a data structure with an O(log n) time bound
per operation. This is asymptotically optimal under certain assumptions. For
the even-more special case in which both cuts and parent queries are
disallowed, we give an alternative O(log n)-time solution that uses standard
dynamic trees as a black box. This solution also applies to the motivating
application. Our methods use previous work on dynamic trees in various ways,
but the analysis of each algorithm requires novel ideas. We also investigate
lower bounds for the problem under various assumptions.
| [
{
"version": "v1",
"created": "Sun, 11 Nov 2007 21:28:20 GMT"
}
] | 2007-11-13T00:00:00 | [
[
"Georgiadis",
"Loukas",
""
],
[
"Kaplan",
"Haim",
""
],
[
"Shafrir",
"Nira",
""
],
[
"Tarjan",
"Robert E.",
""
],
[
"Werneck",
"Renato F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0711.1723 | Jinshan Zhang | Jinshan Zhang, Yan Huo, and Fengshan Bai | An analysis of a random algorithm for estimating all the matchings | 18 pages | null | null | null | cs.CC cs.DM | null | Counting the number of all the matchings on a bipartite graph has been
transformed into calculating the permanent of a matrix obtained from the
extended bipartite graph by Yan Huo, and Rasmussen presents a simple approach
(RM) to approximate the permanent, which just yields a critical ratio
O($n\omega(n)$) for almost all the 0-1 matrices, provided it's a simple
promising practical way to compute this #P-complete problem. In this paper, the
performance of this method will be shown when it's applied to compute all the
matchings based on that transformation. The critical ratio will be proved to be
very large with a certain probability, owning an increasing factor larger than
any polynomial of $n$ even in the sense for almost all the 0-1 matrices. Hence,
RM fails to work well when counting all the matchings via computing the
permanent of the matrix. In other words, we must carefully utilize the known
methods of estimating the permanent to count all the matchings through that
transformation.
| [
{
"version": "v1",
"created": "Mon, 12 Nov 2007 08:15:39 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Nov 2007 15:35:11 GMT"
}
] | 2007-11-15T00:00:00 | [
[
"Zhang",
"Jinshan",
""
],
[
"Huo",
"Yan",
""
],
[
"Bai",
"Fengshan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0711.1765 | Damien Chablat | Anatoly Pashkevich (ROBOTIC Laboratory, Irccyn), Damien Chablat
(IRCCyN), Philippe Wenger (IRCCyN) | Kinematic calibration of orthoglide-type mechanisms | null | Information Control Problems in Manufacturing 2006, Elsevier (Ed.)
(2006) 149-154 | null | null | cs.RO | null | The paper proposes a novel calibration approach for the Orthoglide-type
mechanisms based on observations of the manipulator leg parallelism during
mo-tions between the prespecified test postures. It employs a low-cost
measuring system composed of standard comparator indicators attached to the
universal magnetic stands. They are sequentially used for measuring the
deviation of the relevant leg location while the manipulator moves the TCP
along the Cartesian axes. Using the measured differences, the developed
algorithm estimates the joint offsets that are treated as the most essential
parameters to be adjusted. The sensitivity of the meas-urement methods and the
calibration accuracy are also studied. Experimental re-sults are presented that
demonstrate validity of the proposed calibration technique
| [
{
"version": "v1",
"created": "Mon, 12 Nov 2007 12:57:46 GMT"
}
] | 2007-11-13T00:00:00 | [
[
"Pashkevich",
"Anatoly",
"",
"ROBOTIC Laboratory, Irccyn"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0711.1766 | Yuval Kochman | Ram Zamir, Yuval Kochman and Uri Erez | Achieving the Gaussian Rate-Distortion Function by Prediction | To appear in IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | The "water-filling" solution for the quadratic rate-distortion function of a
stationary Gaussian source is given in terms of its power spectrum. This
formula naturally lends itself to a frequency domain "test-channel"
realization. We provide an alternative time-domain realization for the
rate-distortion function, based on linear prediction. This solution has some
interesting implications, including the optimality at all distortion levels of
pre/post filtered vector-quantized differential pulse code modulation (DPCM),
and a duality relationship with decision-feedback equalization (DFE) for
inter-symbol interference (ISI) channels.
| [
{
"version": "v1",
"created": "Mon, 12 Nov 2007 13:45:05 GMT"
},
{
"version": "v2",
"created": "Sun, 18 Nov 2007 08:53:43 GMT"
},
{
"version": "v3",
"created": "Mon, 24 Dec 2007 08:39:06 GMT"
},
{
"version": "v4",
"created": "Mon, 18 Feb 2008 08:39:00 GMT"
}
] | 2008-02-18T00:00:00 | [
[
"Zamir",
"Ram",
""
],
[
"Kochman",
"Yuval",
""
],
[
"Erez",
"Uri",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.1786 | Cyril Dumont | Cyril Dumont (LACL), Fabrice Mourlin (LACL) | A Mobile Computing Architecture for Numerical Simulation | null | null | null | null | cs.DC | null | The domain of numerical simulation is a place where the parallelization of
numerical code is common. The definition of a numerical context means the
configuration of resources such as memory, processor load and communication
graph, with an evolving feature: the resources availability. A feature is often
missing: the adaptability. It is not predictable and the adaptable aspect is
essential. Without calling into question these implementations of these codes,
we create an adaptive use of these implementations. Because the execution has
to be driven by the availability of main resources, the components of a numeric
computation have to react when their context changes. This paper offers a new
architecture, a mobile computing architecture, based on mobile agents and
JavaSpace. At the end of this paper, we apply our architecture to several case
studies and obtain our first results.
| [
{
"version": "v1",
"created": "Mon, 12 Nov 2007 14:39:34 GMT"
}
] | 2007-11-13T00:00:00 | [
[
"Dumont",
"Cyril",
"",
"LACL"
],
[
"Mourlin",
"Fabrice",
"",
"LACL"
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0711.1814 | Francesca A. Lisi | Francesca A. Lisi | Building Rules on Top of Ontologies for the Semantic Web with Inductive
Logic Programming | 30 pages, 6 figures | null | null | null | cs.AI cs.LG | null | Building rules on top of ontologies is the ultimate goal of the logical layer
of the Semantic Web. To this aim an ad-hoc mark-up language for this layer is
currently under discussion. It is intended to follow the tradition of hybrid
knowledge representation and reasoning systems such as $\mathcal{AL}$-log that
integrates the description logic $\mathcal{ALC}$ and the function-free Horn
clausal language \textsc{Datalog}. In this paper we consider the problem of
automating the acquisition of these rules for the Semantic Web. We propose a
general framework for rule induction that adopts the methodological apparatus
of Inductive Logic Programming and relies on the expressive and deductive power
of $\mathcal{AL}$-log. The framework is valid whatever the scope of induction
(description vs. prediction) is. Yet, for illustrative purposes, we also
discuss an instantiation of the framework which aims at description and turns
out to be useful in Ontology Refinement.
Keywords: Inductive Logic Programming, Hybrid Knowledge Representation and
Reasoning Systems, Ontologies, Semantic Web.
Note: To appear in Theory and Practice of Logic Programming (TPLP)
| [
{
"version": "v1",
"created": "Mon, 12 Nov 2007 17:15:34 GMT"
}
] | 2007-11-13T00:00:00 | [
[
"Lisi",
"Francesca A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0711.1827 | Joerg Rothe | Dorothea Baumeister and Joerg Rothe | The Three-Color and Two-Color Tantrix(TM) Rotation Puzzle Problems are
NP-Complete via Parsimonious Reductions | 30 pages, 25 figures | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Holzer and Holzer (Discrete Applied Mathematics 144(3):345--358, 2004) proved
that the Tantrix(TM) rotation puzzle problem with four colors is NP-complete,
and they showed that the infinite variant of this problem is undecidable. In
this paper, we study the three-color and two-color Tantrix(TM) rotation puzzle
problems (3-TRP and 2-TRP) and their variants. Restricting the number of
allowed colors to three (respectively, to two) reduces the set of available
Tantrix(TM) tiles from 56 to 14 (respectively, to 8). We prove that 3-TRP and
2-TRP are NP-complete, which answers a question raised by Holzer and Holzer in
the affirmative. Since our reductions are parsimonious, it follows that the
problems Unique-3-TRP and Unique-2-TRP are DP-complete under randomized
reductions. We also show that the another-solution problems associated with
4-TRP, 3-TRP, and 2-TRP are NP-complete. Finally, we prove that the infinite
variants of 3-TRP and 2-TRP are undecidable.
| [
{
"version": "v1",
"created": "Mon, 12 Nov 2007 17:44:45 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Nov 2007 21:22:14 GMT"
},
{
"version": "v3",
"created": "Mon, 9 Jun 2008 12:26:34 GMT"
}
] | 2008-06-09T00:00:00 | [
[
"Baumeister",
"Dorothea",
""
],
[
"Rothe",
"Joerg",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0711.1856 | Sumanth Gangasani | Sumanth Kumar Reddy Gangasani | Testing Kak's Conjecture on Binary Reciprocal of Primes and
Cryptographic Applications | 5 pages, 4 figures | null | null | null | cs.CR | null | This note considers reciprocal of primes in binary representation and shows
that the conjecture that 0s exceed 1s in most cases continues to hold for
primes less one million. The conjecture has also been tested for ternary
representation with similar results. Some applications of this result to
cryptography are discussed.
| [
{
"version": "v1",
"created": "Mon, 12 Nov 2007 23:48:53 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Jan 2008 21:24:44 GMT"
}
] | 2008-01-02T00:00:00 | [
[
"Gangasani",
"Sumanth Kumar Reddy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0711.1890 | Martin Haenggi | Martin Haenggi | A Geometric Interpretation of Fading in Wireless Networks: Theory and
Applications | 24 pages, 8 figures | null | null | null | cs.IT math.IT | null | In wireless networks with random node distribution, the underlying point
process model and the channel fading process are usually considered separately.
A unified framework is introduced that permits the geometric characterization
of fading by incorporating the fading process into the point process model.
Concretely, assuming nodes are distributed in a stationary Poisson point
process in $\R^d$, the properties of the point processes that describe the path
loss with fading are analyzed. The main applications are connectivity and
broadcasting.
| [
{
"version": "v1",
"created": "Mon, 12 Nov 2007 23:07:09 GMT"
}
] | 2007-11-14T00:00:00 | [
[
"Haenggi",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.1986 | Andrea Abrardo | Andrea Abrardo | Performance bounds and codes design criteria for channel decoding with
a-priori information | 21 pages, 9 figures | null | null | null | cs.IT math.IT | null | In this article we focus on the problem of channel decoding in presence of
a-priori information. In particular, assuming that the a-priori information
reliability is not perfectly estimated at the receiver, we derive a novel
analytical framework for evaluating the decoder's performance. It is derived
the important result that a "good code", i.e., a code which allows to fully
exploit the potential benefit of a-priori information, must associate
information sequences with high Hamming weights to codewords with low Hamming
weights. Basing on the proposed analysis, we analyze the performance of
convolutional codes, random codes, and turbo codes. Moreover, we consider the
transmission of correlated binary sources from independent nodes, a problem
which has several practical applications, e.g. in the case of sensor networks.
In this context, we propose a very simple joint source-channel turbo decoding
scheme where each decoder works by exploiting a-priori information given by the
other decoder. In the case of block fading channels, it is shown that the
inherent correlation between information signals provide a form of
non-cooperative diversity, thus allowing joint source-channel decoding to
outperform separation-based schemes.
| [
{
"version": "v1",
"created": "Tue, 13 Nov 2007 14:22:32 GMT"
}
] | 2007-11-14T00:00:00 | [
[
"Abrardo",
"Andrea",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.1993 | Michel Grabisch | Aoi Honda, Michel Grabisch (CES) | Entropy of capacities on lattices and set systems | null | Information Sciences 176 (2006) 3472-3489 | null | null | cs.DM math.ST stat.TH | null | We propose a definition for the entropy of capacities defined on lattices.
Classical capacities are monotone set functions and can be seen as a
generalization of probability measures. Capacities on lattices address the
general case where the family of subsets is not necessarily the Boolean lattice
of all subsets. Our definition encompasses the classical definition of Shannon
for probability measures, as well as the entropy of Marichal defined for
classical capacities. Some properties and examples are given.
| [
{
"version": "v1",
"created": "Tue, 13 Nov 2007 14:43:15 GMT"
}
] | 2007-11-14T00:00:00 | [
[
"Honda",
"Aoi",
"",
"CES"
],
[
"Grabisch",
"Michel",
"",
"CES"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0711.2010 | Reiner Czerwinski | Reiner Czerwinski | A Polynomial Time Algorithm for Graph Isomorphism | null | null | null | null | cs.CC | http://creativecommons.org/licenses/by/4.0/ | We claimed that there is a polynomial algorithm to test if two graphs are
isomorphic. But the algorithm is wrong. It only tests if the adjacency matrices
of two graphs have the same eigenvalues. There is a counterexample of two
non-isomorphic graphs with the same eigenvalues.
| [
{
"version": "v1",
"created": "Tue, 13 Nov 2007 15:51:33 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Nov 2007 20:23:00 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Dec 2007 14:51:55 GMT"
},
{
"version": "v4",
"created": "Wed, 23 Jan 2008 15:10:16 GMT"
},
{
"version": "v5",
"created": "Sat, 15 Oct 2022 15:56:47 GMT"
}
] | 2022-10-18T00:00:00 | [
[
"Czerwinski",
"Reiner",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0711.2023 | Peter Turney | Peter D. Turney (National Research Council of Canada) | Empirical Evaluation of Four Tensor Decomposition Algorithms | related work available at http://purl.org/peter.turney/ | null | null | ERB-1152, NRC-49877 | cs.LG cs.CL cs.IR | null | Higher-order tensor decompositions are analogous to the familiar Singular
Value Decomposition (SVD), but they transcend the limitations of matrices
(second-order tensors). SVD is a powerful tool that has achieved impressive
results in information retrieval, collaborative filtering, computational
linguistics, computational vision, and other fields. However, SVD is limited to
two-dimensional arrays of data (two modes), and many potential applications
have three or more modes, which require higher-order tensor decompositions.
This paper evaluates four algorithms for higher-order tensor decomposition:
Higher-Order Singular Value Decomposition (HO-SVD), Higher-Order Orthogonal
Iteration (HOOI), Slice Projection (SP), and Multislice Projection (MP). We
measure the time (elapsed run time), space (RAM and disk space requirements),
and fit (tensor reconstruction accuracy) of the four algorithms, under a
variety of conditions. We find that standard implementations of HO-SVD and HOOI
do not scale up to larger tensors, due to increasing RAM requirements. We
recommend HOOI for tensors that are small enough for the available RAM and MP
for larger tensors.
| [
{
"version": "v1",
"created": "Tue, 13 Nov 2007 16:28:47 GMT"
}
] | 2007-11-14T00:00:00 | [
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0711.2050 | Hacene Belbachir | Kenza Guenda | Two Families of Quantum Codes Derived from Cyclic Codes | null | null | null | null | cs.IT math.IT | null | We characterize the affine-invariant maximal extended cyclic codes. Then by
the CSS construction, we derive from these codes a family of pure quantum
codes. Also for ordnq even, a new family of degenerate quantum stabilizer codes
is derived from the classical duadic codes. This answer an open problem asked
by Aly et al.
| [
{
"version": "v1",
"created": "Tue, 13 Nov 2007 19:06:43 GMT"
}
] | 2007-11-14T00:00:00 | [
[
"Guenda",
"Kenza",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.2058 | Igor M. Suslov | I. M. Suslov (P.L.Kapitza Institute for Physical Problems, Moscow,
Russia) | Computer Model of a "Sense of Humour". I. General Algorithm | 10 pages, 3 figures included; continuation of this series to appear | Biofizika SSSR 37, 318 (1992) [Biophysics 37, 242 (1992)] | null | null | q-bio.NC cs.AI | null | A computer model of a "sense of humour" is proposed. The humorous effect is
interpreted as a specific malfunction in the course of information processing
due to the need for the rapid deletion of the false version transmitted into
consciousness. The biological function of a sense of humour consists in
speeding up the bringing of information into consciousness and in fuller use of
the resources of the brain.
| [
{
"version": "v1",
"created": "Tue, 13 Nov 2007 19:00:32 GMT"
}
] | 2007-11-27T00:00:00 | [
[
"Suslov",
"I. M.",
"",
"P.L.Kapitza Institute for Physical Problems, Moscow,\n Russia"
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0711.2061 | Igor M. Suslov | I. M. Suslov (P.L.Kapitza Institute for Physical Problems, Moscow,
Russia) | Computer Model of a "Sense of Humour". II. Realization in Neural
Networks | 13 pages, 5 figures included; continuation of this series to appear | Biofizika SSSR 37, 325 (1992) [Biophysics 37, 249 (1992)] | null | null | q-bio.NC cs.AI | null | The computer realization of a "sense of humour" requires the creation of an
algorithm for solving the "linguistic problem", i.e. the problem of recognizing
a continuous sequence of polysemantic images. Such algorithm may be realized in
the Hopfield model of a neural network after its proper modification.
| [
{
"version": "v1",
"created": "Tue, 13 Nov 2007 20:15:10 GMT"
}
] | 2007-11-27T00:00:00 | [
[
"Suslov",
"I. M.",
"",
"P.L.Kapitza Institute for Physical Problems, Moscow,\n Russia"
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0711.2062 | Thomas Sandholm | Thomas Sandholm | Autoregressive Time Series Forecasting of Computational Demand | null | null | null | null | cs.DC | null | We study the predictive power of autoregressive moving average models when
forecasting demand in two shared computational networks, PlanetLab and Tycoon.
Demand in these networks is very volatile, and predictive techniques to plan
usage in advance can improve the performance obtained drastically.
Our key finding is that a random walk predictor performs best for
one-step-ahead forecasts, whereas ARIMA(1,1,0) and adaptive exponential
smoothing models perform better for two and three-step-ahead forecasts. A Monte
Carlo bootstrap test is proposed to evaluate the continuous prediction
performance of different models with arbitrary confidence and statistical
significance levels. Although the prediction results differ between the Tycoon
and PlanetLab networks, we observe very similar overall statistical properties,
such as volatility dynamics.
| [
{
"version": "v1",
"created": "Wed, 14 Nov 2007 00:57:13 GMT"
}
] | 2007-11-15T00:00:00 | [
[
"Sandholm",
"Thomas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0711.2087 | Edna Ruckhaus | Edna Ruckhaus, Eduardo Ruiz, Maria-Esther Vidal | Query Evaluation and Optimization in the Semantic Web | 18 pages, 8 figures, 7 tables. Presented at the ALPSWS2006 First
International Workshop on Applications of Logic Programming in the Semantic
Web and Semantic Web Services where it got a "Best Paper Award". To appear in
Theory and Practice of Logic Programming (TPLP) | null | null | null | cs.DB cs.LO | null | We address the problem of answering Web ontology queries efficiently. An
ontology is formalized as a Deductive Ontology Base (DOB), a deductive database
that comprises the ontology's inference axioms and facts. A cost-based query
optimization technique for DOB is presented. A hybrid cost model is proposed to
estimate the cost and cardinality of basic and inferred facts. Cardinality and
cost of inferred facts are estimated using an adaptive sampling technique,
while techniques of traditional relational cost models are used for estimating
the cost of basic facts and conjunctive ontology queries. Finally, we implement
a dynamic-programming optimization algorithm to identify query evaluation plans
that minimize the number of intermediate inferred facts. We modeled a subset of
the Web ontology language OWL Lite as a DOB, and performed an experimental
study to analyze the predictive capacity of our cost model and the benefits of
the query optimization technique. Our study has been conducted over synthetic
and real-world OWL ontologies, and shows that the techniques are accurate and
improve query performance. To appear in Theory and Practice of Logic
Programming (TPLP).
| [
{
"version": "v1",
"created": "Tue, 13 Nov 2007 22:31:09 GMT"
}
] | 2007-11-15T00:00:00 | [
[
"Ruckhaus",
"Edna",
""
],
[
"Ruiz",
"Eduardo",
""
],
[
"Vidal",
"Maria-Esther",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0711.2102 | Gil Shamir | Gil I. Shamir | Patterns of i.i.d. Sequences and Their Entropy - Part II: Bounds for
Some Distributions | null | null | null | null | cs.IT math.IT | null | A pattern of a sequence is a sequence of integer indices with each index
describing the order of first occurrence of the respective symbol in the
original sequence. In a recent paper, tight general bounds on the block entropy
of patterns of sequences generated by independent and identically distributed
(i.i.d.) sources were derived. In this paper, precise approximations are
provided for the pattern block entropies for patterns of sequences generated by
i.i.d. uniform and monotonic distributions, including distributions over the
integers, and the geometric distribution. Numerical bounds on the pattern block
entropies of these distributions are provided even for very short blocks. Tight
bounds are obtained even for distributions that have infinite i.i.d. entropy
rates. The approximations are obtained using general bounds and their
derivation techniques. Conditional index entropy is also studied for
distributions over smaller alphabets.
| [
{
"version": "v1",
"created": "Wed, 14 Nov 2007 02:13:15 GMT"
}
] | 2007-11-15T00:00:00 | [
[
"Shamir",
"Gil I.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.2104 | Arthur Cunha | Arthur Cunha, Minh Do, and Martin Vetterli | On the Information Rates of the Plenoptic Function | submitted to IEEE Transactions in Information Theory | null | null | null | cs.IT cs.CV math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The {\it plenoptic function} (Adelson and Bergen, 91) describes the visual
information available to an observer at any point in space and time. Samples of
the plenoptic function (POF) are seen in video and in general visual content,
and represent large amounts of information. In this paper we propose a
stochastic model to study the compression limits of the plenoptic function. In
the proposed framework, we isolate the two fundamental sources of information
in the POF: the one representing the camera motion and the other representing
the information complexity of the "reality" being acquired and transmitted. The
sources of information are combined, generating a stochastic process that we
study in detail. We first propose a model for ensembles of realities that do
not change over time. The proposed model is simple in that it enables us to
derive precise coding bounds in the information-theoretic sense that are sharp
in a number of cases of practical interest. For this simple case of static
realities and camera motion, our results indicate that coding practice is in
accordance with optimal coding from an information-theoretic standpoint. The
model is further extended to account for visual realities that change over
time. We derive bounds on the lossless and lossy information rates for this
dynamic reality model, stating conditions under which the bounds are tight.
Examples with synthetic sources suggest that in the presence of scene dynamics,
simple hybrid coding using motion/displacement estimation with DPCM performs
considerably suboptimally relative to the true rate-distortion bound.
| [
{
"version": "v1",
"created": "Wed, 14 Nov 2007 02:54:22 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Nov 2007 02:53:30 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Aug 2009 18:11:32 GMT"
}
] | 2009-08-08T00:00:00 | [
[
"Cunha",
"Arthur",
""
],
[
"Do",
"Minh",
""
],
[
"Vetterli",
"Martin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0711.2112 | Michel Grabisch | Michel Grabisch (CES), Christophe Labreuche (TRT) | Bi-capacities -- Part II: the Choquet integral | null | Fuzzy Sets and Systems (2005) 237-259 | null | null | cs.DM cs.GT | null | Bi-capacities arise as a natural generalization of capacities (or fuzzy
measures) in a context of decision making where underlying scales are bipolar.
They are able to capture a wide variety of decision behaviours, encompassing
models such as Cumulative Prospect Theory (CPT). The aim of this paper in two
parts is to present the machinery behind bi-capacities, and thus remains on a
rather theoretical level, although some parts are firmly rooted in decision
theory, notably cooperative game theory. The present second part focuses on the
definition of Choquet integral. We give several expressions of it, including an
expression w.r.t. the M\"obius transform. This permits to express the Choquet
integral for 2-additive bi-capacities w.r.t. the interaction index.
| [
{
"version": "v1",
"created": "Wed, 14 Nov 2007 06:11:57 GMT"
}
] | 2007-11-15T00:00:00 | [
[
"Grabisch",
"Michel",
"",
"CES"
],
[
"Labreuche",
"Christophe",
"",
"TRT"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0711.2114 | Michel Grabisch | Michel Grabisch (CES), Christophe Labreuche (TRT) | Bi-capacities -- Part I: definition, M\"obius transform and interaction | null | Fuzzy Sets and Systems (2005) 211-236 | null | null | cs.DM cs.GT | null | Bi-capacities arise as a natural generalization of capacities (or fuzzy
measures) in a context of decision making where underlying scales are bipolar.
They are able to capture a wide variety of decision behaviours, encompassing
models such as Cumulative Prospect Theory (CPT). The aim of this paper in two
parts is to present the machinery behind bi-capacities, and thus remains on a
rather theoretical level, although some parts are firmly rooted in decision
theory, notably cooperative game theory. The present first part is devoted to
the introduction of bi-capacities and the structure on which they are defined.
We define the M\"obius transform of bi-capacities, by just applying the well
known theory of M\" obius functions as established by Rota to the particular
case of bi-capacities. Then, we introduce derivatives of bi-capacities, by
analogy with what was done for pseudo-Boolean functions (another view of
capacities and set functions), and this is the key point to introduce the
Shapley value and the interaction index for bi-capacities. This is done in a
cooperative game theoretic perspective. In summary, all familiar notions used
for fuzzy measures are available in this more general framework.
| [
{
"version": "v1",
"created": "Wed, 14 Nov 2007 06:15:05 GMT"
}
] | 2007-11-15T00:00:00 | [
[
"Grabisch",
"Michel",
"",
"CES"
],
[
"Labreuche",
"Christophe",
"",
"TRT"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0711.2115 | Michel Grabisch | Michel Grabisch (CES), Christophe Labreuche (TRT) | Derivative of functions over lattices as a basis for the notion of
interaction between attributes | null | Annals of Mathematics and Artificial Intelligence 49 (2007)
151-170 | null | null | cs.DM cs.GT | null | The paper proposes a general notion of interaction between attributes, which
can be applied to many fields in decision making and data analysis. It
generalizes the notion of interaction defined for criteria modelled by
capacities, by considering functions defined on lattices. For a given problem,
the lattice contains for each attribute the partially ordered set of remarkable
points or levels. The interaction is based on the notion of derivative of a
function defined on a lattice, and appears as a generalization of the Shapley
value or other probabilistic values.
| [
{
"version": "v1",
"created": "Wed, 14 Nov 2007 06:15:49 GMT"
}
] | 2007-11-15T00:00:00 | [
[
"Grabisch",
"Michel",
"",
"CES"
],
[
"Labreuche",
"Christophe",
"",
"TRT"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0711.2116 | Frederic Vignat | Fr\'ed\'eric Vignat (LGS), Fran\c{c}ois Villeneuve (LGS) | A numerical approach for 3D manufacturing tolerances synthesis | null | Dans Proceedings of the 10th CIRP International Seminar on
Computer Aided Tolerancing - 10th CIRP International Seminar on Computer
Aided Tolerancing, Erlangen : Allemagne (2007) | null | null | cs.CE | null | Making a product conform to the functional requirements indicated by the
customer suppose to be able to manage the manufacturing process chosen to
realise the parts. A simulation step is generally performed to verify that the
expected generated deviations fit with these requirements. It is then necessary
to assess the actual deviations of the process in progress. This is usually
done by the verification of the conformity of the workpiece to manufacturing
tolerances at the end of each set-up. It is thus necessary to determine these
manufacturing tolerances. This step is called "manufacturing tolerance
synthesis". In this paper, a numerical method is proposed to perform 3D
manufacturing tolerances synthesis. This method uses the result of the
numerical analysis of tolerances to determine influent mall displacement of
surfaces. These displacements are described by small displacements torsors. An
algorithm is then proposed to determine suitable ISO manufacturing tolerances.
| [
{
"version": "v1",
"created": "Wed, 14 Nov 2007 06:21:17 GMT"
}
] | 2007-11-15T00:00:00 | [
[
"Vignat",
"Frédéric",
"",
"LGS"
],
[
"Villeneuve",
"François",
"",
"LGS"
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0711.2155 | Stijn Heymans | Stijn Heymans, Jos de Bruijn, Livia Predoiu, Cristina Feier, Davy Van
Nieuwenborgh | Guarded Hybrid Knowledge Bases | 18 pages | null | null | null | cs.LO | null | Recently, there has been a lot of interest in the integration of Description
Logics and rules on the Semantic Web.We define guarded hybrid knowledge bases
(or g-hybrid knowledge bases) as knowledge bases that consist of a Description
Logic knowledge base and a guarded logic program, similar to the DL+log
knowledge bases from (Rosati 2006). G-hybrid knowledge bases enable an
integration of Description Logics and Logic Programming where, unlike in other
approaches, variables in the rules of a guarded program do not need to appear
in positive non-DL atoms of the body, i.e. DL atoms can act as guards as well.
Decidability of satisfiability checking of g-hybrid knowledge bases is shown
for the particular DL DLRO, which is close to OWL DL, by a reduction to guarded
programs under the open answer set semantics. Moreover, we show
2-EXPTIME-completeness for satisfiability checking of such g-hybrid knowledge
bases. Finally, we discuss advantages and disadvantages of our approach
compared with DL+log knowledge bases.
| [
{
"version": "v1",
"created": "Wed, 14 Nov 2007 10:49:56 GMT"
}
] | 2007-11-15T00:00:00 | [
[
"Heymans",
"Stijn",
""
],
[
"de Bruijn",
"Jos",
""
],
[
"Predoiu",
"Livia",
""
],
[
"Feier",
"Cristina",
""
],
[
"Van Nieuwenborgh",
"Davy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.