id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0809.0124
|
Peter Turney
|
Peter D. Turney (National Research Council of Canada)
|
A Uniform Approach to Analogies, Synonyms, Antonyms, and Associations
|
related work available at http://purl.org/peter.turney/
|
Proceedings of the 22nd International Conference on Computational
Linguistics (Coling 2008), August 2008, Manchester, UK, Pages 905-912
| null |
NRC 50398
|
cs.CL cs.IR cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recognizing analogies, synonyms, antonyms, and associations appear to be four
distinct tasks, requiring distinct NLP algorithms. In the past, the four tasks
have been treated independently, using a wide variety of algorithms. These four
semantic classes, however, are a tiny sample of the full range of semantic
phenomena, and we cannot afford to create ad hoc algorithms for each semantic
phenomenon; we need to seek a unified approach. We propose to subsume a broad
range of phenomena under analogies. To limit the scope of this paper, we
restrict our attention to the subsumption of synonyms, antonyms, and
associations. We introduce a supervised corpus-based machine learning algorithm
for classifying analogous word pairs, and we show that it can solve
multiple-choice SAT analogy questions, TOEFL synonym questions, ESL
synonym-antonym questions, and similar-associated-both questions from cognitive
psychology.
|
[
{
"version": "v1",
"created": "Sun, 31 Aug 2008 14:00:26 GMT"
}
] | 2008-09-02T00:00:00 |
[
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0809.0158
|
Jian Ni
|
Jian Ni, Sekhar Tatikonda
|
Network Tomography Based on Additive Metrics
|
35 pages
|
IEEE Transactions on Information Theory, 57(12), December 2011
|
10.1109/TIT.2011.2168901
| null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Inference of the network structure (e.g., routing topology) and dynamics
(e.g., link performance) is an essential component in many network design and
management tasks. In this paper we propose a new, general framework for
analyzing and designing routing topology and link performance inference
algorithms using ideas and tools from phylogenetic inference in evolutionary
biology. The framework is applicable to a variety of measurement techniques.
Based on the framework we introduce and develop several polynomial-time
distance-based inference algorithms with provable performance. We provide
sufficient conditions for the correctness of the algorithms. We show that the
algorithms are consistent (return correct topology and link performance with an
increasing sample size) and robust (can tolerate a certain level of measurement
errors). In addition, we establish certain optimality properties of the
algorithms (i.e., they achieve the optimal $l_\infty$-radius) and demonstrate
their effectiveness via model simulation.
|
[
{
"version": "v1",
"created": "Sun, 31 Aug 2008 22:27:20 GMT"
}
] | 2019-11-13T00:00:00 |
[
[
"Ni",
"Jian",
""
],
[
"Tatikonda",
"Sekhar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.0159
|
Domagoj Severdija
|
K. Elbassioni, D. Matijevic, J. Mestre, D. Severdija
|
Improved Approximations for Guarding 1.5-Dimensional Terrains
|
10 pages, 1 Postscript figure, uses geometry.sty
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a 4-approximation algorithm for the problem of placing a fewest
guards on a 1.5D terrain so that every point of the terrain is seen by at least
one guard. This improves on the currently best approximation factor of 5. Our
method is based on rounding the linear programming relaxation of the
corresponding covering problem. Besides the simplicity of the analysis, which
mainly relies on decomposing the constraint matrix of the LP into totally
balanced matrices, our algorithm, unlike previous work, generalizes to the
weighted and partial versions of the basic problem.
|
[
{
"version": "v1",
"created": "Mon, 1 Sep 2008 16:13:30 GMT"
}
] | 2008-09-02T00:00:00 |
[
[
"Elbassioni",
"K.",
""
],
[
"Matijevic",
"D.",
""
],
[
"Mestre",
"J.",
""
],
[
"Severdija",
"D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0809.0188
|
Marek Karpinski
|
Piotr Berman, Bhaskar DasGupta and Marek Karpinski
|
Approximating Transitivity in Directed Networks
| null | null | null | null |
cs.CC cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the problem of computing a minimum equivalent digraph (also known as
the problem of computing a strong transitive reduction) and its maximum
objective function variant, with two types of extensions. First, we allow to
declare a set $D\subset E$ and require that a valid solution $A$ satisfies
$D\subset A$ (it is sometimes called transitive reduction problem). In the
second extension (called $p$-ary transitive reduction), we have integer edge
labeling and we view two paths as equivalent if they have the same beginning,
ending and the sum of labels modulo $p$. A solution $A\subseteq E$ is valid if
it gives an equivalent path for every original path. For all problems we
establish the following: polynomial time minimization of $|A|$ within ratio
1.5, maximization of $|E-A|$ within ratio 2, MAX-SNP hardness even of the
length of simple cycles is limited to 5. Furthermore, we believe that the
combinatorial technique behind the approximation algorithm for the minimization
version might be of interest to other graph connectivity problems as well.
|
[
{
"version": "v1",
"created": "Mon, 1 Sep 2008 08:58:32 GMT"
}
] | 2008-09-02T00:00:00 |
[
[
"Berman",
"Piotr",
""
],
[
"DasGupta",
"Bhaskar",
""
],
[
"Karpinski",
"Marek",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0809.0195
|
Ugo Dal Lago
|
Paolo Coppola, Ugo Dal Lago, Simona Ronchi Della Rocca
|
Light Logics and the Call-by-Value Lambda Calculus
|
28 pages
|
Logical Methods in Computer Science, Volume 4, Issue 4 (November
7, 2008) lmcs:820
|
10.2168/LMCS-4(4:5)2008
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The so-called light logics have been introduced as logical systems enjoying
quite remarkable normalization properties. Designing a type assignment system
for pure lambda calculus from these logics, however, is problematic. In this
paper we show that shifting from usual call-by-name to call-by-value lambda
calculus allows regaining strong connections with the underlying logic. This
will be done in the context of Elementary Affine Logic (EAL), designing a type
system in natural deduction style assigning EAL formulae to lambda terms.
|
[
{
"version": "v1",
"created": "Mon, 1 Sep 2008 09:46:36 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Nov 2008 17:12:02 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"Coppola",
"Paolo",
""
],
[
"Lago",
"Ugo Dal",
""
],
[
"Della Rocca",
"Simona Ronchi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0809.0199
|
John Wright
|
John Wright and Yi Ma
|
Dense Error Correction via L1-Minimization
|
40 pages, 9 figures
| null | null |
UILU-ENG-08-2210, DC 237
|
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies the problem of recovering a non-negative sparse signal $\x
\in \Re^n$ from highly corrupted linear measurements $\y = A\x + \e \in \Re^m$,
where $\e$ is an unknown error vector whose nonzero entries may be unbounded.
Motivated by an observation from face recognition in computer vision, this
paper proves that for highly correlated (and possibly overcomplete)
dictionaries $A$, any non-negative, sufficiently sparse signal $\x$ can be
recovered by solving an $\ell^1$-minimization problem: $\min \|\x\|_1 +
\|\e\|_1 \quad {subject to} \quad \y = A\x + \e.$ More precisely, if the
fraction $\rho$ of errors is bounded away from one and the support of $\x$
grows sublinearly in the dimension $m$ of the observation, then as $m$ goes to
infinity, the above $\ell^1$-minimization succeeds for all signals $\x$ and
almost all sign-and-support patterns of $\e$. This result suggests that
accurate recovery of sparse signals is possible and computationally feasible
even with nearly 100% of the observations corrupted. The proof relies on a
careful characterization of the faces of a convex polytope spanned together by
the standard crosspolytope and a set of iid Gaussian vectors with nonzero mean
and small variance, which we call the ``cross-and-bouquet'' model. Simulations
and experimental results corroborate the findings, and suggest extensions to
the result.
|
[
{
"version": "v1",
"created": "Mon, 1 Sep 2008 10:07:19 GMT"
}
] | 2008-09-02T00:00:00 |
[
[
"Wright",
"John",
""
],
[
"Ma",
"Yi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.0216
|
Somitra Sanadhya
|
Somitra Kumar Sanadhya and Palash Sarkar
|
Colliding Message Pairs for 23 and 24-step SHA-512
|
2 pages, 2 Tables
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, Indesteege et al. [1] had described attacks against 23 and 24-step
SHA-512 at SAC '08. Their attacks are based on the differential path by Nikolic
and Biryukov [2]. The reported complexities are $2^{44.9}$ and $2^{53}$ calls
to the respective step reduced SHA-512 hash function. They provided colliding
message pairs for 23-step SHA-512 but did not provide a colliding message pair
for 24-step SHA-512. In this note we provide a colliding message pair for
23-step SHA-512 and the first colliding message pair for 24-step SHA-512. Our
attacks use the differential path first described by Sanadhya and Sarkar at
ACISP '08 [3]. The complexities of our attacks are $2^{16.5}$ and $2^{34.5}$
calls to the respective step reduced SHA-512 hash function. Complete details of
the attacks will be provided in an extended version of this note.
|
[
{
"version": "v1",
"created": "Mon, 1 Sep 2008 12:55:32 GMT"
}
] | 2008-09-02T00:00:00 |
[
[
"Sanadhya",
"Somitra Kumar",
""
],
[
"Sarkar",
"Palash",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0809.0257
|
Xuan Cai
|
Xuan Cai
|
Linear Kernelizations for Restricted 3-Hitting Set Problems
|
12 pages
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The 3-\textsc{Hitting Set} problem is also called the \textsc{Vertex Cover}
problem on 3-uniform hypergraphs. In this paper, we address kernelizations of
the \textsc{Vertex Cover} problem on 3-uniform hypergraphs. We show that this
problem admits a linear kernel in three classes of 3-uniform hypergraphs. We
also obtain lower and upper bounds on the kernel size for them by the
parametric duality.
|
[
{
"version": "v1",
"created": "Mon, 1 Sep 2008 14:52:30 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Sep 2008 09:25:25 GMT"
},
{
"version": "v3",
"created": "Thu, 4 Sep 2008 07:04:49 GMT"
},
{
"version": "v4",
"created": "Sat, 20 Sep 2008 13:19:49 GMT"
}
] | 2008-09-20T00:00:00 |
[
[
"Cai",
"Xuan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0809.0259
|
Vadim E. Levit
|
Vadim E. Levit and Eugen Mandrescu
|
On Duality between Local Maximum Stable Sets of a Graph and its
Line-Graph
|
7 pages; 7 figures
| null | null | null |
math.CO cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
G is a Koenig-Egervary graph provided alpha(G)+ mu(G)=|V(G)|, where mu(G) is
the size of a maximum matching and alpha(G) is the cardinality of a maximum
stable set. S is a local maximum stable set of G if S is a maximum stable set
of the closed neighborhood of S. Nemhauser and Trotter Jr. proved that any
local maximum stable set is a subset of a maximum stable set of G. In this
paper we demonstrate that if S is a local maximum stable set, the subgraph H
induced by the closed neighborhood of S is a Koenig-Egervary graph, and M is a
maximum matching in H, then M is a local maximum stable set in the line graph
of G.
|
[
{
"version": "v1",
"created": "Mon, 1 Sep 2008 15:08:19 GMT"
}
] | 2011-01-25T00:00:00 |
[
[
"Levit",
"Vadim E.",
""
],
[
"Mandrescu",
"Eugen",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0809.0271
|
Martin Josef Geiger
|
Martin Josef Geiger
|
Randomised Variable Neighbourhood Search for Multi Objective
Optimisation
| null |
Proceedings of the 4th EU/ME Workshop: Design and Evaluation of
Advanced Hybrid Meta-Heuristics, November 4--5, Nottingham, United Kingdom,
pp. 34-42
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Various local search approaches have recently been applied to machine
scheduling problems under multiple objectives. Their foremost consideration is
the identification of the set of Pareto optimal alternatives. An important
aspect of successfully solving these problems lies in the definition of an
appropriate neighbourhood structure. Unclear in this context remains, how
interdependencies within the fitness landscape affect the resolution of the
problem.
The paper presents a study of neighbourhood search operators for multiple
objective flow shop scheduling. Experiments have been carried out with twelve
different combinations of criteria. To derive exact conclusions, small problem
instances, for which the optimal solutions are known, have been chosen.
Statistical tests show that no single neighbourhood operator is able to equally
identify all Pareto optimal alternatives. Significant improvements however have
been obtained by hybridising the solution algorithm using a randomised variable
neighbourhood search technique.
|
[
{
"version": "v1",
"created": "Mon, 1 Sep 2008 15:32:49 GMT"
}
] | 2008-09-02T00:00:00 |
[
[
"Geiger",
"Martin Josef",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0809.0352
|
Kees Middelburg
|
J. A. Bergstra, C. A. Middelburg
|
Instruction sequences and non-uniform complexity theory
|
31 pages; 31 pages, improvements of several proof outlines; 33 pages,
presentation of section 7 improved
| null | null |
PRG0812
|
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop theory concerning non-uniform complexity in a setting in which the
notion of single-pass instruction sequence considered in program algebra is the
central notion. We define counterparts of the complexity classes P/poly and
NP/poly and formulate a counterpart of the complexity theoretic conjecture that
NP is not included in P/poly. In addition, we define a notion of completeness
for the counterpart of NP/poly using a non-uniform reducibility relation and
formulate complexity hypotheses which concern restrictions on the instruction
sequences used for computation. We think that the theory developed opens up an
additional way of investigating issues concerning non-uniform complexity.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 05:45:48 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Oct 2009 06:14:49 GMT"
},
{
"version": "v3",
"created": "Wed, 14 Jul 2010 19:05:50 GMT"
}
] | 2010-07-15T00:00:00 |
[
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0809.0355
|
Bruno Martin
|
Katsunobu Imai (I3S, IEC), Bruno Martin (I3S)
|
Simulations between triangular and hexagonal number-conserving cellular
automata
|
11 pages; International Workshop on Natural Computing, Yokohama :
Japon (2008)
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A number-conserving cellular automaton is a cellular automaton whose states
are integers and whose transition function keeps the sum of all cells constant
throughout its evolution. It can be seen as a kind of modelization of the
physical conservation laws of mass or energy. In this paper, we first propose a
necessary condition for triangular and hexagonal cellular automata to be
number-conserving. The local transition function is expressed by the sum of
arity two functions which can be regarded as 'flows' of numbers. The
sufficiency is obtained through general results on number-conserving cellular
automata. Then, using the previous flow functions, we can construct effective
number-conserving simulations between hexagonal cellular automata and
triangular cellular automata.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 06:40:40 GMT"
}
] | 2008-09-03T00:00:00 |
[
[
"Imai",
"Katsunobu",
"",
"I3S, IEC"
],
[
"Martin",
"Bruno",
"",
"I3S"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0809.0360
|
Aniello Murano
|
Piero A. Bonatti, Carsten Lutz, Aniello Murano, Moshe Y. Vardi
|
The Complexity of Enriched Mu-Calculi
|
A preliminary version of this paper appears in the Proceedings of the
33rd International Colloquium on Automata, Languages and Programming (ICALP),
2006. This paper has been selected for a special issue in LMCS
|
Logical Methods in Computer Science, Volume 4, Issue 3 (September
22, 2008) lmcs:993
|
10.2168/LMCS-4(3:11)2008
| null |
cs.LO cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The fully enriched μ-calculus is the extension of the propositional
μ-calculus with inverse programs, graded modalities, and nominals. While
satisfiability in several expressive fragments of the fully enriched
μ-calculus is known to be decidable and ExpTime-complete, it has recently
been proved that the full calculus is undecidable. In this paper, we study the
fragments of the fully enriched μ-calculus that are obtained by dropping at
least one of the additional constructs. We show that, in all fragments obtained
in this way, satisfiability is decidable and ExpTime-complete. Thus, we
identify a family of decidable logics that are maximal (and incomparable) in
expressive power. Our results are obtained by introducing two new automata
models, showing that their emptiness problems are ExpTime-complete, and then
reducing satisfiability in the relevant logics to these problems. The automata
models we introduce are two-way graded alternating parity automata over
infinite trees (2GAPTs) and fully enriched automata (FEAs) over infinite
forests. The former are a common generalization of two incomparable automata
models from the literature. The latter extend alternating automata in a similar
way as the fully enriched μ-calculus extends the standard μ-calculus.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 07:51:04 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Sep 2008 19:10:39 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"Bonatti",
"Piero A.",
""
],
[
"Lutz",
"Carsten",
""
],
[
"Murano",
"Aniello",
""
],
[
"Vardi",
"Moshe Y.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0809.0400
|
Xuan Cai
|
Xuan Cai
|
Canonical Coin Systems for Change-Making Problems
|
7 pages
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Change-Making Problem is to represent a given value with the fewest coins
under a given coin system. As a variation of the knapsack problem, it is known
to be NP-hard. Nevertheless, in most real money systems, the greedy algorithm
yields optimal solutions. In this paper, we study what type of coin systems
that guarantee the optimality of the greedy algorithm. We provide new proofs
for a sufficient and necessary condition for the so-called \emph{canonical}
coin systems with four or five types of coins, and a sufficient condition for
non-canonical coin systems, respectively. Moreover, we present an $O(m^2)$
algorithm that decides whether a tight coin system is canonical.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 11:04:19 GMT"
},
{
"version": "v2",
"created": "Sat, 21 Mar 2009 16:12:55 GMT"
}
] | 2009-03-21T00:00:00 |
[
[
"Cai",
"Xuan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0809.0406
|
Martin Josef Geiger
|
Martin Josef Geiger
|
Foundations of the Pareto Iterated Local Search Metaheuristic
|
Proceedings of the 18th International Conference on Multiple Criteria
Decision Making, Chania, Greece, June 19-23, 2006
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper describes the proposition and application of a local search
metaheuristic for multi-objective optimization problems. It is based on two
main principles of heuristic search, intensification through variable
neighborhoods, and diversification through perturbations and successive
iterations in favorable regions of the search space. The concept is
successfully tested on permutation flow shop scheduling problems under multiple
objectives. While the obtained results are encouraging in terms of their
quality, another positive attribute of the approach is its' simplicity as it
does require the setting of only very few parameters. The implementation of the
Pareto Iterated Local Search metaheuristic is based on the MOOPPS computer
system of local search heuristics for multi-objective scheduling which has been
awarded the European Academic Software Award 2002 in Ronneby, Sweden
(http://www.easa-award.net/, http://www.bth.se/llab/easa_2002.nsf)
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 11:29:45 GMT"
}
] | 2008-09-03T00:00:00 |
[
[
"Geiger",
"Martin Josef",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0809.0410
|
Martin Josef Geiger
|
Martin Josef Geiger
|
A Computational Study of Genetic Crossover Operators for Multi-Objective
Vehicle Routing Problem with Soft Time Windows
| null |
Habenicht, W. et al. (eds.): Multi-Criteria- und Fuzzy Systeme in
Theorie und Praxis-Loesungsansaetze fuer Entscheidungsprobleme mit komplexen
Zielsystemen, 2003, ISBN 3-8244-7864-1, pp. 191-207
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The article describes an investigation of the effectiveness of genetic
algorithms for multi-objective combinatorial optimization (MOCO) by presenting
an application for the vehicle routing problem with soft time windows. The work
is motivated by the question, if and how the problem structure influences the
effectiveness of different configurations of the genetic algorithm.
Computational results are presented for different classes of vehicle routing
problems, varying in their coverage with time windows, time window size,
distribution and number of customers. The results are compared with a simple,
but effective local search approach for multi-objective combinatorial
optimization problems.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 11:39:52 GMT"
}
] | 2008-09-03T00:00:00 |
[
[
"Geiger",
"Martin Josef",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0809.0416
|
Martin Josef Geiger
|
Martin Josef Geiger
|
Genetic Algorithms for multiple objective vehicle routing
| null |
Proceedings of the Metaheuristics International Conference
MIC'2001, Porto, Portugal, pp. 349-353
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The talk describes a general approach of a genetic algorithm for multiple
objective optimization problems. A particular dominance relation between the
individuals of the population is used to define a fitness operator, enabling
the genetic algorithm to adress even problems with efficient, but
convex-dominated alternatives. The algorithm is implemented in a multilingual
computer program, solving vehicle routing problems with time windows under
multiple objectives. The graphical user interface of the program shows the
progress of the genetic algorithm and the main parameters of the approach can
be easily modified. In addition to that, the program provides powerful decision
support to the decision maker. The software has proved it's excellence at the
finals of the European Academic Software Award EASA, held at the Keble college/
University of Oxford/ Great Britain.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 12:08:56 GMT"
}
] | 2008-09-03T00:00:00 |
[
[
"Geiger",
"Martin Josef",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0809.0417
|
Nirmal Thyagu N
|
Satyam Mukherjee, Neelima Gupte
|
Queue-length synchronization in a communication networks
|
13 Pages, 15 figures
|
Phys. Rev. E Vol. 79, 056105 (2009)
|
10.1103/PhysRevE.79.056105
| null |
physics.soc-ph cond-mat.stat-mech cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study synchronization in the context of network traffic on a $2-d$
communication network with local clustering and geographic separations. The
network consists of nodes and randomly distributed hubs where the top five hubs
ranked according to their coefficient of betweenness centrality (CBC) are
connected by random assortative and gradient mechanisms. For multiple message
traffic, messages can trap at the high CBC hubs, and congestion can build up on
the network with long queues at the congested hubs. The queue lengths are seen
to synchronize in the congested phase. Both complete and phase synchronization
is seen, between pairs of hubs. In the decongested phase, the pairs start
clearing, and synchronization is lost. A cascading master-slave relation is
seen between the hubs, with the slower hubs (which are slow to decongest)
driving the faster ones. These are usually the hubs of high CBC. Similar
results are seen for traffic of constant density. Total synchronization between
the hubs of high CBC is also seen in the congested regime. Similar behavior is
seen for traffic on a network constructed using the Waxman random topology
generator. We also demonstrate the existence of phase synchronization in real
Internet traffic data.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 12:10:37 GMT"
},
{
"version": "v2",
"created": "Sat, 22 Nov 2008 12:41:46 GMT"
},
{
"version": "v3",
"created": "Wed, 20 May 2009 10:37:49 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Mukherjee",
"Satyam",
""
],
[
"Gupte",
"Neelima",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0809.0444
|
Gambs S\'ebastien
|
S\'ebastien Gambs
|
Quantum classification
|
Preliminary version, comments are welcome
| null | null | null |
quant-ph cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Quantum classification is defined as the task of predicting the associated
class of an unknown quantum state drawn from an ensemble of pure states given a
finite number of copies of this state. By recasting the state discrimination
problem within the framework of Machine Learning (ML), we can use the notion of
learning reduction coming from classical ML to solve different variants of the
classification task, such as the weighted binary and the multiclass versions.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 19:56:54 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Sep 2008 20:02:34 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Gambs",
"Sébastien",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0809.0448
|
Eric Engle
|
Eric Engle
|
The Stock Market as a Game: An Agent Based Approach to Trading in Stocks
|
21 pages and accompanying program
| null | null | null |
q-fin.TR cs.AI cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Just as war is sometimes fallaciously represented as a zero sum game -- when
in fact war is a negative sum game - stock market trading, a positive sum game
over time, is often erroneously represented as a zero sum game. This is called
the "zero sum fallacy" -- the erroneous belief that one trader in a stock
market exchange can only improve their position provided some other trader's
position deteriorates. However, a positive sum game in absolute terms can be
recast as a zero sum game in relative terms. Similarly it appears that negative
sum games in absolute terms have been recast as zero sum games in relative
terms: otherwise, why would zero sum games be used to represent situations of
war? Such recasting may have heuristic or pedagogic interest but recasting must
be clearly explicited or risks generating confusion.
Keywords: Game theory, stock trading and agent based AI.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 14:58:00 GMT"
}
] | 2008-12-02T00:00:00 |
[
[
"Engle",
"Eric",
""
]
] |
[
{
"class": "Quantitative Finance",
"code": "q-fin.TR",
"description": "Market microstructure, liquidity, exchange and auction design, automated trading, agent-based modeling and market-making",
"span": "(Trading and Market Microstructure)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0809.0458
|
Eric Engle
|
Eric Engle
|
Agent Models of Political Interactions
|
22 pages
| null | null | null |
cs.AI cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Looks at state interactions from an agent based AI perspective to see state
interactions as an example of emergent intelligent behavior. Exposes basic
principles of game theory.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 16:06:40 GMT"
}
] | 2008-09-03T00:00:00 |
[
[
"Engle",
"Eric",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0809.0460
|
Shipra Agrawal
|
Shipra Agrawal, Amin Saberi, Yinyu Ye
|
Stochastic Combinatorial Optimization under Probabilistic Constraints
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present approximation algorithms for combinatorial
optimization problems under probabilistic constraints. Specifically, we focus
on stochastic variants of two important combinatorial optimization problems:
the k-center problem and the set cover problem, with uncertainty characterized
by a probability distribution over set of points or elements to be covered. We
consider these problems under adaptive and non-adaptive settings, and present
efficient approximation algorithms for the case when underlying distribution is
a product distribution. In contrast to the expected cost model prevalent in
stochastic optimization literature, our problem definitions support
restrictions on the probability distributions of the total costs, via
incorporating constraints that bound the probability with which the incurred
costs may exceed a given threshold.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 16:07:42 GMT"
}
] | 2008-09-03T00:00:00 |
[
[
"Agrawal",
"Shipra",
""
],
[
"Saberi",
"Amin",
""
],
[
"Ye",
"Yinyu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0809.0461
|
Eric Engle
|
Eric Engle
|
The Semiotic Machine
|
28 pages
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A semiotic model of the user interface in human-computer interaction.
Algorithmic sign, semotics, algorithmic art.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 17:25:25 GMT"
}
] | 2008-09-03T00:00:00 |
[
[
"Engle",
"Eric",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0809.0490
|
Alexander Gorban
|
A. N. Gorban, A. Y. Zinovyev
|
Principal Graphs and Manifolds
|
36 pages, 6 figures, minor corrections
|
Handbook of Research on Machine Learning Applications and Trends:
Algorithms, Methods and Techniques, Ch. 2, Information Science Reference,
2009. 28-59
|
10.4018/978-1-60566-766-9
| null |
cs.LG cs.NE stat.ML
|
http://creativecommons.org/licenses/by/3.0/
|
In many physical, statistical, biological and other investigations it is
desirable to approximate a system of points by objects of lower dimension
and/or complexity. For this purpose, Karl Pearson invented principal component
analysis in 1901 and found 'lines and planes of closest fit to system of
points'. The famous k-means algorithm solves the approximation problem too, but
by finite sets instead of lines and planes. This chapter gives a brief
practical introduction into the methods of construction of general principal
objects, i.e. objects embedded in the 'middle' of the multidimensional data
set. As a basis, the unifying framework of mean squared distance approximation
of finite datasets is selected. Principal graphs and manifolds are constructed
as generalisations of principal components and k-means principal points. For
this purpose, the family of expectation/maximisation algorithms with nearest
generalisations is presented. Construction of principal graphs with controlled
complexity is based on the graph grammar approach.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 18:04:53 GMT"
},
{
"version": "v2",
"created": "Mon, 9 May 2011 13:23:08 GMT"
}
] | 2011-05-10T00:00:00 |
[
[
"Gorban",
"A. N.",
""
],
[
"Zinovyev",
"A. Y.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0809.0494
|
Bruno Guillaume
|
Bruno Guillaume (INRIA Lorraine - LORIA), Guy Perrier (INRIA Lorraine
- LORIA)
|
Interaction Grammars
| null | null | null |
RR-6621
|
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Interaction Grammar (IG) is a grammatical formalism based on the notion of
polarity. Polarities express the resource sensitivity of natural languages by
modelling the distinction between saturated and unsaturated syntactic
structures. Syntactic composition is represented as a chemical reaction guided
by the saturation of polarities. It is expressed in a model-theoretic framework
where grammars are constraint systems using the notion of tree description and
parsing appears as a process of building tree description models satisfying
criteria of saturation and minimality.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 18:37:01 GMT"
}
] | 2008-09-03T00:00:00 |
[
[
"Guillaume",
"Bruno",
"",
"INRIA Lorraine - LORIA"
],
[
"Perrier",
"Guy",
"",
"INRIA Lorraine\n - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0809.0519
|
Haris Aziz
|
Haris Aziz
|
Complexity of comparison of influence of players in simple games
|
Latex, 13 pages, COMSOC-2008: 2nd International Workshop on
Computational Social Choice
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Coalitional voting games appear in different forms in multi-agent systems,
social choice and threshold logic. In this paper, the complexity of comparison
of influence between players in coalitional voting games is characterized. The
possible representations of simple games considered are simple games
represented by winning coalitions, minimal winning coalitions, weighted voting
game or a multiple weighted voting game. The influence of players is gauged
from the viewpoint of basic player types, desirability relations and classical
power indices such as Shapley-Shubik index, Banzhaf index, Holler index,
Deegan-Packel index and Chow parameters. Among other results, it is shown that
for a simple game represented by minimal winning coalitions, although it is
easy to verify whether a player has zero or one voting power, computing the
Banzhaf value of the player is #P-complete. Moreover, it is proved that
multiple weighted voting games are the only representations for which it is
NP-hard to verify whether the game is linear or not. For a simple game with a
set W^m of minimal winning coalitions and n players, a O(n.|W^m|+(n^2)log(n))
algorithm is presented which returns `no' if the game is non-linear and returns
the strict desirability ordering otherwise. The complexity of transforming
simple games into compact representations is also examined.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 21:20:27 GMT"
}
] | 2008-09-04T00:00:00 |
[
[
"Aziz",
"Haris",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0809.0522
|
Mark Newman
|
M. E. J. Newman
|
The first-mover advantage in scientific publication
|
7 pages, 3 figures
|
Europhys. Lett. 86, 68001 (2009)
|
10.1209/0295-5075/86/68001
| null |
physics.soc-ph cs.DL cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mathematical models of the scientific citation process predict a strong
"first-mover" effect under which the first papers in a field will, essentially
regardless of content, receive citations at a rate enormously higher than
papers published later. Moreover papers are expected to retain this advantage
in perpetuity -- they should receive more citations indefinitely, no matter how
many other papers are published after them. We test this conjecture against
data from a selection of fields and in several cases find a first-mover effect
of a magnitude similar to that predicted by the theory. Were we wearing our
cynical hat today, we might say that the scientist who wants to become famous
is better off -- by a wide margin -- writing a modest paper in next year's
hottest field than an outstanding paper in this year's. On the other hand,
there are some papers, albeit only a small fraction, that buck the trend and
attract significantly more citations than theory predicts despite having
relatively late publication dates. We suggest that papers of this kind, though
they often receive comparatively few citations overall, are probably worthy of
our attention.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 21:33:02 GMT"
}
] | 2013-10-31T00:00:00 |
[
[
"Newman",
"M. E. J.",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
}
] |
0809.0524
|
Eric Engle
|
Eric Engle
|
Computer Art in the Former Soviet Bloc
|
28 pages
| null | null | null |
cs.MM cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Documents early computer art in the Soviet bloc and describes Marxist art
theory.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2008 21:48:28 GMT"
}
] | 2008-09-04T00:00:00 |
[
[
"Engle",
"Eric",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0809.0533
|
Wei Ren
|
Wei Ren, Qing Zhao, Ananthram Swami
|
Power Control in Cognitive Radio Networks: How to Cross a Multi-Lane
Highway
|
20 pages, 10 figures, to appear in IEEE Journal on Selected Areas in
Communications (JSAC): Special Issue on Stochastic Geometry and Random Graphs
for Wireless Networks
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider power control in cognitive radio networks where secondary users
identify and exploit instantaneous and local spectrum opportunities without
causing unacceptable interference to primary users. We qualitatively
characterize the impact of the transmission power of secondary users on the
occurrence of spectrum opportunities and the reliability of opportunity
detection. Based on a Poisson model of the primary network, we quantify these
impacts by showing that (i) the probability of spectrum opportunity decreases
exponentially with respect to the transmission power of secondary users, where
the exponential decay constant is given by the traffic load of primary users;
(ii) reliable opportunity detection is achieved in the two extreme regimes in
terms of the ratio between the transmission power of secondary users and that
of primary users. Such analytical characterizations allow us to study power
control for optimal transport throughput under constraints on the interference
to primary users. Furthermore, we reveal the difference between detecting
primary signals and detecting spectrum opportunities, and demonstrate the
complex relationship between physical layer spectrum sensing and MAC layer
throughput. The dependency of this PHY-MAC interaction on the application type
and the use of handshake signaling such as RTS/CTS is illustrated.
|
[
{
"version": "v1",
"created": "Wed, 3 Sep 2008 07:40:19 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Mar 2009 00:32:11 GMT"
}
] | 2009-03-17T00:00:00 |
[
[
"Ren",
"Wei",
""
],
[
"Zhao",
"Qing",
""
],
[
"Swami",
"Ananthram",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0809.0536
|
Minghua Xia
|
Minghua Xia, Wenkun Wen, and Soo-Chang Kim
|
How to Fully Exploit the Degrees of Freedom in the Downlink of MISO
Systems With Opportunistic Beamforming
|
v2, revised Jan. 5, 2009. Few typo and error corrections, better
clarification
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The opportunistic beamforming in the downlink of multiple-input single-output
(MISO) systems forms $N$ transmit beams, usually, no more than the number of
transmit antennas $N_t$. However, the degrees of freedom in this downlink is as
large as $N_t^2$. That is, at most $N_t^2$ rather than only $N_t$ users can be
simultaneously transmitted and thus the scheduling latency can be significantly
reduced. In this paper, we focus on the opportunistic beamforming schemes with
$N_t<N\le N_t^2$ transmit beams in the downlink of MISO systems over Rayleigh
fading channels. We first show how to design the beamforming matrices with
maximum number of transmit beams as well as least correlation between any pair
of them as possible, through Fourier, Grassmannian, and mutually unbiased bases
(MUB) based constructions in practice. Then, we analyze their system throughput
by exploiting the asymptotic theory of extreme order statistics. Finally, our
simulation results show the Grassmannian-based beamforming achieves the maximum
throughput in all cases with $N_t=2$, 3, 4. However, if we want to exploit
overall $N_t^2$ degrees of freedom, we shall resort to the Fourier and
MUB-based constructions in the cases with $N_t=3$, 4, respectively.
|
[
{
"version": "v1",
"created": "Wed, 3 Sep 2008 07:59:12 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jan 2009 11:30:02 GMT"
}
] | 2009-01-05T00:00:00 |
[
[
"Xia",
"Minghua",
""
],
[
"Wen",
"Wenkun",
""
],
[
"Kim",
"Soo-Chang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.0539
|
Wiroonsak Santipach
|
Wiroonsak Santipach
|
Signature Quantization in Fading CDMA With Limited Feedback
| null |
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 59, NO. 2, PP. 569-577
FEBRUARY 2011
|
10.1109/TCOMM.2011.122110.090476
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we analyze the performance of a signature quantization scheme
for reverse-link Direct Sequence (DS)- Code Division Multiple Access (CDMA).
Assuming perfect estimates of the channel and interference covariance, the
receiver selects the signature that minimizes interference power or maximizes
signal-to-interference plus noise ratio (SINR) for a desired user from a
signature codebook. The codebook index corresponding to the optimal signature
is then relayed to the user with a finite number of bits via a feedback
channel. Here we are interested in the performance of a Random Vector
Quantization (RVQ) codebook, which contains independent isotropically
distributed vectors. Assuming arbitrary transmit power allocation, we consider
additive white Gaussian noise (AWGN) channel first with no fading and
subsequently, with multipath fading. We derive the corresponding SINR in a
large system limit at the output of matched filter and linear minimum mean
squared error (MMSE) receiver. Numerical examples show that the derived large
system results give a good approximation to the performance of finite-size
system and that the MMSE receiver achieves close to a single-user performance
with only one feedback bit per signature element.
|
[
{
"version": "v1",
"created": "Wed, 3 Sep 2008 02:17:32 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Aug 2009 03:29:37 GMT"
},
{
"version": "v3",
"created": "Thu, 17 Feb 2011 12:51:14 GMT"
}
] | 2011-02-18T00:00:00 |
[
[
"Santipach",
"Wiroonsak",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.0545
|
Ian Petersen
|
S. Z. Sayed Hassen, M. Heurs, E. H. Huntington, I. R. Petersen
|
Frequency Locking of an Optical Cavity using LQG Integral Control
|
18 pages, 9 figures
|
Journal of Physics B: Atomic, Molecular and Optical Physics, vol.
42, 175501, 2009
|
10.1088/0953-4075/42/17/175501
| null |
quant-ph cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers the application of integral Linear Quadratic Gaussian
(LQG) optimal control theory to a problem of cavity locking in quantum optics.
The cavity locking problem involves controlling the error between the laser
frequency and the resonant frequency of the cavity. A model for the cavity
system, which comprises a piezo-electric actuator and an optical cavity is
experimentally determined using a subspace identification method. An LQG
controller which includes integral action is synthesized to stabilize the
frequency of the cavity to the laser frequency and to reject low frequency
noise. The controller is successfully implemented in the laboratory using a
dSpace DSP board.
|
[
{
"version": "v1",
"created": "Wed, 3 Sep 2008 04:46:39 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Hassen",
"S. Z. Sayed",
""
],
[
"Heurs",
"M.",
""
],
[
"Huntington",
"E. H.",
""
],
[
"Petersen",
"I. R.",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
}
] |
0809.0600
|
Srikanth Radhakrishna
|
R. Srikanth
|
No-signaling, intractability and entanglement
|
19 pages, 2 figures, revtex4
| null | null | null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of deriving the no-signaling condition from the
assumption that, as seen from a complexity theoretic perspective, the universe
is not an exponential place. A fact that disallows such a derivation is the
existence of {\em polynomial superluminal} gates, hypothetical primitive
operations that enable superluminal signaling but not the efficient solution of
intractable problems. It therefore follows, if this assumption is a basic
principle of physics, either that it must be supplemented with additional
assumptions to prohibit such gates, or, improbably, that no-signaling is not a
universal condition. Yet, a gate of this kind is possibly implicit, though not
recognized as such, in a decade-old quantum optical experiment involving
position-momentum entangled photons. Here we describe a feasible modified
version experiment that appears to explicitly demonstrate the action of this
gate. Some obvious counter-claims are shown to be invalid. We believe that the
unexpected possibility of polynomial superluminal operations arises because
some practically measured quantum optical quantities are not describable as
standard quantum mechanical observables.
|
[
{
"version": "v1",
"created": "Wed, 3 Sep 2008 11:10:36 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Sep 2008 17:15:43 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Jun 2009 14:06:14 GMT"
}
] | 2009-06-16T00:00:00 |
[
[
"Srikanth",
"R.",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0809.0610
|
Martin Josef Geiger
|
Martin Josef Geiger, Wolf Wenger
|
A framework for the interactive resolution of multi-objective vehicle
routing problems
|
Proceedings of the 7th EU/ME Workshop: Adaptive, Self-Adaptive, and
Multi-Level Metaheuristics, Malaga, Spain, November 16-17, 2006
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The article presents a framework for the resolution of rich vehicle routing
problems which are difficult to address with standard optimization techniques.
We use local search on the basis on variable neighborhood search for the
construction of the solutions, but embed the techniques in a flexible framework
that allows the consideration of complex side constraints of the problem such
as time windows, multiple depots, heterogeneous fleets, and, in particular,
multiple optimization criteria. In order to identify a compromise alternative
that meets the requirements of the decision maker, an interactive procedure is
integrated in the resolution of the problem, allowing the modification of the
preference information articulated by the decision maker. The framework is
prototypically implemented in a computer system. First results of test runs on
multiple depot vehicle routing problems with time windows are reported.
|
[
{
"version": "v1",
"created": "Wed, 3 Sep 2008 12:22:08 GMT"
}
] | 2008-09-04T00:00:00 |
[
[
"Geiger",
"Martin Josef",
""
],
[
"Wenger",
"Wolf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0809.0635
|
Pavan Srinath
|
K. Pavan Srinath, B. Sundar Rajan
|
Low ML-Decoding Complexity, Large Coding Gain, Full-Rate, Full-Diversity
STBCs for 2 X 2 and 4 X 2 MIMO Systems
|
28 pages, 5 figures, 3 tables, submitted to IEEE Journal of Selected
Topics in Signal Processing
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper (Part of the content of this manuscript has been accepted for
presentation in IEEE Globecom 2008, to be held in New Orleans) deals with low
maximum likelihood (ML) decoding complexity, full-rate and full-diversity
space-time block codes (STBCs), which also offer large coding gain, for the 2
transmit antenna, 2 receive antenna ($2\times 2$) and the 4 transmit antenna, 2
receive antenna ($4\times 2$) MIMO systems. Presently, the best known STBC for
the $2\times2$ system is the Golden code and that for the $4\times2$ system is
the DjABBA code. Following the approach by Biglieri, Hong and Viterbo, a new
STBC is presented in this paper for the $2\times 2$ system. This code matches
the Golden code in performance and ML-decoding complexity for square QAM
constellations while it has lower ML-decoding complexity with the same
performance for non-rectangular QAM constellations. This code is also shown to
be \emph{information-lossless} and \emph{diversity-multiplexing gain} (DMG)
tradeoff optimal. This design procedure is then extended to the $4\times 2$
system and a code, which outperforms the DjABBA code for QAM constellations
with lower ML-decoding complexity, is presented. So far, the Golden code has
been reported to have an ML-decoding complexity of the order of $M^4$ for
square QAM of size $M$. In this paper, a scheme that reduces its ML-decoding
complexity to $M^2\sqrt{M}$ is presented.
|
[
{
"version": "v1",
"created": "Wed, 3 Sep 2008 14:44:02 GMT"
}
] | 2008-09-04T00:00:00 |
[
[
"Srinath",
"K. Pavan",
""
],
[
"Rajan",
"B. Sundar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.0662
|
Martin Josef Geiger
|
Martin Josef Geiger, Sanja Petrovic
|
Improving Local Search for Fuzzy Scheduling Problems
| null |
Proceedings of the Post Graduate Research Conference in
Electronics, Photonics, Communications & Networks and Computing Science PREP
2004, University of Hertfordshire, Great Britain, pp. 146-147
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The integration of fuzzy set theory and fuzzy logic into scheduling is a
rather new aspect with growing importance for manufacturing applications,
resulting in various unsolved aspects. In the current paper, we investigate an
improved local search technique for fuzzy scheduling problems with fitness
plateaus, using a multi criteria formulation of the problem. We especially
address the problem of changing job priorities over time as studied at the
Sherwood Press Ltd, a Nottingham based printing company, who is a collaborator
on the project.
|
[
{
"version": "v1",
"created": "Wed, 3 Sep 2008 16:16:43 GMT"
}
] | 2008-09-04T00:00:00 |
[
[
"Geiger",
"Martin Josef",
""
],
[
"Petrovic",
"Sanja",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0809.0676
|
Suresh Thippireddy
|
Suresh B. Thippireddy
|
Binary Random Sequences Obtained From Decimal Sequences
|
10 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a twist to the generation of binary random sequences by
starting with decimal sequences. Rather than representing the prime reciprocal
sequence directly in base 2, we first right the prime reciprocal in base 10 and
then convert it into the binary form. The autocorrelation and cross-correlation
properties of these binary random (BRD) sequences are discussed.
|
[
{
"version": "v1",
"created": "Wed, 3 Sep 2008 17:04:48 GMT"
}
] | 2008-09-04T00:00:00 |
[
[
"Thippireddy",
"Suresh B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0809.0680
|
Paul Fodor
|
Paul Fodor, Adam Lally, David Ferrucci
|
The Prolog Interface to the Unstructured Information Management
Architecture
| null | null | null | null |
cs.SE cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we describe the design and implementation of the Prolog
interface to the Unstructured Information Management Architecture (UIMA) and
some of its applications in natural language processing. The UIMA Prolog
interface translates unstructured data and the UIMA Common Analysis Structure
(CAS) into a Prolog knowledge base, over which, the developers write rules and
use resolution theorem proving to search and generate new annotations over the
unstructured data. These rules can explore all the previous UIMA annotations
(such as, the syntactic structure, parsing statistics) and external Prolog
knowledge bases (such as, Prolog WordNet and Extended WordNet) to implement a
variety of tasks for the natural language analysis. We also describe
applications of this logic programming interface in question analysis (such as,
focus detection, answer-type and other constraints detection), shallow parsing
(such as, relations in the syntactic structure), and answer selection.
|
[
{
"version": "v1",
"created": "Wed, 3 Sep 2008 17:38:32 GMT"
}
] | 2008-09-04T00:00:00 |
[
[
"Fodor",
"Paul",
""
],
[
"Lally",
"Adam",
""
],
[
"Ferrucci",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0809.0686
|
Animashree Anandkumar
|
Animashree Anandkumar, Joseph E. Yukich, Lang Tong, and Ananthram
Swami
|
Energy Scaling Laws for Distributed Inference in Random Fusion Networks
|
IEEE JSAC on Stochastic Geometry and Random Graphs for Wireless
Networks
|
vol. 27, no. 7, pp.1203-1217, Sept. 2009
|
10.1109/JSAC.2009.090916
| null |
cs.IT cs.NI math.IT math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The energy scaling laws of multihop data fusion networks for distributed
inference are considered. The fusion network consists of randomly located
sensors distributed i.i.d. according to a general spatial distribution in an
expanding region. Among the class of data fusion schemes that enable optimal
inference at the fusion center for Markov random field (MRF) hypotheses, the
scheme with minimum average energy consumption is bounded below by average
energy of fusion along the minimum spanning tree, and above by a suboptimal
scheme, referred to as Data Fusion for Markov Random Fields (DFMRF). Scaling
laws are derived for the optimal and suboptimal fusion policies. It is shown
that the average asymptotic energy of the DFMRF scheme is finite for a class of
MRF models.
|
[
{
"version": "v1",
"created": "Wed, 3 Sep 2008 18:06:05 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Feb 2009 21:18:34 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Jun 2010 23:01:46 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Anandkumar",
"Animashree",
""
],
[
"Yukich",
"Joseph E.",
""
],
[
"Tong",
"Lang",
""
],
[
"Swami",
"Ananthram",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0809.0689
|
Matthias K\"oppe
|
Matthias K\"oppe, Christopher Thomas Ryan, Maurice Queyranne
|
Rational Generating Functions and Integer Programming Games
|
18 pages
|
Operations Research 59 (2011), no. 6, 1445-1460
|
10.1287/opre.1110.0964
| null |
cs.GT math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We explore the computational complexity of computing pure Nash equilibria for
a new class of strategic games called integer programming games with difference
of piecewise linear convex payoffs. Integer programming games are games where
players' action sets are integer points inside of polytopes. Using recent
results from the study of short rational generating functions for encoding sets
of integer points pioneered by Alexander Barvinok, we present efficient
algorithms for enumerating all pure Nash equilibria, and other computations of
interest, such as the pure price of anarchy, and pure threat point, when the
dimension and number of "convex" linear pieces in the payoff functions are
fixed. Sequential games where a leader is followed by competing followers (a
Stackelberg--Nash setting) are also considered.
|
[
{
"version": "v1",
"created": "Wed, 3 Sep 2008 19:21:22 GMT"
}
] | 2017-01-03T00:00:00 |
[
[
"Köppe",
"Matthias",
""
],
[
"Ryan",
"Christopher Thomas",
""
],
[
"Queyranne",
"Maurice",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0809.0692
|
Krzysztof Stanek
|
Krzysztof Zbigniew Stanek
|
How long should an astronomical paper be to increase its Impact?
|
11 pages, 5 figures
| null | null | null |
astro-ph cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Naively, one would expect longer papers to have larger impact (i.e., to be
cited more). I tested this expectation by selecting all (~30,000) refereed
papers from A&A, AJ, ApJ and MNRAS published between 2000 and 2004. These
particular years were chosen so papers analyzed would not be too "fresh", but
at the same time length of each article could be obtained via ADS. I find that
indeed longer papers published in these four major astronomy journals are on
average cited more, with a median number of citations increasing from 6 for
articles 2-3 pages long to about 50 for articles ~50 pages long. I do however
observe a significant "Letters effect", i.e. ApJ and A&A articles 4 pages long
are cited more than articles 5-10 pages long. Also, the very few longest (>80
pages) papers are actually cited less than somewhat shorter papers. For
individual journals, median citations per paper increase from 11 for ~9,300 A&A
papers to 14 for ~5,300 MNRAS papers, 16 for ~2,550 AJ papers, and 20 for
~12,850 ApJ papers (including ApJ Letters and Supplement). I conclude with some
semi-humorous career advice, directed especially at first-year graduate
students.
|
[
{
"version": "v1",
"created": "Wed, 3 Sep 2008 20:00:03 GMT"
}
] | 2008-09-05T00:00:00 |
[
[
"Stanek",
"Krzysztof Zbigniew",
""
]
] |
[
null,
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0809.0723
|
L.T. Handoko
|
Z. Akbar and L.T. Handoko
|
A Simple Mechanism for Focused Web-harvesting
|
6 pages, 4 figures, Proceeding of the International Conference on
Advanced Computational Intelligence and Its Applications 2008
| null | null |
FISIKALIPI-08079
|
cs.IR cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The focused web-harvesting is deployed to realize an automated and
comprehensive index databases as an alternative way for virtual topical data
integration. The web-harvesting has been implemented and extended by not only
specifying the targeted URLs, but also predefining human-edited harvesting
parameters to improve the speed and accuracy. The harvesting parameter set
comprises three main components. First, the depth-scale of being harvested
final pages containing desired information counted from the first page at the
targeted URLs. Secondly, the focus-point number to determine the exact box
containing relevant information. Lastly, the combination of keywords to
recognize encountered hyperlinks of relevant images or full-texts embedded in
those final pages. All parameters are accessible and fully customizable for
each target by the administrators of participating institutions over an
integrated web interface. A real implementation to the Indonesian Scientific
Index which covers all scientific information across Indonesia is also briefly
introduced.
|
[
{
"version": "v1",
"created": "Wed, 3 Sep 2008 23:53:29 GMT"
}
] | 2008-09-05T00:00:00 |
[
[
"Akbar",
"Z.",
""
],
[
"Handoko",
"L. T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0809.0727
|
L.T. Handoko
|
I. Firmansyah, Z. Akbar, B. Hermanto and L.T. Handoko
|
Microcontroller-based System for Modular Networked Robot
|
6 pages, 5 figures, Proceeding of the 2008 International Conference
on Advanced Computational Intelligence and Its Applications
| null | null |
FISIKALIPI-08077
|
cs.RO cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A prototype of modular networked robot for autonomous monitoring works with
full control over web through wireless connection has been developed. The robot
is equipped with a particular set of built-in analyzing tools and appropriate
censors, depending on its main purposes, to enable self-independent and
real-time data acquisition and processing. The paper is focused on the
microcontroller-based system to realize the modularity. The whole system is
divided into three modules : main unit, data acquisition and data processing,
while the analyzed results and all aspects of control and monitoring systems
are fully accessible over an integrated web-interface. This concept leads to
some unique features : enhancing flexibility due to enabling partial
replacement of the modules according to user needs, easy access over web for
remote users, and low development and maintenance cost due to software
dominated components.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 00:13:11 GMT"
}
] | 2008-09-05T00:00:00 |
[
[
"Firmansyah",
"I.",
""
],
[
"Akbar",
"Z.",
""
],
[
"Hermanto",
"B.",
""
],
[
"Handoko",
"L. T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0809.0728
|
Wenyi Zhang
|
Wenyi Zhang, Urbashi Mitra
|
A Spectrum-Shaping Perspective on Cognitive Radio
|
To appear in DySPAN'08
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new perspective on cognitive radio is presented, where the pre-existent
legacy service is either uncoded or coded and a pair of cognitive transceivers
need be appropriately deployed to coexist with the legacy service. The basic
idea underlying the new perspective is to exploit the fact that, typically, the
legacy channel is not fully loaded by the legacy service, thus leaving a
non-negligible margin to accommodate the cognitive transmission. The
exploitation of such a load margin is optimized by shaping the spectrum of the
transmitted cognitive signal. It is shown that non-trivial coexistence of
legacy and cognitive systems is possible even without sharing the legacy
message with the cognitive transmitter. Surprisingly, the optimized cognitive
transmitter is no longer limited by its interference power at the legacy
receiver, and can always transmit at its full available device power.
Analytical development and numerical illustration are presented, in particular
focusing on the logarithmic growth rate, {\it i.e.}, the prelog coefficient, of
cognitive transmission in the high-power regime.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 00:50:20 GMT"
}
] | 2008-09-05T00:00:00 |
[
[
"Zhang",
"Wenyi",
""
],
[
"Mitra",
"Urbashi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.0733
|
Masaaki Harada
|
Masaaki Harada and Akihiro Munemasa
|
There exists no self-dual [24,12,10] code over F5
|
To appear in Designs, Codes and Cryptogr
|
Designs, Codes and Cryptogr. 52 (2009), 125-127
| null | null |
math.CO cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Self-dual codes over F5 exist for all even lengths. The smallest length for
which the largest minimum weight among self-dual codes has not been determined
is 24, and the largest minimum weight is either 9 or 10. In this note, we show
that there exists no self-dual [24,12,10] code over F5, using the
classification of 24-dimensional odd unimodular lattices due to Borcherds.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 02:17:12 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Mar 2009 07:37:52 GMT"
}
] | 2012-05-28T00:00:00 |
[
[
"Harada",
"Masaaki",
""
],
[
"Munemasa",
"Akihiro",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.0737
|
Lav Varshney
|
Lav R. Varshney, Julius Kusuma, and Vivek K Goyal
|
Malleable Coding with Fixed Reuse
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In cloud computing, storage area networks, remote backup storage, and similar
settings, stored data is modified with updates from new versions. Representing
information and modifying the representation are both expensive. Therefore it
is desirable for the data to not only be compressed but to also be easily
modified during updates. A malleable coding scheme considers both compression
efficiency and ease of alteration, promoting codeword reuse. We examine the
trade-off between compression efficiency and malleability cost-the difficulty
of synchronizing compressed versions-measured as the length of a reused prefix
portion. Through a coding theorem, the region of achievable rates and
malleability is expressed as a single-letter optimization. Relationships to
common information problems are also described.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 02:41:25 GMT"
},
{
"version": "v2",
"created": "Mon, 9 May 2011 21:55:40 GMT"
}
] | 2011-05-11T00:00:00 |
[
[
"Varshney",
"Lav R.",
""
],
[
"Kusuma",
"Julius",
""
],
[
"Goyal",
"Vivek K",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.0745
|
Rayan Saab
|
Rayan Saab, Ozgur Yilmaz
|
Sparse Recovery by Non-convex Optimization -- Instance Optimality
|
32 pages, 4 figures v2
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this note, we address the theoretical properties of $\Delta_p$, a class of
compressed sensing decoders that rely on $\ell^p$ minimization with 0<p<1 to
recover estimates of sparse and compressible signals from incomplete and
inaccurate measurements. In particular, we extend the results of Candes,
Romberg and Tao, and Wojtaszczyk regarding the decoder $\Delta_1$, based on
$\ell^1$ minimization, to $\Delta_p$ with 0<p<1. Our results are two-fold.
First, we show that under certain sufficient conditions that are weaker than
the analogous sufficient conditions for $\Delta_1$ the decoders $\Delta_p$ are
robust to noise and stable in the sense that they are (2,p) instance optimal
for a large class of encoders. Second, we extend the results of Wojtaszczyk to
show that, like $\Delta_1$, the decoders $\Delta_p$ are (2,2) instance optimal
in probability provided the measurement matrix is drawn from an appropriate
distribution.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 04:24:32 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Aug 2009 11:21:36 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Saab",
"Rayan",
""
],
[
"Yilmaz",
"Ozgur",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.0753
|
Martin Josef Geiger
|
Martin Josef Geiger
|
Proposition of the Interactive Pareto Iterated Local Search Procedure -
Elements and Initial Experiments
| null |
The Fourth International Conference on Evolutionary
Multi-Criterion Optimization: Late Breaking Papers, Matsushima, Japan, March
2007, pp. 19-23
| null | null |
cs.AI cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The article presents an approach to interactively solve multi-objective
optimization problems. While the identification of efficient solutions is
supported by computational intelligence techniques on the basis of local
search, the search is directed by partial preference information obtained from
the decision maker.
An application of the approach to biobjective portfolio optimization, modeled
as the well-known knapsack problem, is reported, and experimental results are
reported for benchmark instances taken from the literature. In brief, we obtain
encouraging results that show the applicability of the approach to the
described problem.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 06:52:16 GMT"
}
] | 2008-09-05T00:00:00 |
[
[
"Geiger",
"Martin Josef",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0809.0755
|
Martin Josef Geiger
|
Martin Josef Geiger
|
Bin Packing Under Multiple Objectives - a Heuristic Approximation
Approach
| null |
The Fourth International Conference on Evolutionary
Multi-Criterion Optimization: Late Breaking Papers, Matsushima, Japan, March
2007, pp. 53-56
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The article proposes a heuristic approximation approach to the bin packing
problem under multiple objectives. In addition to the traditional objective of
minimizing the number of bins, the heterogeneousness of the elements in each
bin is minimized, leading to a biobjective formulation of the problem with a
tradeoff between the number of bins and their heterogeneousness. An extension
of the Best-Fit approximation algorithm is presented to solve the problem.
Experimental investigations have been carried out on benchmark instances of
different size, ranging from 100 to 1000 items. Encouraging results have been
obtained, showing the applicability of the heuristic approach to the described
problem.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 07:02:29 GMT"
}
] | 2008-09-05T00:00:00 |
[
[
"Geiger",
"Martin Josef",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0809.0757
|
Martin Josef Geiger
|
Martin Josef Geiger
|
An application of the Threshold Accepting metaheuristic for curriculum
based course timetabling
| null |
Proceedings of the 7th International Conference on the Practice
and Theory of Automated Timetabling PATAT 2008, August 19-22, Montreal,
Canada
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The article presents a local search approach for the solution of timetabling
problems in general, with a particular implementation for competition track 3
of the International Timetabling Competition 2007 (ITC 2007). The heuristic
search procedure is based on Threshold Accepting to overcome local optima. A
stochastic neighborhood is proposed and implemented, randomly removing and
reassigning events from the current solution.
The overall concept has been incrementally obtained from a series of
experiments, which we describe in each (sub)section of the paper. In result, we
successfully derived a potential candidate solution approach for the finals of
track 3 of the ITC 2007.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 07:12:02 GMT"
}
] | 2008-10-02T00:00:00 |
[
[
"Geiger",
"Martin Josef",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0809.0788
|
Hubie Chen
|
Manuel Bodirsky and Hubie Chen
|
Peek Arc Consistency
| null | null | null | null |
cs.AI cs.CC cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies peek arc consistency, a reasoning technique that extends
the well-known arc consistency technique for constraint satisfaction. In
contrast to other more costly extensions of arc consistency that have been
studied in the literature, peek arc consistency requires only linear space and
quadratic time and can be parallelized in a straightforward way such that it
runs in linear time with a linear number of processors. We demonstrate that for
various constraint languages, peek arc consistency gives a polynomial-time
decision procedure for the constraint satisfaction problem. We also present an
algebraic characterization of those constraint languages that can be solved by
peek arc consistency, and study the robustness of the algorithm.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 11:15:50 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Feb 2012 18:53:00 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Bodirsky",
"Manuel",
""
],
[
"Chen",
"Hubie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0809.0833
|
Fabien Mathieu
|
Fabien Mathieu (INRIA Rocquencourt, FT R&D, INRIA Rocquencourt),
Gheorghe Postelnicu, Julien Reynier (INRIA Rocquencourt)
|
The stable configuration in acyclic preference-based systems
| null | null | null |
RR-6628
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Acyclic preferences recently appeared as an elegant way to model many
distributed systems. An acyclic instance admits a unique stable configuration,
which can reveal the performance of the system. In this paper, we give the
statistical properties of the stable configuration for three classes of acyclic
preferences: node-based preferences, distance-based preferences, and random
acyclic systems. Using random overlay graphs, we prove using mean-field and
fluid-limit techniques that these systems have an asymptotically continuous
independent rank distribution for a proper scaling, and the analytical solution
is compared to simulations. These results provide a theoretical ground for
validating the performance of bandwidth-based or proximity-based unstructured
systems.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 15:12:00 GMT"
}
] | 2008-09-05T00:00:00 |
[
[
"Mathieu",
"Fabien",
"",
"INRIA Rocquencourt, FT R&D, INRIA Rocquencourt"
],
[
"Postelnicu",
"Gheorghe",
"",
"INRIA Rocquencourt"
],
[
"Reynier",
"Julien",
"",
"INRIA Rocquencourt"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0809.0835
|
Tobias Friedrich
|
Karl Bringmann and Tobias Friedrich
|
Approximating the volume of unions and intersections of high-dimensional
geometric objects
|
16 pages, To appear in Computational Geometry - Theory and
Applications
|
Computational Geometry: Theory and Applications, Vol. 43, No. 6-7,
pages 601-610, 2010
|
10.1016/j.comgeo.2010.03.004
| null |
cs.CG cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the computation of the volume of the union of high-dimensional
geometric objects. While showing that this problem is #P-hard already for very
simple bodies (i.e., axis-parallel boxes), we give a fast FPRAS for all objects
where one can: (1) test whether a given point lies inside the object, (2)
sample a point uniformly, (3) calculate the volume of the object in polynomial
time. All three oracles can be weak, that is, just approximate. This implies
that Klee's measure problem and the hypervolume indicator can be approximated
efficiently even though they are #P-hard and hence cannot be solved exactly in
time polynomial in the number of dimensions unless P=NP. Our algorithm also
allows to approximate efficiently the volume of the union of convex bodies
given by weak membership oracles.
For the analogous problem of the intersection of high-dimensional geometric
objects we prove #P-hardness for boxes and show that there is no multiplicative
polynomial-time $2^{d^{1-\epsilon}}$-approximation for certain boxes unless
NP=BPP, but give a simple additive polynomial-time $\epsilon$-approximation.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 16:14:09 GMT"
},
{
"version": "v2",
"created": "Sun, 14 Mar 2010 03:26:40 GMT"
}
] | 2010-06-09T00:00:00 |
[
[
"Bringmann",
"Karl",
""
],
[
"Friedrich",
"Tobias",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0809.0840
|
Sergei Chekanov V.
|
S.Chekanov
|
HEP data analysis using jHepWork and Java
|
5 pages, Proceedings of the HERA-LHC workshops (2007-2008), DESY-CERN
| null | null |
ANL-HEP-CP-08-53
|
cs.CE hep-ex hep-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A role of Java in high-energy physics and recent progress in development of a
platform-independent data-analysis framework, jHepWork, is discussed. The
framework produces professional graphics and has many libraries for data
manipulation.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 15:33:23 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Feb 2009 19:17:26 GMT"
}
] | 2009-02-09T00:00:00 |
[
[
"Chekanov",
"S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "hep-ex",
"description": "Description coming soon",
"span": "(High Energy Physics - Experiment)"
},
{
"class": "Physics",
"code": "hep-ph",
"description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.",
"span": "(High Energy Physics - Phenomenology)"
}
] |
0809.0853
|
XuanLong Nguyen
|
XuanLong Nguyen, Martin J. Wainwright, Michael I. Jordan
|
Estimating divergence functionals and the likelihood ratio by convex
risk minimization
|
28 pages
|
IEEE Transactions on Information Theory, 56(11), 5847--5861, 2010
|
10.1109/TIT.2010.2068870
| null |
math.ST cs.IT math.IT stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop and analyze $M$-estimation methods for divergence functionals and
the likelihood ratios of two probability distributions. Our method is based on
a non-asymptotic variational characterization of $f$-divergences, which allows
the problem of estimating divergences to be tackled via convex empirical risk
optimization. The resulting estimators are simple to implement, requiring only
the solution of standard convex programs. We present an analysis of consistency
and convergence for these estimators. Given conditions only on the ratios of
densities, we show that our estimators can achieve optimal minimax rates for
the likelihood ratio and the divergence functionals in certain regimes. We
derive an efficient optimization algorithm for computing our estimates, and
illustrate their convergence behavior and practical viability by simulations.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 16:44:14 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Apr 2009 19:36:18 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Nguyen",
"XuanLong",
""
],
[
"Wainwright",
"Martin J.",
""
],
[
"Jordan",
"Michael I.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0809.0874
|
Fionn Murtagh
|
Fionn Murtagh
|
Between the Information Economy and Student Recruitment: Present
Conjuncture and Future Prospects
|
18 pages, 4 figures
|
CEPIS UPGRADE, vol. IX, no. 5, pp. 56-64, Oct. 2008
| null | null |
cs.CY cs.GL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In university programs and curricula, in general we react to the need to meet
market needs. We respond to market stimulus, or at least try to do so. Consider
now an inverted view. Consider our data and perspectives in university programs
as reflecting and indeed presaging economic trends. In this article I pursue
this line of thinking. I show how various past events fit very well into this
new view. I provide explanation for why some technology trends happened as they
did, and why some current developments are important now.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 18:17:05 GMT"
}
] | 2008-12-21T00:00:00 |
[
[
"Murtagh",
"Fionn",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
0809.0884
|
John Risch
|
John S. Risch
|
On the role of metaphor in information visualization
|
20 pages, with figures
| null | null | null |
cs.HC cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The concept of metaphor, in particular graphical (or visual) metaphor, is
central to the field of information visualization. Information graphics and
interactive information visualization systems employ a variety of metaphorical
devices to make abstract, complex, voluminous, or otherwise
difficult-to-comprehend information understandable in graphical terms. This
paper explores the use of metaphor in information visualization, advancing the
theory previously argued by Johnson, Lakoff, Tversky et al. that many
information graphics are metaphorically understood in terms of cognitively
entrenched spatial patterns known as image schemas. These patterns serve to
structure and constrain abstract reasoning processes via metaphorical
projection operations that are grounded in everyday perceptual experiences with
phenomena such as containment, movement, and force dynamics. Building on
previous research, I argue that information graphics promote comprehension of
their target information through the use of graphical patterns that invoke
these preexisting schematic structures. I further theorize that the degree of
structural alignment of a particular graphic with one or more corresponding
image schemas accounts for its perceived degree of intuitiveness. Accordingly,
image schema theory can provide a powerful explanatory and predictive framework
for visualization research. I review relevant theories of analogy and metaphor,
and discuss the image schematic properties of several common types of
information graphic. I conclude with the proposal that the inventory of image
schemas culled from linguistic studies can serve as the basis for an inventory
of design elements suitable for developing intuitive and effective new
information visualization techniques.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 19:55:40 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Risch",
"John S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0809.0908
|
Xudong Ma
|
Xudong Ma
|
Reduced Complexity Demodulation and Equalization Scheme for Differential
Impulse Radio UWB Systems with ISI
|
Camera ready version. Several typos in the previous version have been
fixed
|
Proceeding of the IEEE Sarnoff Symposium, Princeton NJ, March 30 -
April 1, 2009
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider the demodulation and equalization problem of
differential Impulse Radio (IR) Ultra-WideBand (UWB) Systems with
Inter-Symbol-Interference (ISI). The differential IR UWB systems have been
extensively discussed recently. The advantage of differential IR UWB systems
include simple receiver frontend structure. One challenge in the demodulation
and equalization of such systems with ISI is that the systems have a rather
complex model. The input and output signals of the systems follow a
second-order Volterra model. Furthermore, the noise at the output is data
dependent. In this paper, we propose a reduced-complexity joint demodulation
and equalization algorithm. The algorithm is based on reformulating the nearest
neighborhood decoding problem into a mixed quadratic programming and utilizing
a semi-definite relaxation. The numerical results show that the proposed
demodulation and equalization algorithm has low computational complexity, and
at the same time, has almost the same error probability performance compared
with the maximal likelihood decoding algorithm.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 20:52:32 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Mar 2009 20:19:21 GMT"
}
] | 2009-03-02T00:00:00 |
[
[
"Ma",
"Xudong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.0916
|
Konstantin S. Turitsyn
|
Konstantin S. Turitsyn, Michael Chertkov, Marija Vucelja
|
Irreversible Monte Carlo Algorithms for Efficient Sampling
|
4 pages, 2 figures
| null |
10.1016/j.physd.2010.10.003
| null |
cond-mat.stat-mech cs.IT math.IT math.PR stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Equilibrium systems evolve according to Detailed Balance (DB). This principe
guided development of the Monte-Carlo sampling techniques, of which
Metropolis-Hastings (MH) algorithm is the famous representative. It is also
known that DB is sufficient but not necessary. We construct irreversible
deformation of a given reversible algorithm capable of dramatic improvement of
sampling from known distribution. Our transformation modifies transition rates
keeping the structure of transitions intact. To illustrate the general scheme
we design an Irreversible version of Metropolis-Hastings (IMH) and test it on
example of a spin cluster. Standard MH for the model suffers from the critical
slowdown, while IMH is free from critical slowdown.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 21:10:24 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Sep 2008 15:43:44 GMT"
}
] | 2015-07-15T00:00:00 |
[
[
"Turitsyn",
"Konstantin S.",
""
],
[
"Chertkov",
"Michael",
""
],
[
"Vucelja",
"Marija",
""
]
] |
[
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0809.0918
|
N. Prasanth Anthapadmanabhan
|
N. Prasanth Anthapadmanabhan and Armand M. Makowski
|
Intersecting random graphs and networks with multiple adjacency
constraints: A simple example
|
Submitted to IEEE JSAC issue on Stochastic Geometry and Random Graphs
for Wireless Networks
| null | null | null |
cs.IT math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When studying networks using random graph models, one is sometimes faced with
situations where the notion of adjacency between nodes reflects multiple
constraints. Traditional random graph models are insufficient to handle such
situations.
A simple idea to account for multiple constraints consists in taking the
intersection of random graphs. In this paper we initiate the study of random
graphs so obtained through a simple example. We examine the intersection of an
Erdos-Renyi graph and of one-dimensional geometric random graphs. We
investigate the zero-one laws for the property that there are no isolated
nodes. When the geometric component is defined on the unit circle, a full
zero-one law is established and we determine its critical scaling. When the
geometric component lies in the unit interval, there is a gap in that the
obtained zero and one laws are found to express deviations from different
critical scalings. In particular, the first moment method requires a larger
critical scaling than in the unit circle case in order to obtain the one law.
This discrepancy is somewhat surprising given that the zero-one laws for the
absence of isolated nodes are identical in the geometric random graphs on both
the unit interval and unit circle.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 21:13:14 GMT"
}
] | 2008-09-10T00:00:00 |
[
[
"Anthapadmanabhan",
"N. Prasanth",
""
],
[
"Makowski",
"Armand M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0809.0922
|
Matthias Horbach
|
Matthias Horbach, Christoph Weidenbach
|
Superposition for Fixed Domains
|
34 pages; to appear in ACM Transactions on Computational Logic
| null | null | null |
cs.AI cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Superposition is an established decision procedure for a variety of
first-order logic theories represented by sets of clauses. A satisfiable
theory, saturated by superposition, implicitly defines a minimal term-generated
model for the theory. Proving universal properties with respect to a saturated
theory directly leads to a modification of the minimal model's term-generated
domain, as new Skolem functions are introduced. For many applications, this is
not desired.
Therefore, we propose the first superposition calculus that can explicitly
represent existentially quantified variables and can thus compute with respect
to a given domain. This calculus is sound and refutationally complete in the
limit for a first-order fixed domain semantics. For saturated Horn theories and
classes of positive formulas, we can even employ the calculus to prove
properties of the minimal model itself, going beyond the scope of known
superposition-based approaches.
|
[
{
"version": "v1",
"created": "Thu, 4 Sep 2008 21:58:58 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Aug 2009 11:40:16 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Nov 2009 12:43:51 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"Horbach",
"Matthias",
""
],
[
"Weidenbach",
"Christoph",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0809.0949
|
Michael Baer
|
Michael B. Baer
|
Efficient Implementation of the Generalized Tunstall Code Generation
Algorithm
|
5 pages, 5 figures, accepted to ISIT 2009
| null | null | null |
cs.IT cs.DS math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A method is presented for constructing a Tunstall code that is linear time in
the number of output items. This is an improvement on the state of the art for
non-Bernoulli sources, including Markov sources, which require a (suboptimal)
generalization of Tunstall's algorithm proposed by Savari and analytically
examined by Tabus and Rissanen. In general, if n is the total number of output
leaves across all Tunstall trees, s is the number of trees (states), and D is
the number of leaves of each internal node, then this method takes O((1+(log
s)/D) n) time and O(n) space.
|
[
{
"version": "v1",
"created": "Fri, 5 Sep 2008 05:14:10 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Apr 2009 19:58:44 GMT"
},
{
"version": "v3",
"created": "Fri, 8 May 2009 00:10:57 GMT"
}
] | 2009-05-08T00:00:00 |
[
[
"Baer",
"Michael B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.0961
|
Martin Josef Geiger
|
Martin Josef Geiger
|
MOOPPS: An Optimization System for Multi Objective Scheduling
| null |
Proceedings of the Metaheuristics International Conference MIC
2005, Vienna, Austria, pp. 403-408
| null | null |
cs.AI cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the current paper, we present an optimization system solving multi
objective production scheduling problems (MOOPPS). The identification of Pareto
optimal alternatives or at least a close approximation of them is possible by a
set of implemented metaheuristics. Necessary control parameters can easily be
adjusted by the decision maker as the whole software is fully menu driven. This
allows the comparison of different metaheuristic algorithms for the considered
problem instances. Results are visualized by a graphical user interface showing
the distribution of solutions in outcome space as well as their corresponding
Gantt chart representation.
The identification of a most preferred solution from the set of efficient
solutions is supported by a module based on the aspiration interactive method
(AIM). The decision maker successively defines aspiration levels until a single
solution is chosen.
After successfully competing in the finals in Ronneby, Sweden, the MOOPPS
software has been awarded the European Academic Software Award 2002
(http://www.bth.se/llab/easa_2002.nsf)
|
[
{
"version": "v1",
"created": "Fri, 5 Sep 2008 06:22:36 GMT"
}
] | 2008-09-08T00:00:00 |
[
[
"Geiger",
"Martin Josef",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0809.1017
|
Peter Grunwald
|
Peter Grunwald
|
Entropy Concentration and the Empirical Coding Game
|
A somewhat modified version of this paper was published in Statistica
Neerlandica 62(3), pages 374-392, 2008
| null | null | null |
cs.IT cs.LG math.IT math.ST stat.ME stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give a characterization of Maximum Entropy/Minimum Relative Entropy
inference by providing two `strong entropy concentration' theorems. These
theorems unify and generalize Jaynes' `concentration phenomenon' and Van
Campenhout and Cover's `conditional limit theorem'. The theorems characterize
exactly in what sense a prior distribution Q conditioned on a given constraint,
and the distribution P, minimizing the relative entropy D(P ||Q) over all
distributions satisfying the constraint, are `close' to each other. We then
apply our theorems to establish the relationship between entropy concentration
and a game-theoretic characterization of Maximum Entropy Inference due to
Topsoe and others.
|
[
{
"version": "v1",
"created": "Fri, 5 Sep 2008 12:18:15 GMT"
}
] | 2008-09-17T00:00:00 |
[
[
"Grunwald",
"Peter",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0809.1019
|
Sergey Andreyev
|
Sergey Andreyev
|
Moving and resizing of the screen objects
|
17 pages, 13 figures
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The shape and size of the objects, which we see on the screen, when the
application is running, are defined at the design time. By using some sort of
adaptive interface, developers give users a chance to resize these objects or
on rare occasion even change, but all these changes are predetermined by a
developer; user can't go out of the designer's scenario. Making each and all
elements moveable / resizable and giving users the full control of these
processes, changes the whole idea of applications; programs become user-driven
and significantly increase the effectiveness of users' work. This article is
about the instrument to turn any screen object into moveable / resizable.
|
[
{
"version": "v1",
"created": "Fri, 5 Sep 2008 12:59:06 GMT"
}
] | 2008-09-08T00:00:00 |
[
[
"Andreyev",
"Sergey",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0809.1039
|
Petros Elia
|
Somsak Kittipiyakul, Petros Elia, and Tara Javidi
|
High-SNR Analysis of Outage-Limited Communications with Bursty and
Delay-Limited Information
|
16 pages, 5 figures, to appear in IEEE Trans. Inf. Theory
| null |
10.1109/TIT.2008.2010005
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work analyzes the high-SNR asymptotic error performance of
outage-limited communications with fading, where the number of bits that arrive
at the transmitter during any time slot is random but the delivery of bits at
the receiver must adhere to a strict delay limitation. Specifically, bit errors
are caused by erroneous decoding at the receiver or violation of the strict
delay constraint. Under certain scaling of the statistics of the bit-arrival
process with SNR, this paper shows that the optimal decay behavior of the
asymptotic total probability of bit error depends on how fast the burstiness of
the source scales down with SNR. If the source burstiness scales down too
slowly, the total probability of error is asymptotically dominated by
delay-violation events. On the other hand, if the source burstiness scales down
too quickly, the total probability of error is asymptotically dominated by
channel-error events. However, at the proper scaling, where the burstiness
scales linearly with 1/sqrt(log SNR) and at the optimal coding duration and
transmission rate, the occurrences of channel errors and delay-violation errors
are asymptotically balanced. In this latter case, the optimal exponent of the
total probability of error reveals a tradeoff that addresses the question of
how much of the allowable time and rate should be used for gaining reliability
over the channel and how much for accommodating the burstiness with delay
constraints.
|
[
{
"version": "v1",
"created": "Fri, 5 Sep 2008 15:37:03 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Kittipiyakul",
"Somsak",
""
],
[
"Elia",
"Petros",
""
],
[
"Javidi",
"Tara",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.1043
|
Marco Dalai
|
Marco Dalai, Riccardo Leonardi
|
On Unique Decodability
|
Accepted for publication, IEEE Transactions on Information Theory
| null |
10.1109/TIT.2008.929941
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we propose a revisitation of the topic of unique decodability
and of some fundamental theorems of lossless coding. It is widely believed
that, for any discrete source X, every "uniquely decodable" block code
satisfies E[l(X_1 X_2 ... X_n)]>= H(X_1,X_2,...,X_n), where X_1, X_2,...,X_n
are the first n symbols of the source, E[l(X_1 X_2 ... X_n)] is the expected
length of the code for those symbols and H(X_1,X_2,...,X_n) is their joint
entropy. We show that, for certain sources with memory, the above inequality
only holds when a limiting definition of "uniquely decodable code" is
considered. In particular, the above inequality is usually assumed to hold for
any "practical code" due to a debatable application of McMillan's theorem to
sources with memory. We thus propose a clarification of the topic, also
providing an extended version of McMillan's theorem to be used for Markovian
sources.
|
[
{
"version": "v1",
"created": "Fri, 5 Sep 2008 15:06:37 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Dalai",
"Marco",
""
],
[
"Leonardi",
"Riccardo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.1053
|
Daniil Ryabko
|
Daniil Ryabko (INRIA Lille - Nord Europe)
|
An impossibility result for process discrimination
| null | null | null | null |
math.PR cs.IT math.IT math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Two series of binary observations $x_1,x_1,...$ and $y_1,y_2,...$ are
presented: at each time $n\in\N$ we are given $x_n$ and $y_n$. It is assumed
that the sequences are generated independently of each other by two
B-processes. We are interested in the question of whether the sequences
represent a typical realization of two different processes or of the same one.
We demonstrate that this is impossible to decide, in the sense that every
discrimination procedure is bound to err with non-negligible frequency when
presented with sequences from some B-processes. This contrasts earlier positive
results on B-processes, in particular those showing that there are consistent
$\bar d$-distance estimates for this class of processes.
|
[
{
"version": "v1",
"created": "Fri, 5 Sep 2008 15:28:08 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Jan 2009 14:33:40 GMT"
},
{
"version": "v3",
"created": "Sun, 10 May 2009 05:49:18 GMT"
},
{
"version": "v4",
"created": "Fri, 10 Jul 2009 09:41:45 GMT"
}
] | 2009-07-10T00:00:00 |
[
[
"Ryabko",
"Daniil",
"",
"INRIA Lille - Nord Europe"
]
] |
[
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0809.1061
|
Massimiliano Laddomada Ph.D.
|
M. Laddomada, F. Mesiti, M. Mondin, and F. Daneshgaran
|
A Novel Proportional Fairness Criterion for Throughput Allocation in
Multirate IEEE 802.11
|
Submitted to IEEE Transaction on Wireless Communications, September
2008
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper focuses on multirate IEEE 802.11 Wireless LAN employing the
mandatory Distributed Coordination Function (DCF) option. Its aim is threefold.
Upon starting from the multi-dimensional Markovian state transition model
proposed by Malone \textit{et.al.} for characterizing the behavior of the IEEE
802.11 protocol at the Medium Access Control layer, it presents an extension
accounting for packet transmission failures due to channel errors. Second, it
establishes the conditions under which a network constituted by $N$ stations,
each station transmitting with its own bit rate, $R^{(s)}_d$, and packet rate,
$\lambda_s$, can be assumed loaded. Finally, it proposes a modified
Proportional Fairness (PF) criterion, suitable for mitigating the \textit{rate
anomaly} problem of multirate loaded IEEE 802.11 Wireless LANs, employing the
mandatory DCF option. Compared to the widely adopted assumption of saturated
network, the proposed fairness criterion can be applied to general loaded
networks.
The throughput allocation resulting from the proposed algorithm is able to
greatly increase the aggregate throughput of the DCF, while ensuring fairness
levels among the stations of the same order as the ones guaranteed by the
classical PF criterion.
Simulation results are presented for some sample scenarios, confirming the
effectiveness of the proposed criterion for optimized throughput allocation.
|
[
{
"version": "v1",
"created": "Fri, 5 Sep 2008 15:43:14 GMT"
}
] | 2008-09-08T00:00:00 |
[
[
"Laddomada",
"M.",
""
],
[
"Mesiti",
"F.",
""
],
[
"Mondin",
"M.",
""
],
[
"Daneshgaran",
"F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0809.1077
|
Martin Josef Geiger
|
Martin Josef Geiger, Wolf Wenger
|
Variable Neighborhood Search for the University Lecturer-Student
Assignment Problem
|
Proceedings of the 18th Mini Euro Conference on Variable Neighborhood
Search, November 23-25, 2005, Puerto de La Cruz, Tenerife, Spain, ISBN
84-689-5679-1
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper presents a study of local search heuristics in general and variable
neighborhood search in particular for the resolution of an assignment problem
studied in the practical work of universities. Here, students have to be
assigned to scientific topics which are proposed and supported by members of
staff. The problem involves the optimization under given preferences of
students which may be expressed when applying for certain topics.
It is possible to observe that variable neighborhood search leads to superior
results for the tested problem instances. One instance is taken from an actual
case, while others have been generated based on the real world data to support
the analysis with a deeper analysis.
An extension of the problem has been formulated by integrating a second
objective function that simultaneously balances the workload of the members of
staff while maximizing utility of the students. The algorithmic approach has
been prototypically implemented in a computer system. One important aspect in
this context is the application of the research work to problems of other
scientific institutions, and therefore the provision of decision support
functionalities.
|
[
{
"version": "v1",
"created": "Fri, 5 Sep 2008 17:02:55 GMT"
}
] | 2008-09-08T00:00:00 |
[
[
"Geiger",
"Martin Josef",
""
],
[
"Wenger",
"Wolf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0809.1132
|
Vandy Berten
|
Vandy Berten, Chi-Ju Chang, Tei-Wei Kuo
|
Managing Varying Worst Case Execution Times on DVS Platforms
| null | null | null | null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Energy efficient real-time task scheduling attracted a lot of attention in
the past decade. Most of the time, deterministic execution lengths for tasks
were considered, but this model fits less and less with the reality, especially
with the increasing number of multimedia applications. It's why a lot of
research is starting to consider stochastic models, where execution times are
only known stochastically. However, authors consider that they have a pretty
much precise knowledge about the properties of the system, especially regarding
to the worst case execution time (or worst case execution cycles, WCEC).
In this work, we try to relax this hypothesis, and assume that the WCEC can
vary. We propose miscellaneous methods to react to such a situation, and give
many simulation results attesting that with a small effort, we can provide very
good results, allowing to keep a low deadline miss rate as well as an energy
consumption similar to clairvoyant algorithms.
|
[
{
"version": "v1",
"created": "Sat, 6 Sep 2008 04:38:34 GMT"
}
] | 2008-09-09T00:00:00 |
[
[
"Berten",
"Vandy",
""
],
[
"Chang",
"Chi-Ju",
""
],
[
"Kuo",
"Tei-Wei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0809.1138
|
Alex Feigel
|
Alexander Feigel, Avraham Englander and Assaf Engel
|
Derivation of evolutionary payoffs from observable behavior
|
9 pages, 3 figures
| null | null | null |
q-bio.PE cs.GT physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Interpretation of animal behavior, especially as cooperative or selfish, is a
challenge for evolutionary theory. Strategy of a competition should follow from
corresponding Darwinian payoffs for the available behavioral options. The
payoffs and decision making processes, however, are difficult to observe and
quantify. Here we present a general method for the derivation of evolutionary
payoffs from observable statistics of interactions. The method is applied to
combat of male bowl and doily spiders, to predator inspection by sticklebacks
and to territorial defense by lions, demonstrating animal behavior as a new
type of game theoretical equilibrium. Games animals play may be derived
unequivocally from their observable behavior, the reconstruction, however, can
be subjected to fundamental limitations due to our inability to observe all
information exchange mechanisms (communication).
|
[
{
"version": "v1",
"created": "Sat, 6 Sep 2008 06:43:57 GMT"
}
] | 2008-09-09T00:00:00 |
[
[
"Feigel",
"Alexander",
""
],
[
"Englander",
"Avraham",
""
],
[
"Engel",
"Assaf",
""
]
] |
[
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0809.1171
|
Cheng-Wei Luo
|
Cheng-Wei Luo, Hsiao-Fei Liu, Peng-An Chen, and Kun-Mao Chao
|
Minkowski Sum Selection and Finding
|
23 pages, 10 figures, accepted by ISAAC 2008
| null | null | null |
cs.DS cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For the \textsc{Minkowski Sum Selection} problem with linear objective
functions, we obtain the following results: (1) optimal $O(n\log n)$ time
algorithms for $\lambda=1$; (2) $O(n\log^2 n)$ time deterministic algorithms
and expected $O(n\log n)$ time randomized algorithms for any fixed $\lambda>1$.
For the \textsc{Minkowski Sum Finding} problem with linear objective functions
or objective functions of the form
$f(x,y)=\frac{by}{ax}$, we construct optimal $O(n\log n)$ time algorithms for
any fixed $\lambda\geq 1$.
|
[
{
"version": "v1",
"created": "Sat, 6 Sep 2008 14:31:49 GMT"
}
] | 2008-09-09T00:00:00 |
[
[
"Luo",
"Cheng-Wei",
""
],
[
"Liu",
"Hsiao-Fei",
""
],
[
"Chen",
"Peng-An",
""
],
[
"Chao",
"Kun-Mao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0809.1177
|
Andrzej Karbowski
|
Andrzej Karbowski
|
Amdahl's and Gustafson-Barsis laws revisited
| null | null | null | null |
cs.DC cs.GT cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper presents a simple derivation of the Gustafson-Barsis law from the
Amdahl's law. In the computer literature these two laws describing the speedup
limits of parallel applications are derived separately. It is shown, that
treating the time of the execution of the sequential part of the application as
a constant, in few lines the Gustafson-Barsis law can be obtained from the
Amdahl's law and that the popular claim, that Gustafson-Barsis law overthrows
Amdahl's law is a mistake.
|
[
{
"version": "v1",
"created": "Sat, 6 Sep 2008 15:06:53 GMT"
}
] | 2008-09-09T00:00:00 |
[
[
"Karbowski",
"Andrzej",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0809.1181
|
Robert Grossman
|
Yunhong Gu and Robert L Grossman
|
Sector and Sphere: Towards Simplified Storage and Processing of Large
Scale Distributed Data
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cloud computing has demonstrated that processing very large datasets over
commodity clusters can be done simply given the right programming model and
infrastructure. In this paper, we describe the design and implementation of the
Sector storage cloud and the Sphere compute cloud. In contrast to existing
storage and compute clouds, Sector can manage data not only within a data
center, but also across geographically distributed data centers. Similarly, the
Sphere compute cloud supports User Defined Functions (UDF) over data both
within a data center and across data centers. As a special case, MapReduce
style programming can be implemented in Sphere by using a Map UDF followed by a
Reduce UDF. We describe some experimental studies comparing Sector/Sphere and
Hadoop using the Terasort Benchmark. In these studies, Sector is about twice as
fast as Hadoop. Sector/Sphere is open source.
|
[
{
"version": "v1",
"created": "Sat, 6 Sep 2008 18:37:51 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Jan 2009 00:34:47 GMT"
}
] | 2009-01-17T00:00:00 |
[
[
"Gu",
"Yunhong",
""
],
[
"Grossman",
"Robert L",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0809.1205
|
Liang-Liang Xie
|
Liang-Liang Xie
|
On Information-Theoretic Scaling Laws for Wireless Networks
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the analysis of the hierarchical scheme, the potential influence of the
pre-constant in deriving scaling laws is exposed. It is found that a modified
hierarchical scheme can achieve a throughput arbitrarily times higher than the
original one, although it is still diminishingly small compared to the linear
scaling. The study demonstrates the essential importance of the throughput
formula itself, rather than the scaling laws consequently derived.
|
[
{
"version": "v1",
"created": "Sun, 7 Sep 2008 03:14:13 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Sep 2008 04:13:33 GMT"
},
{
"version": "v3",
"created": "Tue, 7 Jul 2009 18:54:26 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Xie",
"Liang-Liang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.1208
|
Abdellatif Zaidi
|
Abdellatif Zaidi and Luc Vandendorpe
|
Bounds on the Capacity of the Relay Channel with States at the Source
|
This paper has been withdrawn
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper has been withdrawn by the authors
|
[
{
"version": "v1",
"created": "Mon, 8 Sep 2008 12:32:46 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Sep 2008 13:08:47 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Jun 2009 21:13:52 GMT"
}
] | 2009-06-04T00:00:00 |
[
[
"Zaidi",
"Abdellatif",
""
],
[
"Vandendorpe",
"Luc",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.1226
|
Boris Ryabko
|
Boris Ryabko
|
Applications of Universal Source Coding to Statistical Analysis of Time
Series
|
accepted for publication
| null | null | null |
cs.IT cs.AI math.IT math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show how universal codes can be used for solving some of the most
important statistical problems for time series. By definition, a universal code
(or a universal lossless data compressor) can compress any sequence generated
by a stationary and ergodic source asymptotically to the Shannon entropy,
which, in turn, is the best achievable ratio for lossless data compressors.
We consider finite-alphabet and real-valued time series and the following
problems: estimation of the limiting probabilities for finite-alphabet time
series and estimation of the density for real-valued time series, the on-line
prediction, regression, classification (or problems with side information) for
both types of the time series and the following problems of hypothesis testing:
goodness-of-fit testing, or identity testing, and testing of serial
independence. It is important to note that all problems are considered in the
framework of classical mathematical statistics and, on the other hand, everyday
methods of data compression (or archivers) can be used as a tool for the
estimation and testing. It turns out, that quite often the suggested methods
and tests are more powerful than known ones when they are applied in practice.
|
[
{
"version": "v1",
"created": "Sun, 7 Sep 2008 15:37:48 GMT"
}
] | 2008-09-09T00:00:00 |
[
[
"Ryabko",
"Boris",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0809.1236
|
Pierre Ganty
|
Pierre Ganty, Rupak Majumdar, Benjamin Monmege
|
Bounded Underapproximations
|
30 pages, 2 figures, v4 added complexity results, various
improvements
|
Formal Methods in System Design 40(2) (2012) 206-231
|
10.1007/s10703-011-0136-y
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show a new and constructive proof of the following language-theoretic
result: for every context-free language L, there is a bounded context-free
language L' included in L which has the same Parikh (commutative) image as L.
Bounded languages, introduced by Ginsburg and Spanier, are subsets of regular
languages of the form w1*w2*...wk* for some finite words w1,...,wk. In
particular bounded subsets of context-free languages have nice structural and
decidability properties. Our proof proceeds in two parts. First, using Newton's
iterations on the language semiring, we construct a context-free subset Ls of L
that can be represented as a sequence of substitutions on a linear language and
has the same Parikh image as L. Second, we inductively construct a
Parikh-equivalent bounded context-free subset of Ls.
We show two applications of this result in model checking: to
underapproximate the reachable state space of multithreaded procedural programs
and to underapproximate the reachable state space of recursive counter
programs. The bounded language constructed above provides a decidable
underapproximation for the original problems. By iterating the construction, we
get a semi-algorithm for the original problems that constructs a sequence of
underapproximations such that no two underapproximations of the sequence can be
compared. This provides a progress guarantee: every word w in L is in some
underapproximation of the sequence. In addition, we show that our approach
subsumes context-bounded reachability for multithreaded programs.
|
[
{
"version": "v1",
"created": "Sun, 7 Sep 2008 22:21:33 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Oct 2008 20:35:08 GMT"
},
{
"version": "v3",
"created": "Thu, 8 Oct 2009 10:16:06 GMT"
},
{
"version": "v4",
"created": "Sun, 17 Jan 2010 15:00:58 GMT"
}
] | 2012-07-03T00:00:00 |
[
[
"Ganty",
"Pierre",
""
],
[
"Majumdar",
"Rupak",
""
],
[
"Monmege",
"Benjamin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0809.1241
|
Xinjia Chen
|
Xinjia Chen
|
A New Framework of Multistage Estimation
|
254 pages, no figure; added more references; main results appeared in
Proceedings of SPIE, Orlando, Florida, USA, April 2010 and 2011
| null |
10.1103/PhysRevE.79.026307
| null |
math.ST cs.LG math.PR stat.ME stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we have established a unified framework of multistage
parameter estimation. We demonstrate that a wide variety of statistical
problems such as fixed-sample-size interval estimation, point estimation with
error control, bounded-width confidence intervals, interval estimation
following hypothesis testing, construction of confidence sequences, can be cast
into the general framework of constructing sequential random intervals with
prescribed coverage probabilities. We have developed exact methods for the
construction of such sequential random intervals in the context of multistage
sampling. In particular, we have established inclusion principle and coverage
tuning techniques to control and adjust the coverage probabilities of
sequential random intervals. We have obtained concrete sampling schemes which
are unprecedentedly efficient in terms of sampling effort as compared to
existing procedures.
|
[
{
"version": "v1",
"created": "Mon, 8 Sep 2008 14:03:24 GMT"
},
{
"version": "v10",
"created": "Tue, 7 Apr 2009 16:48:35 GMT"
},
{
"version": "v11",
"created": "Fri, 24 Apr 2009 17:17:49 GMT"
},
{
"version": "v12",
"created": "Mon, 27 Apr 2009 18:33:01 GMT"
},
{
"version": "v13",
"created": "Mon, 29 Jun 2009 01:01:34 GMT"
},
{
"version": "v14",
"created": "Wed, 23 Sep 2009 16:53:22 GMT"
},
{
"version": "v15",
"created": "Wed, 23 Sep 2009 20:01:39 GMT"
},
{
"version": "v16",
"created": "Fri, 20 Nov 2009 22:10:54 GMT"
},
{
"version": "v17",
"created": "Wed, 2 Dec 2009 22:01:56 GMT"
},
{
"version": "v18",
"created": "Mon, 21 Dec 2009 22:43:19 GMT"
},
{
"version": "v19",
"created": "Sun, 7 Mar 2010 04:49:46 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Oct 2008 16:14:26 GMT"
},
{
"version": "v20",
"created": "Sat, 7 Aug 2010 00:17:28 GMT"
},
{
"version": "v21",
"created": "Mon, 15 Nov 2010 02:38:02 GMT"
},
{
"version": "v22",
"created": "Thu, 25 Nov 2010 00:30:46 GMT"
},
{
"version": "v23",
"created": "Tue, 1 Feb 2011 00:08:06 GMT"
},
{
"version": "v24",
"created": "Mon, 21 Feb 2011 00:58:11 GMT"
},
{
"version": "v25",
"created": "Mon, 6 Jun 2011 01:11:59 GMT"
},
{
"version": "v26",
"created": "Wed, 13 Jul 2011 18:13:33 GMT"
},
{
"version": "v27",
"created": "Sun, 31 Jul 2011 19:29:34 GMT"
},
{
"version": "v28",
"created": "Sun, 4 Sep 2011 18:46:04 GMT"
},
{
"version": "v29",
"created": "Tue, 29 Nov 2011 19:21:24 GMT"
},
{
"version": "v3",
"created": "Sun, 2 Nov 2008 23:25:28 GMT"
},
{
"version": "v30",
"created": "Thu, 29 Dec 2011 17:10:00 GMT"
},
{
"version": "v31",
"created": "Thu, 9 Feb 2012 19:54:11 GMT"
},
{
"version": "v32",
"created": "Tue, 15 May 2012 16:10:57 GMT"
},
{
"version": "v33",
"created": "Sat, 1 Sep 2012 21:53:39 GMT"
},
{
"version": "v34",
"created": "Sun, 30 Sep 2012 20:46:09 GMT"
},
{
"version": "v35",
"created": "Wed, 5 Dec 2012 00:39:40 GMT"
},
{
"version": "v4",
"created": "Tue, 2 Dec 2008 21:40:37 GMT"
},
{
"version": "v5",
"created": "Fri, 30 Jan 2009 02:04:54 GMT"
},
{
"version": "v6",
"created": "Mon, 2 Mar 2009 18:51:46 GMT"
},
{
"version": "v7",
"created": "Mon, 2 Mar 2009 21:35:54 GMT"
},
{
"version": "v8",
"created": "Sun, 29 Mar 2009 20:07:10 GMT"
},
{
"version": "v9",
"created": "Sun, 5 Apr 2009 21:07:25 GMT"
}
] | 2013-11-05T00:00:00 |
[
[
"Chen",
"Xinjia",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0809.1252
|
Georg B\"ocherer
|
Georg B\"ocherer, Valdemar Cardoso da Rocha Jr. and Cecilio Pimentel
|
Maximum Entropy Rate of Markov Sources for Systems With Non-regular
Constraints
|
5 pages, to presented at the ISITA 2008 in Auckland, NZ
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Using the concept of discrete noiseless channels, it was shown by Shannon in
A Mathematical Theory of Communication that the ultimate performance of an
encoder for a constrained system is limited by the combinatorial capacity of
the system if the constraints define a regular language. In the present work,
it is shown that this is not an inherent property of regularity but holds in
general. To show this, constrained systems are described by generating
functions and random walks on trees.
|
[
{
"version": "v1",
"created": "Sun, 7 Sep 2008 21:00:42 GMT"
}
] | 2008-09-09T00:00:00 |
[
[
"Böcherer",
"Georg",
""
],
[
"Rocha",
"Valdemar Cardoso da",
"Jr."
],
[
"Pimentel",
"Cecilio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.1257
|
Ozgur Yilmaz
|
I. Daubechies, C.S. G\"unt\"urk, Y. Wang, \"O. Yilmaz
|
The Golden Ratio Encoder
|
24 pages, 9 figures
| null |
10.1109/TIT.2010.2059750
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a novel Nyquist-rate analog-to-digital (A/D) conversion
algorithm which achieves exponential accuracy in the bit-rate despite using
imperfect components. The proposed algorithm is based on a robust
implementation of a beta-encoder where the value of the base beta is equal to
golden mean. It was previously shown that beta-encoders can be implemented in
such a way that their exponential accuracy is robust against threshold offsets
in the quantizer element. This paper extends this result by allowing for
imperfect analog multipliers with imprecise gain values as well. A formal
computational model for algorithmic encoders and a general test bed for
evaluating their robustness is also proposed.
|
[
{
"version": "v1",
"created": "Sun, 7 Sep 2008 22:29:59 GMT"
}
] | 2010-10-19T00:00:00 |
[
[
"Daubechies",
"I.",
""
],
[
"Güntürk",
"C. S.",
""
],
[
"Wang",
"Y.",
""
],
[
"Yilmaz",
"Ö.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.1258
|
Salah A. Aly
|
Salah A. Aly, Ahmed E. Kamal
|
Network Protection Codes Against Link Failures Using Network Coding
| null |
Proc. of IEEE Globecom 08, New Orleans, LA, 2008
|
10.1109/GLOCOM.2008.ECP.516
| null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Protecting against link failures in communication networks is essential to
increase robustness, accessibility, and reliability of data transmission.
Recently, network coding has been proposed as a solution to provide agile and
cost efficient network protection against link failures, which does not require
data rerouting, or packet retransmission. To achieve this, separate paths have
to be provisioned to carry encoded packets, hence requiring either the addition
of extra links, or reserving some of the resources for this purpose. In this
paper, we propose network protection codes against a single link failure using
network coding, where a separate path using reserved links is not needed. In
this case portions of the link capacities are used to carry the encoded
packets.
The scheme is extended to protect against multiple link failures and can be
implemented at an overlay layer. Although this leads to reducing the network
capacity, the network capacity reduction is asymptotically small in most cases
of practical interest. We demonstrate that such network protection codes are
equivalent to error correcting codes for erasure channels. Finally, we study
the encoding and decoding operations of such codes over the binary field.
|
[
{
"version": "v1",
"created": "Sun, 7 Sep 2008 23:03:22 GMT"
},
{
"version": "v2",
"created": "Sun, 21 Dec 2008 20:40:01 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Aly",
"Salah A.",
""
],
[
"Kamal",
"Ahmed E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.1264
|
Michael Baer
|
Michael Baer
|
Tight Bounds on Minimum Maximum Pointwise Redundancy
|
5 pages, 1 figure, presented at ISIT 2008
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents new lower and upper bounds for the optimal compression of
binary prefix codes in terms of the most probable input symbol, where
compression efficiency is determined by the nonlinear codeword length objective
of minimizing maximum pointwise redundancy. This objective relates to both
universal modeling and Shannon coding, and these bounds are tight throughout
the interval. The upper bounds also apply to a related objective, that of dth
exponential redundancy.
|
[
{
"version": "v1",
"created": "Mon, 8 Sep 2008 01:28:53 GMT"
}
] | 2008-09-09T00:00:00 |
[
[
"Baer",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.1270
|
Marcus Hutter
|
Marcus Hutter
|
Predictive Hypothesis Identification
|
16 pages
| null | null | null |
cs.LG math.ST stat.ML stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While statistics focusses on hypothesis testing and on estimating (properties
of) the true sampling distribution, in machine learning the performance of
learning algorithms on future data is the primary issue. In this paper we
bridge the gap with a general principle (PHI) that identifies hypotheses with
best predictive performance. This includes predictive point and interval
estimation, simple and composite hypothesis testing, (mixture) model selection,
and others as special cases. For concrete instantiations we will recover
well-known methods, variations thereof, and new ones. PHI nicely justifies,
reconciles, and blends (a reparametrization invariant variation of) MAP, ML,
MDL, and moment estimation. One particular feature of PHI is that it can
genuinely deal with nested hypotheses.
|
[
{
"version": "v1",
"created": "Mon, 8 Sep 2008 04:18:17 GMT"
}
] | 2009-12-30T00:00:00 |
[
[
"Hutter",
"Marcus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0809.1300
|
Jossy Sayir
|
Jossy Sayir
|
What makes a good role model
|
This paper is dedicated to Jim Massey on the occasion of his 75th
birthday. Submitted to the IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The role model strategy is introduced as a method for designing an estimator
by approaching the output of a superior estimator that has better input
observations. This strategy is shown to yield the optimal Bayesian estimator
when a Markov condition is fulfilled. Two examples involving simple channels
are given to illustrate its use. The strategy is combined with time averaging
to construct a statistical model by numerically solving a convex program. The
role model strategy was developed in the context of low complexity decoder
design for iterative decoding. Potential applications outside the field of
communications are discussed.
|
[
{
"version": "v1",
"created": "Mon, 8 Sep 2008 09:51:04 GMT"
}
] | 2008-09-09T00:00:00 |
[
[
"Sayir",
"Jossy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.1318
|
Alawi Abdulrahman Al-saggaf
|
Alawi A. Al-saggaf, H. S. Acharya
|
A Fuzzy Commitment Scheme
|
4 pages, IEEE International Conference on Advances in Computer Vision
and Information Technology 28-30 November 2007 - India
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper attempt has been made to explain a fuzzy commitment scheme. In the
conventional Commitment schemes, both committed string m and valid opening key
are required to enable the sender to prove the commitment. However there could
be many instances where the transmission involves noise or minor errors arising
purely because of the factors over which neither the sender nor the receiver
have any control. The fuzzy commitment scheme presented in this paper is to
accept the opening key that is close to the original one in suitable distance
metric, but not necessarily identical. The concept itself is illustrated with
the help of simple situation.
|
[
{
"version": "v1",
"created": "Mon, 8 Sep 2008 11:34:45 GMT"
}
] | 2008-09-09T00:00:00 |
[
[
"Al-saggaf",
"Alawi A.",
""
],
[
"Acharya",
"H. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0809.1330
|
Gerhard Maierbacher
|
G. Maierbacher, J. Barros
|
Low-Complexity Coding and Source-Optimized Clustering for Large-Scale
Sensor Networks
|
26 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the distributed source coding problem in which correlated data
picked up by scattered sensors has to be encoded separately and transmitted to
a common receiver, subject to a rate-distortion constraint. Although
near-tooptimal solutions based on Turbo and LDPC codes exist for this problem,
in most cases the proposed techniques do not scale to networks of hundreds of
sensors. We present a scalable solution based on the following key elements:
(a) distortion-optimized index assignments for low-complexity distributed
quantization, (b) source-optimized hierarchical clustering based on the
Kullback-Leibler distance and (c) sum-product decoding on specific factor
graphs exploiting the correlation of the data.
|
[
{
"version": "v1",
"created": "Mon, 8 Sep 2008 13:28:37 GMT"
}
] | 2008-09-09T00:00:00 |
[
[
"Maierbacher",
"G.",
""
],
[
"Barros",
"J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.1344
|
Urs Niesen
|
Urs Niesen, Piyush Gupta, Devavrat Shah
|
The Balanced Unicast and Multicast Capacity Regions of Large Wireless
Networks
|
37 pages, 7 figures, to appear in IEEE Transactions on Information
Theory
|
IEEE Transactions on Information Theory, vol. 56, pp. 2249-2271,
May 2010
|
10.1109/TIT.2010.2043979
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the question of determining the scaling of the $n^2$-dimensional
balanced unicast and the $n 2^n$-dimensional balanced multicast capacity
regions of a wireless network with $n$ nodes placed uniformly at random in a
square region of area $n$ and communicating over Gaussian fading channels. We
identify this scaling of both the balanced unicast and multicast capacity
regions in terms of $\Theta(n)$, out of $2^n$ total possible, cuts. These cuts
only depend on the geometry of the locations of the source nodes and their
destination nodes and the traffic demands between them, and thus can be readily
evaluated. Our results are constructive and provide optimal (in the scaling
sense) communication schemes.
|
[
{
"version": "v1",
"created": "Mon, 8 Sep 2008 14:26:17 GMT"
},
{
"version": "v2",
"created": "Mon, 11 May 2009 14:11:35 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Jun 2009 20:10:19 GMT"
},
{
"version": "v4",
"created": "Thu, 14 Jan 2010 00:03:02 GMT"
},
{
"version": "v5",
"created": "Thu, 21 Jan 2010 17:36:31 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Niesen",
"Urs",
""
],
[
"Gupta",
"Piyush",
""
],
[
"Shah",
"Devavrat",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.1348
|
Thorsten Hehn
|
Thorsten Hehn, Johannes B. Huber, Stefan Laendner
|
MBBP for improved iterative channel decoding in 802.16e WiMAX systems
|
5 pages, 3 figures, submitted to IEEE ICC 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose the application of multiple-bases belief-propagation, an optimized
iterative decoding method, to a set of rate-1/2 LDPC codes from the IEEE
802.16e WiMAX standard. The presented approach allows for improved decoding
performance when signaling over the AWGN channel. As all required operations
for this method can be run in parallel, the decoding delay of this method and
standard belief-propagation decoding are equal. The obtained results are
compared to the performance of LDPC codes optimized with the progressive
edge-growth algorithm and to bounds from information theory. It will be shown
that the discussed method mitigates the gap to the well-known random coding
bound by about 20 percent.
|
[
{
"version": "v1",
"created": "Mon, 8 Sep 2008 14:45:00 GMT"
}
] | 2008-09-09T00:00:00 |
[
[
"Hehn",
"Thorsten",
""
],
[
"Huber",
"Johannes B.",
""
],
[
"Laendner",
"Stefan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.1366
|
Lu\'isa Lima
|
Lu\'isa Lima, Jo\~ao P. Vilela, Paulo F. Oliveira and Jo\~ao Barros
|
Network Coding Security: Attacks and Countermeasures
|
8 pages, 4 figures
| null | null | null |
cs.CR cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
By allowing intermediate nodes to perform non-trivial operations on packets,
such as mixing data from multiple streams, network coding breaks with the
ruling store and forward networking paradigm and opens a myriad of challenging
security questions. Following a brief overview of emerging network coding
protocols, we provide a taxonomy of their security vulnerabilities, which
highlights the differences between attack scenarios in which network coding is
particularly vulnerable and other relevant cases in which the intrinsic
properties of network coding allow for stronger and more efficient security
solutions than classical routing. Furthermore, we give practical examples where
network coding can be combined with classical cryptography both for secure
communication and secret key distribution. Throughout the paper we identify a
number of research challenges deemed relevant towards the applicability of
secure network coding in practical networks.
|
[
{
"version": "v1",
"created": "Mon, 8 Sep 2008 15:34:03 GMT"
}
] | 2008-09-09T00:00:00 |
[
[
"Lima",
"Luísa",
""
],
[
"Vilela",
"João P.",
""
],
[
"Oliveira",
"Paulo F.",
""
],
[
"Barros",
"João",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.1379
|
Rui Costa
|
Rui A. Costa, Joao Barros
|
A Max-Flow Min-Cut Theorem with Applications in Small Worlds and Dual
Radio Networks
|
22 pages, 4 figures, Submitted to JSAC Special Issue on Stochastic
Geometry and Random Graphs for Wireless Networks
| null | null | null |
cs.IT cs.DM math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Intrigued by the capacity of random networks, we start by proving a max-flow
min-cut theorem that is applicable to any random graph obeying a suitably
defined independence-in-cut property. We then show that this property is
satisfied by relevant classes, including small world topologies, which are
pervasive in both man-made and natural networks, and wireless networks of dual
devices, which exploit multiple radio interfaces to enhance the connectivity of
the network. In both cases, we are able to apply our theorem and derive
max-flow min-cut bounds for network information flow.
|
[
{
"version": "v1",
"created": "Mon, 8 Sep 2008 16:53:27 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jan 2009 11:50:22 GMT"
}
] | 2009-01-30T00:00:00 |
[
[
"Costa",
"Rui A.",
""
],
[
"Barros",
"Joao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0809.1398
|
Jose Javier Ramasco
|
Muhittin Mungan, Jose J. Ramasco
|
Stability of Maximum likelihood based clustering methods: exploring the
backbone of classifications (Who is keeping you in that community?)
|
19 pages, 9 figures
|
J. Stat. Mech. (2010) P04028
| null | null |
physics.soc-ph cond-mat.stat-mech cs.IT math.IT physics.comp-ph physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Components of complex systems are often classified according to the way they
interact with each other. In graph theory such groups are known as clusters or
communities. Many different techniques have been recently proposed to detect
them, some of which involve inference methods using either Bayesian or Maximum
Likelihood approaches. In this article, we study a statistical model designed
for detecting clusters based on connection similarity. The basic assumption of
the model is that the graph was generated by a certain grouping of the nodes
and an Expectation Maximization algorithm is employed to infer that grouping.
We show that the method admits further development to yield a stability
analysis of the groupings that quantifies the extent to which each node
influences its neighbors group membership. Our approach naturally allows for
the identification of the key elements responsible for the grouping and their
resilience to changes in the network. Given the generality of the assumptions
underlying the statistical model, such nodes are likely to play special roles
in the original system. We illustrate this point by analyzing several empirical
networks for which further information about the properties of the nodes is
available. The search and identification of stabilizing nodes constitutes thus
a novel technique to characterize the relevance of nodes in complex networks.
|
[
{
"version": "v1",
"created": "Mon, 8 Sep 2008 19:04:06 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Apr 2010 17:04:23 GMT"
}
] | 2010-04-30T00:00:00 |
[
[
"Mungan",
"Muhittin",
""
],
[
"Ramasco",
"Jose J.",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0809.1409
|
Anshuman Sinha
|
Anshuman Sinha, Haritha Nandela, Vijaya Balakrishna
|
Domain Specific Software Architecture for Design Center Automation
|
158 pages
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Domain specific software architecture aims at software reuse through
construction of domain architecture reference model. The constructed reference
model presents a set of individual components and their interaction points.
When starting on a new large software project, the design engineer starts with
pre-constructed model, which can be easily browsed and picks up opportunities
of use in the new solution design. This report discusses application of domain
reference design methods by deriving domain specific reference architecture for
a product ordering system in a design center. The product in this case is
instock and special order blinds from different manufacturers in a large supply
store. The development of mature domain specific reference software
architecture for this domain is not the objective of this report. However, this
report would like to capture the method used in one such process and that is
the primary concern of this report. This report lists subjective details of
such a process applied to the domain of ordering custom and instock blinds from
a large home construction and goods supply store. This report also describes
the detailed process of derivation of knowledge models, unified knowledge
models and the reference architecture for this domain. However, this domain
model is only partially complete which may not be used for any real
applications. This report is a result of a course project undertaken while
studying this methodology.
|
[
{
"version": "v1",
"created": "Mon, 8 Sep 2008 19:07:17 GMT"
}
] | 2008-11-06T00:00:00 |
[
[
"Sinha",
"Anshuman",
""
],
[
"Nandela",
"Haritha",
""
],
[
"Balakrishna",
"Vijaya",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0809.1437
|
Fotis Georgatos Drs
|
Fotis Georgatos
|
How applicable is Python as first computer language for teaching
programming in a pre-university educational environment, from a teacher's
point of view?
|
135 pages, 20 tables, 10 figures (incl. evolution of computer
languages)
| null | null | null |
cs.PL cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This project report attempts to evaluate the educational properties of the
Python computer language, in practice. This is done by examining computer
language evolution history, related scientific background work, the existing
educational research on computer languages and Python's experimental
application in higher secondary education in Greece, during first half of year
2002. This Thesis Report was delivered in advance of a thesis defense for a
Masters/Doctorandus (MSc/Drs) title with the Amstel Institute/Universiteit van
Amsterdam, during the same year.
|
[
{
"version": "v1",
"created": "Tue, 9 Sep 2008 14:39:57 GMT"
}
] | 2008-09-10T00:00:00 |
[
[
"Georgatos",
"Fotis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0809.1465
|
Krishnendu Chatterjee
|
Krishnendu Chatterjee and Thomas A. Henzinger
|
Probabilistic Systems with LimSup and LimInf Objectives
|
The paper will appear in ILC proceedings
| null | null | null |
cs.GT cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give polynomial-time algorithms for computing the values of Markov
decision processes (MDPs) with limsup and liminf objectives. A real-valued
reward is assigned to each state, and the value of an infinite path in the MDP
is the limsup (resp. liminf) of all rewards along the path. The value of an MDP
is the maximal expected value of an infinite path that can be achieved by
resolving the decisions of the MDP. Using our result on MDPs, we show that
turn-based stochastic games with limsup and liminf objectives can be solved in
NP \cap coNP.
|
[
{
"version": "v1",
"created": "Tue, 9 Sep 2008 00:12:05 GMT"
}
] | 2008-09-10T00:00:00 |
[
[
"Chatterjee",
"Krishnendu",
""
],
[
"Henzinger",
"Thomas A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0809.1476
|
Qin Xiaolin
|
Yong Feng, Jingzhong Zhang, Xiaolin Qin, Xun Yuan
|
Obtaining Exact Interpolation Multivariate Polynomial by Approximation
|
14 pages
| null | null | null |
cs.SC cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In some fields such as Mathematics Mechanization, automated reasoning and
Trustworthy Computing etc., exact results are needed. Symbolic computations are
used to obtain the exact results. Symbolic computations are of high complexity.
In order to improve the situation, exactly interpolating methods are often
proposed for the exact results and approximate interpolating methods for the
approximate ones. In this paper, we study how to obtain exact interpolation
polynomial with rational coefficients by approximate interpolating methods.
|
[
{
"version": "v1",
"created": "Tue, 9 Sep 2008 02:33:30 GMT"
}
] | 2008-09-10T00:00:00 |
[
[
"Feng",
"Yong",
""
],
[
"Zhang",
"Jingzhong",
""
],
[
"Qin",
"Xiaolin",
""
],
[
"Yuan",
"Xun",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0809.1489
|
Jukka Suomela
|
Patrik Flor\'een, Joel Kaasinen, Petteri Kaski, Jukka Suomela
|
An optimal local approximation algorithm for max-min linear programs
|
16 pages, 3 figures
| null |
10.1145/1583991.1584058
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a local algorithm (constant-time distributed algorithm) for
approximating max-min LPs. The objective is to maximise $\omega$ subject to $Ax
\le 1$, $Cx \ge \omega 1$, and $x \ge 0$ for nonnegative matrices $A$ and $C$.
The approximation ratio of our algorithm is the best possible for any local
algorithm; there is a matching unconditional lower bound.
|
[
{
"version": "v1",
"created": "Tue, 9 Sep 2008 06:11:31 GMT"
}
] | 2012-05-15T00:00:00 |
[
[
"Floréen",
"Patrik",
""
],
[
"Kaasinen",
"Joel",
""
],
[
"Kaski",
"Petteri",
""
],
[
"Suomela",
"Jukka",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0809.1493
|
Francis Bach
|
Francis Bach (INRIA Rocquencourt)
|
Exploring Large Feature Spaces with Hierarchical Multiple Kernel
Learning
| null | null | null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For supervised and unsupervised learning, positive definite kernels allow to
use large and potentially infinite dimensional feature spaces with a
computational cost that only depends on the number of observations. This is
usually done through the penalization of predictor functions by Euclidean or
Hilbertian norms. In this paper, we explore penalizing by sparsity-inducing
norms such as the l1-norm or the block l1-norm. We assume that the kernel
decomposes into a large sum of individual basis kernels which can be embedded
in a directed acyclic graph; we show that it is then possible to perform kernel
selection through a hierarchical multiple kernel learning framework, in
polynomial time in the number of selected kernels. This framework is naturally
applied to non linear variable selection; our extensive simulations on
synthetic datasets and datasets from the UCI repository show that efficiently
exploring the large feature space through sparsity-inducing norms leads to
state-of-the-art predictive performance.
|
[
{
"version": "v1",
"created": "Tue, 9 Sep 2008 06:48:10 GMT"
}
] | 2008-09-10T00:00:00 |
[
[
"Bach",
"Francis",
"",
"INRIA Rocquencourt"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0809.1522
|
J\'anos K\"orner
|
Gerard Cohen, Emanuela Fachini, Janos Korner
|
On the permutation capacity of digraphs
|
11 pages, no figures
| null | null | null |
math.CO cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We extend several results of the third author and C. Malvenuto on
graph-different permutations to the case of directed graphs and introduce new
open problems. Permutation capacity is a natural extension of Sperner capacity
from finite directed graphs to infinite digraphs. Our subject is combinatorial
in nature, but can be equally regarded as zero-error information theory.
|
[
{
"version": "v1",
"created": "Tue, 9 Sep 2008 09:38:24 GMT"
}
] | 2008-09-10T00:00:00 |
[
[
"Cohen",
"Gerard",
""
],
[
"Fachini",
"Emanuela",
""
],
[
"Korner",
"Janos",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.