id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0711.2157
Bodo Manthey
Bodo Manthey
On Approximating Multi-Criteria TSP
Preliminary version at STACS 2009. This paper is a revised full version, where some proofs are simplified
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present approximation algorithms for almost all variants of the multi-criteria traveling salesman problem (TSP). First, we devise randomized approximation algorithms for multi-criteria maximum traveling salesman problems (Max-TSP). For multi-criteria Max-STSP, where the edge weights have to be symmetric, we devise an algorithm with an approximation ratio of 2/3 - eps. For multi-criteria Max-ATSP, where the edge weights may be asymmetric, we present an algorithm with a ratio of 1/2 - eps. Our algorithms work for any fixed number k of objectives. Furthermore, we present a deterministic algorithm for bi-criteria Max-STSP that achieves an approximation ratio of 7/27. Finally, we present a randomized approximation algorithm for the asymmetric multi-criteria minimum TSP with triangle inequality Min-ATSP. This algorithm achieves a ratio of log n + eps.
[ { "version": "v1", "created": "Wed, 14 Nov 2007 10:53:49 GMT" }, { "version": "v2", "created": "Wed, 19 Nov 2008 09:20:10 GMT" }, { "version": "v3", "created": "Wed, 13 Jul 2011 12:29:45 GMT" } ]
2011-07-14T00:00:00
[ [ "Manthey", "Bodo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0711.2239
Guillaume Thomann
Guillaume Thomann (LGS), Jean Caelen (LIG), Morgan Verdier (LGS), Brigitte Meillon (LIG)
Mise en place de sc\'enarios pour la conception d'outils en Chirurgie Minimalement Invasive
null
Les Syst\`emes de Production, Lavoisier (Ed.) (2007) 93-107
null
null
cs.HC
null
Nowadays, more and more surgical interventions are carried out in Minimally Invasive Surgery, to make the post-operative constraints less painful for the patient. Actually, new surgical tools or medical products are designed after informal discussions between surgeons and designers. The user requirements documents are the main document used by the mechanical designers to design and improve the product. Medical terms, often used by surgeons and employed to explain their needs, don't allow for an instantaneous understanding by designers. Unfortunately, this relation causes a dysfunction in the definition cycle of the product. Our aim is to work on the design process, its assistance thanks to methods and tools and on its organisation for better understandings and more complementarities between surgeons and designers. We propose on this article a design method already tested in the informatics domain: User Centred Design which takes the user into account more effectively in the process design. We already propose a scenario oriented design method centred on the user and represented as a scenario (Scenario-Based Design). We start in this article by clarifying these concepts before detailing their implementation for the design of a new surgical tool.
[ { "version": "v1", "created": "Wed, 14 Nov 2007 16:18:42 GMT" } ]
2007-11-19T00:00:00
[ [ "Thomann", "Guillaume", "", "LGS" ], [ "Caelen", "Jean", "", "LIG" ], [ "Verdier", "Morgan", "", "LGS" ], [ "Meillon", "Brigitte", "", "LIG" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0711.2270
Igor M. Suslov
I. M. Suslov (P.L.Kapitza Institute for Physical Problems, Moscow, Russia)
Can a Computer Laugh ?
English translation of the paper in Russian; 18 pages, 6 figures included
Computer Chronicle (Moscow), 1994, issue 1, p.1
null
null
cs.CL cs.AI q-bio.NC
null
A computer model of "a sense of humour" suggested previously [arXiv:0711.2058,0711.2061], relating the humorous effect with a specific malfunction in information processing, is given in somewhat different exposition. Psychological aspects of humour are elaborated more thoroughly. The mechanism of laughter is formulated on the more general level. Detailed discussion is presented for the higher levels of information processing, which are responsible for a perception of complex samples of humour. Development of a sense of humour in the process of evolution is discussed.
[ { "version": "v1", "created": "Wed, 14 Nov 2007 18:32:09 GMT" } ]
2007-11-27T00:00:00
[ [ "Suslov", "I. M.", "", "P.L.Kapitza Institute for Physical Problems, Moscow,\n Russia" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" } ]
0711.2383
Barbara Cerato
Barbara Cerato, Guido Masera and Emanuele Viterbo
Decoding the Golden Code: a VLSI design
25 pages, 10 figures
null
null
null
cs.AR
null
The recently proposed Golden code is an optimal space-time block code for 2 X 2 multiple-input multiple-output (MIMO) systems. The aim of this work is the design of a VLSI decoder for a MIMO system coded with the Golden code. The architecture is based on a rearrangement of the sphere decoding algorithm that achieves maximum-likelihood (ML) decoding performance. Compared to other approaces, the proposed solution exhibits an inherent flexibility in terms of modulation schemes QAM modulation size and this makes our architecture particularly suitable for adaptive modulation schemes.
[ { "version": "v1", "created": "Thu, 15 Nov 2007 11:55:30 GMT" } ]
2007-11-16T00:00:00
[ [ "Cerato", "Barbara", "" ], [ "Masera", "Guido", "" ], [ "Viterbo", "Emanuele", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0711.2399
Alexander Tiskin
Vladimir Deineko and Alexander Tiskin
Minimum-weight double-tree shortcutting for Metric TSP: Bounding the approximation ratio
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Metric Traveling Salesman Problem (TSP) is a classical NP-hard optimization problem. The double-tree shortcutting method for Metric TSP yields an exponentially-sized space of TSP tours, each of which approximates the optimal solution within at most a factor of 2. We consider the problem of finding among these tours the one that gives the closest approximation, i.e.\ the \emph{minimum-weight double-tree shortcutting}. Previously, we gave an efficient algorithm for this problem, and carried out its experimental analysis. In this paper, we address the related question of the worst-case approximation ratio for the minimum-weight double-tree shortcutting method. In particular, we give lower bounds on the approximation ratio in some specific metric spaces: the ratio of 2 in the discrete shortest path metric, 1.622 in the planar Euclidean metric, and 1.666 in the planar Minkowski metric. The first of these lower bounds is tight; we conjecture that the other two bounds are also tight, and in particular that the minimum-weight double-tree method provides a 1.622-approximation for planar Euclidean TSP.
[ { "version": "v1", "created": "Thu, 15 Nov 2007 13:19:01 GMT" }, { "version": "v2", "created": "Tue, 16 Dec 2008 11:58:25 GMT" }, { "version": "v3", "created": "Sun, 28 Dec 2008 17:28:18 GMT" } ]
2008-12-30T00:00:00
[ [ "Deineko", "Vladimir", "" ], [ "Tiskin", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0711.2442
Li Rong
Zhisheng Duan, Wenxu Wang, Chao Liu and Guanrong Chen
Are networks with more edges easier to synchronize?
14 pages, 18 figures
null
null
null
cs.NI
null
In this paper, the relationship between the network synchronizability and the edge distribution of its associated graph is investigated. First, it is shown that adding one edge to a cycle definitely decreases the network sychronizability. Then, since sometimes the synchronizability can be enhanced by changing the network structure, the question of whether the networks with more edges are easier to synchronize is addressed. It is shown by examples that the answer is negative. This reveals that generally there are redundant edges in a network, which not only make no contributions to synchronization but actually may reduce the synchronizability. Moreover, an example shows that the node betweenness centrality is not always a good indicator for the network synchronizability. Finally, some more examples are presented to illustrate how the network synchronizability varies following the addition of edges, where all the examples show that the network synchronizability globally increases but locally fluctuates as the number of added edges increases.
[ { "version": "v1", "created": "Thu, 15 Nov 2007 15:34:55 GMT" } ]
2007-11-16T00:00:00
[ [ "Duan", "Zhisheng", "" ], [ "Wang", "Wenxu", "" ], [ "Liu", "Chao", "" ], [ "Chen", "Guanrong", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0711.2444
Richard Moot
Richard Moot (INRIA Futurs, Labri)
Proof nets for display logic
null
null
null
null
cs.CL
null
This paper explores several extensions of proof nets for the Lambek calculus in order to handle the different connectives of display logic in a natural way. The new proof net calculus handles some recent additions to the Lambek vocabulary such as Galois connections and Grishin interactions. It concludes with an exploration of the generative capacity of the Lambek-Grishin calculus, presenting an embedding of lexicalized tree adjoining grammars into the Lambek-Grishin calculus.
[ { "version": "v1", "created": "Thu, 15 Nov 2007 15:39:48 GMT" } ]
2007-11-16T00:00:00
[ [ "Moot", "Richard", "", "INRIA Futurs, Labri" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0711.2478
Vasileios Barmpoutis
Vasileios Barmpoutis, Gary F. Dargush
A Compact Self-organizing Cellular Automata-based Genetic Algorithm
24 pages, 18 figures, Submitted to Evolutionary Computation
null
null
null
cs.NE cs.AI
null
A Genetic Algorithm (GA) is proposed in which each member of the population can change schemata only with its neighbors according to a rule. The rule methodology and the neighborhood structure employ elements from the Cellular Automata (CA) strategies. Each member of the GA population is assigned to a cell and crossover takes place only between adjacent cells, according to the predefined rule. Although combinations of CA and GA approaches have appeared previously, here we rely on the inherent self-organizing features of CA, rather than on parallelism. This conceptual shift directs us toward the evolution of compact populations containing only a handful of members. We find that the resulting algorithm can search the design space more efficiently than traditional GA strategies due to its ability to exploit mutations within this compact self-organizing population. Consequently, premature convergence is avoided and the final results often are more accurate. In order to reinforce the superior mutation capability, a re-initialization strategy also is implemented. Ten test functions and two benchmark structural engineering truss design problems are examined in order to demonstrate the performance of the method.
[ { "version": "v1", "created": "Thu, 15 Nov 2007 18:19:39 GMT" } ]
2007-11-16T00:00:00
[ [ "Barmpoutis", "Vasileios", "" ], [ "Dargush", "Gary F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0711.2486
Jean-Francois Boujut
Onur Hisarciklilar (LGS), Jean-Fran\c{c}ois Boujut (LGS)
An annotation based approach to support design communication
null
Dans Proceedings of ICED'07 - International Conference on Engineering Design, Paris : France (2007)
null
null
cs.HC
null
The aim of this paper is to propose an approach based on the concept of annotation for supporting design communication. In this paper, we describe a co-operative design case study where we analyse some annotation practices, mainly focused on design minutes recorded during project reviews. We point out specific requirements concerning annotation needs. Based on these requirements, we propose an annotation model, inspired from the Speech Act Theory (SAT) to support communication in a 3D digital environment. We define two types of annotations in the engineering design context, locutionary and illocutionary annotations. The annotations we describe in this paper are materialised by a set of digital artefacts, which have a semantic dimension allowing express/record elements of technical justifications, traces of contradictory debates, etc. In this paper, we first clarify the semantic annotation concept, and we define general properties of annotations in the engineering design context, and the role of annotations in different design project situations. After the description of the case study, where we observe and analyse annotations usage during the design reviews and minute making, the last section is dedicated to present our approach. We then describe the SAT concept, and define the concept of annotation acts. We conclude with a description of basic annotation functionalities that are actually implemented in a software, based on our approach.
[ { "version": "v1", "created": "Thu, 15 Nov 2007 19:22:16 GMT" } ]
2007-11-16T00:00:00
[ [ "Hisarciklilar", "Onur", "", "LGS" ], [ "Boujut", "Jean-François", "", "LGS" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0711.2489
Michel Grabisch
Pedro Miranda, Michel Grabisch (CES), Pedro Gil
Axiomatic structure of k-additive capacities
null
Mathematical Social Sciences (2005) 153-178
null
null
cs.DM
null
In this paper we deal with the problem of axiomatizing the preference relations modelled through Choquet integral with respect to a $k$-additive capacity, i.e. whose M\"obius transform vanishes for subsets of more than $k$ elements. Thus, $k$-additive capacities range from probability measures ($k=1$) to general capacities ($k=n$). The axiomatization is done in several steps, starting from symmetric 2-additive capacities, a case related to the Gini index, and finishing with general $k$-additive capacities. We put an emphasis on 2-additive capacities. Our axiomatization is done in the framework of social welfare, and complete previous results of Weymark, Gilboa and Ben Porath, and Gajdos.
[ { "version": "v1", "created": "Thu, 15 Nov 2007 19:24:22 GMT" } ]
2007-11-16T00:00:00
[ [ "Miranda", "Pedro", "", "CES" ], [ "Grabisch", "Michel", "", "CES" ], [ "Gil", "Pedro", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0711.2490
Michel Grabisch
Michel Grabisch (CES)
The M\"obius transform on symmetric ordered structures and its application to capacities on finite sets
null
Discrete Mathematics (2004) 17-34
null
null
cs.DM
null
Considering a linearly ordered set, we introduce its symmetric version, and endow it with two operations extending supremum and infimum, so as to obtain an algebraic structure close to a commutative ring. We show that imposing symmetry necessarily entails non associativity, hence computing rules are defined in order to deal with non associativity. We study in details computing rules, which we endow with a partial order. This permits to find solutions to the inversion formula underlying the M\"obius transform. Then we apply these results to the case of capacities, a notion from decision theory which corresponds, in the language of ordered sets, to order preserving mappings, preserving also top and bottom. In this case, the solution of the inversion formula is called the M\"obius transform of the capacity. Properties and examples of M\"obius transform of sup-preserving and inf-preserving capacities are given.
[ { "version": "v1", "created": "Thu, 15 Nov 2007 19:25:12 GMT" } ]
2007-11-16T00:00:00
[ [ "Grabisch", "Michel", "", "CES" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0711.2501
Neri Merhav
Neri Merhav
Error Exponents of Erasure/List Decoding Revisited via Moments of Distance Enumerators
24 pages; submitted to the IEEE Transactions on Information Theory
null
10.1109/TIT.2008.929004
null
cs.IT math.IT
null
The analysis of random coding error exponents pertaining to erasure/list decoding, due to Forney, is revisited. Instead of using Jensen's inequality as well as some other inequalities in the derivation, we demonstrate that an exponentially tight analysis can be carried out by assessing the relevant moments of a certain distance enumerator. The resulting bound has the following advantages: (i) it is at least as tight as Forney's bound, (ii) under certain symmetry conditions associated with the channel and the random coding distribution, it is simpler than Forney's bound in the sense that it involves an optimization over one parameter only (rather than two), and (iii) in certain special cases, like the binary symmetric channel (BSC), the optimum value of this parameter can be found in closed form, and so, there is no need to conduct a numerical search. We have not found yet, however, a numerical example where this new bound is strictly better than Forney's bound. This may provide an additional evidence to support Forney's conjecture that his bound is tight for the average code. We believe that the technique we suggest in this paper can be useful in simplifying, and hopefully also improving, exponential error bounds in other problem settings as well.
[ { "version": "v1", "created": "Thu, 15 Nov 2007 20:20:19 GMT" } ]
2016-11-17T00:00:00
[ [ "Merhav", "Neri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.2503
Holger Rauhut
Goetz E. Pfander, Holger Rauhut
Sparsity in time-frequency representations
null
null
null
null
math.CA cs.IT math.IT
null
We consider signals and operators in finite dimension which have sparse time-frequency representations. As main result we show that an $S$-sparse Gabor representation in $\mathbb{C}^n$ with respect to a random unimodular window can be recovered by Basis Pursuit with high probability provided that $S\leq Cn/\log(n)$. Our results are applicable to the channel estimation problem in wireless communications and they establish the usefulness of a class of measurement matrices for compressive sensing.
[ { "version": "v1", "created": "Thu, 15 Nov 2007 20:54:55 GMT" } ]
2007-11-16T00:00:00
[ [ "Pfander", "Goetz E.", "" ], [ "Rauhut", "Holger", "" ] ]
[ { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.2546
Wojciech Moczydlowski
Wojciech Moczydlowski
Normalization of IZF with Replacement
null
Logical Methods in Computer Science, Volume 4, Issue 2 (April 8, 2008) lmcs:1235
10.2168/LMCS-4(2:1)2008
null
cs.LO
null
ZF is a well investigated impredicative constructive version of Zermelo-Fraenkel set theory. Using set terms, we axiomatize IZF with Replacement, which we call \izfr, along with its intensional counterpart \iizfr. We define a typed lambda calculus $\li$ corresponding to proofs in \iizfr according to the Curry-Howard isomorphism principle. Using realizability for \iizfr, we show weak normalization of $\li$. We use normalization to prove the disjunction, numerical existence and term existence properties. An inner extensional model is used to show these properties, along with the set existence property, for full, extensional \izfr.
[ { "version": "v1", "created": "Fri, 16 Nov 2007 02:44:05 GMT" }, { "version": "v2", "created": "Tue, 8 Apr 2008 15:49:00 GMT" } ]
2019-03-14T00:00:00
[ [ "Moczydlowski", "Wojciech", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0711.2547
Syed Jafar
Viveck Cadambe, Syed A. Jafar, Shlomo Shamai (Shitz)
Interference Alignment on the Deterministic Channel and Application to Fully Connected AWGN Interference Networks
null
null
null
null
cs.IT math.IT
null
An interference alignment example is constructed for the deterministic channel model of the $K$ user interference channel. The deterministic channel example is then translated into the Gaussian setting, creating the first known example of a fully connected Gaussian $K$ user interference network with single antenna nodes, real, non-zero and contant channel coefficients, and no propagation delays where the degrees of freedom outerbound is achieved. An analogy is drawn between the propagation delay based interference alignment examples and the deterministic channel model which also allows similar constructions for the 2 user $X$ channel as well.
[ { "version": "v1", "created": "Fri, 16 Nov 2007 02:47:23 GMT" } ]
2007-11-19T00:00:00
[ [ "Cadambe", "Viveck", "", "Shitz" ], [ "Jafar", "Syed A.", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.2562
J. Maurice Rojas
Ashraf Ibrahim, J. Maurice Rojas, Korben Rusek
Algorithmic Arithmetic Fewnomial Theory I: One Variable
This paper has been withdrawn by the authors
null
null
null
math.NT cs.CC math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Withdrawn by the authors due to an error in the proof of the finite field result (Thm. 1.5): The random primes used in the proof need NOT avoid the exceptional primes from Lemma 2.7, thus leaving Thm. 1.5 unproved.
[ { "version": "v1", "created": "Fri, 16 Nov 2007 06:15:35 GMT" }, { "version": "v2", "created": "Sun, 24 Jan 2010 16:04:36 GMT" } ]
2010-01-24T00:00:00
[ [ "Ibrahim", "Ashraf", "" ], [ "Rojas", "J. Maurice", "" ], [ "Rusek", "Korben", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
0711.2585
Petteri Kaski
Andreas Bj\"orklund, Thore Husfeldt, Petteri Kaski, Mikko Koivisto
Computing the Tutte polynomial in vertex-exponential time
null
null
null
null
cs.DS cond-mat.stat-mech math.CO
null
The deletion--contraction algorithm is perhaps the most popular method for computing a host of fundamental graph invariants such as the chromatic, flow, and reliability polynomials in graph theory, the Jones polynomial of an alternating link in knot theory, and the partition functions of the models of Ising, Potts, and Fortuin--Kasteleyn in statistical physics. Prior to this work, deletion--contraction was also the fastest known general-purpose algorithm for these invariants, running in time roughly proportional to the number of spanning trees in the input graph. Here, we give a substantially faster algorithm that computes the Tutte polynomial--and hence, all the aforementioned invariants and more--of an arbitrary graph in time within a polynomial factor of the number of connected vertex sets. The algorithm actually evaluates a multivariate generalization of the Tutte polynomial by making use of an identity due to Fortuin and Kasteleyn. We also provide a polynomial-space variant of the algorithm and give an analogous result for Chung and Graham's cover polynomial. An implementation of the algorithm outperforms deletion--contraction also in practice.
[ { "version": "v1", "created": "Fri, 16 Nov 2007 10:51:10 GMT" }, { "version": "v2", "created": "Mon, 19 Nov 2007 10:41:46 GMT" }, { "version": "v3", "created": "Mon, 14 Jan 2008 16:06:31 GMT" }, { "version": "v4", "created": "Mon, 14 Apr 2008 10:31:54 GMT" } ]
2008-04-14T00:00:00
[ [ "Björklund", "Andreas", "" ], [ "Husfeldt", "Thore", "" ], [ "Kaski", "Petteri", "" ], [ "Koivisto", "Mikko", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0711.2605
Gregory Price
Gregory N. Price and Erik D. Demaine
Generalized D-Forms Have No Spurious Creases
revised
null
null
null
cs.CG
http://creativecommons.org/licenses/by/3.0/
A convex surface that is flat everywhere but on finitely many smooth curves (or "seams") and points is a seam form. We show that the only creases through the flat components of a seam form are either between vertices or tangent to the seams. As corollaries we resolve open problems about certain special seam forms: the flat components of a D-form have no creases at all, and the flat component of a pita-form has at most one crease, between the seam's endpoints.
[ { "version": "v1", "created": "Fri, 16 Nov 2007 20:58:57 GMT" }, { "version": "v2", "created": "Thu, 7 May 2009 05:45:19 GMT" } ]
2009-05-07T00:00:00
[ [ "Price", "Gregory N.", "" ], [ "Demaine", "Erik D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0711.2615
Franco Bagnoli
Franco Bagnoli, Francesca Di Patti
A Biologically Inspired Classifier
null
null
null
null
cs.DB cs.IR
null
We present a method for measuring the distance among records based on the correlations of data stored in the corresponding database entries. The original method (F. Bagnoli, A. Berrones and F. Franci. Physica A 332 (2004) 509-518) was formulated in the context of opinion formation. The opinions expressed over a set of topic originate a ``knowledge network'' among individuals, where two individuals are nearer the more similar their expressed opinions are. Assuming that individuals' opinions are stored in a database, the authors show that it is possible to anticipate an opinion using the correlations in the database. This corresponds to approximating the overlap between the tastes of two individuals with the correlations of their expressed opinions. In this paper we extend this model to nonlinear matching functions, inspired by biological problems such as microarray (probe-sample pairing). We investigate numerically the error between the correlation and the overlap matrix for eight sequences of reference with random probes. Results show that this method is particularly robust for detecting similarities in the presence of translocations.
[ { "version": "v1", "created": "Fri, 16 Nov 2007 13:38:15 GMT" } ]
2007-11-19T00:00:00
[ [ "Bagnoli", "Franco", "" ], [ "Di Patti", "Francesca", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0711.2618
Krzysztof R. Apt
Krzysztof R. Apt, Farhad Arbab, Huiye Ma
A System for Distributed Mechanisms: Design, Implementation and Applications
36 pages; revised and expanded version
null
null
null
cs.DC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe here a structured system for distributed mechanism design appropriate for both Intranet and Internet applications. In our approach the players dynamically form a network in which they know neither their neighbours nor the size of the network and interact to jointly take decisions. The only assumption concerning the underlying communication layer is that for each pair of processes there is a path of neighbours connecting them. This allows us to deal with arbitrary network topologies. We also discuss the implementation of this system which consists of a sequence of layers. The lower layers deal with the operations that implement the basic primitives of distributed computing, namely low level communication and distributed termination, while the upper layers use these primitives to implement high level communication among players, including broadcasting and multicasting, and distributed decision making. This yields a highly flexible distributed system whose specific applications are realized as instances of its top layer. This design is implemented in Java. The system supports at various levels fault-tolerance and includes a provision for distributed policing the purpose of which is to exclude `dishonest' players. Also, it can be used for repeated creation of dynamically formed networks of players interested in a joint decision making implemented by means of a tax-based mechanism. We illustrate its flexibility by discussing a number of implemented examples.
[ { "version": "v1", "created": "Fri, 16 Nov 2007 14:10:16 GMT" }, { "version": "v2", "created": "Wed, 20 Feb 2008 15:10:54 GMT" }, { "version": "v3", "created": "Mon, 11 Jan 2010 13:23:13 GMT" }, { "version": "v4", "created": "Tue, 20 Sep 2011 15:42:02 GMT" } ]
2011-09-21T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Arbab", "Farhad", "" ], [ "Ma", "Huiye", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0711.2642
Nihar Jindal
Giuseppe Caire, Nihar Jindal, Mari Kobayashi, Niranjay Ravindran
Multiuser MIMO Achievable Rates with Downlink Training and Channel State Feedback
Revised for IEEE Trans. Information Theory, May 2009. (Original submission: Nov. 2007)
null
10.1109/TIT.2010.2046225
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a MIMO fading broadcast channel and compute achievable ergodic rates when channel state information is acquired at the receivers via downlink training and it is provided to the transmitter by channel state feedback. Unquantized (analog) and quantized (digital) channel state feedback schemes are analyzed and compared under various assumptions. Digital feedback is shown to be potentially superior when the feedback channel uses per channel state coefficient is larger than 1. Also, we show that by proper design of the digital feedback link, errors in the feedback have a minor effect even if simple uncoded modulation is used on the feedback channel. We discuss first the case of an unfaded AWGN feedback channel with orthogonal access and then the case of fading MIMO multi-access (MIMO-MAC). We show that by exploiting the MIMO-MAC nature of the uplink channel, a much better scaling of the feedback channel resource with the number of base station antennas can be achieved. Finally, for the case of delayed feedback, we show that in the realistic case where the fading process has (normalized) maximum Doppler frequency shift 0 < F < 1/2, a fraction 1 - 2F of the optimal multiplexing gain is achievable. The general conclusion of this work is that very significant downlink throughput is achievable with simple and efficient channel state feedback, provided that the feedback link is properly designed.
[ { "version": "v1", "created": "Fri, 16 Nov 2007 16:04:23 GMT" }, { "version": "v2", "created": "Fri, 8 May 2009 18:51:41 GMT" } ]
2016-11-17T00:00:00
[ [ "Caire", "Giuseppe", "" ], [ "Jindal", "Nihar", "" ], [ "Kobayashi", "Mari", "" ], [ "Ravindran", "Niranjay", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.2652
Brockway McMillan
Brockway McMillan
An information-theoretic analog of a result of Perelman
null
null
null
null
math.DG cs.IT math.IT
null
Each compact manifold M of finite dimension k is differentiable and supports an intrinsic probability measure. There then exists a measurable transformation of M to the k-dimensional "surface" of the (k+1)-dimensional ball.
[ { "version": "v1", "created": "Fri, 16 Nov 2007 22:53:00 GMT" } ]
2007-11-19T00:00:00
[ [ "McMillan", "Brockway", "" ] ]
[ { "class": "Mathematics", "code": "math.DG", "description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis", "span": "(Differential Geometry)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.2666
Matthew Harrison
Matthew T. Harrison
The Generalized Asymptotic Equipartition Property: Necessary and Sufficient Conditions
19 pages
IEEE Transactions on Information Theory, (2008) 54: 3211-3216
10.1109/TIT.2008.924668
null
cs.IT math.IT
null
Suppose a string $X_1^n=(X_1,X_2,...,X_n)$ generated by a memoryless source $(X_n)_{n\geq 1}$ with distribution $P$ is to be compressed with distortion no greater than $D\geq 0$, using a memoryless random codebook with distribution $Q$. The compression performance is determined by the ``generalized asymptotic equipartition property'' (AEP), which states that the probability of finding a $D$-close match between $X_1^n$ and any given codeword $Y_1^n$, is approximately $2^{-n R(P,Q,D)}$, where the rate function $R(P,Q,D)$ can be expressed as an infimum of relative entropies. The main purpose here is to remove various restrictive assumptions on the validity of this result that have appeared in the recent literature. Necessary and sufficient conditions for the generalized AEP are provided in the general setting of abstract alphabets and unbounded distortion measures. All possible distortion levels $D\geq 0$ are considered; the source $(X_n)_{n\geq 1}$ can be stationary and ergodic; and the codebook distribution can have memory. Moreover, the behavior of the matching probability is precisely characterized, even when the generalized AEP is not valid. Natural characterizations of the rate function $R(P,Q,D)$ are established under equally general conditions.
[ { "version": "v1", "created": "Fri, 16 Nov 2007 18:58:45 GMT" } ]
2013-01-18T00:00:00
[ [ "Harrison", "Matthew T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.2671
Himanshu Thapliyal
Himanshu Thapliyal, Hamid R. Arabnia, Rajnish Bajpai, Kamal K. Sharma
Combined Integer and Variable Precision (CIVP) Floating Point Multiplication Architecture for FPGAs
Published in Proceedings of the 2007 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'07), Las Vegas, U.S.A, June 2007, Volume 1, pp. 449-450.(CSREA Press)
null
null
null
cs.AR
null
In this paper, we propose an architecture/methodology for making FPGAs suitable for integer as well as variable precision floating point multiplication. The proposed work will of great importance in applications which requires variable precision floating point multiplication such as multi-media processing applications. In the proposed architecture/methodology, we propose the replacement of existing 18x18 bit and 25x18 bit dedicated multipliers in FPGAs with dedicated 24x24 bit and 24x9 bit multipliers, respectively. We have proved that our approach of providing the dedicated 24x24 bit and 24x9 bit multipliers in FPGAs will make them efficient for performing integer as well as single precision, double precision, and Quadruple precision floating point multiplications.
[ { "version": "v1", "created": "Fri, 16 Nov 2007 20:18:32 GMT" } ]
2007-11-19T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Arabnia", "Hamid R.", "" ], [ "Bajpai", "Rajnish", "" ], [ "Sharma", "Kamal K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0711.2674
Himanshu Thapliyal
Himanshu Thapliyal, Hamid R. Arabnia, Rajnish Bajpai, Kamal K. Sharma
Partial Reversible Gates(PRG) for Reversible BCD Arithmetic
Published in Proceedings of the 2007 International Conference on Computer Design(CDES'07), Las Vegas, U.S.A, June 2007, pp. 90-91(CSREA Press)
null
null
null
cs.AR
null
IEEE 754r is the ongoing revision to the IEEE 754 floating point standard and a major enhancement to the standard is the addition of decimal format. Furthermore, in the recent years reversible logic has emerged as a promising computing paradigm having its applications in low power CMOS, quantum computing, nanotechnology, and optical computing. The major goal in reversible logic is to minimize the number of reversible gates and garbage outputs. Thus, this paper proposes the novel concept of partial reversible gates that will satisfy the reversibility criteria for specific cases in BCD arithmetic. The partial reversible gate is proposed to minimize the number of reversible gates and garbage outputs, while designing the reversible BCD arithmetic circuits.
[ { "version": "v1", "created": "Fri, 16 Nov 2007 20:25:20 GMT" } ]
2007-11-19T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Arabnia", "Hamid R.", "" ], [ "Bajpai", "Rajnish", "" ], [ "Sharma", "Kamal K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0711.2710
Bernhard Haeupler
Bernhard Haeupler and Robert E. Tarjan
Finding a Feasible Flow in a Strongly Connected Network
4 pages, submitted to Operations Research Letters, minor updates: typos corrected, speed-up = improvement of the worst-case time bound
null
null
null
cs.DS
null
We consider the problem of finding a feasible single-commodity flow in a strongly connected network with fixed supplies and demands, provided that the sum of supplies equals the sum of demands and the minimum arc capacity is at least this sum. A fast algorithm for this problem improves the worst-case time bound of the Goldberg-Rao maximum flow method by a constant factor. Erlebach and Hagerup gave an linear-time feasible flow algorithm. We give an arguably simpler one.
[ { "version": "v1", "created": "Sat, 17 Nov 2007 01:59:53 GMT" }, { "version": "v2", "created": "Mon, 3 Dec 2007 15:34:37 GMT" } ]
2007-12-03T00:00:00
[ [ "Haeupler", "Bernhard", "" ], [ "Tarjan", "Robert E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0711.2712
Peyman Razaghi
P. Razaghi and W. Yu
Parity Forwarding for Multiple-Relay Networks
submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
This paper proposes a relaying strategy for the multiple-relay network in which each relay decodes a selection of transmitted messages by other transmitting terminals, and forwards parities of the decoded codewords. This protocol improves the previously known achievable rate of the decode-and-forward (DF) strategy for multirelay networks by allowing relays to decode only a selection of messages from relays with strong links to it. Hence, each relay may have several choices as to which messages to decode, and for a given network many different parity forwarding protocols may exist. A tree structure is devised to characterize a class of parity forwarding protocols for an arbitrary multirelay network. Based on this tree structure, closed-form expressions for the achievable rates of these DF schemes are derived. It is shown that parity forwarding is capacity achieving for new forms of degraded relay networks.
[ { "version": "v1", "created": "Sat, 17 Nov 2007 03:08:09 GMT" } ]
2007-11-20T00:00:00
[ [ "Razaghi", "P.", "" ], [ "Yu", "W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.2745
Urs Niesen
Urs Niesen, Piyush Gupta, Devavrat Shah
On Capacity Scaling in Arbitrary Wireless Networks
38 pages, 6 figures, to appear in IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, vol. 55, pp. 3959-3982, September 2009
10.1109/TIT.2009.2025537
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent work, Ozgur, Leveque, and Tse (2007) obtained a complete scaling characterization of throughput scaling for random extended wireless networks (i.e., $n$ nodes are placed uniformly at random in a square region of area $n$). They showed that for small path-loss exponents $\alpha\in(2,3]$ cooperative communication is order optimal, and for large path-loss exponents $\alpha > 3$ multi-hop communication is order optimal. However, their results (both the communication scheme and the proof technique) are strongly dependent on the regularity induced with high probability by the random node placement. In this paper, we consider the problem of characterizing the throughput scaling in extended wireless networks with arbitrary node placement. As a main result, we propose a more general novel cooperative communication scheme that works for arbitrarily placed nodes. For small path-loss exponents $\alpha \in (2,3]$, we show that our scheme is order optimal for all node placements, and achieves exactly the same throughput scaling as in Ozgur et al. This shows that the regularity of the node placement does not affect the scaling of the achievable rates for $\alpha\in (2,3]$. The situation is, however, markedly different for large path-loss exponents $\alpha >3$. We show that in this regime the scaling of the achievable per-node rates depends crucially on the regularity of the node placement. We then present a family of schemes that smoothly "interpolate" between multi-hop and cooperative communication, depending upon the level of regularity in the node placement. We establish order optimality of these schemes under adversarial node placement for $\alpha > 3$.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 19:59:52 GMT" }, { "version": "v2", "created": "Sun, 3 May 2009 01:27:28 GMT" }, { "version": "v3", "created": "Mon, 3 Aug 2009 19:00:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Niesen", "Urs", "" ], [ "Gupta", "Piyush", "" ], [ "Shah", "Devavrat", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.2749
George Bell
George I. Bell
Diamond Solitaire
11 pages, 12 figures
The Games and Puzzles Journal, Issue 41, September-October 2005 http://gpj.connectfree.co.uk/gpjw.htm
null
null
math.CO cs.DM
null
We investigate the game of peg solitaire on different board shapes, and find those of diamond or rhombus shape have interesting properties. When one peg captures many pegs consecutively, this is called a sweep. Rhombus boards of side 6 have the property that no matter which peg is missing at the start, the game can be solved to one peg using a maximal sweep of length 16. We show how to construct a solution on a rhombus board of side 6i, where the final move is a maximal sweep of length r, where r=(9i-1)(3i-1) is a "rhombic matchstick number".
[ { "version": "v1", "created": "Mon, 19 Nov 2007 16:26:32 GMT" } ]
2007-11-29T00:00:00
[ [ "Bell", "George I.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0711.2760
Vita Hinze-Hoare
Vita Hinze-Hoare
Computer Supported Collaborative Research
null
null
null
null
cs.HC
null
It is suggested that a new area of CSCR (Computer Supported Collaborative Research) is distinguished from CSCW (Computer Supported Collaborative Work) and CSCL (Computer Supported Collaborative Learning) and that the demarcation between the three areas could do with greater clarification and prescription. Although the areas of Human Computer Interaction (HCI), CSCW, and CSCL are now relatively well established, the related field of Computer Supported Collaborative Research (CSCR) is new and little understood. An analysis of the principles and issues behind CSCR is undertaken with a view to determining precisely its nature and scope and to delineate it clearly from CSCW and CSCL. This determination is such that it is generally applicable to the building, design and evaluation of collaborative research environments. A particular instance of the CSCR domain is then examined in order to determine the requirements of a collaborative research environment for students and supervisors (CRESS).
[ { "version": "v1", "created": "Sat, 17 Nov 2007 20:08:41 GMT" } ]
2007-11-20T00:00:00
[ [ "Hinze-Hoare", "Vita", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0711.2762
Shivaprasad Kotagiri
ShivaPrasad Kotagiri, J.Nicholas Laneman
Variations on Information Embedding in Multiple Access and Broadcast Channels
Submitted to Transactions on Information Theory
null
null
null
cs.IT math.IT
null
Information embedding (IE) is the transmission of information within a host signal subject to a distortion constraint. There are two types of embedding methods, namely irreversible IE and reversible IE, depending upon whether or not the host, as well as the message, is recovered at the decoder. In irreversible IE, only the embedded message is recovered at the decoder, and in reversible IE, both the message and the host are recovered at the decoder. This paper considers combinations of irreversible and reversible IE in multiple access channels (MAC) and physically degraded broadcast channels (BC).
[ { "version": "v1", "created": "Sat, 17 Nov 2007 21:57:47 GMT" } ]
2007-11-20T00:00:00
[ [ "Kotagiri", "ShivaPrasad", "" ], [ "Laneman", "J. Nicholas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.2780
Salvatore Scellato
Salvatore Scellato (Scuola Superiore di Catania), Cecilia Mascolo (Department of Computer Science, University College London), Mirco Musolesi (Department of Computer Science, Dartmouth College), Vito Latora (Dipartimento di Fisica e Astronomia, Universita' di Catania)
Epcast: Controlled Dissemination in Human-based Wireless Networks by means of Epidemic Spreading Models
null
null
null
null
cs.NI
null
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabilistic message replication and redundancy to ensure reliable communication. Moreover, they have been successfully exploited to support group communication in distributed systems, broadcasting, multicasting and information dissemination in fixed and mobile networks. However, in most of the existing work, the probability of infection is determined heuristically, without relying on any analytical model. This often leads to unnecessarily high transmission overheads. In this paper we show that models of epidemic spreading in complex networks can be applied to the problem of tuning and controlling the dissemination of information in wireless ad hoc networks composed of devices carried by individuals, i.e., human-based networks. The novelty of our idea resides in the evaluation and exploitation of the structure of the underlying human network for the automatic tuning of the dissemination process in order to improve the protocol performance. We evaluate the results using synthetic mobility models and real human contacts traces.
[ { "version": "v1", "created": "Sun, 18 Nov 2007 09:29:19 GMT" } ]
2007-11-20T00:00:00
[ [ "Scellato", "Salvatore", "", "Scuola Superiore di Catania" ], [ "Mascolo", "Cecilia", "", "Department of Computer Science, University College London" ], [ "Musolesi", "Mirco", "", "Department of Computer Science, Dartmouth College" ], [ "Latora", "Vito", "", "Dipartimento di Fisica e Astronomia, Universita' di Catania" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0711.2801
Xinjia Chen
Xinjia Chen
Inverse Sampling for Nonasymptotic Sequential Estimation of Bounded Variable Means
31 pages, 4 figures, added proofs
null
null
null
math.ST cs.LG math.PR stat.TH
null
In this paper, we consider the nonasymptotic sequential estimation of means of random variables bounded in between zero and one. We have rigorously demonstrated that, in order to guarantee prescribed relative precision and confidence level, it suffices to continue sampling until the sample sum is no less than a certain bound and then take the average of samples as an estimate for the mean of the bounded random variable. We have developed an explicit formula and a bisection search method for the determination of such bound of sample sum, without any knowledge of the bounded variable. Moreover, we have derived bounds for the distribution of sample size. In the special case of Bernoulli random variables, we have established analytical and numerical methods to further reduce the bound of sample sum and thus improve the efficiency of sampling. Furthermore, the fallacy of existing results are detected and analyzed.
[ { "version": "v1", "created": "Sun, 18 Nov 2007 17:28:23 GMT" }, { "version": "v2", "created": "Sun, 2 Dec 2007 21:59:44 GMT" } ]
2013-11-05T00:00:00
[ [ "Chen", "Xinjia", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0711.2811
Annie Bouyer
Gilles Halin (CRAI), Sylvain Kubicki (CRAI)
Une approche par les mod\`eles pour le suivi de l'activit\'e de construction d'un b\^atiment. Bat'iViews : une interface multi-vues orient\'ee gestion de chantier
null
null
null
null
cs.HC
null
Cooperation between actors in design and construction activities in architecture is an essential stake nowadays. In professional practices the actors involved in construction projects use numerous tools. The project is unique but the "views" that actors manipulate are various and sometimes fundamentally different. Their common characteristic is that they partially represent the cooperation context through a specific point of view. "Bat'iViews" suggests to the actors a multi-view interface of the context and enables to navigate through the different views. This proposition is based on a model-driven approach. We distinguish between "context modelling" and modelling of concepts represented in each "businessview". A model integrative infrastructure allows us to develop the prototype and to manage user interaction through the definition of models' transformations.
[ { "version": "v1", "created": "Sun, 18 Nov 2007 19:10:18 GMT" } ]
2007-11-20T00:00:00
[ [ "Halin", "Gilles", "", "CRAI" ], [ "Kubicki", "Sylvain", "", "CRAI" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0711.2824
Syed Jafar
Viveck R. Cadambe, Syed A. Jafar
Degrees of Freedom of Wireless X Networks
26 pages
null
null
null
cs.IT math.IT
null
We explore the degrees of freedom of $M\times N$ user wireless $X$ networks, i.e. networks of $M$ transmitters and $N$ receivers where every transmitter has an independent message for every receiver. We derive a general outerbound on the degrees of freedom \emph{region} of these networks. When all nodes have a single antenna and all channel coefficients vary in time or frequency, we show that the \emph{total} number of degrees of freedom of the $X$ network is equal to $\frac{MN}{M+N-1}$ per orthogonal time and frequency dimension. Achievability is proved by constructing interference alignment schemes for $X$ networks that can come arbitrarily close to the outerbound on degrees of freedom. For the case where either M=2 or N=2 we find that the outerbound is exactly achievable. While $X$ networks have significant degrees of freedom benefits over interference networks when the number of users is small, our results show that as the number of users increases, this advantage disappears. Thus, for large $K$, the $K\times K$ user wireless $X$ network loses half the degrees of freedom relative to the $K\times K$ MIMO outerbound achievable through full cooperation. Interestingly, when there are few transmitters sending to many receivers ($N\gg M$) or many transmitters sending to few receivers ($M\gg N$), $X$ networks are able to approach the $\min(M,N)$ degrees of freedom possible with full cooperation on the $M\times N$ MIMO channel. Similar to the interference channel, we also construct an example of a 2 user $X$ channel with propagation delays where the outerbound on degrees of freedom is achieved through interference alignment based on a simple TDMA strategy.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 00:27:49 GMT" } ]
2007-11-20T00:00:00
[ [ "Cadambe", "Viveck R.", "" ], [ "Jafar", "Syed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.2832
Annie Bouyer
Salma Chaabouni (MAP / Crai), Jc Bignon (MAP / Crai), Gilles Halin (MAP / Crai)
Premi\`ere \'etape vers une navigation r\'ef\'erentielle par l'image pour l'assistance \`a la conception des ambiances lumineuses
null
null
null
null
cs.IR
null
In the first design stage, image reference plays a double role of means of formulation and resolution of problems. In our approach, we consider image reference as a support of creation activity to generate ideas and we propose a tool for navigation in references by image in order to assist daylight ambience design. Within this paper, we present, in a first part, the semantic indexation method to be used for the indexation of our image database. In a second part we propose a synthetic analysis of various modes of referential navigation in order to propose a tool implementing all or a part of these modes.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 16:10:35 GMT" } ]
2007-11-20T00:00:00
[ [ "Chaabouni", "Salma", "", "MAP / Crai" ], [ "Bignon", "Jc", "", "MAP / Crai" ], [ "Halin", "Gilles", "", "MAP / Crai" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0711.2835
Sergey Bereg
Sergey Bereg
Faster Algorithms for Rigidity in the Plane
null
null
null
null
cs.CG
null
In [1], a new construction called red-black hierarchy characterizing Laman graphs and an algorithm for computing it were presented. For a Laman graph G=(V,E) with n vertices it runs in O(n^2) time assuming that a partition of (V,E+e) into two spanning trees is given. We show that a simple modification reduces the running time to O(n\log n). The total running time can be reduced O(n\sqrt{n\log n}) using the algorithm by Gabow and Westermann [2] for partitioning a graph into two forests. The existence of a red-black hierarchy is a necessary and sufficient condition for a graph to be a Laman graph. The algorithm for constructing a red-black hierarchy can be then modified to recognize Laman graphs in the same time.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 18:54:32 GMT" }, { "version": "v2", "created": "Fri, 29 Feb 2008 18:38:50 GMT" } ]
2008-02-29T00:00:00
[ [ "Bereg", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0711.2842
L.T. Handoko
L.T. Handoko
A new approach for scientific data dissemination in developing countries: a case of Indonesia
6 pages
Earth, Moon, and Planets 104 (2009) 331
10.1007/s11038-008-9283-6
FISIKALIPI-07020
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This short paper is intended as an additional progress report to share our experiences in Indonesia on collecting, integrating and disseminating both global and local scientific data across the country through the web technology. Our recent efforts are exerted on improving the local public access to global scientific data, and on the other hand encouraging the local scientific data to be more accessible for the global communities. We have maintained well-connected infrastructure and some web-based information management systems to realize such objectives. This paper is especially focused on introducing the ARSIP for mirroring global as well as sharing local scientific data, and the newly developed Indonesian Scientific Index for integrating local scientific data through an automated intelligent indexing system.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 04:56:33 GMT" }, { "version": "v2", "created": "Tue, 27 Nov 2007 22:58:50 GMT" }, { "version": "v3", "created": "Thu, 5 Mar 2009 08:31:06 GMT" } ]
2009-03-05T00:00:00
[ [ "Handoko", "L. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0711.2843
Xueliang Li
Xueliang Li, Xiangmei Yao, Wenli Zhou
Complexity of the conditional colorability of graphs
8 pages
null
null
null
cs.DM cs.CC
null
For an integer $r>0$, a conditional $(k,r)$-coloring of a graph $G$ is a proper $k$-coloring of the vertices of $G$ such that every vertex $v$ of degree $d(v)$ in $G$ is adjacent to vertices with at least $min\{r, d(v)\}$ different colors. The smallest integer $k$ for which a graph $G$ has a conditional $(k,r)$-coloring is called the $r$th order conditional chromatic number, denoted by $\chi_r(G)$. It is easy to see that the conditional coloring is a generalization of the traditional vertex coloring for which $r=1$. In this paper, we consider the complexity of the conditional colorings of graphs. The main result is that the conditional $(3,2)$-colorability is $NP$-complete for triangle-free graphs with maximum degree at most 3, which is different from the old result that the traditional 3-colorability is polynomial solvable for graphs with maximum degree at most 3. This also implies that it is $NP$-complete to determine if a graph of maximum degree 3 is $(3,2)$- or $(4,2)$-colorable. Also we have proved that some old complexity results for traditional colorings still hold for the conditional colorings.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 05:41:36 GMT" } ]
2007-11-20T00:00:00
[ [ "Li", "Xueliang", "" ], [ "Yao", "Xiangmei", "" ], [ "Zhou", "Wenli", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0711.2844
Xueliang Li
Xueliang Li, Wenli Zhou
Dynamic 3-Coloring of Claw-free Graphs
13 pages
null
null
null
cs.DM cs.CC
null
A {\it dynamic $k$-coloring} of a graph $G$ is a proper $k$-coloring of the vertices of $G$ such that every vertex of degree at least 2 in $G$ will be adjacent to vertices with at least 2 different colors. The smallest number $k$ for which a graph $G$ can have a dynamic $k$-coloring is the {\it dynamic chromatic number}, denoted by $\chi_d(G)$. In this paper, we investigate the dynamic 3-colorings of claw-free graphs. First, we prove that it is $NP$-complete to determine if a claw-free graph with maximum degree 3 is dynamically 3-colorable. Second, by forbidding a kind of subgraphs, we find a reasonable subclass of claw-free graphs with maximum degree 3, for which the dynamically 3-colorable problem can be solved in linear time. Third, we give a linear time algorithm to recognize this subclass of graphs, and a linear time algorithm to determine whether it is dynamically 3-colorable. We also give a linear time algorithm to color the graphs in the subclass by 3 colors.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 05:56:01 GMT" } ]
2007-11-20T00:00:00
[ [ "Li", "Xueliang", "" ], [ "Zhou", "Wenli", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0711.2867
Cristobald de Kerchove
Cristobald de Kerchove, Laure Ninove, Paul Van Dooren
Maximizing PageRank via outlinks
27 pages, 14 figures, submitted to Linear Algebra Appl
null
null
null
cs.IR math.RA
null
We analyze linkage strategies for a set I of webpages for which the webmaster wants to maximize the sum of Google's PageRank scores. The webmaster can only choose the hyperlinks starting from the webpages of I and has no control on the hyperlinks from other webpages. We provide an optimal linkage strategy under some reasonable assumptions.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 09:43:22 GMT" } ]
2007-12-04T00:00:00
[ [ "de Kerchove", "Cristobald", "" ], [ "Ninove", "Laure", "" ], [ "Van Dooren", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
0711.2873
Axel Heim
Axel Heim, Vladimir Sidorenko, Uli Sorger
Trellis Computations
9 pages, 4 figures
null
null
null
cs.IT math.IT
null
For a certain class of functions, the distribution of the function values can be calculated in the trellis or a sub-trellis. The forward/backward recursion known from the BCJR algorithm is generalized to compute the moments of these distributions. In analogy to the symbol probabilities, by introducing a constraint at a certain depth in the trellis we obtain symbol moments. These moments are required for an efficient implementation of the discriminated belief propagation algorithm in [2], and can furthermore be utilized to compute conditional entropies in the trellis. The moment computation algorithm has the same asymptotic complexity as the BCJR algorithm. It is applicable to any commutative semi-ring, thus actually providing a generalization of the Viterbi algorithm.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 09:30:51 GMT" } ]
2007-11-20T00:00:00
[ [ "Heim", "Axel", "" ], [ "Sidorenko", "Vladimir", "" ], [ "Sorger", "Uli", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.2895
Stephanie Wehner
Stephanie Wehner, Christian Schaffner, Barbara Terhal
Cryptography from Noisy Storage
13 pages RevTex, 2 figures. v2: more comments on implementation dependent attacks, v3: published version (minor changes)
Phys. Rev. Lett. 100, 220502 (2008)
10.1103/PhysRevLett.100.220502
null
quant-ph cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show how to implement cryptographic primitives based on the realistic assumption that quantum storage of qubits is noisy. We thereby consider individual-storage attacks, i.e. the dishonest party attempts to store each incoming qubit separately. Our model is similar to the model of bounded-quantum storage, however, we consider an explicit noise model inspired by present-day technology. To illustrate the power of this new model, we show that a protocol for oblivious transfer (OT) is secure for any amount of quantum-storage noise, as long as honest players can perform perfect quantum operations. Our model also allows the security of protocols that cope with noise in the operations of the honest players and achieve more advanced tasks such as secure identification.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 16:50:08 GMT" }, { "version": "v2", "created": "Thu, 29 Nov 2007 16:43:09 GMT" }, { "version": "v3", "created": "Fri, 20 Jun 2008 18:48:03 GMT" } ]
2008-06-20T00:00:00
[ [ "Wehner", "Stephanie", "" ], [ "Schaffner", "Christian", "" ], [ "Terhal", "Barbara", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0711.2897
Michael Tung M.
J. Izquierdo, M.M. Tung, R. Perez, F. J. Martinez
Estimation of fuzzy anomalies in Water Distribution Systems
5 pages
Progress in Industrial Mathematics at ECMI 2006 (edited by L. L. Bonilla, M. A. Moscoso, G. Platero, and J. M. Vega), vol. 12 of Mathematics in Industry, pp. 801-805 (Springer, Berlin, 2007), ISBN 978-3-540-71991-5
null
null
cs.NE
null
State estimation is necessary in diagnosing anomalies in Water Demand Systems (WDS). In this paper we present a neural network performing such a task. State estimation is performed by using optimization, which tries to reconcile all the available information. Quantification of the uncertainty of the input data (telemetry measures and demand predictions) can be achieved by means of robust estate estimation. Using a mathematical model of the network, fuzzy estimated states for anomalous states of the network can be obtained. They are used to train a neural network capable of assessing WDS anomalies associated with particular sets of measurements.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 11:24:47 GMT" } ]
2007-11-20T00:00:00
[ [ "Izquierdo", "J.", "" ], [ "Tung", "M. M.", "" ], [ "Perez", "R.", "" ], [ "Martinez", "F. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0711.2909
Krzysztof R. Apt
Krzysztof R. Apt, Francesca Rossi, Kristen Brent Venable
Comparing the notions of optimality in CP-nets, strategic games and soft constraints
39 pages. To appear in Annals of Mathematics and Artificial Intelligence
null
null
null
cs.AI cs.GT
null
The notion of optimality naturally arises in many areas of applied mathematics and computer science concerned with decision making. Here we consider this notion in the context of three formalisms used for different purposes in reasoning about multi-agent systems: strategic games, CP-nets, and soft constraints. To relate the notions of optimality in these formalisms we introduce a natural qualitative modification of the notion of a strategic game. We show then that the optimal outcomes of a CP-net are exactly the Nash equilibria of such games. This allows us to use the techniques of game theory to search for optimal outcomes of CP-nets and vice-versa, to use techniques developed for CP-nets to search for Nash equilibria of the considered games. Then, we relate the notion of optimality used in the area of soft constraints to that used in a generalization of strategic games, called graphical games. In particular we prove that for a natural class of soft constraints that includes weighted constraints every optimal solution is both a Nash equilibrium and Pareto efficient joint strategy. For a natural mapping in the other direction we show that Pareto efficient joint strategies coincide with the optimal solutions of soft constraints.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 12:14:27 GMT" }, { "version": "v2", "created": "Mon, 21 Apr 2008 10:47:41 GMT" } ]
2008-04-21T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Rossi", "Francesca", "" ], [ "Venable", "Kristen Brent", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0711.2914
Tshilidzi Marwala
Gidudu Anthony, Hulley Gregg and Marwala Tshilidzi
Image Classification Using SVMs: One-against-One Vs One-against-All
Proccedings of the 28th Asian Conference on Remote Sensing, 2007
null
null
null
cs.LG cs.AI cs.CV
null
Support Vector Machines (SVMs) are a relatively new supervised classification technique to the land cover mapping community. They have their roots in Statistical Learning Theory and have gained prominence because they are robust, accurate and are effective even when using a small training sample. By their nature SVMs are essentially binary classifiers, however, they can be adopted to handle the multiple classification tasks common in remote sensing studies. The two approaches commonly used are the One-Against-One (1A1) and One-Against-All (1AA) techniques. In this paper, these approaches are evaluated in as far as their impact and implication for land cover mapping. The main finding from this research is that whereas the 1AA technique is more predisposed to yielding unclassified and mixed pixels, the resulting classification accuracy is not significantly different from 1A1 approach. It is the authors conclusion therefore that ultimately the choice of technique adopted boils down to personal preference and the uniqueness of the dataset at hand.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 12:25:00 GMT" } ]
2007-11-20T00:00:00
[ [ "Anthony", "Gidudu", "" ], [ "Gregg", "Hulley", "" ], [ "Tshilidzi", "Marwala", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0711.2917
Anne-Marie Vercoustre
James A. Thom (RMIT), Jovan Pehcevski (INRIA Rocquencourt / INRIA Sophia Antipolis), Anne-Marie Vercoustre (INRIA Rocquencourt / INRIA Sophia Antipolis)
Use of Wikipedia Categories in Entity Ranking
null
Dans The 12th Australasian Document Computing Symposium (ADCS'07) (2007)
null
null
cs.IR
null
Wikipedia is a useful source of knowledge that has many applications in language processing and knowledge representation. The Wikipedia category graph can be compared with the class hierarchy in an ontology; it has some characteristics in common as well as some differences. In this paper, we present our approach for answering entity ranking queries from the Wikipedia. In particular, we explore how to make use of Wikipedia categories to improve entity ranking effectiveness. Our experiments show that using categories of example entities works significantly better than using loosely defined target categories.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 12:35:48 GMT" } ]
2007-11-20T00:00:00
[ [ "Thom", "James A.", "", "RMIT" ], [ "Pehcevski", "Jovan", "", "INRIA Rocquencourt / INRIA\n Sophia Antipolis" ], [ "Vercoustre", "Anne-Marie", "", "INRIA Rocquencourt / INRIA Sophia\n Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0711.2961
Felix Brandt
Felix Brandt, Felix Fischer, Paul Harrenstein
Recognizing Members of the Tournament Equilibrium Set is NP-hard
9 pages, 3 figures
Social Choice and Welfare 34(4), 2009
10.1007/s00355-009-0419-z
null
cs.CC cs.GT cs.MA
null
A recurring theme in the mathematical social sciences is how to select the "most desirable" elements given a binary dominance relation on a set of alternatives. Schwartz's tournament equilibrium set (TEQ) ranks among the most intriguing, but also among the most enigmatic, tournament solutions that have been proposed so far in this context. Due to its unwieldy recursive definition, little is known about TEQ. In particular, its monotonicity remains an open problem up to date. Yet, if TEQ were to satisfy monotonicity, it would be a very attractive tournament solution concept refining both the Banks set and Dutta's minimal covering set. We show that the problem of deciding whether a given alternative is contained in TEQ is NP-hard.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 15:48:46 GMT" }, { "version": "v2", "created": "Mon, 7 Jan 2008 13:47:48 GMT" } ]
2015-02-06T00:00:00
[ [ "Brandt", "Felix", "" ], [ "Fischer", "Felix", "" ], [ "Harrenstein", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0711.2971
Annie Bouyer
Sylvain Kubicki (MAP / CRAI), Annie Guerri\'ero (MAP / CRAI), Damien Hanser (MAP / CRAI), Gilles Halin (MAP / CRAI)
IT services design to support coordination practices in the Luxembourguish AEC sector
null
null
null
null
cs.HC
null
In the Architecture Engineering and Construction sector (AEC) cooperation between actors is essential for project success. The configuration of actors' organization takes different forms like the associated coordination mechanisms. Our approach consists in analyzing these coordination mechanisms through the identification of the "base practices" realized by the actors of a construction project to cooperate. We also try with practitioners to highlight the "best practices" of cooperation. Then we suggest here two prototypes of IT services aiming to demonstrate the value added of IT to support cooperation. These prototype tools allow us to sensitize the actors through terrain experiments and then to bring inch by inch the Luxembourgish AEC sector towards electronic cooperation.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 16:36:02 GMT" } ]
2007-11-20T00:00:00
[ [ "Kubicki", "Sylvain", "", "MAP / CRAI" ], [ "Guerriéro", "Annie", "", "MAP / CRAI" ], [ "Hanser", "Damien", "", "MAP / CRAI" ], [ "Halin", "Gilles", "", "MAP / CRAI" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0711.2998
Benjamin Leveque
Yannick Frein (LGS), Benjamin L\'ev\^eque (LGS), Andras Sebo (LGS)
Optimizing diversity
null
null
null
null
cs.DM
null
We consider the problem of minimizing the size of a family of sets G such that every subset of 1,...,n can be written as a disjoint union of at most k members of G, where k and n are given numbers. This problem originates in a real-world application aiming at the diversity of industrial production. At the same time, the minimum of G so that every subset of 1,...,n is the union of two sets in G has been asked by Erdos and studied recently by Furedi and Katona without requiring the disjointness of the sets. A simple construction providing a feasible solution is conjectured to be optimal for this problem for all values of n and k and regardless of the disjointness requirement; we prove this conjecture in special cases including all (n,k) for which n <= 3k holds, and some individual values of n and k.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 18:58:06 GMT" } ]
2007-11-20T00:00:00
[ [ "Frein", "Yannick", "", "LGS" ], [ "Lévêque", "Benjamin", "", "LGS" ], [ "Sebo", "Andras", "", "LGS" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0711.3013
Louis Theran
Ileana Streinu and Louis Theran
Natural realizations of sparsity matroids
Corrected some typos from the previous version; to appear in Ars Mathematica Contemporanea
null
null
null
math.CO cs.CG math.AG math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A hypergraph G with n vertices and m hyperedges with d endpoints each is (k,l)-sparse if for all sub-hypergraphs G' on n' vertices and m' edges, m'\le kn'-l. For integers k and l satisfying 0\le l\le dk-1, this is known to be a linearly representable matroidal family. Motivated by problems in rigidity theory, we give a new linear representation theorem for the (k,l)-sparse hypergraphs that is natural; i.e., the representing matrix captures the vertex-edge incidence structure of the underlying hypergraph G.
[ { "version": "v1", "created": "Mon, 19 Nov 2007 21:02:34 GMT" }, { "version": "v2", "created": "Fri, 21 Dec 2007 06:33:13 GMT" }, { "version": "v3", "created": "Wed, 9 Jan 2008 18:40:20 GMT" }, { "version": "v4", "created": "Mon, 5 Jul 2010 15:43:57 GMT" }, { "version": "v5", "created": "Mon, 20 Dec 2010 17:06:51 GMT" } ]
2010-12-21T00:00:00
[ [ "Streinu", "Ileana", "" ], [ "Theran", "Louis", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
0711.3077
Jie Luo
Jie Luo
On Low Complexity Maximum Likelihood Decoding of Convolutional Codes
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2008.2006461
null
cs.IT cs.CC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the average complexity of maximum likelihood (ML) decoding of convolutional codes. ML decoding can be modeled as finding the most probable path taken through a Markov graph. Integrated with the Viterbi algorithm (VA), complexity reduction methods such as the sphere decoder often use the sum log likelihood (SLL) of a Markov path as a bound to disprove the optimality of other Markov path sets and to consequently avoid exhaustive path search. In this paper, it is shown that SLL-based optimality tests are inefficient if one fixes the coding memory and takes the codeword length to infinity. Alternatively, optimality of a source symbol at a given time index can be testified using bounds derived from log likelihoods of the neighboring symbols. It is demonstrated that such neighboring log likelihood (NLL)-based optimality tests, whose efficiency does not depend on the codeword length, can bring significant complexity reduction to ML decoding of convolutional codes. The results are generalized to ML sequence detection in a class of discrete-time hidden Markov systems.
[ { "version": "v1", "created": "Tue, 20 Nov 2007 07:27:30 GMT" }, { "version": "v2", "created": "Thu, 22 Nov 2007 00:15:24 GMT" }, { "version": "v3", "created": "Thu, 31 Jul 2008 17:08:52 GMT" } ]
2016-11-17T00:00:00
[ [ "Luo", "Jie", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.3099
Marcello Caleffi
Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura
Augmented Tree-based Routing Protocol for Scalable Ad Hoc Networks
Routing, mobile ad hoc network, MANET, dynamic addressing, multi-path, distributed hash table, DHT
IEEE MHWMN'07: The Third IEEE International Workshop on Heterogeneous Multi-Hop Wireless and Mobile Networks 2007
10.1109/MOBHOC.2007.4428727
null
cs.NI
null
In ad hoc networks scalability is a critical requirement if these technologies have to reach their full potential. Most of the proposed routing protocols do not operate efficiently with networks of more than a few hundred nodes. In this paper, we propose an augmented tree-based address space structure and a hierarchical multi-path routing protocol, referred to as Augmented Tree-based Routing (ATR), which utilizes such a structure in order to solve the scalability problem and to gain good resilience against node failure/mobility and link congestion/instability. Simulation results and performance comparisons with existing protocols substantiate the effectiveness of the ATR.
[ { "version": "v1", "created": "Tue, 20 Nov 2007 09:53:40 GMT" } ]
2016-11-18T00:00:00
[ [ "Caleffi", "Marcello", "" ], [ "Ferraiuolo", "Giancarlo", "" ], [ "Paura", "Luigi", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0711.3128
Anne-Marie Vercoustre
Anne-Marie Vercoustre (INRIA Rocquencourt / INRIA Sophia Antipolis), James A. Thom (RMIT), Jovan Pehcevski (INRIA Rocquencourt / INRIA Sophia Antipolis)
Entity Ranking in Wikipedia
to appear
Dans the 23rd Annual ACM Symposium on Applied Computing (2008)
null
null
cs.IR
null
The traditional entity extraction problem lies in the ability of extracting named entities from plain text using natural language processing techniques and intensive training from large document collections. Examples of named entities include organisations, people, locations, or dates. There are many research activities involving named entities; we are interested in entity ranking in the field of information retrieval. In this paper, we describe our approach to identifying and ranking entities from the INEX Wikipedia document collection. Wikipedia offers a number of interesting features for entity identification and ranking that we first introduce. We then describe the principles and the architecture of our entity ranking system, and introduce our methodology for evaluation. Our preliminary results show that the use of categories and the link structure of Wikipedia, together with entity examples, can significantly improve retrieval effectiveness.
[ { "version": "v1", "created": "Tue, 20 Nov 2007 12:40:23 GMT" } ]
2007-11-21T00:00:00
[ [ "Vercoustre", "Anne-Marie", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Thom", "James A.", "", "RMIT" ], [ "Pehcevski", "Jovan", "", "INRIA Rocquencourt / INRIA Sophia\n Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0711.3149
Marie-Jean Meurs
Marie-Jean Meurs
Approche polyedrale pour le probleme du separateur (VSP)
21 pages, 4 figures
null
null
null
cs.DM
null
In an undirected connected graph G=(V,E), the vertex separator problem (VSP) asks for a partition of V into nonempty subsets A, B, C such that |C| is minimized such that there is no edge between A and B, and sizes of A and B are similar. This paper presents a polyhedral approach of the (VSP), introducing new efficient valid inequalities and providing computational tests and results.
[ { "version": "v1", "created": "Tue, 20 Nov 2007 14:55:20 GMT" } ]
2007-11-21T00:00:00
[ [ "Meurs", "Marie-Jean", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0711.3152
Tobias Koch
Tobias Koch, Amos Lapidoth
Multipath Channels of Bounded Capacity
To be presented at the 2008 IEEE Information Theory Workshop (ITW) in Porto, Portugal; replaced with the version that appears in the proceedings
null
10.1109/ITW.2008.4578611
null
cs.IT math.IT
null
The capacity of discrete-time, non-coherent, multipath fading channels is considered. It is shown that if the delay spread is large in the sense that the variances of the path gains do not decay faster than geometrically, then capacity is bounded in the signal-to-noise ratio.
[ { "version": "v1", "created": "Tue, 20 Nov 2007 15:00:39 GMT" }, { "version": "v2", "created": "Mon, 14 Apr 2008 12:19:10 GMT" } ]
2016-11-18T00:00:00
[ [ "Koch", "Tobias", "" ], [ "Lapidoth", "Amos", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.3176
Seyed Abolfazl Motahari
Abolfazl S. Motahari and Amir K. Khandani
To Decode the Interference or To Consider it as Noise
submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
We address single-user data transmission over a channel where the received signal incurs interference from a finite number of users (interfering users) that use single codebooks for transmitting their own messages. The receiver, however, is allowed to decode interfering users' messages. This means the signal transmitted from any interfering user is either decoded or considered as noise at the receiver side. We propose the following method to obtain an achievable rate for this channel. Assuming its own data is decoded successfully, the receiver partitions the set of interfering users into two disjoint subsets, namely the set of decodable users and the set of non-decodable users. Then the transmitter's rate is chosen such that the intended signal can be jointly decoded with the set of decodable users. To show the strength of this method, we prove that for the additive Gaussian channel with Gaussian interfering users, the Gaussian distribution is optimal and the achievable rate is the capacity of this channel. To obtain the maximum achievable rate, one needs to find the maximum decodable subset of interfering users. Due to the large number of possible choices, having efficient algorithms that find the set of decodable users with maximum cardinality is desired. To this end, we propose an algorithm that enables the receiver to accomplish this task in polynomial time.
[ { "version": "v1", "created": "Tue, 20 Nov 2007 17:34:30 GMT" } ]
2007-11-21T00:00:00
[ [ "Motahari", "Abolfazl S.", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.3183
Narad Rampersad
Terry Anderson, John Loftus, Narad Rampersad, Nicolae Santean, Jeffrey Shallit
Detecting palindromes, patterns, and borders in regular languages
Full version of a paper submitted to LATA 2008. This is a new version with John Loftus added as a co-author and containing new results on unbordered words
null
null
null
cs.CC cs.DM cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a language L and a nondeterministic finite automaton M, we consider whether we can determine efficiently (in the size of M) if M accepts at least one word in L, or infinitely many words. Given that M accepts at least one word in L, we consider how long a shortest word can be. The languages L that we examine include the palindromes, the non-palindromes, the k-powers, the non-k-powers, the powers, the non-powers (also called primitive words), the words matching a general pattern, the bordered words, and the unbordered words.
[ { "version": "v1", "created": "Tue, 20 Nov 2007 17:38:47 GMT" }, { "version": "v2", "created": "Mon, 9 Jun 2008 14:25:57 GMT" } ]
2009-04-14T00:00:00
[ [ "Anderson", "Terry", "" ], [ "Loftus", "John", "" ], [ "Rampersad", "Narad", "" ], [ "Santean", "Nicolae", "" ], [ "Shallit", "Jeffrey", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0711.3197
Igor M. Suslov
I. M. Suslov (P.L.Kapitza Institute for Physical Problems, Moscow, Russia)
How to realize "a sense of humour" in computers ?
14 pages, 6 figures included
null
null
null
cs.CL cs.AI q-bio.NC
null
Computer model of a "sense of humour" suggested previously [arXiv:0711.2058, 0711.2061, 0711.2270] is raised to the level of a realistic algorithm.
[ { "version": "v1", "created": "Tue, 20 Nov 2007 19:57:23 GMT" } ]
2007-11-27T00:00:00
[ [ "Suslov", "I. M.", "", "P.L.Kapitza Institute for Physical Problems, Moscow,\n Russia" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" } ]
0711.3205
Caleb Lo
Caleb K. Lo, Sriram Vishwanath and Robert W. Heath Jr
Relay Subset Selection in Wireless Networks Using Partial Decode-and-Forward Transmission
27 pages, 5 figures, submitted to the IEEE Transactions on Vehicular Technology, revised May 2008
null
null
null
cs.IT math.IT
null
This paper considers the problem of selecting a subset of nodes in a two-hop wireless network to act as relays in aiding the communication between the source-destination pair. Optimal relay subset selection with the objective of maximizing the overall throughput is a difficult problem that depends on multiple factors including node locations, queue lengths and power consumption. A partial decode-and-forward strategy is applied in this paper to improve the tractability of the relay selection problem and performance of the overall network. Note that the number of relays selected ultimately determines the performance of the network. This paper benchmarks this performance by determining the net diversity achieved using the relays selected and the partial decode-and-forward strategy. This framework is subsequently used to further transform relay selection into a simpler relay placement problem, and two proximity-based approximation algorithms are developed to determine the appropriate set of relays to be selected in the network. Other selection strategies such as random relay selection and a greedy algorithm that relies on channel state information are also presented. This paper concludes by showing that the proposed proximity-based relay selection strategies yield near-optimal expected rates for a small number of selected relays.
[ { "version": "v1", "created": "Tue, 20 Nov 2007 20:40:20 GMT" }, { "version": "v2", "created": "Thu, 22 May 2008 21:53:27 GMT" } ]
2008-05-23T00:00:00
[ [ "Lo", "Caleb K.", "" ], [ "Vishwanath", "Sriram", "" ], [ "Heath", "Robert W.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.3235
Joseph Y. Halpern
Peter D. Grunwald and Joseph Y. Halpern
A Game-Theoretic Analysis of Updating Sets of Probabilities
null
null
null
null
cs.AI math.ST stat.TH
null
We consider how an agent should update her uncertainty when it is represented by a set $\P$ of probability distributions and the agent observes that a random variable $X$ takes on value $x$, given that the agent makes decisions using the minimax criterion, perhaps the best-studied and most commonly-used criterion in the literature. We adopt a game-theoretic framework, where the agent plays against a bookie, who chooses some distribution from $\P$. We consider two reasonable games that differ in what the bookie knows when he makes his choice. Anomalies that have been observed before, like time inconsistency, can be understood as arising important because different games are being played, against bookies with different information. We characterize the important special cases in which the optimal decision rules according to the minimax criterion amount to either conditioning or simply ignoring the information. Finally, we consider the relationship between conditioning and calibration when uncertainty is described by sets of probabilities.
[ { "version": "v1", "created": "Tue, 20 Nov 2007 23:34:12 GMT" } ]
2007-11-27T00:00:00
[ [ "Grunwald", "Peter D.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0711.3242
Frank Nielsen
Frank Nielsen, Richard Nock
On the Centroids of Symmetrized Bregman Divergences
17 pages
null
null
null
cs.CG
null
In this paper, we generalize the notions of centroids and barycenters to the broad class of information-theoretic distortion measures called Bregman divergences. Bregman divergences are versatile, and unify quadratic geometric distances with various statistical entropic measures. Because Bregman divergences are typically asymmetric, we consider both the left-sided and right-sided centroids and the symmetrized centroids, and prove that all three are unique. We give closed-form solutions for the sided centroids that are generalized means, and design a provably fast and efficient approximation algorithm for the symmetrized centroid based on its exact geometric characterization that requires solely to walk on the geodesic linking the two sided centroids. We report on our generic implementation for computing entropic centers of image clusters and entropic centers of multivariate normals, and compare our results with former ad-hoc methods.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 01:15:19 GMT" } ]
2007-11-22T00:00:00
[ [ "Nielsen", "Frank", "" ], [ "Nock", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0711.3247
Behtash Babadi
Behtash Babadi, Vahid Tarokh
A Distributed Dynamic Frequency Allocation Algorithm
null
null
null
null
cs.NI
null
We consider a network model where the nodes are grouped into a number of clusters and propose a distributed dynamic frequency allocation algorithm that achieves performance close to that of a centralized optimal algorithm. Each cluster chooses its transmission frequency band based on its knowledge of the interference that it experiences. The convergence of the proposed distributed algorithm to a sub-optimal frequency allocation pattern is proved. For some specific cases of spatial distributions of the clusters in the network, asymptotic bounds on the performance of the algorithm are derived and comparisons to the performance of optimal centralized solutions are made. These analytic results and additional simulation studies verify performance close to that of an optimum centralized frequency allocation algorithm. It is demonstrated that the algorithm achieves about 90% of the Shannon capacities corresponding to the optimum/near-optimum centralized frequency band assignments. Furthermore, we consider the scenario where each cluster can be in active or inactive mode according to a two-state Markov model. We derive conditions to guarantee finite steady state variance for the output of the algorithm using stochastic analysis. Further simulation studies confirm the results of stochastic modeling and the performance of the algorithm in the time-varying setup.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 01:47:54 GMT" }, { "version": "v2", "created": "Thu, 13 Mar 2008 22:34:53 GMT" } ]
2008-03-14T00:00:00
[ [ "Babadi", "Behtash", "" ], [ "Tarokh", "Vahid", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0711.3250
Venkata Seshu Kumar Kurapati Mr
Venkata Seshu Kumar Kurapati
Improved Fully Dynamic Reachability Algorithm for Directed Graph
null
null
null
null
cs.DS
null
We propose a fully dynamic algorithm for maintaining reachability information in directed graphs. The proposed deterministic dynamic algorithm has an update time of $O((ins*n^{2}) + (del * (m+n*log(n))))$ where $m$ is the current number of edges, $n$ is the number of vertices in the graph, $ins$ is the number of edge insertions and $del$ is the number of edge deletions. Each query can be answered in O(1) time after each update. The proposed algorithm combines existing fully dynamic reachability algorithm with well known witness counting technique to improve efficiency of maintaining reachability information when edges are deleted. The proposed algorithm improves by a factor of $O(\frac{n^2}{m+n*log(n)})$ for edge deletion over the best existing fully dynamic algorithm for maintaining reachability information.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 03:22:12 GMT" } ]
2007-11-22T00:00:00
[ [ "Kurapati", "Venkata Seshu Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0711.3251
Niranjay Ravindran
Niranjay Ravindran, Nihar Jindal
Limited Feedback-based Block Diagonalization for the MIMO Broadcast Channel
20 pages, 4 figures, submitted to IEEE JSAC November 2007
null
10.1109/JSAC.2008.081013
null
cs.IT math.IT
null
Block diagonalization is a linear precoding technique for the multiple antenna broadcast (downlink) channel that involves transmission of multiple data streams to each receiver such that no multi-user interference is experienced at any of the receivers. This low-complexity scheme operates only a few dB away from capacity but requires very accurate channel knowledge at the transmitter. We consider a limited feedback system where each receiver knows its channel perfectly, but the transmitter is only provided with a finite number of channel feedback bits from each receiver. Using a random quantization argument, we quantify the throughput loss due to imperfect channel knowledge as a function of the feedback level. The quality of channel knowledge must improve proportional to the SNR in order to prevent interference-limitations, and we show that scaling the number of feedback bits linearly with the system SNR is sufficient to maintain a bounded rate loss. Finally, we compare our quantization strategy to an analog feedback scheme and show the superiority of quantized feedback.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 02:03:56 GMT" } ]
2016-11-17T00:00:00
[ [ "Ravindran", "Niranjay", "" ], [ "Jindal", "Nihar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0711.3274
EDA Publishing Association
M.-A. Polosky, E.-J. Garcia
Microsystem Product Development
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
Over the last decade the successful design and fabrication of complex MEMS (MicroElectroMechanical Systems), optical circuits and ASICs have been demonstrated. Packaging and integration processes have lagged behind MEMS research but are rapidly maturing. As packaging processes evolve, a new challenge presents itself, microsystem product development. Product development entails the maturation of the design and all the processes needed to successfully produce a product. Elements such as tooling design, fixtures, gages, testers, inspection, work instructions, process planning, etc., are often overlooked as MEMS engineers concentrate on design, fabrication and packaging processes. Thorough, up-front planning of product development efforts is crucial to the success of any project.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 08:18:26 GMT" } ]
2007-11-29T00:00:00
[ [ "Polosky", "M. -A.", "" ], [ "Garcia", "E. -J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3275
EDA Publishing Association
J. Iannacci, Jason Tian, S. Sinaga, R. Gaddi, A. Gnudi, M. Bartek
Parasitic Effects Reduction for Wafer-Level Packaging of RF-Mems
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
In RF-MEMS packaging, next to the protection of movable structures, optimization of package electrical performance plays a very important role. In this work, a wafer-level packaging process has been investigated and optimized in order to minimize electrical parasitic effects. The RF-MEMS package concept used is based on a wafer-level bonding of a capping silicon substrate to an RF-MEMS wafer. The capping silicon substrate resistivity, substrate thickness and the geometry of through-substrate electrical interconnect vias have been optimized using finite-element electromagnetic simulations (Ansoft HFSS). Test structures for electrical characterization have been designed and after their fabrication, measurement results will be compared with simulations.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 08:24:39 GMT" } ]
2007-11-29T00:00:00
[ [ "Iannacci", "J.", "" ], [ "Tian", "Jason", "" ], [ "Sinaga", "S.", "" ], [ "Gaddi", "R.", "" ], [ "Gnudi", "A.", "" ], [ "Bartek", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3276
EDA Publishing Association
A. Phommahaxay (ESYCOM-Esiee), G. Lissorgues (ESYCOM-Esiee), L. Rousseau (ESYCOM-Esiee), T. Bourouina (ESYCOM-Esiee), P. Nicole
Surface Conditioning Effect on Vacuum Microelectronics Components Fabricated by Deep Reactive Ion Etching
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
Advances in material processing such as silicon micromachining are opening the way to vacuum microelectronics. Two-dimensional vacuum components can be fabricated using the microsystems processes. We developed such devices using a single metal layer and silicon micromachining by DRIE. The latter technological step has significant impact on the characteristics of the vacuum components. This paper presents a brief summary of electron emission possibilities and the design leading to the fabrication of a lateral field emission diode. First measurement results and the aging of the devices are also discussed.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 08:25:17 GMT" } ]
2007-11-29T00:00:00
[ [ "Phommahaxay", "A.", "", "ESYCOM-Esiee" ], [ "Lissorgues", "G.", "", "ESYCOM-Esiee" ], [ "Rousseau", "L.", "", "ESYCOM-Esiee" ], [ "Bourouina", "T.", "", "ESYCOM-Esiee" ], [ "Nicole", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3277
EDA Publishing Association
C. Mendez, C. Louis, S. Paquay, P. De Vincenzo, I. Klapka, V. Rochus, F. Iker, Nicolas Andr\'e, J.-P. Raskin
3-D Self-Assembled Soi Mems: An Example of Multiphysics Simulation
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
MEMS devices are typical systems where multiphysics simulations are unavoidable. In this work, we present possible applications of 3-D self-assembled SOI (Silicon-on-Insulator) MEMS such as, for instance, thermal actuators and flow sensors. The numerical simulations of these microsystems are presented. Structural and thermal parts have to be strongly coupled for correctly describing the fabrication process and for simulating the behavior of these 3-D SOI MEMS.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 08:25:55 GMT" } ]
2007-11-29T00:00:00
[ [ "Mendez", "C.", "" ], [ "Louis", "C.", "" ], [ "Paquay", "S.", "" ], [ "De Vincenzo", "P.", "" ], [ "Klapka", "I.", "" ], [ "Rochus", "V.", "" ], [ "Iker", "F.", "" ], [ "André", "Nicolas", "" ], [ "Raskin", "J. -P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3279
EDA Publishing Association
M. Dominguez, Joan Pons, J. Ricart, J. Juillard (EA2523), E. Colinet (EA2523)
Influence of the Feedback Filter on the Response of the Pulsed Digital Oscillator
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
This paper introduces a new feedback topology for the Pulsed Digital Oscillator (PDO) and compares it to the classical topology. The `classic' or single feedback topology, introduced in previous works, shows a strong behavior dependence on the damping losses in the MEMS resonator. A new double feedback topology is introduced here in order to help solving this problem. Comparative discrete-time simulations and preliminary experimental measurements have been carried out for both topologies, showing how the new double feedback topology may increase PDO performance for some frequency ranges.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 08:27:54 GMT" } ]
2007-11-29T00:00:00
[ [ "Dominguez", "M.", "", "EA2523" ], [ "Pons", "Joan", "", "EA2523" ], [ "Ricart", "J.", "", "EA2523" ], [ "Juillard", "J.", "", "EA2523" ], [ "Colinet", "E.", "", "EA2523" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3284
EDA Publishing Association
Tsung-Hung Lin, Hsiharng Yang, Ching-Kong Chao
Concave Microlens Array Mold Fabrication in Photoresist Using UV Proximity Printing
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
This paper presents a simple and effective method to fabricate a polydimethyl-siloxane (PDMS) microlens array with a high fill factor, which utilizes the UV proximity printing and photoresist replication methods. The concave microlens array mold was made using a printing gap in lithography process, which utilizes optical diffraction of UV light to deflect away from the aperture edges and produces a certain exposure in the photoresist material outside the aperture edges. This method can precisely control the geometric profile of concave microlens array. The experimental results showed that the concave micro-lens array in photoresist could be formed automatically when the printing gap ranged from 240 micron to 720 micron. High fill factor microlens array can be produced, when the control pitch distance between the adjacent apertures of the concave microlens array was decreased to the aperture size.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:21:50 GMT" } ]
2007-11-29T00:00:00
[ [ "Lin", "Tsung-Hung", "" ], [ "Yang", "Hsiharng", "" ], [ "Chao", "Ching-Kong", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3286
EDA Publishing Association
Jing Li, L. Dedeng, Suntao Wu
The annealing induced extraordinary properties of SI based ZNO film grown by RF sputtering
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
Pb(Zr0.52Ti0.48)O3 (PZT) thin films were in situ deposited by pulsed laser deposition (PLD) on Pt/Ti/SiO2/Si substrates using a template layer derived by sol-gel method. A 0.1-$\mu$m-thick PZT layer with (111) or (100)-preferred orientation was first deposited onto Pt/Ti/SiO2/Si substrates using the sol-gel method, and than a PZT layer with thickness of 1$\mu$m was in situ deposited by PLD on the above-mentioned PZT layer. The crystalline phases and the preferred orientations of the PZT films were investigated by X-ray diffraction analysis. Surface and cross-sectional morphologies were observed by scanning electron microscopy and transmission electron microscopy. The electrical properties of the films were evaluated by measuring their P-E hysteresis loops and dielectric constants. The preferred orientation of the films can be controlled using the template layer derived by the sol-gel method. The deposition temperature required to obtain the perovskite phase in this process is approximately 460 degrees C, and is significantly lower than that in the case of direct film deposition by PLD on the Pt/Ti/SiO2/Si substrates. Keywords: lead zirconate titanate (PZT), thin film, sol-gel method, laser ablation, electrical properties
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:31:12 GMT" } ]
2007-11-29T00:00:00
[ [ "Li", "Jing", "" ], [ "Dedeng", "L.", "" ], [ "Wu", "Suntao", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3287
EDA Publishing Association
S.-P. Vudathu, K.-K. Duganapalli, Rainer Laur, D. Kubalinska, A. Bunse-Gerstner
Parametric Yield Analysis of Mems via Statistical Methods
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
This paper considers a developing theory on the effects of inevitable process variations during the fabrication of MEMS and other microsystems. The effects on the performance and design yield of the microsystems devices are analyzed and presented. A novel methodology in the design cycle of MEMS and other microsystems is briefly introduced. This paper describes the initial steps of this methodology that is aimed at counteracting the parametric variations in the product cycle of microsystems. It is based on a concept of worst-case analysis that has proven successful in the parent IC technology. Issues ranging from the level of abstraction of the microsystem models to the availability of such models are addressed
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:32:13 GMT" } ]
2007-11-29T00:00:00
[ [ "Vudathu", "S. -P.", "" ], [ "Duganapalli", "K. -K.", "" ], [ "Laur", "Rainer", "" ], [ "Kubalinska", "D.", "" ], [ "Bunse-Gerstner", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3288
EDA Publishing Association
A. Giridhar (ESYCOM-Esiee, Ief), F. Verjus (ESYCOM-Esiee), F. Marty (IEF), A. Bosseboeuf (IEF), T. Bourouina (IEF)
Electrostatically-Driven Resonator on Soi with Improved Temperature Stability
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
This paper deals with a single-crystal-silicon (SCS) MEMS resonator with improved temperature stability. While simulations have shown that the temperature coefficient of resonant frequency can be down to 1 ppm/degrees C, preliminary measurements on non-optimised structures gave evidence of a temperature coefficient of 29 ppm/degrees C. Design, optimisation, experimental results with post process simulation and prospective work are presented.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:32:31 GMT" } ]
2007-11-29T00:00:00
[ [ "Giridhar", "A.", "", "ESYCOM-Esiee, Ief" ], [ "Verjus", "F.", "", "ESYCOM-Esiee" ], [ "Marty", "F.", "", "IEF" ], [ "Bosseboeuf", "A.", "", "IEF" ], [ "Bourouina", "T.", "", "IEF" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3289
EDA Publishing Association
S. Spinner, J. Bartholomeyczik, B. Becker, M. Doelle, O. Paul, I. Polian, R. Roth, K. Seitz, P. Ruther
Electromechanical Reliability Testing of Three-Axial Silicon Force Sensors
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
This paper reports on the systematic electromechanical characterization of a new three-axial force sensor used in dimensional metrology of micro components. The siliconbased sensor system consists of piezoresistive mechanicalstress transducers integrated in thin membrane hinges supporting a suspended flexible cross structure. The mechanical behavior of the fragile micromechanical structure isanalyzed for both static and dynamic load cases. This work demonstrates that the silicon microstructure withstands static forces of 1.16N applied orthogonally to the front-side of the structure. A statistical Weibull analysis of the measured data shows that these values are significantly reduced if the normal force is applied to the back of the sensor. Improvements of the sensor system design for future development cycles are derived from the measurement results.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:33:12 GMT" } ]
2007-11-29T00:00:00
[ [ "Spinner", "S.", "" ], [ "Bartholomeyczik", "J.", "" ], [ "Becker", "B.", "" ], [ "Doelle", "M.", "" ], [ "Paul", "O.", "" ], [ "Polian", "I.", "" ], [ "Roth", "R.", "" ], [ "Seitz", "K.", "" ], [ "Ruther", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3290
EDA Publishing Association
O. Fran\c{c}ais, M.-C. Jullien (SATIE), L. Rousseau (ESYCOM-Esiee), P. Poulichet (ESYCOM-Esiee), S. Desportes (PPSM), A. Chouai (PPSM), J.-P. Lefevre (PPSM), J. Delaire (PPSM)
An Active Chaotic Micromixer Integrating Thermal Actuation Associating PDMS and Silicon Microtechnology
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
Due to scaling laws, in microfluidic, flows are laminar. Consequently, mixing between two liquids is mainly obtained by natural diffusion which may take a long time or equivalently requires centimetre length channels. To reduce time and length for mixing, it is possible to generate chaotic-like flows either by modifying the channel geometry or by creating an external perturbation of the flow. In this paper, an active micromixer is presented consisting on thermal actuation with heating resistors. In order to disturb the liquid flow, an oscillating transverse flow is generated by heating the liquid. Depending on the value of boiling point, either bubble expansion or volumetric dilation controlled the transverse flow amplitude. A chaotic like mixing is then induced under particular conditions depending on volume expansion, liquid velocity, frequency of actuation... This solution presents the advantage to achieve mixing in a very short time (1s) and along a short channel distance (channel width). It can also be integrated in a more complex device due to actuator integration with microfluidics.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:34:28 GMT" } ]
2007-11-29T00:00:00
[ [ "Français", "O.", "", "SATIE" ], [ "Jullien", "M. -C.", "", "SATIE" ], [ "Rousseau", "L.", "", "ESYCOM-Esiee" ], [ "Poulichet", "P.", "", "ESYCOM-Esiee" ], [ "Desportes", "S.", "", "PPSM" ], [ "Chouai", "A.", "", "PPSM" ], [ "Lefevre", "J. -P.", "", "PPSM" ], [ "Delaire", "J.", "", "PPSM" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3291
EDA Publishing Association
J. Juillard, E. Colinet (LETI), M. Dominguez, Joan Pons, J. Ricart
Resolution Limits for Resonant Mems Sensors Based on Discrete Relay Feedback Techniques
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
This paper is devoted to the analysis of resonant MEMS sensors based on discrete relay feedback techniques. One drawback of such techniques is that some synchronization usually occurs between the discrete part and the continuous part of the system: this results in sensor responses that are very similar to the curves known as devil's staircases, i.e. the frequency does not vary smoothly with the sensor's input. The main contribution of this paper is a theoretical calculation of the resolution of such systems. The resolutions of two existing resonant MEMS architectures are then calculated and these results are discussed.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:35:07 GMT" } ]
2007-11-29T00:00:00
[ [ "Juillard", "J.", "", "LETI" ], [ "Colinet", "E.", "", "LETI" ], [ "Dominguez", "M.", "" ], [ "Pons", "Joan", "" ], [ "Ricart", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3292
EDA Publishing Association
X.-C. Shan, Z.-F. Wang, R. Maeda, Y.F. Sun, M. Wu, J.S. Hua
A Silicon-Based Micro Gas Turbine Engine for Power Generation
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
This paper reports on our research in developing a micro power generation system based on gas turbine engine and piezoelectric converter. The micro gas turbine engine consists of a micro combustor, a turbine and a centrifugal compressor. Comprehensive simulation has been implemented to optimal the component design. We have successfully demonstrated a silicon-based micro combustor, which consists of seven layers of silicon structures. A hairpin-shaped design is applied to the fuel/air recirculation channel. The micro combustor can sustain a stable combustion with an exit temperature as high as 1600 K. We have also successfully developed a micro turbine device, which is equipped with enhanced micro air-bearings and driven by compressed air. A rotation speed of 15,000 rpm has been demonstrated during lab test. In this paper, we will introduce our research results major in the development of micro combustor and micro turbine test device.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:37:07 GMT" } ]
2007-11-29T00:00:00
[ [ "Shan", "X. -C.", "" ], [ "Wang", "Z. -F.", "" ], [ "Maeda", "R.", "" ], [ "Sun", "Y. F.", "" ], [ "Wu", "M.", "" ], [ "Hua", "J. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3294
EDA Publishing Association
Guillaume Savelli (LEG), Marc Plissonnier, Jacqueline Bablet, C. Salvi, J.M. Fournier
Energy Conversion Using New Thermoelectric Generator
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
During recent years, microelectronics helped to develop complex and varied technologies. It appears that many of these technologies can be applied successfully to realize Seebeck micro generators: photolithography and deposition methods allow to elaborate thin thermoelectric structures at the micro-scale level. Our goal is to scavenge energy by developing a miniature power source for operating electronic components. First Bi and Sb micro-devices on silicon glass substrate have been manufactured with an area of 1cm2 including more than one hundred junctions. Each step of process fabrication has been optimized: photolithography, deposition process, anneals conditions and metallic connections. Different device structures have been realized with different micro-line dimensions. Each devices performance will be reviewed and discussed in function of their design structure.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:40:31 GMT" } ]
2007-11-29T00:00:00
[ [ "Savelli", "Guillaume", "", "LEG" ], [ "Plissonnier", "Marc", "" ], [ "Bablet", "Jacqueline", "" ], [ "Salvi", "C.", "" ], [ "Fournier", "J. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3296
EDA Publishing Association
S. Oukassi, R. Salot, S. Bancel, J.-P. Pereira-Ramos
Above Ic Micro-Power Generators for RF-Mems
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
This work presents recent advances in the development and the integration of an electrochemical (chemicalelectrical energy conversion) micro power generator used as a high voltage energy source for RF-MEMS powering. Autonomous MEMS require similarly miniaturized power sources. Up to day, solid state thin film batteries are realized with mechanical masks. This method doesn't allow dimensions below a few mm^2 active area, and besides the whole process flow is done under controlled atmosphere so as to ensure materials chemical stability (mainly lithiated materials). Within this context, Microelectronics micro-fabrication procedures (photolithography, Reactive Ion Etching...) are used to reach both miniaturisation (100x100 $\mu$m^2 targeted unit cell active area) and Above IC technological compatibility. All process steps developed here are realized in clean room environment.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:42:06 GMT" } ]
2007-11-29T00:00:00
[ [ "Oukassi", "S.", "" ], [ "Salot", "R.", "" ], [ "Bancel", "S.", "" ], [ "Pereira-Ramos", "J. -P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3297
EDA Publishing Association
M.-K. El Khatib (XLIM), A. Pothier (XLIM), P. Blondy (XLIM)
Packaging of RF Mems Switching Functions on Alumina Substrate
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
Recently the strong demands in wireless communication requires expanding development for the application of RF MEMS (Radio Frequency micro electro mechanical systems) sensing devices such as micro-switches, tunable capacitors because it offers lower power consumption, lower losses, higher linearity and higher Q factors compared with conventional communications components. To accelerate commercialisation of RF MEMS products, development for packaging technologies is one of the most critical issues should be solved beforehand.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:44:39 GMT" } ]
2007-11-29T00:00:00
[ [ "Khatib", "M. -K. El", "", "XLIM" ], [ "Pothier", "A.", "", "XLIM" ], [ "Blondy", "P.", "", "XLIM" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3298
EDA Publishing Association
T. Pichonat (FEMTO-ST - Lopmd), B. Gauthier-Manuel (FEMTO-ST - Lopmd)
Recent Developments in Mems-Based Micro Fuel Cells
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
Micro fuel cells ($\mu$-FC) represent promising power sources for portable applications. Today, one of the technological ways to make $\mu$-FC is to have recourse to standard microfabrication techniques used in the fabrication of micro electromechanical systems (MEMS). This paper shows an overview on the applications of MEMS techniques on miniature FC by presenting several solutions developed throughout the world. It also describes the latest developments of a new porous silicon-based miniature fuel cell. Using a silane grafted on an inorganic porous media as the proton-exchange membrane instead of a common ionomer such as Nafion, the fuel cell achieved a maximum power density of 58 mW cm-2 at room temperature with hydrogen as fuel.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:45:58 GMT" } ]
2007-11-29T00:00:00
[ [ "Pichonat", "T.", "", "FEMTO-ST - Lopmd" ], [ "Gauthier-Manuel", "B.", "", "FEMTO-ST - Lopmd" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3299
EDA Publishing Association
W. Faris, H. Mohammed, M.M. Abdalla, C.-H. Ling
Influence of Micro-Cantilever Geometry and Gap on Pull-in Voltage
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
In this paper, we study the behaviour of a microcantilever beam under electrostatic actuation using finite difference method. This problem has a lot of applications in MEMS based devices like accelerometers, switches and others. In this paper, we formulated the problem of a cantilever beam with proof mass at its end and carried out the finite difference solution. we studied the effects of length, width, and the gap size on the pull-in voltage using data that are available in the literature. Also, the stability limit is compared with the single degree of freedom commonly used in the earlier literature as an approximation to calculate the pull-in voltage.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:45:58 GMT" } ]
2007-11-29T00:00:00
[ [ "Faris", "W.", "" ], [ "Mohammed", "H.", "" ], [ "Abdalla", "M. M.", "" ], [ "Ling", "C. -H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3300
EDA Publishing Association
Ming-Tzer Lin, Chi-Jia Tong, Chung-Hsun Chiang
Design and Development of Novel Electroplating Spring Frame Mems Structure Specimens for the Microtensile Testing of Thin Film Materials
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
Microelectromechanical systems (MEMS) technologies are developing rapidly with increasing study of the design, fabrication and commercialization of microscale systems and devices. Accurate mechanical properties are important for successful design and development of MEMS. We have demonstrated here a novel electroplating spring frame MEMS Structure Specimen integrates pin-pin align holes, misalignment compensate spring structure frame, load sensor beam and freestanding thin film. The specimen can be fit into a specially designed microtensile apparatus which is capable of carrying out a series of tests on sub-micro scale freestanding thin films.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:46:32 GMT" } ]
2007-11-29T00:00:00
[ [ "Lin", "Ming-Tzer", "" ], [ "Tong", "Chi-Jia", "" ], [ "Chiang", "Chung-Hsun", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3301
EDA Publishing Association
P. Szabo, B. Nemeth, M. Rencz, B. Courtois (TIMA)
Characterisation of the Etching Quality in Micro-Electro-Mechanical Systems by Thermal Transient Methodology
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
Our paper presents a non-destructive thermal transient measurement method that is able to reveal differences even in the micron size range of MEMS structures. Devices of the same design can have differences in their sacrificial layers as consequence of the differences in their manufacturing processes e.g. different etching times. We have made simulations examining how the etching quality reflects in the thermal behaviour of devices. These simulations predicted change in the thermal behaviour of MEMS structures having differences in their sacrificial layers. The theory was tested with measurements of similar MEMS devices prepared with different etching times. In the measurements we used the T3Ster thermal transient tester equipment. The results show that deviations in the devices, as consequence of the different etching times, result in different temperature elevations and manifest also as shift in time in the relevant temperature transient curves.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:46:34 GMT" } ]
2007-11-29T00:00:00
[ [ "Szabo", "P.", "", "TIMA" ], [ "Nemeth", "B.", "", "TIMA" ], [ "Rencz", "M.", "", "TIMA" ], [ "Courtois", "B.", "", "TIMA" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3302
EDA Publishing Association
D. Allen, N. Duclos, I. Garbutt, M. Saumer, Ch. Dhum, M. Schmitt, J. E. Hoffmann
The Effects of Additives on the Physical Properties of Electroformed Nickel and on the Stretch of Photoelectroformed Nickel Components
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
The process of nickel electroforming is becoming increasingly important in the manufacture of MST products, as it has the potential to replicate complex geometries with extremely high fidelity. Electroforming of nickel uses multi-component electrolyte formulations in order to maximise desirable product properties. In addition to nickel sulphamate (the major electrolyte component), formulation additives can also comprise nickel chloride (to increase nickel anode dissolution), sulphamic acid (to control pH), boric acid (to act as a pH buffer), hardening/levelling agents (to increase deposit hardness and lustre) and wetting agents (to aid surface wetting and thus prevent gas bubbles and void formation). This paper investigates the effects of some of these variables on internal stress and stretch as a function of applied current density.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:47:35 GMT" } ]
2007-11-29T00:00:00
[ [ "Allen", "D.", "" ], [ "Duclos", "N.", "" ], [ "Garbutt", "I.", "" ], [ "Saumer", "M.", "" ], [ "Dhum", "Ch.", "" ], [ "Schmitt", "M.", "" ], [ "Hoffmann", "J. E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3304
EDA Publishing Association
Gou-Jen Wang, Yi-Chin Lin, Gwo-Sen Lin
A Novel Contact Resistance Model of Anisotropic Conductive Film for FPD Packaging
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
In this research, a novel contact resistance model for the flat panel display (FPD) packaging based on the within layer parallel and between layers series resistance concepts was proposed. The FJ2530 anisotropic conductive films (ACF) by Sony Inc. containing the currently smallest 3micron conductive particles was used to conduct the experiments to verify the accuracy of the proposed model. Calculated resistance of the chip-on-glass (COG) packaging by the proposed model is 0.163\Omega. It is found that the gold bump with 0.162\Omega resistance play the major role of the overall resistance. Although the predicted resistance by the proposed model is only one third of the experimentally measured value, it has been three-fold improvement compared to the existing models.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:48:35 GMT" } ]
2007-11-29T00:00:00
[ [ "Wang", "Gou-Jen", "" ], [ "Lin", "Yi-Chin", "" ], [ "Lin", "Gwo-Sen", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3305
EDA Publishing Association
A. Bennis, C. Leinenbach, C. Raudzis, R. M\"uller-Fiedler, S. Kronm\"uller
Measurement Technique for Elastic and Mechanical Properties of Polycrystalline Silicon-Germanium Films Using Surface Acoustic Waves and Projection Masks
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
Using Rayleigh surface acoustic waves (SAW), the Young's modulus, the density and the thickness of polycrystalline Silicon-Germanium (SiGe) films deposited on silicon and SiO2 were measured, in excellent agreement with theory. The dispersion curve of the propagating SAW is calculated with a Boundary Element Method (BEM)-Model based on Green's functions. The propagating SAW is generated with a nanosecond laser in a narrowband scheme projecting stripes from a mask on the surface of the sample. For this purpose a glass mask and a liquid crystal display (LCD) mask are used. The slope of the SAW is then measured using a probe beam setup. From the wavelength of the mask and the frequency of the measured SAW, the dispersion curve is determined point by point. Fitting the BEM-Model to the measured nonlinear dispersion curve provides several physical parameters simultaneously. In the present work this is demonstrated for the Young's modulus, the density and the thickness of SiGe films. The results from the narrowband scheme measurement are in excellent agreement with separated measurements of the thickness (profilometer), the density (balance) and the Young's modulus (nanoindenter).
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:51:13 GMT" } ]
2007-11-29T00:00:00
[ [ "Bennis", "A.", "" ], [ "Leinenbach", "C.", "" ], [ "Raudzis", "C.", "" ], [ "Müller-Fiedler", "R.", "" ], [ "Kronmüller", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3306
EDA Publishing Association
Ja-Myeong Koo, Seung-Boo Jung
Effect of Surface Finish of Substrate on Mechanical Reliability of in-48SN Solder Joints in Moems Package
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
Interfacial reactions and shear properties of the In-48Sn (in wt.%) ball grid array (BGA) solder joints after bonding were investigated with four different surface finishes of the substrate over an underlying Cu pad: electroplated Ni/Au (hereafter E-NG), electroless Ni/immersion Au (hereafter ENIG), immersion Ag (hereafter I-Ag) and organic solderability preservative (hereafter OSP). During bonding, continuous AuIn2, Ni3(Sn,In)4 and Cu6(Sn,In)5 intermetallic compound (IMC) layers were formed at the solder/E-NG, solder/ENIG and solder/OSP interface, respectively. The interfacial reactions between the solder and I-Ag substrate during bonding resulted in the formation of Cu6(Sn,In)5 and Cu(Sn,In)2 IMCs with a minor Ag element. The In-48Sn/I-Ag solder joint showed the best shear properties among the four solder joints after bonding, whereas the solder/ENIG solder joint exhibited the weakest mechanical integrity.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:52:02 GMT" } ]
2007-11-29T00:00:00
[ [ "Koo", "Ja-Myeong", "" ], [ "Jung", "Seung-Boo", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3308
EDA Publishing Association
Yasser Ammar (TIMA), S. Basrour (TIMA)
Non Linear Techniques for Increasing Harvesting Energy from Piezoelectric and Electromagnetic Micro-Power-Generators
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
Non-linear techniques are used to optimize the harvested energy from piezoelectric and electromagnetic generators. This paper introduces an analytical study for the voltage amplification obtained from these techniques. The analytical study is experimentally validated using a macro model of piezoelectric generator. Moreover, the integration influences on these techniques is studied. Through all the obtained results, a suitable structure for autonomous microsystems is proposed.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:53:26 GMT" } ]
2007-11-29T00:00:00
[ [ "Ammar", "Yasser", "", "TIMA" ], [ "Basrour", "S.", "", "TIMA" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3309
EDA Publishing Association
E. Lefeuvre (LGEF), A. Badel (LGEF), C. Richard (LGEF), L. Petit (LGEF), D. Guyomar (LGEF)
Optimization of Piezoelectric Electrical Generators Powered by Random Vibrations
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
This paper compares the performances of a vibrationpowered electrical generators using PZT piezoelectric ceramic associated to two different power conditioning circuits. A new approach of the piezoelectric power conversion based on a nonlinear voltage processing is presented and implemented with a particular power conditioning circuit topology. Theoretical predictions and experimental results show that the nonlinear processing technique may increase the power harvested by a factor up to 4 compared to the Standard optimization technique. Properties of this new technique are analyzed in particular in the case of broadband, random vibrations, and compared to those of the Standard interface.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:54:47 GMT" } ]
2007-11-29T00:00:00
[ [ "Lefeuvre", "E.", "", "LGEF" ], [ "Badel", "A.", "", "LGEF" ], [ "Richard", "C.", "", "LGEF" ], [ "Petit", "L.", "", "LGEF" ], [ "Guyomar", "D.", "", "LGEF" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3311
EDA Publishing Association
P.-D. Mitcheson, T.-C. Green, E.-M. Yeatman
Power Processing Circuits for Mems Inertial Energy Scavengers
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
Inertial energy scavengers are self-contained devices which generate power from ambient motion, by electrically damping the internal motion of a suspended proof mass. There are significant challenges in converting the power generated from such devices to useable form, particularly in micro-engineered variants. This paper presents approaches to this power conversion requirement, with emphasis on the cases of electromagnetic and electrostatic transduction.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:57:09 GMT" } ]
2007-11-29T00:00:00
[ [ "Mitcheson", "P. -D.", "" ], [ "Green", "T. -C.", "" ], [ "Yeatman", "E. -M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3312
EDA Publishing Association
T. Sterken, P. Fiorini, R. Puers
Motion-Based Generators for Industrial Applications
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
Scaling down of electronic systems has generated a large interest in the research on miniature energy sources. In this paper a closer look is given to the use of vibration based scavengers in industrial environments, where waste energy is abundantly available as engine related vibrations or large amplitude motions. The modeling of mechanical generators resulted in the design and realization of two prototypes, based on electromagnetic and electrostatic conversion of energy. Although the prototypes are not yet optimized against size and efficiency, a power of 0.3 mW has been generated in a 5 Hz motion with a 0.5 meter amplitude.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:57:46 GMT" } ]
2007-11-29T00:00:00
[ [ "Sterken", "T.", "" ], [ "Fiorini", "P.", "" ], [ "Puers", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3313
EDA Publishing Association
Yi Chiu, Chiung-Ting Kuo, Yu-Shan Chu
Design and Fabrication of a Micro Electrostatic Vibration-to-Electricity Energy Converter
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
This paper presents a micro electrostatic vibration-toelectricity energy converter. For the 3.3 V supply voltage and 1cm2 chip area constraints, optimal design parameters were found from theoretical calculation and Simulink simulation. In the current design, the output power is 200 $\mu$W/cm2 for the optimal load of 8 M\Omega. The device was fabricated in a silicon-on-insulator (SOI) wafer. Mechanical and electrical measurements were conducted. Residual particles caused shortage of the variable capacitor and the output power could not be measured. Device design and fabrication processes are being refined.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 09:58:42 GMT" } ]
2007-11-29T00:00:00
[ [ "Chiu", "Yi", "" ], [ "Kuo", "Chiung-Ting", "" ], [ "Chu", "Yu-Shan", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3314
EDA Publishing Association
S.-P. Beeby, M.-J. Tudor, R.-N. Torah, E. Koukharenko, S. Roberts, T. O'Donnell, S. Roy
Macro and Micro Scale Electromagnetic Kinetic Energy Harvesting Generators
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
This paper is concerned with generators that harvest electrical energy from the kinetic energy present in the sensor nodes environment. These generators have the potential to replace or augment battery power which has a limited lifetime and requires periodic replacement which limits the placement and application of the sensor node.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 10:01:56 GMT" } ]
2007-11-29T00:00:00
[ [ "Beeby", "S. -P.", "" ], [ "Tudor", "M. -J.", "" ], [ "Torah", "R. -N.", "" ], [ "Koukharenko", "E.", "" ], [ "Roberts", "S.", "" ], [ "O'Donnell", "T.", "" ], [ "Roy", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3315
EDA Publishing Association
Fei Duan, J. Jiao, Y. Wang
Impact of Thermal Behavior on Offset in a High-Q Gyroscope
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
In this paper, CFD approach is used to simulate the thermal behavior in a sensitive high-Q gyroscope. The electromagnetically driving wires, in which AC current flows, are treated as Joule heat sources in the model. We found that the differences of temperature, pressure and velocity along the driving direction and transversely across the proof masses increased as the gap height between the proof mass and top glass became smaller. Local pressure gradient is expected to possibly enhance the impact of any imperfect led by MEMS processes or designs on the offset of our tuning fork type gyroscope, which has been experimentally verified. A device with 200um gap gives a two-third offset down compared with that of its counterpart with 50um gap.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 10:02:53 GMT" } ]
2007-11-29T00:00:00
[ [ "Duan", "Fei", "" ], [ "Jiao", "J.", "" ], [ "Wang", "Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3316
EDA Publishing Association
T. O'Donnell, C. Saha, S.-P. Beeby, M.-J. Tudor
Scaling Effects for Electromagnetic Vibrational Power Generators
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
This paper investigates how the power generated by electromagnetic based vibrational power generators scales with the dimension of the generator. The effects of scaling on the magnetic fields, the coil parameters and the electromagnetic damping are presented. An analysis is presented for both wire-wound coil technology and micro-fabricated coils.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 10:03:04 GMT" } ]
2007-11-29T00:00:00
[ [ "O'Donnell", "T.", "" ], [ "Saha", "C.", "" ], [ "Beeby", "S. -P.", "" ], [ "Tudor", "M. -J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3317
EDA Publishing Association
R. Hellin-Rico, J.-P. Celis, K. Baert, C. Van Hoof, A. Witvrouw
A Generic Surface Micromachining Module for Mems Hermetic Packaging at Temperatures Below 200 degrees C
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
This paper presents the different processing steps of a new generic surface micromachining module for MEMS hermetic packaging at temperatures around 180 degrees C based on nickel plating and photoresist sacrificial layers. The advantages of thin film caps are the reduced thickness and area consumption and the promise of being a low-cost batch process. Moreover, sealing happens by a reflow technique, giving the freedom of choosing the pressure and atmosphere inside the cavity. Sacrificial etch holes are situated above the device allowing shorter release times compared to the state-of-the-art. With the so-called over-plating process, small etch holes can be created in the membrane without the need of expensive lithography tools. The etch holes in the membrane have been shown to be sufficiently small to block the sealing material to pass through, but still large enough to enable an efficient release.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 10:03:52 GMT" } ]
2007-11-29T00:00:00
[ [ "Hellin-Rico", "R.", "" ], [ "Celis", "J. -P.", "" ], [ "Baert", "K.", "" ], [ "Van Hoof", "C.", "" ], [ "Witvrouw", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3318
EDA Publishing Association
Zhang Yong, Zhu Jian, Yu Yuanwei, Chen Chen, Jia Shi Xing
A Ku-Band Novel Micromachined Bandpass Filter with Two Transmission Zeros
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
This paper presents a micromachined bandpass filter with miniature size that has relatively outstanding performance. A silicon-based eight-order microstrip bandpass filter is fabricated and measured. A novel design method of the interdigital filter that can create two transmission zeros is described. The location of the transmission zeros can be shifted arbitrarily in the stopband. By adjusting the zero location properly, the filter provides much better skirt rejection and lower insertion loss than a conventional microstrip interdigital filter. To reduce the chip size, through-silicon-substrate-via-hole is used. Good experimental results are obtained.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 10:05:09 GMT" } ]
2007-11-29T00:00:00
[ [ "Yong", "Zhang", "" ], [ "Jian", "Zhu", "" ], [ "Yuanwei", "Yu", "" ], [ "Chen", "Chen", "" ], [ "Xing", "Jia Shi", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0711.3319
EDA Publishing Association
Ch.-Heng Chien, Hui-Min Yu
The Design and Fabrication of Platform Device for Dna Amplification
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans Symposium on Design, Test, Integration and Packaging of MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006)
null
null
cs.OH
null
Thermalcycler were extensively used machine for amplify DNA sample. One of the major problems in the working time was that it spent most of time for cooling and heating. In order to improve the efficient, this study presented a novel method for amplify DNA sample. For this concept, the DNA sample in the silicon chamber which was pushed by a beam through three temperature regions around a center and then the DNA segments could be amplified rapidly after 30 cycles. The polymerase chain reaction platform was composed of thin-film heaters, copper plates, DC powers, and temperature controllers. The photolithography and bulk etching technologies were utilized to construct the thin-film heater and DNA reaction chambers. Finally, 1 pound gL 100bp DNA segment of E. coli K12 was amplified successfully within 36 minutes on this PCR platform.
[ { "version": "v1", "created": "Wed, 21 Nov 2007 10:05:29 GMT" } ]
2007-11-29T00:00:00
[ [ "Chien", "Ch. -Heng", "" ], [ "Yu", "Hui-Min", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]