id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0711.2157 | Bodo Manthey | Bodo Manthey | On Approximating Multi-Criteria TSP | Preliminary version at STACS 2009. This paper is a revised full
version, where some proofs are simplified | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present approximation algorithms for almost all variants of the
multi-criteria traveling salesman problem (TSP).
First, we devise randomized approximation algorithms for multi-criteria
maximum traveling salesman problems (Max-TSP). For multi-criteria Max-STSP,
where the edge weights have to be symmetric, we devise an algorithm with an
approximation ratio of 2/3 - eps. For multi-criteria Max-ATSP, where the edge
weights may be asymmetric, we present an algorithm with a ratio of 1/2 - eps.
Our algorithms work for any fixed number k of objectives. Furthermore, we
present a deterministic algorithm for bi-criteria Max-STSP that achieves an
approximation ratio of 7/27.
Finally, we present a randomized approximation algorithm for the asymmetric
multi-criteria minimum TSP with triangle inequality Min-ATSP. This algorithm
achieves a ratio of log n + eps.
| [
{
"version": "v1",
"created": "Wed, 14 Nov 2007 10:53:49 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Nov 2008 09:20:10 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Jul 2011 12:29:45 GMT"
}
] | 2011-07-14T00:00:00 | [
[
"Manthey",
"Bodo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0711.2239 | Guillaume Thomann | Guillaume Thomann (LGS), Jean Caelen (LIG), Morgan Verdier (LGS),
Brigitte Meillon (LIG) | Mise en place de sc\'enarios pour la conception d'outils en Chirurgie
Minimalement Invasive | null | Les Syst\`emes de Production, Lavoisier (Ed.) (2007) 93-107 | null | null | cs.HC | null | Nowadays, more and more surgical interventions are carried out in Minimally
Invasive Surgery, to make the post-operative constraints less painful for the
patient. Actually, new surgical tools or medical products are designed after
informal discussions between surgeons and designers. The user requirements
documents are the main document used by the mechanical designers to design and
improve the product. Medical terms, often used by surgeons and employed to
explain their needs, don't allow for an instantaneous understanding by
designers. Unfortunately, this relation causes a dysfunction in the definition
cycle of the product. Our aim is to work on the design process, its assistance
thanks to methods and tools and on its organisation for better understandings
and more complementarities between surgeons and designers. We propose on this
article a design method already tested in the informatics domain: User Centred
Design which takes the user into account more effectively in the process
design. We already propose a scenario oriented design method centred on the
user and represented as a scenario (Scenario-Based Design). We start in this
article by clarifying these concepts before detailing their implementation for
the design of a new surgical tool.
| [
{
"version": "v1",
"created": "Wed, 14 Nov 2007 16:18:42 GMT"
}
] | 2007-11-19T00:00:00 | [
[
"Thomann",
"Guillaume",
"",
"LGS"
],
[
"Caelen",
"Jean",
"",
"LIG"
],
[
"Verdier",
"Morgan",
"",
"LGS"
],
[
"Meillon",
"Brigitte",
"",
"LIG"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0711.2270 | Igor M. Suslov | I. M. Suslov (P.L.Kapitza Institute for Physical Problems, Moscow,
Russia) | Can a Computer Laugh ? | English translation of the paper in Russian; 18 pages, 6 figures
included | Computer Chronicle (Moscow), 1994, issue 1, p.1 | null | null | cs.CL cs.AI q-bio.NC | null | A computer model of "a sense of humour" suggested previously
[arXiv:0711.2058,0711.2061], relating the humorous effect with a specific
malfunction in information processing, is given in somewhat different
exposition. Psychological aspects of humour are elaborated more thoroughly. The
mechanism of laughter is formulated on the more general level. Detailed
discussion is presented for the higher levels of information processing, which
are responsible for a perception of complex samples of humour. Development of a
sense of humour in the process of evolution is discussed.
| [
{
"version": "v1",
"created": "Wed, 14 Nov 2007 18:32:09 GMT"
}
] | 2007-11-27T00:00:00 | [
[
"Suslov",
"I. M.",
"",
"P.L.Kapitza Institute for Physical Problems, Moscow,\n Russia"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
] |
0711.2383 | Barbara Cerato | Barbara Cerato, Guido Masera and Emanuele Viterbo | Decoding the Golden Code: a VLSI design | 25 pages, 10 figures | null | null | null | cs.AR | null | The recently proposed Golden code is an optimal space-time block code for 2 X
2 multiple-input multiple-output (MIMO) systems. The aim of this work is the
design of a VLSI decoder for a MIMO system coded with the Golden code. The
architecture is based on a rearrangement of the sphere decoding algorithm that
achieves maximum-likelihood (ML) decoding performance. Compared to other
approaces, the proposed solution exhibits an inherent flexibility in terms of
modulation schemes QAM modulation size and this makes our architecture
particularly suitable for adaptive modulation schemes.
| [
{
"version": "v1",
"created": "Thu, 15 Nov 2007 11:55:30 GMT"
}
] | 2007-11-16T00:00:00 | [
[
"Cerato",
"Barbara",
""
],
[
"Masera",
"Guido",
""
],
[
"Viterbo",
"Emanuele",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0711.2399 | Alexander Tiskin | Vladimir Deineko and Alexander Tiskin | Minimum-weight double-tree shortcutting for Metric TSP: Bounding the
approximation ratio | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Metric Traveling Salesman Problem (TSP) is a classical NP-hard
optimization problem. The double-tree shortcutting method for Metric TSP yields
an exponentially-sized space of TSP tours, each of which approximates the
optimal solution within at most a factor of 2. We consider the problem of
finding among these tours the one that gives the closest approximation, i.e.\
the \emph{minimum-weight double-tree shortcutting}. Previously, we gave an
efficient algorithm for this problem, and carried out its experimental
analysis. In this paper, we address the related question of the worst-case
approximation ratio for the minimum-weight double-tree shortcutting method. In
particular, we give lower bounds on the approximation ratio in some specific
metric spaces: the ratio of 2 in the discrete shortest path metric, 1.622 in
the planar Euclidean metric, and 1.666 in the planar Minkowski metric. The
first of these lower bounds is tight; we conjecture that the other two bounds
are also tight, and in particular that the minimum-weight double-tree method
provides a 1.622-approximation for planar Euclidean TSP.
| [
{
"version": "v1",
"created": "Thu, 15 Nov 2007 13:19:01 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Dec 2008 11:58:25 GMT"
},
{
"version": "v3",
"created": "Sun, 28 Dec 2008 17:28:18 GMT"
}
] | 2008-12-30T00:00:00 | [
[
"Deineko",
"Vladimir",
""
],
[
"Tiskin",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0711.2442 | Li Rong | Zhisheng Duan, Wenxu Wang, Chao Liu and Guanrong Chen | Are networks with more edges easier to synchronize? | 14 pages, 18 figures | null | null | null | cs.NI | null | In this paper, the relationship between the network synchronizability and the
edge distribution of its associated graph is investigated. First, it is shown
that adding one edge to a cycle definitely decreases the network
sychronizability. Then, since sometimes the synchronizability can be enhanced
by changing the network structure, the question of whether the networks with
more edges are easier to synchronize is addressed. It is shown by examples that
the answer is negative. This reveals that generally there are redundant edges
in a network, which not only make no contributions to synchronization but
actually may reduce the synchronizability. Moreover, an example shows that the
node betweenness centrality is not always a good indicator for the network
synchronizability. Finally, some more examples are presented to illustrate how
the network synchronizability varies following the addition of edges, where all
the examples show that the network synchronizability globally increases but
locally fluctuates as the number of added edges increases.
| [
{
"version": "v1",
"created": "Thu, 15 Nov 2007 15:34:55 GMT"
}
] | 2007-11-16T00:00:00 | [
[
"Duan",
"Zhisheng",
""
],
[
"Wang",
"Wenxu",
""
],
[
"Liu",
"Chao",
""
],
[
"Chen",
"Guanrong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0711.2444 | Richard Moot | Richard Moot (INRIA Futurs, Labri) | Proof nets for display logic | null | null | null | null | cs.CL | null | This paper explores several extensions of proof nets for the Lambek calculus
in order to handle the different connectives of display logic in a natural way.
The new proof net calculus handles some recent additions to the Lambek
vocabulary such as Galois connections and Grishin interactions. It concludes
with an exploration of the generative capacity of the Lambek-Grishin calculus,
presenting an embedding of lexicalized tree adjoining grammars into the
Lambek-Grishin calculus.
| [
{
"version": "v1",
"created": "Thu, 15 Nov 2007 15:39:48 GMT"
}
] | 2007-11-16T00:00:00 | [
[
"Moot",
"Richard",
"",
"INRIA Futurs, Labri"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0711.2478 | Vasileios Barmpoutis | Vasileios Barmpoutis, Gary F. Dargush | A Compact Self-organizing Cellular Automata-based Genetic Algorithm | 24 pages, 18 figures, Submitted to Evolutionary Computation | null | null | null | cs.NE cs.AI | null | A Genetic Algorithm (GA) is proposed in which each member of the population
can change schemata only with its neighbors according to a rule. The rule
methodology and the neighborhood structure employ elements from the Cellular
Automata (CA) strategies. Each member of the GA population is assigned to a
cell and crossover takes place only between adjacent cells, according to the
predefined rule. Although combinations of CA and GA approaches have appeared
previously, here we rely on the inherent self-organizing features of CA, rather
than on parallelism. This conceptual shift directs us toward the evolution of
compact populations containing only a handful of members. We find that the
resulting algorithm can search the design space more efficiently than
traditional GA strategies due to its ability to exploit mutations within this
compact self-organizing population. Consequently, premature convergence is
avoided and the final results often are more accurate. In order to reinforce
the superior mutation capability, a re-initialization strategy also is
implemented. Ten test functions and two benchmark structural engineering truss
design problems are examined in order to demonstrate the performance of the
method.
| [
{
"version": "v1",
"created": "Thu, 15 Nov 2007 18:19:39 GMT"
}
] | 2007-11-16T00:00:00 | [
[
"Barmpoutis",
"Vasileios",
""
],
[
"Dargush",
"Gary F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0711.2486 | Jean-Francois Boujut | Onur Hisarciklilar (LGS), Jean-Fran\c{c}ois Boujut (LGS) | An annotation based approach to support design communication | null | Dans Proceedings of ICED'07 - International Conference on
Engineering Design, Paris : France (2007) | null | null | cs.HC | null | The aim of this paper is to propose an approach based on the concept of
annotation for supporting design communication. In this paper, we describe a
co-operative design case study where we analyse some annotation practices,
mainly focused on design minutes recorded during project reviews. We point out
specific requirements concerning annotation needs. Based on these requirements,
we propose an annotation model, inspired from the Speech Act Theory (SAT) to
support communication in a 3D digital environment. We define two types of
annotations in the engineering design context, locutionary and illocutionary
annotations. The annotations we describe in this paper are materialised by a
set of digital artefacts, which have a semantic dimension allowing
express/record elements of technical justifications, traces of contradictory
debates, etc. In this paper, we first clarify the semantic annotation concept,
and we define general properties of annotations in the engineering design
context, and the role of annotations in different design project situations.
After the description of the case study, where we observe and analyse
annotations usage during the design reviews and minute making, the last section
is dedicated to present our approach. We then describe the SAT concept, and
define the concept of annotation acts. We conclude with a description of basic
annotation functionalities that are actually implemented in a software, based
on our approach.
| [
{
"version": "v1",
"created": "Thu, 15 Nov 2007 19:22:16 GMT"
}
] | 2007-11-16T00:00:00 | [
[
"Hisarciklilar",
"Onur",
"",
"LGS"
],
[
"Boujut",
"Jean-François",
"",
"LGS"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0711.2489 | Michel Grabisch | Pedro Miranda, Michel Grabisch (CES), Pedro Gil | Axiomatic structure of k-additive capacities | null | Mathematical Social Sciences (2005) 153-178 | null | null | cs.DM | null | In this paper we deal with the problem of axiomatizing the preference
relations modelled through Choquet integral with respect to a $k$-additive
capacity, i.e. whose M\"obius transform vanishes for subsets of more than $k$
elements. Thus, $k$-additive capacities range from probability measures ($k=1$)
to general capacities ($k=n$). The axiomatization is done in several steps,
starting from symmetric 2-additive capacities, a case related to the Gini
index, and finishing with general $k$-additive capacities. We put an emphasis
on 2-additive capacities. Our axiomatization is done in the framework of social
welfare, and complete previous results of Weymark, Gilboa and Ben Porath, and
Gajdos.
| [
{
"version": "v1",
"created": "Thu, 15 Nov 2007 19:24:22 GMT"
}
] | 2007-11-16T00:00:00 | [
[
"Miranda",
"Pedro",
"",
"CES"
],
[
"Grabisch",
"Michel",
"",
"CES"
],
[
"Gil",
"Pedro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0711.2490 | Michel Grabisch | Michel Grabisch (CES) | The M\"obius transform on symmetric ordered structures and its
application to capacities on finite sets | null | Discrete Mathematics (2004) 17-34 | null | null | cs.DM | null | Considering a linearly ordered set, we introduce its symmetric version, and
endow it with two operations extending supremum and infimum, so as to obtain an
algebraic structure close to a commutative ring. We show that imposing symmetry
necessarily entails non associativity, hence computing rules are defined in
order to deal with non associativity. We study in details computing rules,
which we endow with a partial order. This permits to find solutions to the
inversion formula underlying the M\"obius transform. Then we apply these
results to the case of capacities, a notion from decision theory which
corresponds, in the language of ordered sets, to order preserving mappings,
preserving also top and bottom. In this case, the solution of the inversion
formula is called the M\"obius transform of the capacity. Properties and
examples of M\"obius transform of sup-preserving and inf-preserving capacities
are given.
| [
{
"version": "v1",
"created": "Thu, 15 Nov 2007 19:25:12 GMT"
}
] | 2007-11-16T00:00:00 | [
[
"Grabisch",
"Michel",
"",
"CES"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0711.2501 | Neri Merhav | Neri Merhav | Error Exponents of Erasure/List Decoding Revisited via Moments of
Distance Enumerators | 24 pages; submitted to the IEEE Transactions on Information Theory | null | 10.1109/TIT.2008.929004 | null | cs.IT math.IT | null | The analysis of random coding error exponents pertaining to erasure/list
decoding, due to Forney, is revisited. Instead of using Jensen's inequality as
well as some other inequalities in the derivation, we demonstrate that an
exponentially tight analysis can be carried out by assessing the relevant
moments of a certain distance enumerator. The resulting bound has the following
advantages: (i) it is at least as tight as Forney's bound, (ii) under certain
symmetry conditions associated with the channel and the random coding
distribution, it is simpler than Forney's bound in the sense that it involves
an optimization over one parameter only (rather than two), and (iii) in certain
special cases, like the binary symmetric channel (BSC), the optimum value of
this parameter can be found in closed form, and so, there is no need to conduct
a numerical search. We have not found yet, however, a numerical example where
this new bound is strictly better than Forney's bound. This may provide an
additional evidence to support Forney's conjecture that his bound is tight for
the average code. We believe that the technique we suggest in this paper can be
useful in simplifying, and hopefully also improving, exponential error bounds
in other problem settings as well.
| [
{
"version": "v1",
"created": "Thu, 15 Nov 2007 20:20:19 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Merhav",
"Neri",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.2503 | Holger Rauhut | Goetz E. Pfander, Holger Rauhut | Sparsity in time-frequency representations | null | null | null | null | math.CA cs.IT math.IT | null | We consider signals and operators in finite dimension which have sparse
time-frequency representations. As main result we show that an $S$-sparse Gabor
representation in $\mathbb{C}^n$ with respect to a random unimodular window can
be recovered by Basis Pursuit with high probability provided that $S\leq
Cn/\log(n)$. Our results are applicable to the channel estimation problem in
wireless communications and they establish the usefulness of a class of
measurement matrices for compressive sensing.
| [
{
"version": "v1",
"created": "Thu, 15 Nov 2007 20:54:55 GMT"
}
] | 2007-11-16T00:00:00 | [
[
"Pfander",
"Goetz E.",
""
],
[
"Rauhut",
"Holger",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.2546 | Wojciech Moczydlowski | Wojciech Moczydlowski | Normalization of IZF with Replacement | null | Logical Methods in Computer Science, Volume 4, Issue 2 (April 8,
2008) lmcs:1235 | 10.2168/LMCS-4(2:1)2008 | null | cs.LO | null | ZF is a well investigated impredicative constructive version of
Zermelo-Fraenkel set theory. Using set terms, we axiomatize IZF with
Replacement, which we call \izfr, along with its intensional counterpart
\iizfr. We define a typed lambda calculus $\li$ corresponding to proofs in
\iizfr according to the Curry-Howard isomorphism principle. Using realizability
for \iizfr, we show weak normalization of $\li$. We use normalization to prove
the disjunction, numerical existence and term existence properties. An inner
extensional model is used to show these properties, along with the set
existence property, for full, extensional \izfr.
| [
{
"version": "v1",
"created": "Fri, 16 Nov 2007 02:44:05 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Apr 2008 15:49:00 GMT"
}
] | 2019-03-14T00:00:00 | [
[
"Moczydlowski",
"Wojciech",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0711.2547 | Syed Jafar | Viveck Cadambe, Syed A. Jafar, Shlomo Shamai (Shitz) | Interference Alignment on the Deterministic Channel and Application to
Fully Connected AWGN Interference Networks | null | null | null | null | cs.IT math.IT | null | An interference alignment example is constructed for the deterministic
channel model of the $K$ user interference channel. The deterministic channel
example is then translated into the Gaussian setting, creating the first known
example of a fully connected Gaussian $K$ user interference network with single
antenna nodes, real, non-zero and contant channel coefficients, and no
propagation delays where the degrees of freedom outerbound is achieved. An
analogy is drawn between the propagation delay based interference alignment
examples and the deterministic channel model which also allows similar
constructions for the 2 user $X$ channel as well.
| [
{
"version": "v1",
"created": "Fri, 16 Nov 2007 02:47:23 GMT"
}
] | 2007-11-19T00:00:00 | [
[
"Cadambe",
"Viveck",
"",
"Shitz"
],
[
"Jafar",
"Syed A.",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.2562 | J. Maurice Rojas | Ashraf Ibrahim, J. Maurice Rojas, Korben Rusek | Algorithmic Arithmetic Fewnomial Theory I: One Variable | This paper has been withdrawn by the authors | null | null | null | math.NT cs.CC math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Withdrawn by the authors due to an error in the proof of the finite field
result (Thm. 1.5): The random primes used in the proof need NOT avoid the
exceptional primes from Lemma 2.7, thus leaving Thm. 1.5 unproved.
| [
{
"version": "v1",
"created": "Fri, 16 Nov 2007 06:15:35 GMT"
},
{
"version": "v2",
"created": "Sun, 24 Jan 2010 16:04:36 GMT"
}
] | 2010-01-24T00:00:00 | [
[
"Ibrahim",
"Ashraf",
""
],
[
"Rojas",
"J. Maurice",
""
],
[
"Rusek",
"Korben",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
0711.2585 | Petteri Kaski | Andreas Bj\"orklund, Thore Husfeldt, Petteri Kaski, Mikko Koivisto | Computing the Tutte polynomial in vertex-exponential time | null | null | null | null | cs.DS cond-mat.stat-mech math.CO | null | The deletion--contraction algorithm is perhaps the most popular method for
computing a host of fundamental graph invariants such as the chromatic, flow,
and reliability polynomials in graph theory, the Jones polynomial of an
alternating link in knot theory, and the partition functions of the models of
Ising, Potts, and Fortuin--Kasteleyn in statistical physics. Prior to this
work, deletion--contraction was also the fastest known general-purpose
algorithm for these invariants, running in time roughly proportional to the
number of spanning trees in the input graph. Here, we give a substantially
faster algorithm that computes the Tutte polynomial--and hence, all the
aforementioned invariants and more--of an arbitrary graph in time within a
polynomial factor of the number of connected vertex sets. The algorithm
actually evaluates a multivariate generalization of the Tutte polynomial by
making use of an identity due to Fortuin and Kasteleyn. We also provide a
polynomial-space variant of the algorithm and give an analogous result for
Chung and Graham's cover polynomial. An implementation of the algorithm
outperforms deletion--contraction also in practice.
| [
{
"version": "v1",
"created": "Fri, 16 Nov 2007 10:51:10 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Nov 2007 10:41:46 GMT"
},
{
"version": "v3",
"created": "Mon, 14 Jan 2008 16:06:31 GMT"
},
{
"version": "v4",
"created": "Mon, 14 Apr 2008 10:31:54 GMT"
}
] | 2008-04-14T00:00:00 | [
[
"Björklund",
"Andreas",
""
],
[
"Husfeldt",
"Thore",
""
],
[
"Kaski",
"Petteri",
""
],
[
"Koivisto",
"Mikko",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0711.2605 | Gregory Price | Gregory N. Price and Erik D. Demaine | Generalized D-Forms Have No Spurious Creases | revised | null | null | null | cs.CG | http://creativecommons.org/licenses/by/3.0/ | A convex surface that is flat everywhere but on finitely many smooth curves
(or "seams") and points is a seam form. We show that the only creases through
the flat components of a seam form are either between vertices or tangent to
the seams. As corollaries we resolve open problems about certain special seam
forms: the flat components of a D-form have no creases at all, and the flat
component of a pita-form has at most one crease, between the seam's endpoints.
| [
{
"version": "v1",
"created": "Fri, 16 Nov 2007 20:58:57 GMT"
},
{
"version": "v2",
"created": "Thu, 7 May 2009 05:45:19 GMT"
}
] | 2009-05-07T00:00:00 | [
[
"Price",
"Gregory N.",
""
],
[
"Demaine",
"Erik D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0711.2615 | Franco Bagnoli | Franco Bagnoli, Francesca Di Patti | A Biologically Inspired Classifier | null | null | null | null | cs.DB cs.IR | null | We present a method for measuring the distance among records based on the
correlations of data stored in the corresponding database entries. The original
method (F. Bagnoli, A. Berrones and F. Franci. Physica A 332 (2004) 509-518)
was formulated in the context of opinion formation. The opinions expressed over
a set of topic originate a ``knowledge network'' among individuals, where two
individuals are nearer the more similar their expressed opinions are. Assuming
that individuals' opinions are stored in a database, the authors show that it
is possible to anticipate an opinion using the correlations in the database.
This corresponds to approximating the overlap between the tastes of two
individuals with the correlations of their expressed opinions.
In this paper we extend this model to nonlinear matching functions, inspired
by biological problems such as microarray (probe-sample pairing). We
investigate numerically the error between the correlation and the overlap
matrix for eight sequences of reference with random probes. Results show that
this method is particularly robust for detecting similarities in the presence
of translocations.
| [
{
"version": "v1",
"created": "Fri, 16 Nov 2007 13:38:15 GMT"
}
] | 2007-11-19T00:00:00 | [
[
"Bagnoli",
"Franco",
""
],
[
"Di Patti",
"Francesca",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0711.2618 | Krzysztof R. Apt | Krzysztof R. Apt, Farhad Arbab, Huiye Ma | A System for Distributed Mechanisms: Design, Implementation and
Applications | 36 pages; revised and expanded version | null | null | null | cs.DC cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe here a structured system for distributed mechanism design
appropriate for both Intranet and Internet applications. In our approach the
players dynamically form a network in which they know neither their neighbours
nor the size of the network and interact to jointly take decisions. The only
assumption concerning the underlying communication layer is that for each pair
of processes there is a path of neighbours connecting them. This allows us to
deal with arbitrary network topologies.
We also discuss the implementation of this system which consists of a
sequence of layers. The lower layers deal with the operations that implement
the basic primitives of distributed computing, namely low level communication
and distributed termination, while the upper layers use these primitives to
implement high level communication among players, including broadcasting and
multicasting, and distributed decision making.
This yields a highly flexible distributed system whose specific applications
are realized as instances of its top layer. This design is implemented in Java.
The system supports at various levels fault-tolerance and includes a
provision for distributed policing the purpose of which is to exclude
`dishonest' players. Also, it can be used for repeated creation of dynamically
formed networks of players interested in a joint decision making implemented by
means of a tax-based mechanism. We illustrate its flexibility by discussing a
number of implemented examples.
| [
{
"version": "v1",
"created": "Fri, 16 Nov 2007 14:10:16 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Feb 2008 15:10:54 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Jan 2010 13:23:13 GMT"
},
{
"version": "v4",
"created": "Tue, 20 Sep 2011 15:42:02 GMT"
}
] | 2011-09-21T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Arbab",
"Farhad",
""
],
[
"Ma",
"Huiye",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0711.2642 | Nihar Jindal | Giuseppe Caire, Nihar Jindal, Mari Kobayashi, Niranjay Ravindran | Multiuser MIMO Achievable Rates with Downlink Training and Channel State
Feedback | Revised for IEEE Trans. Information Theory, May 2009. (Original
submission: Nov. 2007) | null | 10.1109/TIT.2010.2046225 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a MIMO fading broadcast channel and compute achievable ergodic
rates when channel state information is acquired at the receivers via downlink
training and it is provided to the transmitter by channel state feedback.
Unquantized (analog) and quantized (digital) channel state feedback schemes are
analyzed and compared under various assumptions. Digital feedback is shown to
be potentially superior when the feedback channel uses per channel state
coefficient is larger than 1. Also, we show that by proper design of the
digital feedback link, errors in the feedback have a minor effect even if
simple uncoded modulation is used on the feedback channel. We discuss first the
case of an unfaded AWGN feedback channel with orthogonal access and then the
case of fading MIMO multi-access (MIMO-MAC). We show that by exploiting the
MIMO-MAC nature of the uplink channel, a much better scaling of the feedback
channel resource with the number of base station antennas can be achieved.
Finally, for the case of delayed feedback, we show that in the realistic case
where the fading process has (normalized) maximum Doppler frequency shift 0 < F
< 1/2, a fraction 1 - 2F of the optimal multiplexing gain is achievable. The
general conclusion of this work is that very significant downlink throughput is
achievable with simple and efficient channel state feedback, provided that the
feedback link is properly designed.
| [
{
"version": "v1",
"created": "Fri, 16 Nov 2007 16:04:23 GMT"
},
{
"version": "v2",
"created": "Fri, 8 May 2009 18:51:41 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Caire",
"Giuseppe",
""
],
[
"Jindal",
"Nihar",
""
],
[
"Kobayashi",
"Mari",
""
],
[
"Ravindran",
"Niranjay",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.2652 | Brockway McMillan | Brockway McMillan | An information-theoretic analog of a result of Perelman | null | null | null | null | math.DG cs.IT math.IT | null | Each compact manifold M of finite dimension k is differentiable and supports
an intrinsic probability measure. There then exists a measurable transformation
of M to the k-dimensional "surface" of the (k+1)-dimensional ball.
| [
{
"version": "v1",
"created": "Fri, 16 Nov 2007 22:53:00 GMT"
}
] | 2007-11-19T00:00:00 | [
[
"McMillan",
"Brockway",
""
]
] | [
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.2666 | Matthew Harrison | Matthew T. Harrison | The Generalized Asymptotic Equipartition Property: Necessary and
Sufficient Conditions | 19 pages | IEEE Transactions on Information Theory, (2008) 54: 3211-3216 | 10.1109/TIT.2008.924668 | null | cs.IT math.IT | null | Suppose a string $X_1^n=(X_1,X_2,...,X_n)$ generated by a memoryless source
$(X_n)_{n\geq 1}$ with distribution $P$ is to be compressed with distortion no
greater than $D\geq 0$, using a memoryless random codebook with distribution
$Q$. The compression performance is determined by the ``generalized asymptotic
equipartition property'' (AEP), which states that the probability of finding a
$D$-close match between $X_1^n$ and any given codeword $Y_1^n$, is
approximately $2^{-n R(P,Q,D)}$, where the rate function $R(P,Q,D)$ can be
expressed as an infimum of relative entropies. The main purpose here is to
remove various restrictive assumptions on the validity of this result that have
appeared in the recent literature. Necessary and sufficient conditions for the
generalized AEP are provided in the general setting of abstract alphabets and
unbounded distortion measures. All possible distortion levels $D\geq 0$ are
considered; the source $(X_n)_{n\geq 1}$ can be stationary and ergodic; and the
codebook distribution can have memory. Moreover, the behavior of the matching
probability is precisely characterized, even when the generalized AEP is not
valid. Natural characterizations of the rate function $R(P,Q,D)$ are
established under equally general conditions.
| [
{
"version": "v1",
"created": "Fri, 16 Nov 2007 18:58:45 GMT"
}
] | 2013-01-18T00:00:00 | [
[
"Harrison",
"Matthew T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.2671 | Himanshu Thapliyal | Himanshu Thapliyal, Hamid R. Arabnia, Rajnish Bajpai, Kamal K. Sharma | Combined Integer and Variable Precision (CIVP) Floating Point
Multiplication Architecture for FPGAs | Published in Proceedings of the 2007 International Conference on
Parallel and Distributed Processing Techniques and Applications (PDPTA'07),
Las Vegas, U.S.A, June 2007, Volume 1, pp. 449-450.(CSREA Press) | null | null | null | cs.AR | null | In this paper, we propose an architecture/methodology for making FPGAs
suitable for integer as well as variable precision floating point
multiplication. The proposed work will of great importance in applications
which requires variable precision floating point multiplication such as
multi-media processing applications. In the proposed architecture/methodology,
we propose the replacement of existing 18x18 bit and 25x18 bit dedicated
multipliers in FPGAs with dedicated 24x24 bit and 24x9 bit multipliers,
respectively. We have proved that our approach of providing the dedicated 24x24
bit and 24x9 bit multipliers in FPGAs will make them efficient for performing
integer as well as single precision, double precision, and Quadruple precision
floating point multiplications.
| [
{
"version": "v1",
"created": "Fri, 16 Nov 2007 20:18:32 GMT"
}
] | 2007-11-19T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Arabnia",
"Hamid R.",
""
],
[
"Bajpai",
"Rajnish",
""
],
[
"Sharma",
"Kamal K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0711.2674 | Himanshu Thapliyal | Himanshu Thapliyal, Hamid R. Arabnia, Rajnish Bajpai, Kamal K. Sharma | Partial Reversible Gates(PRG) for Reversible BCD Arithmetic | Published in Proceedings of the 2007 International Conference on
Computer Design(CDES'07), Las Vegas, U.S.A, June 2007, pp. 90-91(CSREA Press) | null | null | null | cs.AR | null | IEEE 754r is the ongoing revision to the IEEE 754 floating point standard and
a major enhancement to the standard is the addition of decimal format.
Furthermore, in the recent years reversible logic has emerged as a promising
computing paradigm having its applications in low power CMOS, quantum
computing, nanotechnology, and optical computing. The major goal in reversible
logic is to minimize the number of reversible gates and garbage outputs. Thus,
this paper proposes the novel concept of partial reversible gates that will
satisfy the reversibility criteria for specific cases in BCD arithmetic. The
partial reversible gate is proposed to minimize the number of reversible gates
and garbage outputs, while designing the reversible BCD arithmetic circuits.
| [
{
"version": "v1",
"created": "Fri, 16 Nov 2007 20:25:20 GMT"
}
] | 2007-11-19T00:00:00 | [
[
"Thapliyal",
"Himanshu",
""
],
[
"Arabnia",
"Hamid R.",
""
],
[
"Bajpai",
"Rajnish",
""
],
[
"Sharma",
"Kamal K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0711.2710 | Bernhard Haeupler | Bernhard Haeupler and Robert E. Tarjan | Finding a Feasible Flow in a Strongly Connected Network | 4 pages, submitted to Operations Research Letters, minor updates:
typos corrected, speed-up = improvement of the worst-case time bound | null | null | null | cs.DS | null | We consider the problem of finding a feasible single-commodity flow in a
strongly connected network with fixed supplies and demands, provided that the
sum of supplies equals the sum of demands and the minimum arc capacity is at
least this sum. A fast algorithm for this problem improves the worst-case time
bound of the Goldberg-Rao maximum flow method by a constant factor. Erlebach
and Hagerup gave an linear-time feasible flow algorithm. We give an arguably
simpler one.
| [
{
"version": "v1",
"created": "Sat, 17 Nov 2007 01:59:53 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Dec 2007 15:34:37 GMT"
}
] | 2007-12-03T00:00:00 | [
[
"Haeupler",
"Bernhard",
""
],
[
"Tarjan",
"Robert E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0711.2712 | Peyman Razaghi | P. Razaghi and W. Yu | Parity Forwarding for Multiple-Relay Networks | submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | This paper proposes a relaying strategy for the multiple-relay network in
which each relay decodes a selection of transmitted messages by other
transmitting terminals, and forwards parities of the decoded codewords. This
protocol improves the previously known achievable rate of the
decode-and-forward (DF) strategy for multirelay networks by allowing relays to
decode only a selection of messages from relays with strong links to it. Hence,
each relay may have several choices as to which messages to decode, and for a
given network many different parity forwarding protocols may exist. A tree
structure is devised to characterize a class of parity forwarding protocols for
an arbitrary multirelay network. Based on this tree structure, closed-form
expressions for the achievable rates of these DF schemes are derived. It is
shown that parity forwarding is capacity achieving for new forms of degraded
relay networks.
| [
{
"version": "v1",
"created": "Sat, 17 Nov 2007 03:08:09 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Razaghi",
"P.",
""
],
[
"Yu",
"W.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.2745 | Urs Niesen | Urs Niesen, Piyush Gupta, Devavrat Shah | On Capacity Scaling in Arbitrary Wireless Networks | 38 pages, 6 figures, to appear in IEEE Transactions on Information
Theory | IEEE Transactions on Information Theory, vol. 55, pp. 3959-3982,
September 2009 | 10.1109/TIT.2009.2025537 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent work, Ozgur, Leveque, and Tse (2007) obtained a complete scaling
characterization of throughput scaling for random extended wireless networks
(i.e., $n$ nodes are placed uniformly at random in a square region of area
$n$). They showed that for small path-loss exponents $\alpha\in(2,3]$
cooperative communication is order optimal, and for large path-loss exponents
$\alpha > 3$ multi-hop communication is order optimal. However, their results
(both the communication scheme and the proof technique) are strongly dependent
on the regularity induced with high probability by the random node placement.
In this paper, we consider the problem of characterizing the throughput
scaling in extended wireless networks with arbitrary node placement. As a main
result, we propose a more general novel cooperative communication scheme that
works for arbitrarily placed nodes. For small path-loss exponents $\alpha \in
(2,3]$, we show that our scheme is order optimal for all node placements, and
achieves exactly the same throughput scaling as in Ozgur et al. This shows that
the regularity of the node placement does not affect the scaling of the
achievable rates for $\alpha\in (2,3]$. The situation is, however, markedly
different for large path-loss exponents $\alpha >3$. We show that in this
regime the scaling of the achievable per-node rates depends crucially on the
regularity of the node placement. We then present a family of schemes that
smoothly "interpolate" between multi-hop and cooperative communication,
depending upon the level of regularity in the node placement. We establish
order optimality of these schemes under adversarial node placement for $\alpha
> 3$.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 19:59:52 GMT"
},
{
"version": "v2",
"created": "Sun, 3 May 2009 01:27:28 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Aug 2009 19:00:50 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Niesen",
"Urs",
""
],
[
"Gupta",
"Piyush",
""
],
[
"Shah",
"Devavrat",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.2749 | George Bell | George I. Bell | Diamond Solitaire | 11 pages, 12 figures | The Games and Puzzles Journal, Issue 41, September-October 2005
http://gpj.connectfree.co.uk/gpjw.htm | null | null | math.CO cs.DM | null | We investigate the game of peg solitaire on different board shapes, and find
those of diamond or rhombus shape have interesting properties. When one peg
captures many pegs consecutively, this is called a sweep. Rhombus boards of
side 6 have the property that no matter which peg is missing at the start, the
game can be solved to one peg using a maximal sweep of length 16. We show how
to construct a solution on a rhombus board of side 6i, where the final move is
a maximal sweep of length r, where r=(9i-1)(3i-1) is a "rhombic matchstick
number".
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 16:26:32 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Bell",
"George I.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0711.2760 | Vita Hinze-Hoare | Vita Hinze-Hoare | Computer Supported Collaborative Research | null | null | null | null | cs.HC | null | It is suggested that a new area of CSCR (Computer Supported Collaborative
Research) is distinguished from CSCW (Computer Supported Collaborative Work)
and CSCL (Computer Supported Collaborative Learning) and that the demarcation
between the three areas could do with greater clarification and prescription.
Although the areas of Human Computer Interaction (HCI), CSCW, and CSCL are
now relatively well established, the related field of Computer Supported
Collaborative Research (CSCR) is new and little understood. An analysis of the
principles and issues behind CSCR is undertaken with a view to determining
precisely its nature and scope and to delineate it clearly from CSCW and CSCL.
This determination is such that it is generally applicable to the building,
design and evaluation of collaborative research environments.
A particular instance of the CSCR domain is then examined in order to
determine the requirements of a collaborative research environment for students
and supervisors (CRESS).
| [
{
"version": "v1",
"created": "Sat, 17 Nov 2007 20:08:41 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Hinze-Hoare",
"Vita",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0711.2762 | Shivaprasad Kotagiri | ShivaPrasad Kotagiri, J.Nicholas Laneman | Variations on Information Embedding in Multiple Access and Broadcast
Channels | Submitted to Transactions on Information Theory | null | null | null | cs.IT math.IT | null | Information embedding (IE) is the transmission of information within a host
signal subject to a distortion constraint. There are two types of embedding
methods, namely irreversible IE and reversible IE, depending upon whether or
not the host, as well as the message, is recovered at the decoder. In
irreversible IE, only the embedded message is recovered at the decoder, and in
reversible IE, both the message and the host are recovered at the decoder. This
paper considers combinations of irreversible and reversible IE in multiple
access channels (MAC) and physically degraded broadcast channels (BC).
| [
{
"version": "v1",
"created": "Sat, 17 Nov 2007 21:57:47 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Kotagiri",
"ShivaPrasad",
""
],
[
"Laneman",
"J. Nicholas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.2780 | Salvatore Scellato | Salvatore Scellato (Scuola Superiore di Catania), Cecilia Mascolo
(Department of Computer Science, University College London), Mirco Musolesi
(Department of Computer Science, Dartmouth College), Vito Latora
(Dipartimento di Fisica e Astronomia, Universita' di Catania) | Epcast: Controlled Dissemination in Human-based Wireless Networks by
means of Epidemic Spreading Models | null | null | null | null | cs.NI | null | Epidemics-inspired techniques have received huge attention in recent years
from the distributed systems and networking communities. These algorithms and
protocols rely on probabilistic message replication and redundancy to ensure
reliable communication. Moreover, they have been successfully exploited to
support group communication in distributed systems, broadcasting, multicasting
and information dissemination in fixed and mobile networks. However, in most of
the existing work, the probability of infection is determined heuristically,
without relying on any analytical model. This often leads to unnecessarily high
transmission overheads.
In this paper we show that models of epidemic spreading in complex networks
can be applied to the problem of tuning and controlling the dissemination of
information in wireless ad hoc networks composed of devices carried by
individuals, i.e., human-based networks. The novelty of our idea resides in the
evaluation and exploitation of the structure of the underlying human network
for the automatic tuning of the dissemination process in order to improve the
protocol performance. We evaluate the results using synthetic mobility models
and real human contacts traces.
| [
{
"version": "v1",
"created": "Sun, 18 Nov 2007 09:29:19 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Scellato",
"Salvatore",
"",
"Scuola Superiore di Catania"
],
[
"Mascolo",
"Cecilia",
"",
"Department of Computer Science, University College London"
],
[
"Musolesi",
"Mirco",
"",
"Department of Computer Science, Dartmouth College"
],
[
"Latora",
"Vito",
"",
"Dipartimento di Fisica e Astronomia, Universita' di Catania"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0711.2801 | Xinjia Chen | Xinjia Chen | Inverse Sampling for Nonasymptotic Sequential Estimation of Bounded
Variable Means | 31 pages, 4 figures, added proofs | null | null | null | math.ST cs.LG math.PR stat.TH | null | In this paper, we consider the nonasymptotic sequential estimation of means
of random variables bounded in between zero and one. We have rigorously
demonstrated that, in order to guarantee prescribed relative precision and
confidence level, it suffices to continue sampling until the sample sum is no
less than a certain bound and then take the average of samples as an estimate
for the mean of the bounded random variable. We have developed an explicit
formula and a bisection search method for the determination of such bound of
sample sum, without any knowledge of the bounded variable. Moreover, we have
derived bounds for the distribution of sample size. In the special case of
Bernoulli random variables, we have established analytical and numerical
methods to further reduce the bound of sample sum and thus improve the
efficiency of sampling. Furthermore, the fallacy of existing results are
detected and analyzed.
| [
{
"version": "v1",
"created": "Sun, 18 Nov 2007 17:28:23 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Dec 2007 21:59:44 GMT"
}
] | 2013-11-05T00:00:00 | [
[
"Chen",
"Xinjia",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0711.2811 | Annie Bouyer | Gilles Halin (CRAI), Sylvain Kubicki (CRAI) | Une approche par les mod\`eles pour le suivi de l'activit\'e de
construction d'un b\^atiment. Bat'iViews : une interface multi-vues
orient\'ee gestion de chantier | null | null | null | null | cs.HC | null | Cooperation between actors in design and construction activities in
architecture is an essential stake nowadays. In professional practices the
actors involved in construction projects use numerous tools. The project is
unique but the "views" that actors manipulate are various and sometimes
fundamentally different. Their common characteristic is that they partially
represent the cooperation context through a specific point of view.
"Bat'iViews" suggests to the actors a multi-view interface of the context and
enables to navigate through the different views. This proposition is based on a
model-driven approach. We distinguish between "context modelling" and modelling
of concepts represented in each "businessview". A model integrative
infrastructure allows us to develop the prototype and to manage user
interaction through the definition of models' transformations.
| [
{
"version": "v1",
"created": "Sun, 18 Nov 2007 19:10:18 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Halin",
"Gilles",
"",
"CRAI"
],
[
"Kubicki",
"Sylvain",
"",
"CRAI"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0711.2824 | Syed Jafar | Viveck R. Cadambe, Syed A. Jafar | Degrees of Freedom of Wireless X Networks | 26 pages | null | null | null | cs.IT math.IT | null | We explore the degrees of freedom of $M\times N$ user wireless $X$ networks,
i.e. networks of $M$ transmitters and $N$ receivers where every transmitter has
an independent message for every receiver. We derive a general outerbound on
the degrees of freedom \emph{region} of these networks. When all nodes have a
single antenna and all channel coefficients vary in time or frequency, we show
that the \emph{total} number of degrees of freedom of the $X$ network is equal
to $\frac{MN}{M+N-1}$ per orthogonal time and frequency dimension.
Achievability is proved by constructing interference alignment schemes for $X$
networks that can come arbitrarily close to the outerbound on degrees of
freedom. For the case where either M=2 or N=2 we find that the outerbound is
exactly achievable. While $X$ networks have significant degrees of freedom
benefits over interference networks when the number of users is small, our
results show that as the number of users increases, this advantage disappears.
Thus, for large $K$, the $K\times K$ user wireless $X$ network loses half the
degrees of freedom relative to the $K\times K$ MIMO outerbound achievable
through full cooperation. Interestingly, when there are few transmitters
sending to many receivers ($N\gg M$) or many transmitters sending to few
receivers ($M\gg N$), $X$ networks are able to approach the $\min(M,N)$ degrees
of freedom possible with full cooperation on the $M\times N$ MIMO channel.
Similar to the interference channel, we also construct an example of a 2 user
$X$ channel with propagation delays where the outerbound on degrees of freedom
is achieved through interference alignment based on a simple TDMA strategy.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 00:27:49 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Cadambe",
"Viveck R.",
""
],
[
"Jafar",
"Syed A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.2832 | Annie Bouyer | Salma Chaabouni (MAP / Crai), Jc Bignon (MAP / Crai), Gilles Halin
(MAP / Crai) | Premi\`ere \'etape vers une navigation r\'ef\'erentielle par l'image
pour l'assistance \`a la conception des ambiances lumineuses | null | null | null | null | cs.IR | null | In the first design stage, image reference plays a double role of means of
formulation and resolution of problems. In our approach, we consider image
reference as a support of creation activity to generate ideas and we propose a
tool for navigation in references by image in order to assist daylight ambience
design. Within this paper, we present, in a first part, the semantic indexation
method to be used for the indexation of our image database. In a second part we
propose a synthetic analysis of various modes of referential navigation in
order to propose a tool implementing all or a part of these modes.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 16:10:35 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Chaabouni",
"Salma",
"",
"MAP / Crai"
],
[
"Bignon",
"Jc",
"",
"MAP / Crai"
],
[
"Halin",
"Gilles",
"",
"MAP / Crai"
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0711.2835 | Sergey Bereg | Sergey Bereg | Faster Algorithms for Rigidity in the Plane | null | null | null | null | cs.CG | null | In [1], a new construction called red-black hierarchy characterizing Laman
graphs and an algorithm for computing it were presented. For a Laman graph
G=(V,E) with n vertices it runs in O(n^2) time assuming that a partition of
(V,E+e) into two spanning trees is given. We show that a simple modification
reduces the running time to O(n\log n). The total running time can be reduced
O(n\sqrt{n\log n}) using the algorithm by Gabow and Westermann [2] for
partitioning a graph into two forests. The existence of a red-black hierarchy
is a necessary and sufficient condition for a graph to be a Laman graph. The
algorithm for constructing a red-black hierarchy can be then modified to
recognize Laman graphs in the same time.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 18:54:32 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Feb 2008 18:38:50 GMT"
}
] | 2008-02-29T00:00:00 | [
[
"Bereg",
"Sergey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0711.2842 | L.T. Handoko | L.T. Handoko | A new approach for scientific data dissemination in developing
countries: a case of Indonesia | 6 pages | Earth, Moon, and Planets 104 (2009) 331 | 10.1007/s11038-008-9283-6 | FISIKALIPI-07020 | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This short paper is intended as an additional progress report to share our
experiences in Indonesia on collecting, integrating and disseminating both
global and local scientific data across the country through the web technology.
Our recent efforts are exerted on improving the local public access to global
scientific data, and on the other hand encouraging the local scientific data to
be more accessible for the global communities. We have maintained
well-connected infrastructure and some web-based information management systems
to realize such objectives. This paper is especially focused on introducing the
ARSIP for mirroring global as well as sharing local scientific data, and the
newly developed Indonesian Scientific Index for integrating local scientific
data through an automated intelligent indexing system.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 04:56:33 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Nov 2007 22:58:50 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Mar 2009 08:31:06 GMT"
}
] | 2009-03-05T00:00:00 | [
[
"Handoko",
"L. T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0711.2843 | Xueliang Li | Xueliang Li, Xiangmei Yao, Wenli Zhou | Complexity of the conditional colorability of graphs | 8 pages | null | null | null | cs.DM cs.CC | null | For an integer $r>0$, a conditional $(k,r)$-coloring of a graph $G$ is a
proper $k$-coloring of the vertices of $G$ such that every vertex $v$ of degree
$d(v)$ in $G$ is adjacent to vertices with at least $min\{r, d(v)\}$ different
colors. The smallest integer $k$ for which a graph $G$ has a conditional
$(k,r)$-coloring is called the $r$th order conditional chromatic number,
denoted by $\chi_r(G)$. It is easy to see that the conditional coloring is a
generalization of the traditional vertex coloring for which $r=1$. In this
paper, we consider the complexity of the conditional colorings of graphs. The
main result is that the conditional $(3,2)$-colorability is $NP$-complete for
triangle-free graphs with maximum degree at most 3, which is different from the
old result that the traditional 3-colorability is polynomial solvable for
graphs with maximum degree at most 3. This also implies that it is
$NP$-complete to determine if a graph of maximum degree 3 is $(3,2)$- or
$(4,2)$-colorable. Also we have proved that some old complexity results for
traditional colorings still hold for the conditional colorings.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 05:41:36 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Li",
"Xueliang",
""
],
[
"Yao",
"Xiangmei",
""
],
[
"Zhou",
"Wenli",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0711.2844 | Xueliang Li | Xueliang Li, Wenli Zhou | Dynamic 3-Coloring of Claw-free Graphs | 13 pages | null | null | null | cs.DM cs.CC | null | A {\it dynamic $k$-coloring} of a graph $G$ is a proper $k$-coloring of the
vertices of $G$ such that every vertex of degree at least 2 in $G$ will be
adjacent to vertices with at least 2 different colors. The smallest number $k$
for which a graph $G$ can have a dynamic $k$-coloring is the {\it dynamic
chromatic number}, denoted by $\chi_d(G)$. In this paper, we investigate the
dynamic 3-colorings of claw-free graphs. First, we prove that it is
$NP$-complete to determine if a claw-free graph with maximum degree 3 is
dynamically 3-colorable. Second, by forbidding a kind of subgraphs, we find a
reasonable subclass of claw-free graphs with maximum degree 3, for which the
dynamically 3-colorable problem can be solved in linear time. Third, we give a
linear time algorithm to recognize this subclass of graphs, and a linear time
algorithm to determine whether it is dynamically 3-colorable. We also give a
linear time algorithm to color the graphs in the subclass by 3 colors.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 05:56:01 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Li",
"Xueliang",
""
],
[
"Zhou",
"Wenli",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0711.2867 | Cristobald de Kerchove | Cristobald de Kerchove, Laure Ninove, Paul Van Dooren | Maximizing PageRank via outlinks | 27 pages, 14 figures, submitted to Linear Algebra Appl | null | null | null | cs.IR math.RA | null | We analyze linkage strategies for a set I of webpages for which the webmaster
wants to maximize the sum of Google's PageRank scores. The webmaster can only
choose the hyperlinks starting from the webpages of I and has no control on the
hyperlinks from other webpages. We provide an optimal linkage strategy under
some reasonable assumptions.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 09:43:22 GMT"
}
] | 2007-12-04T00:00:00 | [
[
"de Kerchove",
"Cristobald",
""
],
[
"Ninove",
"Laure",
""
],
[
"Van Dooren",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
0711.2873 | Axel Heim | Axel Heim, Vladimir Sidorenko, Uli Sorger | Trellis Computations | 9 pages, 4 figures | null | null | null | cs.IT math.IT | null | For a certain class of functions, the distribution of the function values can
be calculated in the trellis or a sub-trellis. The forward/backward recursion
known from the BCJR algorithm is generalized to compute the moments of these
distributions. In analogy to the symbol probabilities, by introducing a
constraint at a certain depth in the trellis we obtain symbol moments. These
moments are required for an efficient implementation of the discriminated
belief propagation algorithm in [2], and can furthermore be utilized to compute
conditional entropies in the trellis.
The moment computation algorithm has the same asymptotic complexity as the
BCJR algorithm. It is applicable to any commutative semi-ring, thus actually
providing a generalization of the Viterbi algorithm.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 09:30:51 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Heim",
"Axel",
""
],
[
"Sidorenko",
"Vladimir",
""
],
[
"Sorger",
"Uli",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.2895 | Stephanie Wehner | Stephanie Wehner, Christian Schaffner, Barbara Terhal | Cryptography from Noisy Storage | 13 pages RevTex, 2 figures. v2: more comments on implementation
dependent attacks, v3: published version (minor changes) | Phys. Rev. Lett. 100, 220502 (2008) | 10.1103/PhysRevLett.100.220502 | null | quant-ph cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show how to implement cryptographic primitives based on the realistic
assumption that quantum storage of qubits is noisy. We thereby consider
individual-storage attacks, i.e. the dishonest party attempts to store each
incoming qubit separately. Our model is similar to the model of bounded-quantum
storage, however, we consider an explicit noise model inspired by present-day
technology. To illustrate the power of this new model, we show that a protocol
for oblivious transfer (OT) is secure for any amount of quantum-storage noise,
as long as honest players can perform perfect quantum operations. Our model
also allows the security of protocols that cope with noise in the operations of
the honest players and achieve more advanced tasks such as secure
identification.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 16:50:08 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Nov 2007 16:43:09 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Jun 2008 18:48:03 GMT"
}
] | 2008-06-20T00:00:00 | [
[
"Wehner",
"Stephanie",
""
],
[
"Schaffner",
"Christian",
""
],
[
"Terhal",
"Barbara",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0711.2897 | Michael Tung M. | J. Izquierdo, M.M. Tung, R. Perez, F. J. Martinez | Estimation of fuzzy anomalies in Water Distribution Systems | 5 pages | Progress in Industrial Mathematics at ECMI 2006 (edited by L. L.
Bonilla, M. A. Moscoso, G. Platero, and J. M. Vega), vol. 12 of Mathematics
in Industry, pp. 801-805 (Springer, Berlin, 2007), ISBN 978-3-540-71991-5 | null | null | cs.NE | null | State estimation is necessary in diagnosing anomalies in Water Demand Systems
(WDS). In this paper we present a neural network performing such a task. State
estimation is performed by using optimization, which tries to reconcile all the
available information. Quantification of the uncertainty of the input data
(telemetry measures and demand predictions) can be achieved by means of robust
estate estimation. Using a mathematical model of the network, fuzzy estimated
states for anomalous states of the network can be obtained. They are used to
train a neural network capable of assessing WDS anomalies associated with
particular sets of measurements.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 11:24:47 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Izquierdo",
"J.",
""
],
[
"Tung",
"M. M.",
""
],
[
"Perez",
"R.",
""
],
[
"Martinez",
"F. J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0711.2909 | Krzysztof R. Apt | Krzysztof R. Apt, Francesca Rossi, Kristen Brent Venable | Comparing the notions of optimality in CP-nets, strategic games and soft
constraints | 39 pages. To appear in Annals of Mathematics and Artificial
Intelligence | null | null | null | cs.AI cs.GT | null | The notion of optimality naturally arises in many areas of applied
mathematics and computer science concerned with decision making. Here we
consider this notion in the context of three formalisms used for different
purposes in reasoning about multi-agent systems: strategic games, CP-nets, and
soft constraints. To relate the notions of optimality in these formalisms we
introduce a natural qualitative modification of the notion of a strategic game.
We show then that the optimal outcomes of a CP-net are exactly the Nash
equilibria of such games. This allows us to use the techniques of game theory
to search for optimal outcomes of CP-nets and vice-versa, to use techniques
developed for CP-nets to search for Nash equilibria of the considered games.
Then, we relate the notion of optimality used in the area of soft constraints
to that used in a generalization of strategic games, called graphical games. In
particular we prove that for a natural class of soft constraints that includes
weighted constraints every optimal solution is both a Nash equilibrium and
Pareto efficient joint strategy. For a natural mapping in the other direction
we show that Pareto efficient joint strategies coincide with the optimal
solutions of soft constraints.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 12:14:27 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2008 10:47:41 GMT"
}
] | 2008-04-21T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Rossi",
"Francesca",
""
],
[
"Venable",
"Kristen Brent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0711.2914 | Tshilidzi Marwala | Gidudu Anthony, Hulley Gregg and Marwala Tshilidzi | Image Classification Using SVMs: One-against-One Vs One-against-All | Proccedings of the 28th Asian Conference on Remote Sensing, 2007 | null | null | null | cs.LG cs.AI cs.CV | null | Support Vector Machines (SVMs) are a relatively new supervised classification
technique to the land cover mapping community. They have their roots in
Statistical Learning Theory and have gained prominence because they are robust,
accurate and are effective even when using a small training sample. By their
nature SVMs are essentially binary classifiers, however, they can be adopted to
handle the multiple classification tasks common in remote sensing studies. The
two approaches commonly used are the One-Against-One (1A1) and One-Against-All
(1AA) techniques. In this paper, these approaches are evaluated in as far as
their impact and implication for land cover mapping. The main finding from this
research is that whereas the 1AA technique is more predisposed to yielding
unclassified and mixed pixels, the resulting classification accuracy is not
significantly different from 1A1 approach. It is the authors conclusion
therefore that ultimately the choice of technique adopted boils down to
personal preference and the uniqueness of the dataset at hand.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 12:25:00 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Anthony",
"Gidudu",
""
],
[
"Gregg",
"Hulley",
""
],
[
"Tshilidzi",
"Marwala",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0711.2917 | Anne-Marie Vercoustre | James A. Thom (RMIT), Jovan Pehcevski (INRIA Rocquencourt / INRIA
Sophia Antipolis), Anne-Marie Vercoustre (INRIA Rocquencourt / INRIA Sophia
Antipolis) | Use of Wikipedia Categories in Entity Ranking | null | Dans The 12th Australasian Document Computing Symposium (ADCS'07)
(2007) | null | null | cs.IR | null | Wikipedia is a useful source of knowledge that has many applications in
language processing and knowledge representation. The Wikipedia category graph
can be compared with the class hierarchy in an ontology; it has some
characteristics in common as well as some differences. In this paper, we
present our approach for answering entity ranking queries from the Wikipedia.
In particular, we explore how to make use of Wikipedia categories to improve
entity ranking effectiveness. Our experiments show that using categories of
example entities works significantly better than using loosely defined target
categories.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 12:35:48 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Thom",
"James A.",
"",
"RMIT"
],
[
"Pehcevski",
"Jovan",
"",
"INRIA Rocquencourt / INRIA\n Sophia Antipolis"
],
[
"Vercoustre",
"Anne-Marie",
"",
"INRIA Rocquencourt / INRIA Sophia\n Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0711.2961 | Felix Brandt | Felix Brandt, Felix Fischer, Paul Harrenstein | Recognizing Members of the Tournament Equilibrium Set is NP-hard | 9 pages, 3 figures | Social Choice and Welfare 34(4), 2009 | 10.1007/s00355-009-0419-z | null | cs.CC cs.GT cs.MA | null | A recurring theme in the mathematical social sciences is how to select the
"most desirable" elements given a binary dominance relation on a set of
alternatives. Schwartz's tournament equilibrium set (TEQ) ranks among the most
intriguing, but also among the most enigmatic, tournament solutions that have
been proposed so far in this context. Due to its unwieldy recursive definition,
little is known about TEQ. In particular, its monotonicity remains an open
problem up to date. Yet, if TEQ were to satisfy monotonicity, it would be a
very attractive tournament solution concept refining both the Banks set and
Dutta's minimal covering set. We show that the problem of deciding whether a
given alternative is contained in TEQ is NP-hard.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 15:48:46 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Jan 2008 13:47:48 GMT"
}
] | 2015-02-06T00:00:00 | [
[
"Brandt",
"Felix",
""
],
[
"Fischer",
"Felix",
""
],
[
"Harrenstein",
"Paul",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0711.2971 | Annie Bouyer | Sylvain Kubicki (MAP / CRAI), Annie Guerri\'ero (MAP / CRAI), Damien
Hanser (MAP / CRAI), Gilles Halin (MAP / CRAI) | IT services design to support coordination practices in the
Luxembourguish AEC sector | null | null | null | null | cs.HC | null | In the Architecture Engineering and Construction sector (AEC) cooperation
between actors is essential for project success. The configuration of actors'
organization takes different forms like the associated coordination mechanisms.
Our approach consists in analyzing these coordination mechanisms through the
identification of the "base practices" realized by the actors of a construction
project to cooperate. We also try with practitioners to highlight the "best
practices" of cooperation. Then we suggest here two prototypes of IT services
aiming to demonstrate the value added of IT to support cooperation. These
prototype tools allow us to sensitize the actors through terrain experiments
and then to bring inch by inch the Luxembourgish AEC sector towards electronic
cooperation.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 16:36:02 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Kubicki",
"Sylvain",
"",
"MAP / CRAI"
],
[
"Guerriéro",
"Annie",
"",
"MAP / CRAI"
],
[
"Hanser",
"Damien",
"",
"MAP / CRAI"
],
[
"Halin",
"Gilles",
"",
"MAP / CRAI"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0711.2998 | Benjamin Leveque | Yannick Frein (LGS), Benjamin L\'ev\^eque (LGS), Andras Sebo (LGS) | Optimizing diversity | null | null | null | null | cs.DM | null | We consider the problem of minimizing the size of a family of sets G such
that every subset of 1,...,n can be written as a disjoint union of at most k
members of G, where k and n are given numbers. This problem originates in a
real-world application aiming at the diversity of industrial production. At the
same time, the minimum of G so that every subset of 1,...,n is the union of two
sets in G has been asked by Erdos and studied recently by Furedi and Katona
without requiring the disjointness of the sets. A simple construction providing
a feasible solution is conjectured to be optimal for this problem for all
values of n and k and regardless of the disjointness requirement; we prove this
conjecture in special cases including all (n,k) for which n <= 3k holds, and
some individual values of n and k.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 18:58:06 GMT"
}
] | 2007-11-20T00:00:00 | [
[
"Frein",
"Yannick",
"",
"LGS"
],
[
"Lévêque",
"Benjamin",
"",
"LGS"
],
[
"Sebo",
"Andras",
"",
"LGS"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0711.3013 | Louis Theran | Ileana Streinu and Louis Theran | Natural realizations of sparsity matroids | Corrected some typos from the previous version; to appear in Ars
Mathematica Contemporanea | null | null | null | math.CO cs.CG math.AG math.MG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A hypergraph G with n vertices and m hyperedges with d endpoints each is
(k,l)-sparse if for all sub-hypergraphs G' on n' vertices and m' edges, m'\le
kn'-l. For integers k and l satisfying 0\le l\le dk-1, this is known to be a
linearly representable matroidal family.
Motivated by problems in rigidity theory, we give a new linear representation
theorem for the (k,l)-sparse hypergraphs that is natural; i.e., the
representing matrix captures the vertex-edge incidence structure of the
underlying hypergraph G.
| [
{
"version": "v1",
"created": "Mon, 19 Nov 2007 21:02:34 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Dec 2007 06:33:13 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Jan 2008 18:40:20 GMT"
},
{
"version": "v4",
"created": "Mon, 5 Jul 2010 15:43:57 GMT"
},
{
"version": "v5",
"created": "Mon, 20 Dec 2010 17:06:51 GMT"
}
] | 2010-12-21T00:00:00 | [
[
"Streinu",
"Ileana",
""
],
[
"Theran",
"Louis",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
0711.3077 | Jie Luo | Jie Luo | On Low Complexity Maximum Likelihood Decoding of Convolutional Codes | Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2008.2006461 | null | cs.IT cs.CC math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the average complexity of maximum likelihood (ML)
decoding of convolutional codes. ML decoding can be modeled as finding the most
probable path taken through a Markov graph. Integrated with the Viterbi
algorithm (VA), complexity reduction methods such as the sphere decoder often
use the sum log likelihood (SLL) of a Markov path as a bound to disprove the
optimality of other Markov path sets and to consequently avoid exhaustive path
search. In this paper, it is shown that SLL-based optimality tests are
inefficient if one fixes the coding memory and takes the codeword length to
infinity. Alternatively, optimality of a source symbol at a given time index
can be testified using bounds derived from log likelihoods of the neighboring
symbols. It is demonstrated that such neighboring log likelihood (NLL)-based
optimality tests, whose efficiency does not depend on the codeword length, can
bring significant complexity reduction to ML decoding of convolutional codes.
The results are generalized to ML sequence detection in a class of
discrete-time hidden Markov systems.
| [
{
"version": "v1",
"created": "Tue, 20 Nov 2007 07:27:30 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Nov 2007 00:15:24 GMT"
},
{
"version": "v3",
"created": "Thu, 31 Jul 2008 17:08:52 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Luo",
"Jie",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.3099 | Marcello Caleffi | Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura | Augmented Tree-based Routing Protocol for Scalable Ad Hoc Networks | Routing, mobile ad hoc network, MANET, dynamic addressing,
multi-path, distributed hash table, DHT | IEEE MHWMN'07: The Third IEEE International Workshop on
Heterogeneous Multi-Hop Wireless and Mobile Networks 2007 | 10.1109/MOBHOC.2007.4428727 | null | cs.NI | null | In ad hoc networks scalability is a critical requirement if these
technologies have to reach their full potential. Most of the proposed routing
protocols do not operate efficiently with networks of more than a few hundred
nodes. In this paper, we propose an augmented tree-based address space
structure and a hierarchical multi-path routing protocol, referred to as
Augmented Tree-based Routing (ATR), which utilizes such a structure in order to
solve the scalability problem and to gain good resilience against node
failure/mobility and link congestion/instability. Simulation results and
performance comparisons with existing protocols substantiate the effectiveness
of the ATR.
| [
{
"version": "v1",
"created": "Tue, 20 Nov 2007 09:53:40 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Caleffi",
"Marcello",
""
],
[
"Ferraiuolo",
"Giancarlo",
""
],
[
"Paura",
"Luigi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0711.3128 | Anne-Marie Vercoustre | Anne-Marie Vercoustre (INRIA Rocquencourt / INRIA Sophia Antipolis),
James A. Thom (RMIT), Jovan Pehcevski (INRIA Rocquencourt / INRIA Sophia
Antipolis) | Entity Ranking in Wikipedia | to appear | Dans the 23rd Annual ACM Symposium on Applied Computing (2008) | null | null | cs.IR | null | The traditional entity extraction problem lies in the ability of extracting
named entities from plain text using natural language processing techniques and
intensive training from large document collections. Examples of named entities
include organisations, people, locations, or dates. There are many research
activities involving named entities; we are interested in entity ranking in the
field of information retrieval. In this paper, we describe our approach to
identifying and ranking entities from the INEX Wikipedia document collection.
Wikipedia offers a number of interesting features for entity identification and
ranking that we first introduce. We then describe the principles and the
architecture of our entity ranking system, and introduce our methodology for
evaluation. Our preliminary results show that the use of categories and the
link structure of Wikipedia, together with entity examples, can significantly
improve retrieval effectiveness.
| [
{
"version": "v1",
"created": "Tue, 20 Nov 2007 12:40:23 GMT"
}
] | 2007-11-21T00:00:00 | [
[
"Vercoustre",
"Anne-Marie",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Thom",
"James A.",
"",
"RMIT"
],
[
"Pehcevski",
"Jovan",
"",
"INRIA Rocquencourt / INRIA Sophia\n Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0711.3149 | Marie-Jean Meurs | Marie-Jean Meurs | Approche polyedrale pour le probleme du separateur (VSP) | 21 pages, 4 figures | null | null | null | cs.DM | null | In an undirected connected graph G=(V,E), the vertex separator problem (VSP)
asks for a partition of V into nonempty subsets A, B, C such that |C| is
minimized such that there is no edge between A and B, and sizes of A and B are
similar. This paper presents a polyhedral approach of the (VSP), introducing
new efficient valid inequalities and providing computational tests and results.
| [
{
"version": "v1",
"created": "Tue, 20 Nov 2007 14:55:20 GMT"
}
] | 2007-11-21T00:00:00 | [
[
"Meurs",
"Marie-Jean",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0711.3152 | Tobias Koch | Tobias Koch, Amos Lapidoth | Multipath Channels of Bounded Capacity | To be presented at the 2008 IEEE Information Theory Workshop (ITW) in
Porto, Portugal; replaced with the version that appears in the proceedings | null | 10.1109/ITW.2008.4578611 | null | cs.IT math.IT | null | The capacity of discrete-time, non-coherent, multipath fading channels is
considered. It is shown that if the delay spread is large in the sense that the
variances of the path gains do not decay faster than geometrically, then
capacity is bounded in the signal-to-noise ratio.
| [
{
"version": "v1",
"created": "Tue, 20 Nov 2007 15:00:39 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Apr 2008 12:19:10 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Koch",
"Tobias",
""
],
[
"Lapidoth",
"Amos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.3176 | Seyed Abolfazl Motahari | Abolfazl S. Motahari and Amir K. Khandani | To Decode the Interference or To Consider it as Noise | submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | We address single-user data transmission over a channel where the received
signal incurs interference from a finite number of users (interfering users)
that use single codebooks for transmitting their own messages. The receiver,
however, is allowed to decode interfering users' messages. This means the
signal transmitted from any interfering user is either decoded or considered as
noise at the receiver side. We propose the following method to obtain an
achievable rate for this channel. Assuming its own data is decoded
successfully, the receiver partitions the set of interfering users into two
disjoint subsets, namely the set of decodable users and the set of
non-decodable users. Then the transmitter's rate is chosen such that the
intended signal can be jointly decoded with the set of decodable users. To show
the strength of this method, we prove that for the additive Gaussian channel
with Gaussian interfering users, the Gaussian distribution is optimal and the
achievable rate is the capacity of this channel. To obtain the maximum
achievable rate, one needs to find the maximum decodable subset of interfering
users. Due to the large number of possible choices, having efficient algorithms
that find the set of decodable users with maximum cardinality is desired. To
this end, we propose an algorithm that enables the receiver to accomplish this
task in polynomial time.
| [
{
"version": "v1",
"created": "Tue, 20 Nov 2007 17:34:30 GMT"
}
] | 2007-11-21T00:00:00 | [
[
"Motahari",
"Abolfazl S.",
""
],
[
"Khandani",
"Amir K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.3183 | Narad Rampersad | Terry Anderson, John Loftus, Narad Rampersad, Nicolae Santean, Jeffrey
Shallit | Detecting palindromes, patterns, and borders in regular languages | Full version of a paper submitted to LATA 2008. This is a new version
with John Loftus added as a co-author and containing new results on
unbordered words | null | null | null | cs.CC cs.DM cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a language L and a nondeterministic finite automaton M, we consider
whether we can determine efficiently (in the size of M) if M accepts at least
one word in L, or infinitely many words. Given that M accepts at least one word
in L, we consider how long a shortest word can be. The languages L that we
examine include the palindromes, the non-palindromes, the k-powers, the
non-k-powers, the powers, the non-powers (also called primitive words), the
words matching a general pattern, the bordered words, and the unbordered words.
| [
{
"version": "v1",
"created": "Tue, 20 Nov 2007 17:38:47 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Jun 2008 14:25:57 GMT"
}
] | 2009-04-14T00:00:00 | [
[
"Anderson",
"Terry",
""
],
[
"Loftus",
"John",
""
],
[
"Rampersad",
"Narad",
""
],
[
"Santean",
"Nicolae",
""
],
[
"Shallit",
"Jeffrey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0711.3197 | Igor M. Suslov | I. M. Suslov (P.L.Kapitza Institute for Physical Problems, Moscow,
Russia) | How to realize "a sense of humour" in computers ? | 14 pages, 6 figures included | null | null | null | cs.CL cs.AI q-bio.NC | null | Computer model of a "sense of humour" suggested previously [arXiv:0711.2058,
0711.2061, 0711.2270] is raised to the level of a realistic algorithm.
| [
{
"version": "v1",
"created": "Tue, 20 Nov 2007 19:57:23 GMT"
}
] | 2007-11-27T00:00:00 | [
[
"Suslov",
"I. M.",
"",
"P.L.Kapitza Institute for Physical Problems, Moscow,\n Russia"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
] |
0711.3205 | Caleb Lo | Caleb K. Lo, Sriram Vishwanath and Robert W. Heath Jr | Relay Subset Selection in Wireless Networks Using Partial
Decode-and-Forward Transmission | 27 pages, 5 figures, submitted to the IEEE Transactions on Vehicular
Technology, revised May 2008 | null | null | null | cs.IT math.IT | null | This paper considers the problem of selecting a subset of nodes in a two-hop
wireless network to act as relays in aiding the communication between the
source-destination pair. Optimal relay subset selection with the objective of
maximizing the overall throughput is a difficult problem that depends on
multiple factors including node locations, queue lengths and power consumption.
A partial decode-and-forward strategy is applied in this paper to improve the
tractability of the relay selection problem and performance of the overall
network.
Note that the number of relays selected ultimately determines the performance
of the network. This paper benchmarks this performance by determining the net
diversity achieved using the relays selected and the partial decode-and-forward
strategy. This framework is subsequently used to further transform relay
selection into a simpler relay placement problem, and two proximity-based
approximation algorithms are developed to determine the appropriate set of
relays to be selected in the network. Other selection strategies such as random
relay selection and a greedy algorithm that relies on channel state information
are also presented. This paper concludes by showing that the proposed
proximity-based relay selection strategies yield near-optimal expected rates
for a small number of selected relays.
| [
{
"version": "v1",
"created": "Tue, 20 Nov 2007 20:40:20 GMT"
},
{
"version": "v2",
"created": "Thu, 22 May 2008 21:53:27 GMT"
}
] | 2008-05-23T00:00:00 | [
[
"Lo",
"Caleb K.",
""
],
[
"Vishwanath",
"Sriram",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.3235 | Joseph Y. Halpern | Peter D. Grunwald and Joseph Y. Halpern | A Game-Theoretic Analysis of Updating Sets of Probabilities | null | null | null | null | cs.AI math.ST stat.TH | null | We consider how an agent should update her uncertainty when it is represented
by a set $\P$ of probability distributions and the agent observes that a random
variable $X$ takes on value $x$, given that the agent makes decisions using the
minimax criterion, perhaps the best-studied and most commonly-used criterion in
the literature. We adopt a game-theoretic framework, where the agent plays
against a bookie, who chooses some distribution from $\P$. We consider two
reasonable games that differ in what the bookie knows when he makes his choice.
Anomalies that have been observed before, like time inconsistency, can be
understood as arising important because different games are being played,
against bookies with different information. We characterize the important
special cases in which the optimal decision rules according to the minimax
criterion amount to either conditioning or simply ignoring the information.
Finally, we consider the relationship between conditioning and calibration when
uncertainty is described by sets of probabilities.
| [
{
"version": "v1",
"created": "Tue, 20 Nov 2007 23:34:12 GMT"
}
] | 2007-11-27T00:00:00 | [
[
"Grunwald",
"Peter D.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0711.3242 | Frank Nielsen | Frank Nielsen, Richard Nock | On the Centroids of Symmetrized Bregman Divergences | 17 pages | null | null | null | cs.CG | null | In this paper, we generalize the notions of centroids and barycenters to the
broad class of information-theoretic distortion measures called Bregman
divergences. Bregman divergences are versatile, and unify quadratic geometric
distances with various statistical entropic measures. Because Bregman
divergences are typically asymmetric, we consider both the left-sided and
right-sided centroids and the symmetrized centroids, and prove that all three
are unique. We give closed-form solutions for the sided centroids that are
generalized means, and design a provably fast and efficient approximation
algorithm for the symmetrized centroid based on its exact geometric
characterization that requires solely to walk on the geodesic linking the two
sided centroids. We report on our generic implementation for computing entropic
centers of image clusters and entropic centers of multivariate normals, and
compare our results with former ad-hoc methods.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 01:15:19 GMT"
}
] | 2007-11-22T00:00:00 | [
[
"Nielsen",
"Frank",
""
],
[
"Nock",
"Richard",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0711.3247 | Behtash Babadi | Behtash Babadi, Vahid Tarokh | A Distributed Dynamic Frequency Allocation Algorithm | null | null | null | null | cs.NI | null | We consider a network model where the nodes are grouped into a number of
clusters and propose a distributed dynamic frequency allocation algorithm that
achieves performance close to that of a centralized optimal algorithm. Each
cluster chooses its transmission frequency band based on its knowledge of the
interference that it experiences. The convergence of the proposed distributed
algorithm to a sub-optimal frequency allocation pattern is proved. For some
specific cases of spatial distributions of the clusters in the network,
asymptotic bounds on the performance of the algorithm are derived and
comparisons to the performance of optimal centralized solutions are made. These
analytic results and additional simulation studies verify performance close to
that of an optimum centralized frequency allocation algorithm. It is
demonstrated that the algorithm achieves about 90% of the Shannon capacities
corresponding to the optimum/near-optimum centralized frequency band
assignments. Furthermore, we consider the scenario where each cluster can be in
active or inactive mode according to a two-state Markov model. We derive
conditions to guarantee finite steady state variance for the output of the
algorithm using stochastic analysis. Further simulation studies confirm the
results of stochastic modeling and the performance of the algorithm in the
time-varying setup.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 01:47:54 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Mar 2008 22:34:53 GMT"
}
] | 2008-03-14T00:00:00 | [
[
"Babadi",
"Behtash",
""
],
[
"Tarokh",
"Vahid",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0711.3250 | Venkata Seshu Kumar Kurapati Mr | Venkata Seshu Kumar Kurapati | Improved Fully Dynamic Reachability Algorithm for Directed Graph | null | null | null | null | cs.DS | null | We propose a fully dynamic algorithm for maintaining reachability information
in directed graphs. The proposed deterministic dynamic algorithm has an update
time of $O((ins*n^{2}) + (del * (m+n*log(n))))$ where $m$ is the current number
of edges, $n$ is the number of vertices in the graph, $ins$ is the number of
edge insertions and $del$ is the number of edge deletions. Each query can be
answered in O(1) time after each update. The proposed algorithm combines
existing fully dynamic reachability algorithm with well known witness counting
technique to improve efficiency of maintaining reachability information when
edges are deleted. The proposed algorithm improves by a factor of
$O(\frac{n^2}{m+n*log(n)})$ for edge deletion over the best existing fully
dynamic algorithm for maintaining reachability information.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 03:22:12 GMT"
}
] | 2007-11-22T00:00:00 | [
[
"Kurapati",
"Venkata Seshu Kumar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0711.3251 | Niranjay Ravindran | Niranjay Ravindran, Nihar Jindal | Limited Feedback-based Block Diagonalization for the MIMO Broadcast
Channel | 20 pages, 4 figures, submitted to IEEE JSAC November 2007 | null | 10.1109/JSAC.2008.081013 | null | cs.IT math.IT | null | Block diagonalization is a linear precoding technique for the multiple
antenna broadcast (downlink) channel that involves transmission of multiple
data streams to each receiver such that no multi-user interference is
experienced at any of the receivers. This low-complexity scheme operates only a
few dB away from capacity but requires very accurate channel knowledge at the
transmitter. We consider a limited feedback system where each receiver knows
its channel perfectly, but the transmitter is only provided with a finite
number of channel feedback bits from each receiver. Using a random quantization
argument, we quantify the throughput loss due to imperfect channel knowledge as
a function of the feedback level. The quality of channel knowledge must improve
proportional to the SNR in order to prevent interference-limitations, and we
show that scaling the number of feedback bits linearly with the system SNR is
sufficient to maintain a bounded rate loss. Finally, we compare our
quantization strategy to an analog feedback scheme and show the superiority of
quantized feedback.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 02:03:56 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Ravindran",
"Niranjay",
""
],
[
"Jindal",
"Nihar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0711.3274 | EDA Publishing Association | M.-A. Polosky, E.-J. Garcia | Microsystem Product Development | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | Over the last decade the successful design and fabrication of complex MEMS
(MicroElectroMechanical Systems), optical circuits and ASICs have been
demonstrated. Packaging and integration processes have lagged behind MEMS
research but are rapidly maturing. As packaging processes evolve, a new
challenge presents itself, microsystem product development. Product development
entails the maturation of the design and all the processes needed to
successfully produce a product. Elements such as tooling design, fixtures,
gages, testers, inspection, work instructions, process planning, etc., are
often overlooked as MEMS engineers concentrate on design, fabrication and
packaging processes. Thorough, up-front planning of product development efforts
is crucial to the success of any project.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 08:18:26 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Polosky",
"M. -A.",
""
],
[
"Garcia",
"E. -J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3275 | EDA Publishing Association | J. Iannacci, Jason Tian, S. Sinaga, R. Gaddi, A. Gnudi, M. Bartek | Parasitic Effects Reduction for Wafer-Level Packaging of RF-Mems | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | In RF-MEMS packaging, next to the protection of movable structures,
optimization of package electrical performance plays a very important role. In
this work, a wafer-level packaging process has been investigated and optimized
in order to minimize electrical parasitic effects. The RF-MEMS package concept
used is based on a wafer-level bonding of a capping silicon substrate to an
RF-MEMS wafer. The capping silicon substrate resistivity, substrate thickness
and the geometry of through-substrate electrical interconnect vias have been
optimized using finite-element electromagnetic simulations (Ansoft HFSS). Test
structures for electrical characterization have been designed and after their
fabrication, measurement results will be compared with simulations.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 08:24:39 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Iannacci",
"J.",
""
],
[
"Tian",
"Jason",
""
],
[
"Sinaga",
"S.",
""
],
[
"Gaddi",
"R.",
""
],
[
"Gnudi",
"A.",
""
],
[
"Bartek",
"M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3276 | EDA Publishing Association | A. Phommahaxay (ESYCOM-Esiee), G. Lissorgues (ESYCOM-Esiee), L.
Rousseau (ESYCOM-Esiee), T. Bourouina (ESYCOM-Esiee), P. Nicole | Surface Conditioning Effect on Vacuum Microelectronics Components
Fabricated by Deep Reactive Ion Etching | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | Advances in material processing such as silicon micromachining are opening
the way to vacuum microelectronics. Two-dimensional vacuum components can be
fabricated using the microsystems processes. We developed such devices using a
single metal layer and silicon micromachining by DRIE. The latter technological
step has significant impact on the characteristics of the vacuum components.
This paper presents a brief summary of electron emission possibilities and the
design leading to the fabrication of a lateral field emission diode. First
measurement results and the aging of the devices are also discussed.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 08:25:17 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Phommahaxay",
"A.",
"",
"ESYCOM-Esiee"
],
[
"Lissorgues",
"G.",
"",
"ESYCOM-Esiee"
],
[
"Rousseau",
"L.",
"",
"ESYCOM-Esiee"
],
[
"Bourouina",
"T.",
"",
"ESYCOM-Esiee"
],
[
"Nicole",
"P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3277 | EDA Publishing Association | C. Mendez, C. Louis, S. Paquay, P. De Vincenzo, I. Klapka, V. Rochus,
F. Iker, Nicolas Andr\'e, J.-P. Raskin | 3-D Self-Assembled Soi Mems: An Example of Multiphysics Simulation | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | MEMS devices are typical systems where multiphysics simulations are
unavoidable. In this work, we present possible applications of 3-D
self-assembled SOI (Silicon-on-Insulator) MEMS such as, for instance, thermal
actuators and flow sensors. The numerical simulations of these microsystems are
presented. Structural and thermal parts have to be strongly coupled for
correctly describing the fabrication process and for simulating the behavior of
these 3-D SOI MEMS.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 08:25:55 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Mendez",
"C.",
""
],
[
"Louis",
"C.",
""
],
[
"Paquay",
"S.",
""
],
[
"De Vincenzo",
"P.",
""
],
[
"Klapka",
"I.",
""
],
[
"Rochus",
"V.",
""
],
[
"Iker",
"F.",
""
],
[
"André",
"Nicolas",
""
],
[
"Raskin",
"J. -P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3279 | EDA Publishing Association | M. Dominguez, Joan Pons, J. Ricart, J. Juillard (EA2523), E. Colinet
(EA2523) | Influence of the Feedback Filter on the Response of the Pulsed Digital
Oscillator | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | This paper introduces a new feedback topology for the Pulsed Digital
Oscillator (PDO) and compares it to the classical topology. The `classic' or
single feedback topology, introduced in previous works, shows a strong behavior
dependence on the damping losses in the MEMS resonator. A new double feedback
topology is introduced here in order to help solving this problem. Comparative
discrete-time simulations and preliminary experimental measurements have been
carried out for both topologies, showing how the new double feedback topology
may increase PDO performance for some frequency ranges.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 08:27:54 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Dominguez",
"M.",
"",
"EA2523"
],
[
"Pons",
"Joan",
"",
"EA2523"
],
[
"Ricart",
"J.",
"",
"EA2523"
],
[
"Juillard",
"J.",
"",
"EA2523"
],
[
"Colinet",
"E.",
"",
"EA2523"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3284 | EDA Publishing Association | Tsung-Hung Lin, Hsiharng Yang, Ching-Kong Chao | Concave Microlens Array Mold Fabrication in Photoresist Using UV
Proximity Printing | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | This paper presents a simple and effective method to fabricate a
polydimethyl-siloxane (PDMS) microlens array with a high fill factor, which
utilizes the UV proximity printing and photoresist replication methods. The
concave microlens array mold was made using a printing gap in lithography
process, which utilizes optical diffraction of UV light to deflect away from
the aperture edges and produces a certain exposure in the photoresist material
outside the aperture edges. This method can precisely control the geometric
profile of concave microlens array. The experimental results showed that the
concave micro-lens array in photoresist could be formed automatically when the
printing gap ranged from 240 micron to 720 micron. High fill factor microlens
array can be produced, when the control pitch distance between the adjacent
apertures of the concave microlens array was decreased to the aperture size.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:21:50 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Lin",
"Tsung-Hung",
""
],
[
"Yang",
"Hsiharng",
""
],
[
"Chao",
"Ching-Kong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3286 | EDA Publishing Association | Jing Li, L. Dedeng, Suntao Wu | The annealing induced extraordinary properties of SI based ZNO film
grown by RF sputtering | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | Pb(Zr0.52Ti0.48)O3 (PZT) thin films were in situ deposited by pulsed laser
deposition (PLD) on Pt/Ti/SiO2/Si substrates using a template layer derived by
sol-gel method. A 0.1-$\mu$m-thick PZT layer with (111) or (100)-preferred
orientation was first deposited onto Pt/Ti/SiO2/Si substrates using the sol-gel
method, and than a PZT layer with thickness of 1$\mu$m was in situ deposited by
PLD on the above-mentioned PZT layer. The crystalline phases and the preferred
orientations of the PZT films were investigated by X-ray diffraction analysis.
Surface and cross-sectional morphologies were observed by scanning electron
microscopy and transmission electron microscopy. The electrical properties of
the films were evaluated by measuring their P-E hysteresis loops and dielectric
constants. The preferred orientation of the films can be controlled using the
template layer derived by the sol-gel method. The deposition temperature
required to obtain the perovskite phase in this process is approximately 460
degrees C, and is significantly lower than that in the case of direct film
deposition by PLD on the Pt/Ti/SiO2/Si substrates.
Keywords: lead zirconate titanate (PZT), thin film, sol-gel method, laser
ablation, electrical properties
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:31:12 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Li",
"Jing",
""
],
[
"Dedeng",
"L.",
""
],
[
"Wu",
"Suntao",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3287 | EDA Publishing Association | S.-P. Vudathu, K.-K. Duganapalli, Rainer Laur, D. Kubalinska, A.
Bunse-Gerstner | Parametric Yield Analysis of Mems via Statistical Methods | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | This paper considers a developing theory on the effects of inevitable process
variations during the fabrication of MEMS and other microsystems. The effects
on the performance and design yield of the microsystems devices are analyzed
and presented. A novel methodology in the design cycle of MEMS and other
microsystems is briefly introduced. This paper describes the initial steps of
this methodology that is aimed at counteracting the parametric variations in
the product cycle of microsystems. It is based on a concept of worst-case
analysis that has proven successful in the parent IC technology. Issues ranging
from the level of abstraction of the microsystem models to the availability of
such models are addressed
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:32:13 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Vudathu",
"S. -P.",
""
],
[
"Duganapalli",
"K. -K.",
""
],
[
"Laur",
"Rainer",
""
],
[
"Kubalinska",
"D.",
""
],
[
"Bunse-Gerstner",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3288 | EDA Publishing Association | A. Giridhar (ESYCOM-Esiee, Ief), F. Verjus (ESYCOM-Esiee), F. Marty
(IEF), A. Bosseboeuf (IEF), T. Bourouina (IEF) | Electrostatically-Driven Resonator on Soi with Improved Temperature
Stability | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | This paper deals with a single-crystal-silicon (SCS) MEMS resonator with
improved temperature stability. While simulations have shown that the
temperature coefficient of resonant frequency can be down to 1 ppm/degrees C,
preliminary measurements on non-optimised structures gave evidence of a
temperature coefficient of 29 ppm/degrees C. Design, optimisation, experimental
results with post process simulation and prospective work are presented.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:32:31 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Giridhar",
"A.",
"",
"ESYCOM-Esiee, Ief"
],
[
"Verjus",
"F.",
"",
"ESYCOM-Esiee"
],
[
"Marty",
"F.",
"",
"IEF"
],
[
"Bosseboeuf",
"A.",
"",
"IEF"
],
[
"Bourouina",
"T.",
"",
"IEF"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3289 | EDA Publishing Association | S. Spinner, J. Bartholomeyczik, B. Becker, M. Doelle, O. Paul, I.
Polian, R. Roth, K. Seitz, P. Ruther | Electromechanical Reliability Testing of Three-Axial Silicon Force
Sensors | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | This paper reports on the systematic electromechanical characterization of a
new three-axial force sensor used in dimensional metrology of micro components.
The siliconbased sensor system consists of piezoresistive mechanicalstress
transducers integrated in thin membrane hinges supporting a suspended flexible
cross structure. The mechanical behavior of the fragile micromechanical
structure isanalyzed for both static and dynamic load cases. This work
demonstrates that the silicon microstructure withstands static forces of 1.16N
applied orthogonally to the front-side of the structure. A statistical Weibull
analysis of the measured data shows that these values are significantly reduced
if the normal force is applied to the back of the sensor. Improvements of the
sensor system design for future development cycles are derived from the
measurement results.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:33:12 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Spinner",
"S.",
""
],
[
"Bartholomeyczik",
"J.",
""
],
[
"Becker",
"B.",
""
],
[
"Doelle",
"M.",
""
],
[
"Paul",
"O.",
""
],
[
"Polian",
"I.",
""
],
[
"Roth",
"R.",
""
],
[
"Seitz",
"K.",
""
],
[
"Ruther",
"P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3290 | EDA Publishing Association | O. Fran\c{c}ais, M.-C. Jullien (SATIE), L. Rousseau (ESYCOM-Esiee), P.
Poulichet (ESYCOM-Esiee), S. Desportes (PPSM), A. Chouai (PPSM), J.-P.
Lefevre (PPSM), J. Delaire (PPSM) | An Active Chaotic Micromixer Integrating Thermal Actuation Associating
PDMS and Silicon Microtechnology | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | Due to scaling laws, in microfluidic, flows are laminar. Consequently, mixing
between two liquids is mainly obtained by natural diffusion which may take a
long time or equivalently requires centimetre length channels. To reduce time
and length for mixing, it is possible to generate chaotic-like flows either by
modifying the channel geometry or by creating an external perturbation of the
flow. In this paper, an active micromixer is presented consisting on thermal
actuation with heating resistors. In order to disturb the liquid flow, an
oscillating transverse flow is generated by heating the liquid. Depending on
the value of boiling point, either bubble expansion or volumetric dilation
controlled the transverse flow amplitude. A chaotic like mixing is then induced
under particular conditions depending on volume expansion, liquid velocity,
frequency of actuation... This solution presents the advantage to achieve
mixing in a very short time (1s) and along a short channel distance (channel
width). It can also be integrated in a more complex device due to actuator
integration with microfluidics.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:34:28 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Français",
"O.",
"",
"SATIE"
],
[
"Jullien",
"M. -C.",
"",
"SATIE"
],
[
"Rousseau",
"L.",
"",
"ESYCOM-Esiee"
],
[
"Poulichet",
"P.",
"",
"ESYCOM-Esiee"
],
[
"Desportes",
"S.",
"",
"PPSM"
],
[
"Chouai",
"A.",
"",
"PPSM"
],
[
"Lefevre",
"J. -P.",
"",
"PPSM"
],
[
"Delaire",
"J.",
"",
"PPSM"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3291 | EDA Publishing Association | J. Juillard, E. Colinet (LETI), M. Dominguez, Joan Pons, J. Ricart | Resolution Limits for Resonant Mems Sensors Based on Discrete Relay
Feedback Techniques | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | This paper is devoted to the analysis of resonant MEMS sensors based on
discrete relay feedback techniques. One drawback of such techniques is that
some synchronization usually occurs between the discrete part and the
continuous part of the system: this results in sensor responses that are very
similar to the curves known as devil's staircases, i.e. the frequency does not
vary smoothly with the sensor's input. The main contribution of this paper is a
theoretical calculation of the resolution of such systems. The resolutions of
two existing resonant MEMS architectures are then calculated and these results
are discussed.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:35:07 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Juillard",
"J.",
"",
"LETI"
],
[
"Colinet",
"E.",
"",
"LETI"
],
[
"Dominguez",
"M.",
""
],
[
"Pons",
"Joan",
""
],
[
"Ricart",
"J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3292 | EDA Publishing Association | X.-C. Shan, Z.-F. Wang, R. Maeda, Y.F. Sun, M. Wu, J.S. Hua | A Silicon-Based Micro Gas Turbine Engine for Power Generation | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | This paper reports on our research in developing a micro power generation
system based on gas turbine engine and piezoelectric converter. The micro gas
turbine engine consists of a micro combustor, a turbine and a centrifugal
compressor. Comprehensive simulation has been implemented to optimal the
component design. We have successfully demonstrated a silicon-based micro
combustor, which consists of seven layers of silicon structures. A
hairpin-shaped design is applied to the fuel/air recirculation channel. The
micro combustor can sustain a stable combustion with an exit temperature as
high as 1600 K. We have also successfully developed a micro turbine device,
which is equipped with enhanced micro air-bearings and driven by compressed
air. A rotation speed of 15,000 rpm has been demonstrated during lab test. In
this paper, we will introduce our research results major in the development of
micro combustor and micro turbine test device.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:37:07 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Shan",
"X. -C.",
""
],
[
"Wang",
"Z. -F.",
""
],
[
"Maeda",
"R.",
""
],
[
"Sun",
"Y. F.",
""
],
[
"Wu",
"M.",
""
],
[
"Hua",
"J. S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3294 | EDA Publishing Association | Guillaume Savelli (LEG), Marc Plissonnier, Jacqueline Bablet, C.
Salvi, J.M. Fournier | Energy Conversion Using New Thermoelectric Generator | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | During recent years, microelectronics helped to develop complex and varied
technologies. It appears that many of these technologies can be applied
successfully to realize Seebeck micro generators: photolithography and
deposition methods allow to elaborate thin thermoelectric structures at the
micro-scale level. Our goal is to scavenge energy by developing a miniature
power source for operating electronic components. First Bi and Sb micro-devices
on silicon glass substrate have been manufactured with an area of 1cm2
including more than one hundred junctions. Each step of process fabrication has
been optimized: photolithography, deposition process, anneals conditions and
metallic connections. Different device structures have been realized with
different micro-line dimensions. Each devices performance will be reviewed and
discussed in function of their design structure.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:40:31 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Savelli",
"Guillaume",
"",
"LEG"
],
[
"Plissonnier",
"Marc",
""
],
[
"Bablet",
"Jacqueline",
""
],
[
"Salvi",
"C.",
""
],
[
"Fournier",
"J. M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3296 | EDA Publishing Association | S. Oukassi, R. Salot, S. Bancel, J.-P. Pereira-Ramos | Above Ic Micro-Power Generators for RF-Mems | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | This work presents recent advances in the development and the integration of
an electrochemical (chemicalelectrical energy conversion) micro power generator
used as a high voltage energy source for RF-MEMS powering. Autonomous MEMS
require similarly miniaturized power sources. Up to day, solid state thin film
batteries are realized with mechanical masks. This method doesn't allow
dimensions below a few mm^2 active area, and besides the whole process flow is
done under controlled atmosphere so as to ensure materials chemical stability
(mainly lithiated materials). Within this context, Microelectronics
micro-fabrication procedures (photolithography, Reactive Ion Etching...) are
used to reach both miniaturisation (100x100 $\mu$m^2 targeted unit cell active
area) and Above IC technological compatibility. All process steps developed
here are realized in clean room environment.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:42:06 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Oukassi",
"S.",
""
],
[
"Salot",
"R.",
""
],
[
"Bancel",
"S.",
""
],
[
"Pereira-Ramos",
"J. -P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3297 | EDA Publishing Association | M.-K. El Khatib (XLIM), A. Pothier (XLIM), P. Blondy (XLIM) | Packaging of RF Mems Switching Functions on Alumina Substrate | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | Recently the strong demands in wireless communication requires expanding
development for the application of RF MEMS (Radio Frequency micro electro
mechanical systems) sensing devices such as micro-switches, tunable capacitors
because it offers lower power consumption, lower losses, higher linearity and
higher Q factors compared with conventional communications components. To
accelerate commercialisation of RF MEMS products, development for packaging
technologies is one of the most critical issues should be solved beforehand.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:44:39 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Khatib",
"M. -K. El",
"",
"XLIM"
],
[
"Pothier",
"A.",
"",
"XLIM"
],
[
"Blondy",
"P.",
"",
"XLIM"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3298 | EDA Publishing Association | T. Pichonat (FEMTO-ST - Lopmd), B. Gauthier-Manuel (FEMTO-ST - Lopmd) | Recent Developments in Mems-Based Micro Fuel Cells | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | Micro fuel cells ($\mu$-FC) represent promising power sources for portable
applications. Today, one of the technological ways to make $\mu$-FC is to have
recourse to standard microfabrication techniques used in the fabrication of
micro electromechanical systems (MEMS). This paper shows an overview on the
applications of MEMS techniques on miniature FC by presenting several solutions
developed throughout the world. It also describes the latest developments of a
new porous silicon-based miniature fuel cell. Using a silane grafted on an
inorganic porous media as the proton-exchange membrane instead of a common
ionomer such as Nafion, the fuel cell achieved a maximum power density of 58 mW
cm-2 at room temperature with hydrogen as fuel.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:45:58 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Pichonat",
"T.",
"",
"FEMTO-ST - Lopmd"
],
[
"Gauthier-Manuel",
"B.",
"",
"FEMTO-ST - Lopmd"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3299 | EDA Publishing Association | W. Faris, H. Mohammed, M.M. Abdalla, C.-H. Ling | Influence of Micro-Cantilever Geometry and Gap on Pull-in Voltage | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | In this paper, we study the behaviour of a microcantilever beam under
electrostatic actuation using finite difference method. This problem has a lot
of applications in MEMS based devices like accelerometers, switches and others.
In this paper, we formulated the problem of a cantilever beam with proof mass
at its end and carried out the finite difference solution. we studied the
effects of length, width, and the gap size on the pull-in voltage using data
that are available in the literature. Also, the stability limit is compared
with the single degree of freedom commonly used in the earlier literature as an
approximation to calculate the pull-in voltage.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:45:58 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Faris",
"W.",
""
],
[
"Mohammed",
"H.",
""
],
[
"Abdalla",
"M. M.",
""
],
[
"Ling",
"C. -H.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3300 | EDA Publishing Association | Ming-Tzer Lin, Chi-Jia Tong, Chung-Hsun Chiang | Design and Development of Novel Electroplating Spring Frame Mems
Structure Specimens for the Microtensile Testing of Thin Film Materials | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | Microelectromechanical systems (MEMS) technologies are developing rapidly
with increasing study of the design, fabrication and commercialization of
microscale systems and devices. Accurate mechanical properties are important
for successful design and development of MEMS. We have demonstrated here a
novel electroplating spring frame MEMS Structure Specimen integrates pin-pin
align holes, misalignment compensate spring structure frame, load sensor beam
and freestanding thin film. The specimen can be fit into a specially designed
microtensile apparatus which is capable of carrying out a series of tests on
sub-micro scale freestanding thin films.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:46:32 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Lin",
"Ming-Tzer",
""
],
[
"Tong",
"Chi-Jia",
""
],
[
"Chiang",
"Chung-Hsun",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3301 | EDA Publishing Association | P. Szabo, B. Nemeth, M. Rencz, B. Courtois (TIMA) | Characterisation of the Etching Quality in Micro-Electro-Mechanical
Systems by Thermal Transient Methodology | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | Our paper presents a non-destructive thermal transient measurement method
that is able to reveal differences even in the micron size range of MEMS
structures. Devices of the same design can have differences in their
sacrificial layers as consequence of the differences in their manufacturing
processes e.g. different etching times. We have made simulations examining how
the etching quality reflects in the thermal behaviour of devices. These
simulations predicted change in the thermal behaviour of MEMS structures having
differences in their sacrificial layers. The theory was tested with
measurements of similar MEMS devices prepared with different etching times. In
the measurements we used the T3Ster thermal transient tester equipment. The
results show that deviations in the devices, as consequence of the different
etching times, result in different temperature elevations and manifest also as
shift in time in the relevant temperature transient curves.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:46:34 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Szabo",
"P.",
"",
"TIMA"
],
[
"Nemeth",
"B.",
"",
"TIMA"
],
[
"Rencz",
"M.",
"",
"TIMA"
],
[
"Courtois",
"B.",
"",
"TIMA"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3302 | EDA Publishing Association | D. Allen, N. Duclos, I. Garbutt, M. Saumer, Ch. Dhum, M. Schmitt, J.
E. Hoffmann | The Effects of Additives on the Physical Properties of Electroformed
Nickel and on the Stretch of Photoelectroformed Nickel Components | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | The process of nickel electroforming is becoming increasingly important in
the manufacture of MST products, as it has the potential to replicate complex
geometries with extremely high fidelity. Electroforming of nickel uses
multi-component electrolyte formulations in order to maximise desirable product
properties. In addition to nickel sulphamate (the major electrolyte component),
formulation additives can also comprise nickel chloride (to increase nickel
anode dissolution), sulphamic acid (to control pH), boric acid (to act as a pH
buffer), hardening/levelling agents (to increase deposit hardness and lustre)
and wetting agents (to aid surface wetting and thus prevent gas bubbles and
void formation). This paper investigates the effects of some of these variables
on internal stress and stretch as a function of applied current density.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:47:35 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Allen",
"D.",
""
],
[
"Duclos",
"N.",
""
],
[
"Garbutt",
"I.",
""
],
[
"Saumer",
"M.",
""
],
[
"Dhum",
"Ch.",
""
],
[
"Schmitt",
"M.",
""
],
[
"Hoffmann",
"J. E.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3304 | EDA Publishing Association | Gou-Jen Wang, Yi-Chin Lin, Gwo-Sen Lin | A Novel Contact Resistance Model of Anisotropic Conductive Film for FPD
Packaging | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | In this research, a novel contact resistance model for the flat panel display
(FPD) packaging based on the within layer parallel and between layers series
resistance concepts was proposed. The FJ2530 anisotropic conductive films (ACF)
by Sony Inc. containing the currently smallest 3micron conductive particles was
used to conduct the experiments to verify the accuracy of the proposed model.
Calculated resistance of the chip-on-glass (COG) packaging by the proposed
model is 0.163\Omega. It is found that the gold bump with 0.162\Omega
resistance play the major role of the overall resistance. Although the
predicted resistance by the proposed model is only one third of the
experimentally measured value, it has been three-fold improvement compared to
the existing models.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:48:35 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Wang",
"Gou-Jen",
""
],
[
"Lin",
"Yi-Chin",
""
],
[
"Lin",
"Gwo-Sen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3305 | EDA Publishing Association | A. Bennis, C. Leinenbach, C. Raudzis, R. M\"uller-Fiedler, S.
Kronm\"uller | Measurement Technique for Elastic and Mechanical Properties of
Polycrystalline Silicon-Germanium Films Using Surface Acoustic Waves and
Projection Masks | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | Using Rayleigh surface acoustic waves (SAW), the Young's modulus, the density
and the thickness of polycrystalline Silicon-Germanium (SiGe) films deposited
on silicon and SiO2 were measured, in excellent agreement with theory. The
dispersion curve of the propagating SAW is calculated with a Boundary Element
Method (BEM)-Model based on Green's functions. The propagating SAW is generated
with a nanosecond laser in a narrowband scheme projecting stripes from a mask
on the surface of the sample. For this purpose a glass mask and a liquid
crystal display (LCD) mask are used. The slope of the SAW is then measured
using a probe beam setup. From the wavelength of the mask and the frequency of
the measured SAW, the dispersion curve is determined point by point. Fitting
the BEM-Model to the measured nonlinear dispersion curve provides several
physical parameters simultaneously. In the present work this is demonstrated
for the Young's modulus, the density and the thickness of SiGe films. The
results from the narrowband scheme measurement are in excellent agreement with
separated measurements of the thickness (profilometer), the density (balance)
and the Young's modulus (nanoindenter).
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:51:13 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Bennis",
"A.",
""
],
[
"Leinenbach",
"C.",
""
],
[
"Raudzis",
"C.",
""
],
[
"Müller-Fiedler",
"R.",
""
],
[
"Kronmüller",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3306 | EDA Publishing Association | Ja-Myeong Koo, Seung-Boo Jung | Effect of Surface Finish of Substrate on Mechanical Reliability of
in-48SN Solder Joints in Moems Package | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | Interfacial reactions and shear properties of the In-48Sn (in wt.%) ball grid
array (BGA) solder joints after bonding were investigated with four different
surface finishes of the substrate over an underlying Cu pad: electroplated
Ni/Au (hereafter E-NG), electroless Ni/immersion Au (hereafter ENIG), immersion
Ag (hereafter I-Ag) and organic solderability preservative (hereafter OSP).
During bonding, continuous AuIn2, Ni3(Sn,In)4 and Cu6(Sn,In)5 intermetallic
compound (IMC) layers were formed at the solder/E-NG, solder/ENIG and
solder/OSP interface, respectively. The interfacial reactions between the
solder and I-Ag substrate during bonding resulted in the formation of
Cu6(Sn,In)5 and Cu(Sn,In)2 IMCs with a minor Ag element. The In-48Sn/I-Ag
solder joint showed the best shear properties among the four solder joints
after bonding, whereas the solder/ENIG solder joint exhibited the weakest
mechanical integrity.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:52:02 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Koo",
"Ja-Myeong",
""
],
[
"Jung",
"Seung-Boo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3308 | EDA Publishing Association | Yasser Ammar (TIMA), S. Basrour (TIMA) | Non Linear Techniques for Increasing Harvesting Energy from
Piezoelectric and Electromagnetic Micro-Power-Generators | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | Non-linear techniques are used to optimize the harvested energy from
piezoelectric and electromagnetic generators. This paper introduces an
analytical study for the voltage amplification obtained from these techniques.
The analytical study is experimentally validated using a macro model of
piezoelectric generator. Moreover, the integration influences on these
techniques is studied. Through all the obtained results, a suitable structure
for autonomous microsystems is proposed.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:53:26 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Ammar",
"Yasser",
"",
"TIMA"
],
[
"Basrour",
"S.",
"",
"TIMA"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3309 | EDA Publishing Association | E. Lefeuvre (LGEF), A. Badel (LGEF), C. Richard (LGEF), L. Petit
(LGEF), D. Guyomar (LGEF) | Optimization of Piezoelectric Electrical Generators Powered by Random
Vibrations | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | This paper compares the performances of a vibrationpowered electrical
generators using PZT piezoelectric ceramic associated to two different power
conditioning circuits. A new approach of the piezoelectric power conversion
based on a nonlinear voltage processing is presented and implemented with a
particular power conditioning circuit topology. Theoretical predictions and
experimental results show that the nonlinear processing technique may increase
the power harvested by a factor up to 4 compared to the Standard optimization
technique. Properties of this new technique are analyzed in particular in the
case of broadband, random vibrations, and compared to those of the Standard
interface.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:54:47 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Lefeuvre",
"E.",
"",
"LGEF"
],
[
"Badel",
"A.",
"",
"LGEF"
],
[
"Richard",
"C.",
"",
"LGEF"
],
[
"Petit",
"L.",
"",
"LGEF"
],
[
"Guyomar",
"D.",
"",
"LGEF"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3311 | EDA Publishing Association | P.-D. Mitcheson, T.-C. Green, E.-M. Yeatman | Power Processing Circuits for Mems Inertial Energy Scavengers | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | Inertial energy scavengers are self-contained devices which generate power
from ambient motion, by electrically damping the internal motion of a suspended
proof mass. There are significant challenges in converting the power generated
from such devices to useable form, particularly in micro-engineered variants.
This paper presents approaches to this power conversion requirement, with
emphasis on the cases of electromagnetic and electrostatic transduction.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:57:09 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Mitcheson",
"P. -D.",
""
],
[
"Green",
"T. -C.",
""
],
[
"Yeatman",
"E. -M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3312 | EDA Publishing Association | T. Sterken, P. Fiorini, R. Puers | Motion-Based Generators for Industrial Applications | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | Scaling down of electronic systems has generated a large interest in the
research on miniature energy sources. In this paper a closer look is given to
the use of vibration based scavengers in industrial environments, where waste
energy is abundantly available as engine related vibrations or large amplitude
motions. The modeling of mechanical generators resulted in the design and
realization of two prototypes, based on electromagnetic and electrostatic
conversion of energy. Although the prototypes are not yet optimized against
size and efficiency, a power of 0.3 mW has been generated in a 5 Hz motion with
a 0.5 meter amplitude.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:57:46 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Sterken",
"T.",
""
],
[
"Fiorini",
"P.",
""
],
[
"Puers",
"R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3313 | EDA Publishing Association | Yi Chiu, Chiung-Ting Kuo, Yu-Shan Chu | Design and Fabrication of a Micro Electrostatic Vibration-to-Electricity
Energy Converter | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | This paper presents a micro electrostatic vibration-toelectricity energy
converter. For the 3.3 V supply voltage and 1cm2 chip area constraints, optimal
design parameters were found from theoretical calculation and Simulink
simulation. In the current design, the output power is 200 $\mu$W/cm2 for the
optimal load of 8 M\Omega. The device was fabricated in a silicon-on-insulator
(SOI) wafer. Mechanical and electrical measurements were conducted. Residual
particles caused shortage of the variable capacitor and the output power could
not be measured. Device design and fabrication processes are being refined.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 09:58:42 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Chiu",
"Yi",
""
],
[
"Kuo",
"Chiung-Ting",
""
],
[
"Chu",
"Yu-Shan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3314 | EDA Publishing Association | S.-P. Beeby, M.-J. Tudor, R.-N. Torah, E. Koukharenko, S. Roberts, T.
O'Donnell, S. Roy | Macro and Micro Scale Electromagnetic Kinetic Energy Harvesting
Generators | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | This paper is concerned with generators that harvest electrical energy from
the kinetic energy present in the sensor nodes environment. These generators
have the potential to replace or augment battery power which has a limited
lifetime and requires periodic replacement which limits the placement and
application of the sensor node.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 10:01:56 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Beeby",
"S. -P.",
""
],
[
"Tudor",
"M. -J.",
""
],
[
"Torah",
"R. -N.",
""
],
[
"Koukharenko",
"E.",
""
],
[
"Roberts",
"S.",
""
],
[
"O'Donnell",
"T.",
""
],
[
"Roy",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3315 | EDA Publishing Association | Fei Duan, J. Jiao, Y. Wang | Impact of Thermal Behavior on Offset in a High-Q Gyroscope | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | In this paper, CFD approach is used to simulate the thermal behavior in a
sensitive high-Q gyroscope. The electromagnetically driving wires, in which AC
current flows, are treated as Joule heat sources in the model. We found that
the differences of temperature, pressure and velocity along the driving
direction and transversely across the proof masses increased as the gap height
between the proof mass and top glass became smaller. Local pressure gradient is
expected to possibly enhance the impact of any imperfect led by MEMS processes
or designs on the offset of our tuning fork type gyroscope, which has been
experimentally verified. A device with 200um gap gives a two-third offset down
compared with that of its counterpart with 50um gap.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 10:02:53 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Duan",
"Fei",
""
],
[
"Jiao",
"J.",
""
],
[
"Wang",
"Y.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3316 | EDA Publishing Association | T. O'Donnell, C. Saha, S.-P. Beeby, M.-J. Tudor | Scaling Effects for Electromagnetic Vibrational Power Generators | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | This paper investigates how the power generated by electromagnetic based
vibrational power generators scales with the dimension of the generator. The
effects of scaling on the magnetic fields, the coil parameters and the
electromagnetic damping are presented. An analysis is presented for both
wire-wound coil technology and micro-fabricated coils.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 10:03:04 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"O'Donnell",
"T.",
""
],
[
"Saha",
"C.",
""
],
[
"Beeby",
"S. -P.",
""
],
[
"Tudor",
"M. -J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3317 | EDA Publishing Association | R. Hellin-Rico, J.-P. Celis, K. Baert, C. Van Hoof, A. Witvrouw | A Generic Surface Micromachining Module for Mems Hermetic Packaging at
Temperatures Below 200 degrees C | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | This paper presents the different processing steps of a new generic surface
micromachining module for MEMS hermetic packaging at temperatures around 180
degrees C based on nickel plating and photoresist sacrificial layers. The
advantages of thin film caps are the reduced thickness and area consumption and
the promise of being a low-cost batch process. Moreover, sealing happens by a
reflow technique, giving the freedom of choosing the pressure and atmosphere
inside the cavity. Sacrificial etch holes are situated above the device
allowing shorter release times compared to the state-of-the-art. With the
so-called over-plating process, small etch holes can be created in the membrane
without the need of expensive lithography tools. The etch holes in the membrane
have been shown to be sufficiently small to block the sealing material to pass
through, but still large enough to enable an efficient release.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 10:03:52 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Hellin-Rico",
"R.",
""
],
[
"Celis",
"J. -P.",
""
],
[
"Baert",
"K.",
""
],
[
"Van Hoof",
"C.",
""
],
[
"Witvrouw",
"A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3318 | EDA Publishing Association | Zhang Yong, Zhu Jian, Yu Yuanwei, Chen Chen, Jia Shi Xing | A Ku-Band Novel Micromachined Bandpass Filter with Two Transmission
Zeros | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | This paper presents a micromachined bandpass filter with miniature size that
has relatively outstanding performance. A silicon-based eight-order microstrip
bandpass filter is fabricated and measured. A novel design method of the
interdigital filter that can create two transmission zeros is described. The
location of the transmission zeros can be shifted arbitrarily in the stopband.
By adjusting the zero location properly, the filter provides much better skirt
rejection and lower insertion loss than a conventional microstrip interdigital
filter. To reduce the chip size, through-silicon-substrate-via-hole is used.
Good experimental results are obtained.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 10:05:09 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Yong",
"Zhang",
""
],
[
"Jian",
"Zhu",
""
],
[
"Yuanwei",
"Yu",
""
],
[
"Chen",
"Chen",
""
],
[
"Xing",
"Jia Shi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0711.3319 | EDA Publishing Association | Ch.-Heng Chien, Hui-Min Yu | The Design and Fabrication of Platform Device for Dna Amplification | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans Symposium on Design, Test, Integration and Packaging of
MEMS/MOEMS - DTIP 2006, Stresa, Lago Maggiore : Italie (2006) | null | null | cs.OH | null | Thermalcycler were extensively used machine for amplify DNA sample. One of
the major problems in the working time was that it spent most of time for
cooling and heating. In order to improve the efficient, this study presented a
novel method for amplify DNA sample. For this concept, the DNA sample in the
silicon chamber which was pushed by a beam through three temperature regions
around a center and then the DNA segments could be amplified rapidly after 30
cycles. The polymerase chain reaction platform was composed of thin-film
heaters, copper plates, DC powers, and temperature controllers. The
photolithography and bulk etching technologies were utilized to construct the
thin-film heater and DNA reaction chambers. Finally, 1 pound gL 100bp DNA
segment of E. coli K12 was amplified successfully within 36 minutes on this PCR
platform.
| [
{
"version": "v1",
"created": "Wed, 21 Nov 2007 10:05:29 GMT"
}
] | 2007-11-29T00:00:00 | [
[
"Chien",
"Ch. -Heng",
""
],
[
"Yu",
"Hui-Min",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.