id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0809.0124
Peter Turney
Peter D. Turney (National Research Council of Canada)
A Uniform Approach to Analogies, Synonyms, Antonyms, and Associations
related work available at http://purl.org/peter.turney/
Proceedings of the 22nd International Conference on Computational Linguistics (Coling 2008), August 2008, Manchester, UK, Pages 905-912
null
NRC 50398
cs.CL cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recognizing analogies, synonyms, antonyms, and associations appear to be four distinct tasks, requiring distinct NLP algorithms. In the past, the four tasks have been treated independently, using a wide variety of algorithms. These four semantic classes, however, are a tiny sample of the full range of semantic phenomena, and we cannot afford to create ad hoc algorithms for each semantic phenomenon; we need to seek a unified approach. We propose to subsume a broad range of phenomena under analogies. To limit the scope of this paper, we restrict our attention to the subsumption of synonyms, antonyms, and associations. We introduce a supervised corpus-based machine learning algorithm for classifying analogous word pairs, and we show that it can solve multiple-choice SAT analogy questions, TOEFL synonym questions, ESL synonym-antonym questions, and similar-associated-both questions from cognitive psychology.
[ { "version": "v1", "created": "Sun, 31 Aug 2008 14:00:26 GMT" } ]
2008-09-02T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0809.0158
Jian Ni
Jian Ni, Sekhar Tatikonda
Network Tomography Based on Additive Metrics
35 pages
IEEE Transactions on Information Theory, 57(12), December 2011
10.1109/TIT.2011.2168901
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inference of the network structure (e.g., routing topology) and dynamics (e.g., link performance) is an essential component in many network design and management tasks. In this paper we propose a new, general framework for analyzing and designing routing topology and link performance inference algorithms using ideas and tools from phylogenetic inference in evolutionary biology. The framework is applicable to a variety of measurement techniques. Based on the framework we introduce and develop several polynomial-time distance-based inference algorithms with provable performance. We provide sufficient conditions for the correctness of the algorithms. We show that the algorithms are consistent (return correct topology and link performance with an increasing sample size) and robust (can tolerate a certain level of measurement errors). In addition, we establish certain optimality properties of the algorithms (i.e., they achieve the optimal $l_\infty$-radius) and demonstrate their effectiveness via model simulation.
[ { "version": "v1", "created": "Sun, 31 Aug 2008 22:27:20 GMT" } ]
2019-11-13T00:00:00
[ [ "Ni", "Jian", "" ], [ "Tatikonda", "Sekhar", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.0159
Domagoj Severdija
K. Elbassioni, D. Matijevic, J. Mestre, D. Severdija
Improved Approximations for Guarding 1.5-Dimensional Terrains
10 pages, 1 Postscript figure, uses geometry.sty
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a 4-approximation algorithm for the problem of placing a fewest guards on a 1.5D terrain so that every point of the terrain is seen by at least one guard. This improves on the currently best approximation factor of 5. Our method is based on rounding the linear programming relaxation of the corresponding covering problem. Besides the simplicity of the analysis, which mainly relies on decomposing the constraint matrix of the LP into totally balanced matrices, our algorithm, unlike previous work, generalizes to the weighted and partial versions of the basic problem.
[ { "version": "v1", "created": "Mon, 1 Sep 2008 16:13:30 GMT" } ]
2008-09-02T00:00:00
[ [ "Elbassioni", "K.", "" ], [ "Matijevic", "D.", "" ], [ "Mestre", "J.", "" ], [ "Severdija", "D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0809.0188
Marek Karpinski
Piotr Berman, Bhaskar DasGupta and Marek Karpinski
Approximating Transitivity in Directed Networks
null
null
null
null
cs.CC cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of computing a minimum equivalent digraph (also known as the problem of computing a strong transitive reduction) and its maximum objective function variant, with two types of extensions. First, we allow to declare a set $D\subset E$ and require that a valid solution $A$ satisfies $D\subset A$ (it is sometimes called transitive reduction problem). In the second extension (called $p$-ary transitive reduction), we have integer edge labeling and we view two paths as equivalent if they have the same beginning, ending and the sum of labels modulo $p$. A solution $A\subseteq E$ is valid if it gives an equivalent path for every original path. For all problems we establish the following: polynomial time minimization of $|A|$ within ratio 1.5, maximization of $|E-A|$ within ratio 2, MAX-SNP hardness even of the length of simple cycles is limited to 5. Furthermore, we believe that the combinatorial technique behind the approximation algorithm for the minimization version might be of interest to other graph connectivity problems as well.
[ { "version": "v1", "created": "Mon, 1 Sep 2008 08:58:32 GMT" } ]
2008-09-02T00:00:00
[ [ "Berman", "Piotr", "" ], [ "DasGupta", "Bhaskar", "" ], [ "Karpinski", "Marek", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0809.0195
Ugo Dal Lago
Paolo Coppola, Ugo Dal Lago, Simona Ronchi Della Rocca
Light Logics and the Call-by-Value Lambda Calculus
28 pages
Logical Methods in Computer Science, Volume 4, Issue 4 (November 7, 2008) lmcs:820
10.2168/LMCS-4(4:5)2008
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The so-called light logics have been introduced as logical systems enjoying quite remarkable normalization properties. Designing a type assignment system for pure lambda calculus from these logics, however, is problematic. In this paper we show that shifting from usual call-by-name to call-by-value lambda calculus allows regaining strong connections with the underlying logic. This will be done in the context of Elementary Affine Logic (EAL), designing a type system in natural deduction style assigning EAL formulae to lambda terms.
[ { "version": "v1", "created": "Mon, 1 Sep 2008 09:46:36 GMT" }, { "version": "v2", "created": "Fri, 7 Nov 2008 17:12:02 GMT" } ]
2015-07-01T00:00:00
[ [ "Coppola", "Paolo", "" ], [ "Lago", "Ugo Dal", "" ], [ "Della Rocca", "Simona Ronchi", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0809.0199
John Wright
John Wright and Yi Ma
Dense Error Correction via L1-Minimization
40 pages, 9 figures
null
null
UILU-ENG-08-2210, DC 237
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the problem of recovering a non-negative sparse signal $\x \in \Re^n$ from highly corrupted linear measurements $\y = A\x + \e \in \Re^m$, where $\e$ is an unknown error vector whose nonzero entries may be unbounded. Motivated by an observation from face recognition in computer vision, this paper proves that for highly correlated (and possibly overcomplete) dictionaries $A$, any non-negative, sufficiently sparse signal $\x$ can be recovered by solving an $\ell^1$-minimization problem: $\min \|\x\|_1 + \|\e\|_1 \quad {subject to} \quad \y = A\x + \e.$ More precisely, if the fraction $\rho$ of errors is bounded away from one and the support of $\x$ grows sublinearly in the dimension $m$ of the observation, then as $m$ goes to infinity, the above $\ell^1$-minimization succeeds for all signals $\x$ and almost all sign-and-support patterns of $\e$. This result suggests that accurate recovery of sparse signals is possible and computationally feasible even with nearly 100% of the observations corrupted. The proof relies on a careful characterization of the faces of a convex polytope spanned together by the standard crosspolytope and a set of iid Gaussian vectors with nonzero mean and small variance, which we call the ``cross-and-bouquet'' model. Simulations and experimental results corroborate the findings, and suggest extensions to the result.
[ { "version": "v1", "created": "Mon, 1 Sep 2008 10:07:19 GMT" } ]
2008-09-02T00:00:00
[ [ "Wright", "John", "" ], [ "Ma", "Yi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.0216
Somitra Sanadhya
Somitra Kumar Sanadhya and Palash Sarkar
Colliding Message Pairs for 23 and 24-step SHA-512
2 pages, 2 Tables
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, Indesteege et al. [1] had described attacks against 23 and 24-step SHA-512 at SAC '08. Their attacks are based on the differential path by Nikolic and Biryukov [2]. The reported complexities are $2^{44.9}$ and $2^{53}$ calls to the respective step reduced SHA-512 hash function. They provided colliding message pairs for 23-step SHA-512 but did not provide a colliding message pair for 24-step SHA-512. In this note we provide a colliding message pair for 23-step SHA-512 and the first colliding message pair for 24-step SHA-512. Our attacks use the differential path first described by Sanadhya and Sarkar at ACISP '08 [3]. The complexities of our attacks are $2^{16.5}$ and $2^{34.5}$ calls to the respective step reduced SHA-512 hash function. Complete details of the attacks will be provided in an extended version of this note.
[ { "version": "v1", "created": "Mon, 1 Sep 2008 12:55:32 GMT" } ]
2008-09-02T00:00:00
[ [ "Sanadhya", "Somitra Kumar", "" ], [ "Sarkar", "Palash", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0809.0257
Xuan Cai
Xuan Cai
Linear Kernelizations for Restricted 3-Hitting Set Problems
12 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The 3-\textsc{Hitting Set} problem is also called the \textsc{Vertex Cover} problem on 3-uniform hypergraphs. In this paper, we address kernelizations of the \textsc{Vertex Cover} problem on 3-uniform hypergraphs. We show that this problem admits a linear kernel in three classes of 3-uniform hypergraphs. We also obtain lower and upper bounds on the kernel size for them by the parametric duality.
[ { "version": "v1", "created": "Mon, 1 Sep 2008 14:52:30 GMT" }, { "version": "v2", "created": "Tue, 2 Sep 2008 09:25:25 GMT" }, { "version": "v3", "created": "Thu, 4 Sep 2008 07:04:49 GMT" }, { "version": "v4", "created": "Sat, 20 Sep 2008 13:19:49 GMT" } ]
2008-09-20T00:00:00
[ [ "Cai", "Xuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0809.0259
Vadim E. Levit
Vadim E. Levit and Eugen Mandrescu
On Duality between Local Maximum Stable Sets of a Graph and its Line-Graph
7 pages; 7 figures
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
G is a Koenig-Egervary graph provided alpha(G)+ mu(G)=|V(G)|, where mu(G) is the size of a maximum matching and alpha(G) is the cardinality of a maximum stable set. S is a local maximum stable set of G if S is a maximum stable set of the closed neighborhood of S. Nemhauser and Trotter Jr. proved that any local maximum stable set is a subset of a maximum stable set of G. In this paper we demonstrate that if S is a local maximum stable set, the subgraph H induced by the closed neighborhood of S is a Koenig-Egervary graph, and M is a maximum matching in H, then M is a local maximum stable set in the line graph of G.
[ { "version": "v1", "created": "Mon, 1 Sep 2008 15:08:19 GMT" } ]
2011-01-25T00:00:00
[ [ "Levit", "Vadim E.", "" ], [ "Mandrescu", "Eugen", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0809.0271
Martin Josef Geiger
Martin Josef Geiger
Randomised Variable Neighbourhood Search for Multi Objective Optimisation
null
Proceedings of the 4th EU/ME Workshop: Design and Evaluation of Advanced Hybrid Meta-Heuristics, November 4--5, Nottingham, United Kingdom, pp. 34-42
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Various local search approaches have recently been applied to machine scheduling problems under multiple objectives. Their foremost consideration is the identification of the set of Pareto optimal alternatives. An important aspect of successfully solving these problems lies in the definition of an appropriate neighbourhood structure. Unclear in this context remains, how interdependencies within the fitness landscape affect the resolution of the problem. The paper presents a study of neighbourhood search operators for multiple objective flow shop scheduling. Experiments have been carried out with twelve different combinations of criteria. To derive exact conclusions, small problem instances, for which the optimal solutions are known, have been chosen. Statistical tests show that no single neighbourhood operator is able to equally identify all Pareto optimal alternatives. Significant improvements however have been obtained by hybridising the solution algorithm using a randomised variable neighbourhood search technique.
[ { "version": "v1", "created": "Mon, 1 Sep 2008 15:32:49 GMT" } ]
2008-09-02T00:00:00
[ [ "Geiger", "Martin Josef", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0809.0352
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Instruction sequences and non-uniform complexity theory
31 pages; 31 pages, improvements of several proof outlines; 33 pages, presentation of section 7 improved
null
null
PRG0812
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop theory concerning non-uniform complexity in a setting in which the notion of single-pass instruction sequence considered in program algebra is the central notion. We define counterparts of the complexity classes P/poly and NP/poly and formulate a counterpart of the complexity theoretic conjecture that NP is not included in P/poly. In addition, we define a notion of completeness for the counterpart of NP/poly using a non-uniform reducibility relation and formulate complexity hypotheses which concern restrictions on the instruction sequences used for computation. We think that the theory developed opens up an additional way of investigating issues concerning non-uniform complexity.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 05:45:48 GMT" }, { "version": "v2", "created": "Tue, 6 Oct 2009 06:14:49 GMT" }, { "version": "v3", "created": "Wed, 14 Jul 2010 19:05:50 GMT" } ]
2010-07-15T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0809.0355
Bruno Martin
Katsunobu Imai (I3S, IEC), Bruno Martin (I3S)
Simulations between triangular and hexagonal number-conserving cellular automata
11 pages; International Workshop on Natural Computing, Yokohama : Japon (2008)
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A number-conserving cellular automaton is a cellular automaton whose states are integers and whose transition function keeps the sum of all cells constant throughout its evolution. It can be seen as a kind of modelization of the physical conservation laws of mass or energy. In this paper, we first propose a necessary condition for triangular and hexagonal cellular automata to be number-conserving. The local transition function is expressed by the sum of arity two functions which can be regarded as 'flows' of numbers. The sufficiency is obtained through general results on number-conserving cellular automata. Then, using the previous flow functions, we can construct effective number-conserving simulations between hexagonal cellular automata and triangular cellular automata.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 06:40:40 GMT" } ]
2008-09-03T00:00:00
[ [ "Imai", "Katsunobu", "", "I3S, IEC" ], [ "Martin", "Bruno", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0809.0360
Aniello Murano
Piero A. Bonatti, Carsten Lutz, Aniello Murano, Moshe Y. Vardi
The Complexity of Enriched Mu-Calculi
A preliminary version of this paper appears in the Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP), 2006. This paper has been selected for a special issue in LMCS
Logical Methods in Computer Science, Volume 4, Issue 3 (September 22, 2008) lmcs:993
10.2168/LMCS-4(3:11)2008
null
cs.LO cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The fully enriched μ-calculus is the extension of the propositional μ-calculus with inverse programs, graded modalities, and nominals. While satisfiability in several expressive fragments of the fully enriched μ-calculus is known to be decidable and ExpTime-complete, it has recently been proved that the full calculus is undecidable. In this paper, we study the fragments of the fully enriched μ-calculus that are obtained by dropping at least one of the additional constructs. We show that, in all fragments obtained in this way, satisfiability is decidable and ExpTime-complete. Thus, we identify a family of decidable logics that are maximal (and incomparable) in expressive power. Our results are obtained by introducing two new automata models, showing that their emptiness problems are ExpTime-complete, and then reducing satisfiability in the relevant logics to these problems. The automata models we introduce are two-way graded alternating parity automata over infinite trees (2GAPTs) and fully enriched automata (FEAs) over infinite forests. The former are a common generalization of two incomparable automata models from the literature. The latter extend alternating automata in a similar way as the fully enriched μ-calculus extends the standard μ-calculus.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 07:51:04 GMT" }, { "version": "v2", "created": "Mon, 22 Sep 2008 19:10:39 GMT" } ]
2015-07-01T00:00:00
[ [ "Bonatti", "Piero A.", "" ], [ "Lutz", "Carsten", "" ], [ "Murano", "Aniello", "" ], [ "Vardi", "Moshe Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0809.0400
Xuan Cai
Xuan Cai
Canonical Coin Systems for Change-Making Problems
7 pages
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Change-Making Problem is to represent a given value with the fewest coins under a given coin system. As a variation of the knapsack problem, it is known to be NP-hard. Nevertheless, in most real money systems, the greedy algorithm yields optimal solutions. In this paper, we study what type of coin systems that guarantee the optimality of the greedy algorithm. We provide new proofs for a sufficient and necessary condition for the so-called \emph{canonical} coin systems with four or five types of coins, and a sufficient condition for non-canonical coin systems, respectively. Moreover, we present an $O(m^2)$ algorithm that decides whether a tight coin system is canonical.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 11:04:19 GMT" }, { "version": "v2", "created": "Sat, 21 Mar 2009 16:12:55 GMT" } ]
2009-03-21T00:00:00
[ [ "Cai", "Xuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0809.0406
Martin Josef Geiger
Martin Josef Geiger
Foundations of the Pareto Iterated Local Search Metaheuristic
Proceedings of the 18th International Conference on Multiple Criteria Decision Making, Chania, Greece, June 19-23, 2006
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper describes the proposition and application of a local search metaheuristic for multi-objective optimization problems. It is based on two main principles of heuristic search, intensification through variable neighborhoods, and diversification through perturbations and successive iterations in favorable regions of the search space. The concept is successfully tested on permutation flow shop scheduling problems under multiple objectives. While the obtained results are encouraging in terms of their quality, another positive attribute of the approach is its' simplicity as it does require the setting of only very few parameters. The implementation of the Pareto Iterated Local Search metaheuristic is based on the MOOPPS computer system of local search heuristics for multi-objective scheduling which has been awarded the European Academic Software Award 2002 in Ronneby, Sweden (http://www.easa-award.net/, http://www.bth.se/llab/easa_2002.nsf)
[ { "version": "v1", "created": "Tue, 2 Sep 2008 11:29:45 GMT" } ]
2008-09-03T00:00:00
[ [ "Geiger", "Martin Josef", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0809.0410
Martin Josef Geiger
Martin Josef Geiger
A Computational Study of Genetic Crossover Operators for Multi-Objective Vehicle Routing Problem with Soft Time Windows
null
Habenicht, W. et al. (eds.): Multi-Criteria- und Fuzzy Systeme in Theorie und Praxis-Loesungsansaetze fuer Entscheidungsprobleme mit komplexen Zielsystemen, 2003, ISBN 3-8244-7864-1, pp. 191-207
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The article describes an investigation of the effectiveness of genetic algorithms for multi-objective combinatorial optimization (MOCO) by presenting an application for the vehicle routing problem with soft time windows. The work is motivated by the question, if and how the problem structure influences the effectiveness of different configurations of the genetic algorithm. Computational results are presented for different classes of vehicle routing problems, varying in their coverage with time windows, time window size, distribution and number of customers. The results are compared with a simple, but effective local search approach for multi-objective combinatorial optimization problems.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 11:39:52 GMT" } ]
2008-09-03T00:00:00
[ [ "Geiger", "Martin Josef", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0809.0416
Martin Josef Geiger
Martin Josef Geiger
Genetic Algorithms for multiple objective vehicle routing
null
Proceedings of the Metaheuristics International Conference MIC'2001, Porto, Portugal, pp. 349-353
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The talk describes a general approach of a genetic algorithm for multiple objective optimization problems. A particular dominance relation between the individuals of the population is used to define a fitness operator, enabling the genetic algorithm to adress even problems with efficient, but convex-dominated alternatives. The algorithm is implemented in a multilingual computer program, solving vehicle routing problems with time windows under multiple objectives. The graphical user interface of the program shows the progress of the genetic algorithm and the main parameters of the approach can be easily modified. In addition to that, the program provides powerful decision support to the decision maker. The software has proved it's excellence at the finals of the European Academic Software Award EASA, held at the Keble college/ University of Oxford/ Great Britain.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 12:08:56 GMT" } ]
2008-09-03T00:00:00
[ [ "Geiger", "Martin Josef", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0809.0417
Nirmal Thyagu N
Satyam Mukherjee, Neelima Gupte
Queue-length synchronization in a communication networks
13 Pages, 15 figures
Phys. Rev. E Vol. 79, 056105 (2009)
10.1103/PhysRevE.79.056105
null
physics.soc-ph cond-mat.stat-mech cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study synchronization in the context of network traffic on a $2-d$ communication network with local clustering and geographic separations. The network consists of nodes and randomly distributed hubs where the top five hubs ranked according to their coefficient of betweenness centrality (CBC) are connected by random assortative and gradient mechanisms. For multiple message traffic, messages can trap at the high CBC hubs, and congestion can build up on the network with long queues at the congested hubs. The queue lengths are seen to synchronize in the congested phase. Both complete and phase synchronization is seen, between pairs of hubs. In the decongested phase, the pairs start clearing, and synchronization is lost. A cascading master-slave relation is seen between the hubs, with the slower hubs (which are slow to decongest) driving the faster ones. These are usually the hubs of high CBC. Similar results are seen for traffic of constant density. Total synchronization between the hubs of high CBC is also seen in the congested regime. Similar behavior is seen for traffic on a network constructed using the Waxman random topology generator. We also demonstrate the existence of phase synchronization in real Internet traffic data.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 12:10:37 GMT" }, { "version": "v2", "created": "Sat, 22 Nov 2008 12:41:46 GMT" }, { "version": "v3", "created": "Wed, 20 May 2009 10:37:49 GMT" } ]
2015-05-13T00:00:00
[ [ "Mukherjee", "Satyam", "" ], [ "Gupte", "Neelima", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.0444
Gambs S\'ebastien
S\'ebastien Gambs
Quantum classification
Preliminary version, comments are welcome
null
null
null
quant-ph cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum classification is defined as the task of predicting the associated class of an unknown quantum state drawn from an ensemble of pure states given a finite number of copies of this state. By recasting the state discrimination problem within the framework of Machine Learning (ML), we can use the notion of learning reduction coming from classical ML to solve different variants of the classification task, such as the weighted binary and the multiclass versions.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 19:56:54 GMT" }, { "version": "v2", "created": "Tue, 2 Sep 2008 20:02:34 GMT" } ]
2016-08-14T00:00:00
[ [ "Gambs", "Sébastien", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0809.0448
Eric Engle
Eric Engle
The Stock Market as a Game: An Agent Based Approach to Trading in Stocks
21 pages and accompanying program
null
null
null
q-fin.TR cs.AI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Just as war is sometimes fallaciously represented as a zero sum game -- when in fact war is a negative sum game - stock market trading, a positive sum game over time, is often erroneously represented as a zero sum game. This is called the "zero sum fallacy" -- the erroneous belief that one trader in a stock market exchange can only improve their position provided some other trader's position deteriorates. However, a positive sum game in absolute terms can be recast as a zero sum game in relative terms. Similarly it appears that negative sum games in absolute terms have been recast as zero sum games in relative terms: otherwise, why would zero sum games be used to represent situations of war? Such recasting may have heuristic or pedagogic interest but recasting must be clearly explicited or risks generating confusion. Keywords: Game theory, stock trading and agent based AI.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 14:58:00 GMT" } ]
2008-12-02T00:00:00
[ [ "Engle", "Eric", "" ] ]
[ { "class": "Quantitative Finance", "code": "q-fin.TR", "description": "Market microstructure, liquidity, exchange and auction design, automated trading, agent-based modeling and market-making", "span": "(Trading and Market Microstructure)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0809.0458
Eric Engle
Eric Engle
Agent Models of Political Interactions
22 pages
null
null
null
cs.AI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Looks at state interactions from an agent based AI perspective to see state interactions as an example of emergent intelligent behavior. Exposes basic principles of game theory.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 16:06:40 GMT" } ]
2008-09-03T00:00:00
[ [ "Engle", "Eric", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0809.0460
Shipra Agrawal
Shipra Agrawal, Amin Saberi, Yinyu Ye
Stochastic Combinatorial Optimization under Probabilistic Constraints
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present approximation algorithms for combinatorial optimization problems under probabilistic constraints. Specifically, we focus on stochastic variants of two important combinatorial optimization problems: the k-center problem and the set cover problem, with uncertainty characterized by a probability distribution over set of points or elements to be covered. We consider these problems under adaptive and non-adaptive settings, and present efficient approximation algorithms for the case when underlying distribution is a product distribution. In contrast to the expected cost model prevalent in stochastic optimization literature, our problem definitions support restrictions on the probability distributions of the total costs, via incorporating constraints that bound the probability with which the incurred costs may exceed a given threshold.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 16:07:42 GMT" } ]
2008-09-03T00:00:00
[ [ "Agrawal", "Shipra", "" ], [ "Saberi", "Amin", "" ], [ "Ye", "Yinyu", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0809.0461
Eric Engle
Eric Engle
The Semiotic Machine
28 pages
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A semiotic model of the user interface in human-computer interaction. Algorithmic sign, semotics, algorithmic art.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 17:25:25 GMT" } ]
2008-09-03T00:00:00
[ [ "Engle", "Eric", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0809.0490
Alexander Gorban
A. N. Gorban, A. Y. Zinovyev
Principal Graphs and Manifolds
36 pages, 6 figures, minor corrections
Handbook of Research on Machine Learning Applications and Trends: Algorithms, Methods and Techniques, Ch. 2, Information Science Reference, 2009. 28-59
10.4018/978-1-60566-766-9
null
cs.LG cs.NE stat.ML
http://creativecommons.org/licenses/by/3.0/
In many physical, statistical, biological and other investigations it is desirable to approximate a system of points by objects of lower dimension and/or complexity. For this purpose, Karl Pearson invented principal component analysis in 1901 and found 'lines and planes of closest fit to system of points'. The famous k-means algorithm solves the approximation problem too, but by finite sets instead of lines and planes. This chapter gives a brief practical introduction into the methods of construction of general principal objects, i.e. objects embedded in the 'middle' of the multidimensional data set. As a basis, the unifying framework of mean squared distance approximation of finite datasets is selected. Principal graphs and manifolds are constructed as generalisations of principal components and k-means principal points. For this purpose, the family of expectation/maximisation algorithms with nearest generalisations is presented. Construction of principal graphs with controlled complexity is based on the graph grammar approach.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 18:04:53 GMT" }, { "version": "v2", "created": "Mon, 9 May 2011 13:23:08 GMT" } ]
2011-05-10T00:00:00
[ [ "Gorban", "A. N.", "" ], [ "Zinovyev", "A. Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0809.0494
Bruno Guillaume
Bruno Guillaume (INRIA Lorraine - LORIA), Guy Perrier (INRIA Lorraine - LORIA)
Interaction Grammars
null
null
null
RR-6621
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interaction Grammar (IG) is a grammatical formalism based on the notion of polarity. Polarities express the resource sensitivity of natural languages by modelling the distinction between saturated and unsaturated syntactic structures. Syntactic composition is represented as a chemical reaction guided by the saturation of polarities. It is expressed in a model-theoretic framework where grammars are constraint systems using the notion of tree description and parsing appears as a process of building tree description models satisfying criteria of saturation and minimality.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 18:37:01 GMT" } ]
2008-09-03T00:00:00
[ [ "Guillaume", "Bruno", "", "INRIA Lorraine - LORIA" ], [ "Perrier", "Guy", "", "INRIA Lorraine\n - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0809.0519
Haris Aziz
Haris Aziz
Complexity of comparison of influence of players in simple games
Latex, 13 pages, COMSOC-2008: 2nd International Workshop on Computational Social Choice
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coalitional voting games appear in different forms in multi-agent systems, social choice and threshold logic. In this paper, the complexity of comparison of influence between players in coalitional voting games is characterized. The possible representations of simple games considered are simple games represented by winning coalitions, minimal winning coalitions, weighted voting game or a multiple weighted voting game. The influence of players is gauged from the viewpoint of basic player types, desirability relations and classical power indices such as Shapley-Shubik index, Banzhaf index, Holler index, Deegan-Packel index and Chow parameters. Among other results, it is shown that for a simple game represented by minimal winning coalitions, although it is easy to verify whether a player has zero or one voting power, computing the Banzhaf value of the player is #P-complete. Moreover, it is proved that multiple weighted voting games are the only representations for which it is NP-hard to verify whether the game is linear or not. For a simple game with a set W^m of minimal winning coalitions and n players, a O(n.|W^m|+(n^2)log(n)) algorithm is presented which returns `no' if the game is non-linear and returns the strict desirability ordering otherwise. The complexity of transforming simple games into compact representations is also examined.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 21:20:27 GMT" } ]
2008-09-04T00:00:00
[ [ "Aziz", "Haris", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0809.0522
Mark Newman
M. E. J. Newman
The first-mover advantage in scientific publication
7 pages, 3 figures
Europhys. Lett. 86, 68001 (2009)
10.1209/0295-5075/86/68001
null
physics.soc-ph cs.DL cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mathematical models of the scientific citation process predict a strong "first-mover" effect under which the first papers in a field will, essentially regardless of content, receive citations at a rate enormously higher than papers published later. Moreover papers are expected to retain this advantage in perpetuity -- they should receive more citations indefinitely, no matter how many other papers are published after them. We test this conjecture against data from a selection of fields and in several cases find a first-mover effect of a magnitude similar to that predicted by the theory. Were we wearing our cynical hat today, we might say that the scientist who wants to become famous is better off -- by a wide margin -- writing a modest paper in next year's hottest field than an outstanding paper in this year's. On the other hand, there are some papers, albeit only a small fraction, that buck the trend and attract significantly more citations than theory predicts despite having relatively late publication dates. We suggest that papers of this kind, though they often receive comparatively few citations overall, are probably worthy of our attention.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 21:33:02 GMT" } ]
2013-10-31T00:00:00
[ [ "Newman", "M. E. J.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" } ]
0809.0524
Eric Engle
Eric Engle
Computer Art in the Former Soviet Bloc
28 pages
null
null
null
cs.MM cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Documents early computer art in the Soviet bloc and describes Marxist art theory.
[ { "version": "v1", "created": "Tue, 2 Sep 2008 21:48:28 GMT" } ]
2008-09-04T00:00:00
[ [ "Engle", "Eric", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0809.0533
Wei Ren
Wei Ren, Qing Zhao, Ananthram Swami
Power Control in Cognitive Radio Networks: How to Cross a Multi-Lane Highway
20 pages, 10 figures, to appear in IEEE Journal on Selected Areas in Communications (JSAC): Special Issue on Stochastic Geometry and Random Graphs for Wireless Networks
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider power control in cognitive radio networks where secondary users identify and exploit instantaneous and local spectrum opportunities without causing unacceptable interference to primary users. We qualitatively characterize the impact of the transmission power of secondary users on the occurrence of spectrum opportunities and the reliability of opportunity detection. Based on a Poisson model of the primary network, we quantify these impacts by showing that (i) the probability of spectrum opportunity decreases exponentially with respect to the transmission power of secondary users, where the exponential decay constant is given by the traffic load of primary users; (ii) reliable opportunity detection is achieved in the two extreme regimes in terms of the ratio between the transmission power of secondary users and that of primary users. Such analytical characterizations allow us to study power control for optimal transport throughput under constraints on the interference to primary users. Furthermore, we reveal the difference between detecting primary signals and detecting spectrum opportunities, and demonstrate the complex relationship between physical layer spectrum sensing and MAC layer throughput. The dependency of this PHY-MAC interaction on the application type and the use of handshake signaling such as RTS/CTS is illustrated.
[ { "version": "v1", "created": "Wed, 3 Sep 2008 07:40:19 GMT" }, { "version": "v2", "created": "Tue, 17 Mar 2009 00:32:11 GMT" } ]
2009-03-17T00:00:00
[ [ "Ren", "Wei", "" ], [ "Zhao", "Qing", "" ], [ "Swami", "Ananthram", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.0536
Minghua Xia
Minghua Xia, Wenkun Wen, and Soo-Chang Kim
How to Fully Exploit the Degrees of Freedom in the Downlink of MISO Systems With Opportunistic Beamforming
v2, revised Jan. 5, 2009. Few typo and error corrections, better clarification
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The opportunistic beamforming in the downlink of multiple-input single-output (MISO) systems forms $N$ transmit beams, usually, no more than the number of transmit antennas $N_t$. However, the degrees of freedom in this downlink is as large as $N_t^2$. That is, at most $N_t^2$ rather than only $N_t$ users can be simultaneously transmitted and thus the scheduling latency can be significantly reduced. In this paper, we focus on the opportunistic beamforming schemes with $N_t<N\le N_t^2$ transmit beams in the downlink of MISO systems over Rayleigh fading channels. We first show how to design the beamforming matrices with maximum number of transmit beams as well as least correlation between any pair of them as possible, through Fourier, Grassmannian, and mutually unbiased bases (MUB) based constructions in practice. Then, we analyze their system throughput by exploiting the asymptotic theory of extreme order statistics. Finally, our simulation results show the Grassmannian-based beamforming achieves the maximum throughput in all cases with $N_t=2$, 3, 4. However, if we want to exploit overall $N_t^2$ degrees of freedom, we shall resort to the Fourier and MUB-based constructions in the cases with $N_t=3$, 4, respectively.
[ { "version": "v1", "created": "Wed, 3 Sep 2008 07:59:12 GMT" }, { "version": "v2", "created": "Mon, 5 Jan 2009 11:30:02 GMT" } ]
2009-01-05T00:00:00
[ [ "Xia", "Minghua", "" ], [ "Wen", "Wenkun", "" ], [ "Kim", "Soo-Chang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.0539
Wiroonsak Santipach
Wiroonsak Santipach
Signature Quantization in Fading CDMA With Limited Feedback
null
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 59, NO. 2, PP. 569-577 FEBRUARY 2011
10.1109/TCOMM.2011.122110.090476
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we analyze the performance of a signature quantization scheme for reverse-link Direct Sequence (DS)- Code Division Multiple Access (CDMA). Assuming perfect estimates of the channel and interference covariance, the receiver selects the signature that minimizes interference power or maximizes signal-to-interference plus noise ratio (SINR) for a desired user from a signature codebook. The codebook index corresponding to the optimal signature is then relayed to the user with a finite number of bits via a feedback channel. Here we are interested in the performance of a Random Vector Quantization (RVQ) codebook, which contains independent isotropically distributed vectors. Assuming arbitrary transmit power allocation, we consider additive white Gaussian noise (AWGN) channel first with no fading and subsequently, with multipath fading. We derive the corresponding SINR in a large system limit at the output of matched filter and linear minimum mean squared error (MMSE) receiver. Numerical examples show that the derived large system results give a good approximation to the performance of finite-size system and that the MMSE receiver achieves close to a single-user performance with only one feedback bit per signature element.
[ { "version": "v1", "created": "Wed, 3 Sep 2008 02:17:32 GMT" }, { "version": "v2", "created": "Mon, 17 Aug 2009 03:29:37 GMT" }, { "version": "v3", "created": "Thu, 17 Feb 2011 12:51:14 GMT" } ]
2011-02-18T00:00:00
[ [ "Santipach", "Wiroonsak", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.0545
Ian Petersen
S. Z. Sayed Hassen, M. Heurs, E. H. Huntington, I. R. Petersen
Frequency Locking of an Optical Cavity using LQG Integral Control
18 pages, 9 figures
Journal of Physics B: Atomic, Molecular and Optical Physics, vol. 42, 175501, 2009
10.1088/0953-4075/42/17/175501
null
quant-ph cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the application of integral Linear Quadratic Gaussian (LQG) optimal control theory to a problem of cavity locking in quantum optics. The cavity locking problem involves controlling the error between the laser frequency and the resonant frequency of the cavity. A model for the cavity system, which comprises a piezo-electric actuator and an optical cavity is experimentally determined using a subspace identification method. An LQG controller which includes integral action is synthesized to stabilize the frequency of the cavity to the laser frequency and to reject low frequency noise. The controller is successfully implemented in the laboratory using a dSpace DSP board.
[ { "version": "v1", "created": "Wed, 3 Sep 2008 04:46:39 GMT" } ]
2015-05-13T00:00:00
[ [ "Hassen", "S. Z. Sayed", "" ], [ "Heurs", "M.", "" ], [ "Huntington", "E. H.", "" ], [ "Petersen", "I. R.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" } ]
0809.0600
Srikanth Radhakrishna
R. Srikanth
No-signaling, intractability and entanglement
19 pages, 2 figures, revtex4
null
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of deriving the no-signaling condition from the assumption that, as seen from a complexity theoretic perspective, the universe is not an exponential place. A fact that disallows such a derivation is the existence of {\em polynomial superluminal} gates, hypothetical primitive operations that enable superluminal signaling but not the efficient solution of intractable problems. It therefore follows, if this assumption is a basic principle of physics, either that it must be supplemented with additional assumptions to prohibit such gates, or, improbably, that no-signaling is not a universal condition. Yet, a gate of this kind is possibly implicit, though not recognized as such, in a decade-old quantum optical experiment involving position-momentum entangled photons. Here we describe a feasible modified version experiment that appears to explicitly demonstrate the action of this gate. Some obvious counter-claims are shown to be invalid. We believe that the unexpected possibility of polynomial superluminal operations arises because some practically measured quantum optical quantities are not describable as standard quantum mechanical observables.
[ { "version": "v1", "created": "Wed, 3 Sep 2008 11:10:36 GMT" }, { "version": "v2", "created": "Tue, 16 Sep 2008 17:15:43 GMT" }, { "version": "v3", "created": "Tue, 16 Jun 2009 14:06:14 GMT" } ]
2009-06-16T00:00:00
[ [ "Srikanth", "R.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0809.0610
Martin Josef Geiger
Martin Josef Geiger, Wolf Wenger
A framework for the interactive resolution of multi-objective vehicle routing problems
Proceedings of the 7th EU/ME Workshop: Adaptive, Self-Adaptive, and Multi-Level Metaheuristics, Malaga, Spain, November 16-17, 2006
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The article presents a framework for the resolution of rich vehicle routing problems which are difficult to address with standard optimization techniques. We use local search on the basis on variable neighborhood search for the construction of the solutions, but embed the techniques in a flexible framework that allows the consideration of complex side constraints of the problem such as time windows, multiple depots, heterogeneous fleets, and, in particular, multiple optimization criteria. In order to identify a compromise alternative that meets the requirements of the decision maker, an interactive procedure is integrated in the resolution of the problem, allowing the modification of the preference information articulated by the decision maker. The framework is prototypically implemented in a computer system. First results of test runs on multiple depot vehicle routing problems with time windows are reported.
[ { "version": "v1", "created": "Wed, 3 Sep 2008 12:22:08 GMT" } ]
2008-09-04T00:00:00
[ [ "Geiger", "Martin Josef", "" ], [ "Wenger", "Wolf", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0809.0635
Pavan Srinath
K. Pavan Srinath, B. Sundar Rajan
Low ML-Decoding Complexity, Large Coding Gain, Full-Rate, Full-Diversity STBCs for 2 X 2 and 4 X 2 MIMO Systems
28 pages, 5 figures, 3 tables, submitted to IEEE Journal of Selected Topics in Signal Processing
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper (Part of the content of this manuscript has been accepted for presentation in IEEE Globecom 2008, to be held in New Orleans) deals with low maximum likelihood (ML) decoding complexity, full-rate and full-diversity space-time block codes (STBCs), which also offer large coding gain, for the 2 transmit antenna, 2 receive antenna ($2\times 2$) and the 4 transmit antenna, 2 receive antenna ($4\times 2$) MIMO systems. Presently, the best known STBC for the $2\times2$ system is the Golden code and that for the $4\times2$ system is the DjABBA code. Following the approach by Biglieri, Hong and Viterbo, a new STBC is presented in this paper for the $2\times 2$ system. This code matches the Golden code in performance and ML-decoding complexity for square QAM constellations while it has lower ML-decoding complexity with the same performance for non-rectangular QAM constellations. This code is also shown to be \emph{information-lossless} and \emph{diversity-multiplexing gain} (DMG) tradeoff optimal. This design procedure is then extended to the $4\times 2$ system and a code, which outperforms the DjABBA code for QAM constellations with lower ML-decoding complexity, is presented. So far, the Golden code has been reported to have an ML-decoding complexity of the order of $M^4$ for square QAM of size $M$. In this paper, a scheme that reduces its ML-decoding complexity to $M^2\sqrt{M}$ is presented.
[ { "version": "v1", "created": "Wed, 3 Sep 2008 14:44:02 GMT" } ]
2008-09-04T00:00:00
[ [ "Srinath", "K. Pavan", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.0662
Martin Josef Geiger
Martin Josef Geiger, Sanja Petrovic
Improving Local Search for Fuzzy Scheduling Problems
null
Proceedings of the Post Graduate Research Conference in Electronics, Photonics, Communications & Networks and Computing Science PREP 2004, University of Hertfordshire, Great Britain, pp. 146-147
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The integration of fuzzy set theory and fuzzy logic into scheduling is a rather new aspect with growing importance for manufacturing applications, resulting in various unsolved aspects. In the current paper, we investigate an improved local search technique for fuzzy scheduling problems with fitness plateaus, using a multi criteria formulation of the problem. We especially address the problem of changing job priorities over time as studied at the Sherwood Press Ltd, a Nottingham based printing company, who is a collaborator on the project.
[ { "version": "v1", "created": "Wed, 3 Sep 2008 16:16:43 GMT" } ]
2008-09-04T00:00:00
[ [ "Geiger", "Martin Josef", "" ], [ "Petrovic", "Sanja", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0809.0676
Suresh Thippireddy
Suresh B. Thippireddy
Binary Random Sequences Obtained From Decimal Sequences
10 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a twist to the generation of binary random sequences by starting with decimal sequences. Rather than representing the prime reciprocal sequence directly in base 2, we first right the prime reciprocal in base 10 and then convert it into the binary form. The autocorrelation and cross-correlation properties of these binary random (BRD) sequences are discussed.
[ { "version": "v1", "created": "Wed, 3 Sep 2008 17:04:48 GMT" } ]
2008-09-04T00:00:00
[ [ "Thippireddy", "Suresh B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0809.0680
Paul Fodor
Paul Fodor, Adam Lally, David Ferrucci
The Prolog Interface to the Unstructured Information Management Architecture
null
null
null
null
cs.SE cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe the design and implementation of the Prolog interface to the Unstructured Information Management Architecture (UIMA) and some of its applications in natural language processing. The UIMA Prolog interface translates unstructured data and the UIMA Common Analysis Structure (CAS) into a Prolog knowledge base, over which, the developers write rules and use resolution theorem proving to search and generate new annotations over the unstructured data. These rules can explore all the previous UIMA annotations (such as, the syntactic structure, parsing statistics) and external Prolog knowledge bases (such as, Prolog WordNet and Extended WordNet) to implement a variety of tasks for the natural language analysis. We also describe applications of this logic programming interface in question analysis (such as, focus detection, answer-type and other constraints detection), shallow parsing (such as, relations in the syntactic structure), and answer selection.
[ { "version": "v1", "created": "Wed, 3 Sep 2008 17:38:32 GMT" } ]
2008-09-04T00:00:00
[ [ "Fodor", "Paul", "" ], [ "Lally", "Adam", "" ], [ "Ferrucci", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0809.0686
Animashree Anandkumar
Animashree Anandkumar, Joseph E. Yukich, Lang Tong, and Ananthram Swami
Energy Scaling Laws for Distributed Inference in Random Fusion Networks
IEEE JSAC on Stochastic Geometry and Random Graphs for Wireless Networks
vol. 27, no. 7, pp.1203-1217, Sept. 2009
10.1109/JSAC.2009.090916
null
cs.IT cs.NI math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The energy scaling laws of multihop data fusion networks for distributed inference are considered. The fusion network consists of randomly located sensors distributed i.i.d. according to a general spatial distribution in an expanding region. Among the class of data fusion schemes that enable optimal inference at the fusion center for Markov random field (MRF) hypotheses, the scheme with minimum average energy consumption is bounded below by average energy of fusion along the minimum spanning tree, and above by a suboptimal scheme, referred to as Data Fusion for Markov Random Fields (DFMRF). Scaling laws are derived for the optimal and suboptimal fusion policies. It is shown that the average asymptotic energy of the DFMRF scheme is finite for a class of MRF models.
[ { "version": "v1", "created": "Wed, 3 Sep 2008 18:06:05 GMT" }, { "version": "v2", "created": "Sun, 1 Feb 2009 21:18:34 GMT" }, { "version": "v3", "created": "Tue, 8 Jun 2010 23:01:46 GMT" } ]
2016-11-17T00:00:00
[ [ "Anandkumar", "Animashree", "" ], [ "Yukich", "Joseph E.", "" ], [ "Tong", "Lang", "" ], [ "Swami", "Ananthram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0809.0689
Matthias K\"oppe
Matthias K\"oppe, Christopher Thomas Ryan, Maurice Queyranne
Rational Generating Functions and Integer Programming Games
18 pages
Operations Research 59 (2011), no. 6, 1445-1460
10.1287/opre.1110.0964
null
cs.GT math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explore the computational complexity of computing pure Nash equilibria for a new class of strategic games called integer programming games with difference of piecewise linear convex payoffs. Integer programming games are games where players' action sets are integer points inside of polytopes. Using recent results from the study of short rational generating functions for encoding sets of integer points pioneered by Alexander Barvinok, we present efficient algorithms for enumerating all pure Nash equilibria, and other computations of interest, such as the pure price of anarchy, and pure threat point, when the dimension and number of "convex" linear pieces in the payoff functions are fixed. Sequential games where a leader is followed by competing followers (a Stackelberg--Nash setting) are also considered.
[ { "version": "v1", "created": "Wed, 3 Sep 2008 19:21:22 GMT" } ]
2017-01-03T00:00:00
[ [ "Köppe", "Matthias", "" ], [ "Ryan", "Christopher Thomas", "" ], [ "Queyranne", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0809.0692
Krzysztof Stanek
Krzysztof Zbigniew Stanek
How long should an astronomical paper be to increase its Impact?
11 pages, 5 figures
null
null
null
astro-ph cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Naively, one would expect longer papers to have larger impact (i.e., to be cited more). I tested this expectation by selecting all (~30,000) refereed papers from A&A, AJ, ApJ and MNRAS published between 2000 and 2004. These particular years were chosen so papers analyzed would not be too "fresh", but at the same time length of each article could be obtained via ADS. I find that indeed longer papers published in these four major astronomy journals are on average cited more, with a median number of citations increasing from 6 for articles 2-3 pages long to about 50 for articles ~50 pages long. I do however observe a significant "Letters effect", i.e. ApJ and A&A articles 4 pages long are cited more than articles 5-10 pages long. Also, the very few longest (>80 pages) papers are actually cited less than somewhat shorter papers. For individual journals, median citations per paper increase from 11 for ~9,300 A&A papers to 14 for ~5,300 MNRAS papers, 16 for ~2,550 AJ papers, and 20 for ~12,850 ApJ papers (including ApJ Letters and Supplement). I conclude with some semi-humorous career advice, directed especially at first-year graduate students.
[ { "version": "v1", "created": "Wed, 3 Sep 2008 20:00:03 GMT" } ]
2008-09-05T00:00:00
[ [ "Stanek", "Krzysztof Zbigniew", "" ] ]
[ null, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0809.0723
L.T. Handoko
Z. Akbar and L.T. Handoko
A Simple Mechanism for Focused Web-harvesting
6 pages, 4 figures, Proceeding of the International Conference on Advanced Computational Intelligence and Its Applications 2008
null
null
FISIKALIPI-08079
cs.IR cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The focused web-harvesting is deployed to realize an automated and comprehensive index databases as an alternative way for virtual topical data integration. The web-harvesting has been implemented and extended by not only specifying the targeted URLs, but also predefining human-edited harvesting parameters to improve the speed and accuracy. The harvesting parameter set comprises three main components. First, the depth-scale of being harvested final pages containing desired information counted from the first page at the targeted URLs. Secondly, the focus-point number to determine the exact box containing relevant information. Lastly, the combination of keywords to recognize encountered hyperlinks of relevant images or full-texts embedded in those final pages. All parameters are accessible and fully customizable for each target by the administrators of participating institutions over an integrated web interface. A real implementation to the Indonesian Scientific Index which covers all scientific information across Indonesia is also briefly introduced.
[ { "version": "v1", "created": "Wed, 3 Sep 2008 23:53:29 GMT" } ]
2008-09-05T00:00:00
[ [ "Akbar", "Z.", "" ], [ "Handoko", "L. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0809.0727
L.T. Handoko
I. Firmansyah, Z. Akbar, B. Hermanto and L.T. Handoko
Microcontroller-based System for Modular Networked Robot
6 pages, 5 figures, Proceeding of the 2008 International Conference on Advanced Computational Intelligence and Its Applications
null
null
FISIKALIPI-08077
cs.RO cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A prototype of modular networked robot for autonomous monitoring works with full control over web through wireless connection has been developed. The robot is equipped with a particular set of built-in analyzing tools and appropriate censors, depending on its main purposes, to enable self-independent and real-time data acquisition and processing. The paper is focused on the microcontroller-based system to realize the modularity. The whole system is divided into three modules : main unit, data acquisition and data processing, while the analyzed results and all aspects of control and monitoring systems are fully accessible over an integrated web-interface. This concept leads to some unique features : enhancing flexibility due to enabling partial replacement of the modules according to user needs, easy access over web for remote users, and low development and maintenance cost due to software dominated components.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 00:13:11 GMT" } ]
2008-09-05T00:00:00
[ [ "Firmansyah", "I.", "" ], [ "Akbar", "Z.", "" ], [ "Hermanto", "B.", "" ], [ "Handoko", "L. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0809.0728
Wenyi Zhang
Wenyi Zhang, Urbashi Mitra
A Spectrum-Shaping Perspective on Cognitive Radio
To appear in DySPAN'08
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new perspective on cognitive radio is presented, where the pre-existent legacy service is either uncoded or coded and a pair of cognitive transceivers need be appropriately deployed to coexist with the legacy service. The basic idea underlying the new perspective is to exploit the fact that, typically, the legacy channel is not fully loaded by the legacy service, thus leaving a non-negligible margin to accommodate the cognitive transmission. The exploitation of such a load margin is optimized by shaping the spectrum of the transmitted cognitive signal. It is shown that non-trivial coexistence of legacy and cognitive systems is possible even without sharing the legacy message with the cognitive transmitter. Surprisingly, the optimized cognitive transmitter is no longer limited by its interference power at the legacy receiver, and can always transmit at its full available device power. Analytical development and numerical illustration are presented, in particular focusing on the logarithmic growth rate, {\it i.e.}, the prelog coefficient, of cognitive transmission in the high-power regime.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 00:50:20 GMT" } ]
2008-09-05T00:00:00
[ [ "Zhang", "Wenyi", "" ], [ "Mitra", "Urbashi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.0733
Masaaki Harada
Masaaki Harada and Akihiro Munemasa
There exists no self-dual [24,12,10] code over F5
To appear in Designs, Codes and Cryptogr
Designs, Codes and Cryptogr. 52 (2009), 125-127
null
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Self-dual codes over F5 exist for all even lengths. The smallest length for which the largest minimum weight among self-dual codes has not been determined is 24, and the largest minimum weight is either 9 or 10. In this note, we show that there exists no self-dual [24,12,10] code over F5, using the classification of 24-dimensional odd unimodular lattices due to Borcherds.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 02:17:12 GMT" }, { "version": "v2", "created": "Fri, 6 Mar 2009 07:37:52 GMT" } ]
2012-05-28T00:00:00
[ [ "Harada", "Masaaki", "" ], [ "Munemasa", "Akihiro", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.0737
Lav Varshney
Lav R. Varshney, Julius Kusuma, and Vivek K Goyal
Malleable Coding with Fixed Reuse
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In cloud computing, storage area networks, remote backup storage, and similar settings, stored data is modified with updates from new versions. Representing information and modifying the representation are both expensive. Therefore it is desirable for the data to not only be compressed but to also be easily modified during updates. A malleable coding scheme considers both compression efficiency and ease of alteration, promoting codeword reuse. We examine the trade-off between compression efficiency and malleability cost-the difficulty of synchronizing compressed versions-measured as the length of a reused prefix portion. Through a coding theorem, the region of achievable rates and malleability is expressed as a single-letter optimization. Relationships to common information problems are also described.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 02:41:25 GMT" }, { "version": "v2", "created": "Mon, 9 May 2011 21:55:40 GMT" } ]
2011-05-11T00:00:00
[ [ "Varshney", "Lav R.", "" ], [ "Kusuma", "Julius", "" ], [ "Goyal", "Vivek K", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.0745
Rayan Saab
Rayan Saab, Ozgur Yilmaz
Sparse Recovery by Non-convex Optimization -- Instance Optimality
32 pages, 4 figures v2
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note, we address the theoretical properties of $\Delta_p$, a class of compressed sensing decoders that rely on $\ell^p$ minimization with 0<p<1 to recover estimates of sparse and compressible signals from incomplete and inaccurate measurements. In particular, we extend the results of Candes, Romberg and Tao, and Wojtaszczyk regarding the decoder $\Delta_1$, based on $\ell^1$ minimization, to $\Delta_p$ with 0<p<1. Our results are two-fold. First, we show that under certain sufficient conditions that are weaker than the analogous sufficient conditions for $\Delta_1$ the decoders $\Delta_p$ are robust to noise and stable in the sense that they are (2,p) instance optimal for a large class of encoders. Second, we extend the results of Wojtaszczyk to show that, like $\Delta_1$, the decoders $\Delta_p$ are (2,2) instance optimal in probability provided the measurement matrix is drawn from an appropriate distribution.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 04:24:32 GMT" }, { "version": "v2", "created": "Mon, 10 Aug 2009 11:21:36 GMT" } ]
2009-08-10T00:00:00
[ [ "Saab", "Rayan", "" ], [ "Yilmaz", "Ozgur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.0753
Martin Josef Geiger
Martin Josef Geiger
Proposition of the Interactive Pareto Iterated Local Search Procedure - Elements and Initial Experiments
null
The Fourth International Conference on Evolutionary Multi-Criterion Optimization: Late Breaking Papers, Matsushima, Japan, March 2007, pp. 19-23
null
null
cs.AI cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The article presents an approach to interactively solve multi-objective optimization problems. While the identification of efficient solutions is supported by computational intelligence techniques on the basis of local search, the search is directed by partial preference information obtained from the decision maker. An application of the approach to biobjective portfolio optimization, modeled as the well-known knapsack problem, is reported, and experimental results are reported for benchmark instances taken from the literature. In brief, we obtain encouraging results that show the applicability of the approach to the described problem.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 06:52:16 GMT" } ]
2008-09-05T00:00:00
[ [ "Geiger", "Martin Josef", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0809.0755
Martin Josef Geiger
Martin Josef Geiger
Bin Packing Under Multiple Objectives - a Heuristic Approximation Approach
null
The Fourth International Conference on Evolutionary Multi-Criterion Optimization: Late Breaking Papers, Matsushima, Japan, March 2007, pp. 53-56
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The article proposes a heuristic approximation approach to the bin packing problem under multiple objectives. In addition to the traditional objective of minimizing the number of bins, the heterogeneousness of the elements in each bin is minimized, leading to a biobjective formulation of the problem with a tradeoff between the number of bins and their heterogeneousness. An extension of the Best-Fit approximation algorithm is presented to solve the problem. Experimental investigations have been carried out on benchmark instances of different size, ranging from 100 to 1000 items. Encouraging results have been obtained, showing the applicability of the heuristic approach to the described problem.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 07:02:29 GMT" } ]
2008-09-05T00:00:00
[ [ "Geiger", "Martin Josef", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0809.0757
Martin Josef Geiger
Martin Josef Geiger
An application of the Threshold Accepting metaheuristic for curriculum based course timetabling
null
Proceedings of the 7th International Conference on the Practice and Theory of Automated Timetabling PATAT 2008, August 19-22, Montreal, Canada
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The article presents a local search approach for the solution of timetabling problems in general, with a particular implementation for competition track 3 of the International Timetabling Competition 2007 (ITC 2007). The heuristic search procedure is based on Threshold Accepting to overcome local optima. A stochastic neighborhood is proposed and implemented, randomly removing and reassigning events from the current solution. The overall concept has been incrementally obtained from a series of experiments, which we describe in each (sub)section of the paper. In result, we successfully derived a potential candidate solution approach for the finals of track 3 of the ITC 2007.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 07:12:02 GMT" } ]
2008-10-02T00:00:00
[ [ "Geiger", "Martin Josef", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0809.0788
Hubie Chen
Manuel Bodirsky and Hubie Chen
Peek Arc Consistency
null
null
null
null
cs.AI cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies peek arc consistency, a reasoning technique that extends the well-known arc consistency technique for constraint satisfaction. In contrast to other more costly extensions of arc consistency that have been studied in the literature, peek arc consistency requires only linear space and quadratic time and can be parallelized in a straightforward way such that it runs in linear time with a linear number of processors. We demonstrate that for various constraint languages, peek arc consistency gives a polynomial-time decision procedure for the constraint satisfaction problem. We also present an algebraic characterization of those constraint languages that can be solved by peek arc consistency, and study the robustness of the algorithm.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 11:15:50 GMT" }, { "version": "v2", "created": "Fri, 3 Feb 2012 18:53:00 GMT" } ]
2015-03-13T00:00:00
[ [ "Bodirsky", "Manuel", "" ], [ "Chen", "Hubie", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0809.0833
Fabien Mathieu
Fabien Mathieu (INRIA Rocquencourt, FT R&D, INRIA Rocquencourt), Gheorghe Postelnicu, Julien Reynier (INRIA Rocquencourt)
The stable configuration in acyclic preference-based systems
null
null
null
RR-6628
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Acyclic preferences recently appeared as an elegant way to model many distributed systems. An acyclic instance admits a unique stable configuration, which can reveal the performance of the system. In this paper, we give the statistical properties of the stable configuration for three classes of acyclic preferences: node-based preferences, distance-based preferences, and random acyclic systems. Using random overlay graphs, we prove using mean-field and fluid-limit techniques that these systems have an asymptotically continuous independent rank distribution for a proper scaling, and the analytical solution is compared to simulations. These results provide a theoretical ground for validating the performance of bandwidth-based or proximity-based unstructured systems.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 15:12:00 GMT" } ]
2008-09-05T00:00:00
[ [ "Mathieu", "Fabien", "", "INRIA Rocquencourt, FT R&D, INRIA Rocquencourt" ], [ "Postelnicu", "Gheorghe", "", "INRIA Rocquencourt" ], [ "Reynier", "Julien", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.0835
Tobias Friedrich
Karl Bringmann and Tobias Friedrich
Approximating the volume of unions and intersections of high-dimensional geometric objects
16 pages, To appear in Computational Geometry - Theory and Applications
Computational Geometry: Theory and Applications, Vol. 43, No. 6-7, pages 601-610, 2010
10.1016/j.comgeo.2010.03.004
null
cs.CG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the computation of the volume of the union of high-dimensional geometric objects. While showing that this problem is #P-hard already for very simple bodies (i.e., axis-parallel boxes), we give a fast FPRAS for all objects where one can: (1) test whether a given point lies inside the object, (2) sample a point uniformly, (3) calculate the volume of the object in polynomial time. All three oracles can be weak, that is, just approximate. This implies that Klee's measure problem and the hypervolume indicator can be approximated efficiently even though they are #P-hard and hence cannot be solved exactly in time polynomial in the number of dimensions unless P=NP. Our algorithm also allows to approximate efficiently the volume of the union of convex bodies given by weak membership oracles. For the analogous problem of the intersection of high-dimensional geometric objects we prove #P-hardness for boxes and show that there is no multiplicative polynomial-time $2^{d^{1-\epsilon}}$-approximation for certain boxes unless NP=BPP, but give a simple additive polynomial-time $\epsilon$-approximation.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 16:14:09 GMT" }, { "version": "v2", "created": "Sun, 14 Mar 2010 03:26:40 GMT" } ]
2010-06-09T00:00:00
[ [ "Bringmann", "Karl", "" ], [ "Friedrich", "Tobias", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0809.0840
Sergei Chekanov V.
S.Chekanov
HEP data analysis using jHepWork and Java
5 pages, Proceedings of the HERA-LHC workshops (2007-2008), DESY-CERN
null
null
ANL-HEP-CP-08-53
cs.CE hep-ex hep-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A role of Java in high-energy physics and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 15:33:23 GMT" }, { "version": "v2", "created": "Mon, 9 Feb 2009 19:17:26 GMT" } ]
2009-02-09T00:00:00
[ [ "Chekanov", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "hep-ex", "description": "Description coming soon", "span": "(High Energy Physics - Experiment)" }, { "class": "Physics", "code": "hep-ph", "description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.", "span": "(High Energy Physics - Phenomenology)" } ]
0809.0853
XuanLong Nguyen
XuanLong Nguyen, Martin J. Wainwright, Michael I. Jordan
Estimating divergence functionals and the likelihood ratio by convex risk minimization
28 pages
IEEE Transactions on Information Theory, 56(11), 5847--5861, 2010
10.1109/TIT.2010.2068870
null
math.ST cs.IT math.IT stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop and analyze $M$-estimation methods for divergence functionals and the likelihood ratios of two probability distributions. Our method is based on a non-asymptotic variational characterization of $f$-divergences, which allows the problem of estimating divergences to be tackled via convex empirical risk optimization. The resulting estimators are simple to implement, requiring only the solution of standard convex programs. We present an analysis of consistency and convergence for these estimators. Given conditions only on the ratios of densities, we show that our estimators can achieve optimal minimax rates for the likelihood ratio and the divergence functionals in certain regimes. We derive an efficient optimization algorithm for computing our estimates, and illustrate their convergence behavior and practical viability by simulations.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 16:44:14 GMT" }, { "version": "v2", "created": "Wed, 22 Apr 2009 19:36:18 GMT" } ]
2016-11-18T00:00:00
[ [ "Nguyen", "XuanLong", "" ], [ "Wainwright", "Martin J.", "" ], [ "Jordan", "Michael I.", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0809.0874
Fionn Murtagh
Fionn Murtagh
Between the Information Economy and Student Recruitment: Present Conjuncture and Future Prospects
18 pages, 4 figures
CEPIS UPGRADE, vol. IX, no. 5, pp. 56-64, Oct. 2008
null
null
cs.CY cs.GL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In university programs and curricula, in general we react to the need to meet market needs. We respond to market stimulus, or at least try to do so. Consider now an inverted view. Consider our data and perspectives in university programs as reflecting and indeed presaging economic trends. In this article I pursue this line of thinking. I show how various past events fit very well into this new view. I provide explanation for why some technology trends happened as they did, and why some current developments are important now.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 18:17:05 GMT" } ]
2008-12-21T00:00:00
[ [ "Murtagh", "Fionn", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
0809.0884
John Risch
John S. Risch
On the role of metaphor in information visualization
20 pages, with figures
null
null
null
cs.HC cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The concept of metaphor, in particular graphical (or visual) metaphor, is central to the field of information visualization. Information graphics and interactive information visualization systems employ a variety of metaphorical devices to make abstract, complex, voluminous, or otherwise difficult-to-comprehend information understandable in graphical terms. This paper explores the use of metaphor in information visualization, advancing the theory previously argued by Johnson, Lakoff, Tversky et al. that many information graphics are metaphorically understood in terms of cognitively entrenched spatial patterns known as image schemas. These patterns serve to structure and constrain abstract reasoning processes via metaphorical projection operations that are grounded in everyday perceptual experiences with phenomena such as containment, movement, and force dynamics. Building on previous research, I argue that information graphics promote comprehension of their target information through the use of graphical patterns that invoke these preexisting schematic structures. I further theorize that the degree of structural alignment of a particular graphic with one or more corresponding image schemas accounts for its perceived degree of intuitiveness. Accordingly, image schema theory can provide a powerful explanatory and predictive framework for visualization research. I review relevant theories of analogy and metaphor, and discuss the image schematic properties of several common types of information graphic. I conclude with the proposal that the inventory of image schemas culled from linguistic studies can serve as the basis for an inventory of design elements suitable for developing intuitive and effective new information visualization techniques.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 19:55:40 GMT" } ]
2009-09-29T00:00:00
[ [ "Risch", "John S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0809.0908
Xudong Ma
Xudong Ma
Reduced Complexity Demodulation and Equalization Scheme for Differential Impulse Radio UWB Systems with ISI
Camera ready version. Several typos in the previous version have been fixed
Proceeding of the IEEE Sarnoff Symposium, Princeton NJ, March 30 - April 1, 2009
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the demodulation and equalization problem of differential Impulse Radio (IR) Ultra-WideBand (UWB) Systems with Inter-Symbol-Interference (ISI). The differential IR UWB systems have been extensively discussed recently. The advantage of differential IR UWB systems include simple receiver frontend structure. One challenge in the demodulation and equalization of such systems with ISI is that the systems have a rather complex model. The input and output signals of the systems follow a second-order Volterra model. Furthermore, the noise at the output is data dependent. In this paper, we propose a reduced-complexity joint demodulation and equalization algorithm. The algorithm is based on reformulating the nearest neighborhood decoding problem into a mixed quadratic programming and utilizing a semi-definite relaxation. The numerical results show that the proposed demodulation and equalization algorithm has low computational complexity, and at the same time, has almost the same error probability performance compared with the maximal likelihood decoding algorithm.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 20:52:32 GMT" }, { "version": "v2", "created": "Mon, 2 Mar 2009 20:19:21 GMT" } ]
2009-03-02T00:00:00
[ [ "Ma", "Xudong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.0916
Konstantin S. Turitsyn
Konstantin S. Turitsyn, Michael Chertkov, Marija Vucelja
Irreversible Monte Carlo Algorithms for Efficient Sampling
4 pages, 2 figures
null
10.1016/j.physd.2010.10.003
null
cond-mat.stat-mech cs.IT math.IT math.PR stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Equilibrium systems evolve according to Detailed Balance (DB). This principe guided development of the Monte-Carlo sampling techniques, of which Metropolis-Hastings (MH) algorithm is the famous representative. It is also known that DB is sufficient but not necessary. We construct irreversible deformation of a given reversible algorithm capable of dramatic improvement of sampling from known distribution. Our transformation modifies transition rates keeping the structure of transitions intact. To illustrate the general scheme we design an Irreversible version of Metropolis-Hastings (IMH) and test it on example of a spin cluster. Standard MH for the model suffers from the critical slowdown, while IMH is free from critical slowdown.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 21:10:24 GMT" }, { "version": "v2", "created": "Tue, 23 Sep 2008 15:43:44 GMT" } ]
2015-07-15T00:00:00
[ [ "Turitsyn", "Konstantin S.", "" ], [ "Chertkov", "Michael", "" ], [ "Vucelja", "Marija", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0809.0918
N. Prasanth Anthapadmanabhan
N. Prasanth Anthapadmanabhan and Armand M. Makowski
Intersecting random graphs and networks with multiple adjacency constraints: A simple example
Submitted to IEEE JSAC issue on Stochastic Geometry and Random Graphs for Wireless Networks
null
null
null
cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When studying networks using random graph models, one is sometimes faced with situations where the notion of adjacency between nodes reflects multiple constraints. Traditional random graph models are insufficient to handle such situations. A simple idea to account for multiple constraints consists in taking the intersection of random graphs. In this paper we initiate the study of random graphs so obtained through a simple example. We examine the intersection of an Erdos-Renyi graph and of one-dimensional geometric random graphs. We investigate the zero-one laws for the property that there are no isolated nodes. When the geometric component is defined on the unit circle, a full zero-one law is established and we determine its critical scaling. When the geometric component lies in the unit interval, there is a gap in that the obtained zero and one laws are found to express deviations from different critical scalings. In particular, the first moment method requires a larger critical scaling than in the unit circle case in order to obtain the one law. This discrepancy is somewhat surprising given that the zero-one laws for the absence of isolated nodes are identical in the geometric random graphs on both the unit interval and unit circle.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 21:13:14 GMT" } ]
2008-09-10T00:00:00
[ [ "Anthapadmanabhan", "N. Prasanth", "" ], [ "Makowski", "Armand M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0809.0922
Matthias Horbach
Matthias Horbach, Christoph Weidenbach
Superposition for Fixed Domains
34 pages; to appear in ACM Transactions on Computational Logic
null
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Superposition is an established decision procedure for a variety of first-order logic theories represented by sets of clauses. A satisfiable theory, saturated by superposition, implicitly defines a minimal term-generated model for the theory. Proving universal properties with respect to a saturated theory directly leads to a modification of the minimal model's term-generated domain, as new Skolem functions are introduced. For many applications, this is not desired. Therefore, we propose the first superposition calculus that can explicitly represent existentially quantified variables and can thus compute with respect to a given domain. This calculus is sound and refutationally complete in the limit for a first-order fixed domain semantics. For saturated Horn theories and classes of positive formulas, we can even employ the calculus to prove properties of the minimal model itself, going beyond the scope of known superposition-based approaches.
[ { "version": "v1", "created": "Thu, 4 Sep 2008 21:58:58 GMT" }, { "version": "v2", "created": "Thu, 27 Aug 2009 11:40:16 GMT" }, { "version": "v3", "created": "Mon, 30 Nov 2009 12:43:51 GMT" } ]
2009-11-30T00:00:00
[ [ "Horbach", "Matthias", "" ], [ "Weidenbach", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0809.0949
Michael Baer
Michael B. Baer
Efficient Implementation of the Generalized Tunstall Code Generation Algorithm
5 pages, 5 figures, accepted to ISIT 2009
null
null
null
cs.IT cs.DS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A method is presented for constructing a Tunstall code that is linear time in the number of output items. This is an improvement on the state of the art for non-Bernoulli sources, including Markov sources, which require a (suboptimal) generalization of Tunstall's algorithm proposed by Savari and analytically examined by Tabus and Rissanen. In general, if n is the total number of output leaves across all Tunstall trees, s is the number of trees (states), and D is the number of leaves of each internal node, then this method takes O((1+(log s)/D) n) time and O(n) space.
[ { "version": "v1", "created": "Fri, 5 Sep 2008 05:14:10 GMT" }, { "version": "v2", "created": "Thu, 30 Apr 2009 19:58:44 GMT" }, { "version": "v3", "created": "Fri, 8 May 2009 00:10:57 GMT" } ]
2009-05-08T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.0961
Martin Josef Geiger
Martin Josef Geiger
MOOPPS: An Optimization System for Multi Objective Scheduling
null
Proceedings of the Metaheuristics International Conference MIC 2005, Vienna, Austria, pp. 403-408
null
null
cs.AI cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the current paper, we present an optimization system solving multi objective production scheduling problems (MOOPPS). The identification of Pareto optimal alternatives or at least a close approximation of them is possible by a set of implemented metaheuristics. Necessary control parameters can easily be adjusted by the decision maker as the whole software is fully menu driven. This allows the comparison of different metaheuristic algorithms for the considered problem instances. Results are visualized by a graphical user interface showing the distribution of solutions in outcome space as well as their corresponding Gantt chart representation. The identification of a most preferred solution from the set of efficient solutions is supported by a module based on the aspiration interactive method (AIM). The decision maker successively defines aspiration levels until a single solution is chosen. After successfully competing in the finals in Ronneby, Sweden, the MOOPPS software has been awarded the European Academic Software Award 2002 (http://www.bth.se/llab/easa_2002.nsf)
[ { "version": "v1", "created": "Fri, 5 Sep 2008 06:22:36 GMT" } ]
2008-09-08T00:00:00
[ [ "Geiger", "Martin Josef", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0809.1017
Peter Grunwald
Peter Grunwald
Entropy Concentration and the Empirical Coding Game
A somewhat modified version of this paper was published in Statistica Neerlandica 62(3), pages 374-392, 2008
null
null
null
cs.IT cs.LG math.IT math.ST stat.ME stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a characterization of Maximum Entropy/Minimum Relative Entropy inference by providing two `strong entropy concentration' theorems. These theorems unify and generalize Jaynes' `concentration phenomenon' and Van Campenhout and Cover's `conditional limit theorem'. The theorems characterize exactly in what sense a prior distribution Q conditioned on a given constraint, and the distribution P, minimizing the relative entropy D(P ||Q) over all distributions satisfying the constraint, are `close' to each other. We then apply our theorems to establish the relationship between entropy concentration and a game-theoretic characterization of Maximum Entropy Inference due to Topsoe and others.
[ { "version": "v1", "created": "Fri, 5 Sep 2008 12:18:15 GMT" } ]
2008-09-17T00:00:00
[ [ "Grunwald", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0809.1019
Sergey Andreyev
Sergey Andreyev
Moving and resizing of the screen objects
17 pages, 13 figures
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The shape and size of the objects, which we see on the screen, when the application is running, are defined at the design time. By using some sort of adaptive interface, developers give users a chance to resize these objects or on rare occasion even change, but all these changes are predetermined by a developer; user can't go out of the designer's scenario. Making each and all elements moveable / resizable and giving users the full control of these processes, changes the whole idea of applications; programs become user-driven and significantly increase the effectiveness of users' work. This article is about the instrument to turn any screen object into moveable / resizable.
[ { "version": "v1", "created": "Fri, 5 Sep 2008 12:59:06 GMT" } ]
2008-09-08T00:00:00
[ [ "Andreyev", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0809.1039
Petros Elia
Somsak Kittipiyakul, Petros Elia, and Tara Javidi
High-SNR Analysis of Outage-Limited Communications with Bursty and Delay-Limited Information
16 pages, 5 figures, to appear in IEEE Trans. Inf. Theory
null
10.1109/TIT.2008.2010005
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work analyzes the high-SNR asymptotic error performance of outage-limited communications with fading, where the number of bits that arrive at the transmitter during any time slot is random but the delivery of bits at the receiver must adhere to a strict delay limitation. Specifically, bit errors are caused by erroneous decoding at the receiver or violation of the strict delay constraint. Under certain scaling of the statistics of the bit-arrival process with SNR, this paper shows that the optimal decay behavior of the asymptotic total probability of bit error depends on how fast the burstiness of the source scales down with SNR. If the source burstiness scales down too slowly, the total probability of error is asymptotically dominated by delay-violation events. On the other hand, if the source burstiness scales down too quickly, the total probability of error is asymptotically dominated by channel-error events. However, at the proper scaling, where the burstiness scales linearly with 1/sqrt(log SNR) and at the optimal coding duration and transmission rate, the occurrences of channel errors and delay-violation errors are asymptotically balanced. In this latter case, the optimal exponent of the total probability of error reveals a tradeoff that addresses the question of how much of the allowable time and rate should be used for gaining reliability over the channel and how much for accommodating the burstiness with delay constraints.
[ { "version": "v1", "created": "Fri, 5 Sep 2008 15:37:03 GMT" } ]
2016-11-17T00:00:00
[ [ "Kittipiyakul", "Somsak", "" ], [ "Elia", "Petros", "" ], [ "Javidi", "Tara", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.1043
Marco Dalai
Marco Dalai, Riccardo Leonardi
On Unique Decodability
Accepted for publication, IEEE Transactions on Information Theory
null
10.1109/TIT.2008.929941
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a revisitation of the topic of unique decodability and of some fundamental theorems of lossless coding. It is widely believed that, for any discrete source X, every "uniquely decodable" block code satisfies E[l(X_1 X_2 ... X_n)]>= H(X_1,X_2,...,X_n), where X_1, X_2,...,X_n are the first n symbols of the source, E[l(X_1 X_2 ... X_n)] is the expected length of the code for those symbols and H(X_1,X_2,...,X_n) is their joint entropy. We show that, for certain sources with memory, the above inequality only holds when a limiting definition of "uniquely decodable code" is considered. In particular, the above inequality is usually assumed to hold for any "practical code" due to a debatable application of McMillan's theorem to sources with memory. We thus propose a clarification of the topic, also providing an extended version of McMillan's theorem to be used for Markovian sources.
[ { "version": "v1", "created": "Fri, 5 Sep 2008 15:06:37 GMT" } ]
2016-11-17T00:00:00
[ [ "Dalai", "Marco", "" ], [ "Leonardi", "Riccardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.1053
Daniil Ryabko
Daniil Ryabko (INRIA Lille - Nord Europe)
An impossibility result for process discrimination
null
null
null
null
math.PR cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two series of binary observations $x_1,x_1,...$ and $y_1,y_2,...$ are presented: at each time $n\in\N$ we are given $x_n$ and $y_n$. It is assumed that the sequences are generated independently of each other by two B-processes. We are interested in the question of whether the sequences represent a typical realization of two different processes or of the same one. We demonstrate that this is impossible to decide, in the sense that every discrimination procedure is bound to err with non-negligible frequency when presented with sequences from some B-processes. This contrasts earlier positive results on B-processes, in particular those showing that there are consistent $\bar d$-distance estimates for this class of processes.
[ { "version": "v1", "created": "Fri, 5 Sep 2008 15:28:08 GMT" }, { "version": "v2", "created": "Mon, 12 Jan 2009 14:33:40 GMT" }, { "version": "v3", "created": "Sun, 10 May 2009 05:49:18 GMT" }, { "version": "v4", "created": "Fri, 10 Jul 2009 09:41:45 GMT" } ]
2009-07-10T00:00:00
[ [ "Ryabko", "Daniil", "", "INRIA Lille - Nord Europe" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0809.1061
Massimiliano Laddomada Ph.D.
M. Laddomada, F. Mesiti, M. Mondin, and F. Daneshgaran
A Novel Proportional Fairness Criterion for Throughput Allocation in Multirate IEEE 802.11
Submitted to IEEE Transaction on Wireless Communications, September 2008
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper focuses on multirate IEEE 802.11 Wireless LAN employing the mandatory Distributed Coordination Function (DCF) option. Its aim is threefold. Upon starting from the multi-dimensional Markovian state transition model proposed by Malone \textit{et.al.} for characterizing the behavior of the IEEE 802.11 protocol at the Medium Access Control layer, it presents an extension accounting for packet transmission failures due to channel errors. Second, it establishes the conditions under which a network constituted by $N$ stations, each station transmitting with its own bit rate, $R^{(s)}_d$, and packet rate, $\lambda_s$, can be assumed loaded. Finally, it proposes a modified Proportional Fairness (PF) criterion, suitable for mitigating the \textit{rate anomaly} problem of multirate loaded IEEE 802.11 Wireless LANs, employing the mandatory DCF option. Compared to the widely adopted assumption of saturated network, the proposed fairness criterion can be applied to general loaded networks. The throughput allocation resulting from the proposed algorithm is able to greatly increase the aggregate throughput of the DCF, while ensuring fairness levels among the stations of the same order as the ones guaranteed by the classical PF criterion. Simulation results are presented for some sample scenarios, confirming the effectiveness of the proposed criterion for optimized throughput allocation.
[ { "version": "v1", "created": "Fri, 5 Sep 2008 15:43:14 GMT" } ]
2008-09-08T00:00:00
[ [ "Laddomada", "M.", "" ], [ "Mesiti", "F.", "" ], [ "Mondin", "M.", "" ], [ "Daneshgaran", "F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0809.1077
Martin Josef Geiger
Martin Josef Geiger, Wolf Wenger
Variable Neighborhood Search for the University Lecturer-Student Assignment Problem
Proceedings of the 18th Mini Euro Conference on Variable Neighborhood Search, November 23-25, 2005, Puerto de La Cruz, Tenerife, Spain, ISBN 84-689-5679-1
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a study of local search heuristics in general and variable neighborhood search in particular for the resolution of an assignment problem studied in the practical work of universities. Here, students have to be assigned to scientific topics which are proposed and supported by members of staff. The problem involves the optimization under given preferences of students which may be expressed when applying for certain topics. It is possible to observe that variable neighborhood search leads to superior results for the tested problem instances. One instance is taken from an actual case, while others have been generated based on the real world data to support the analysis with a deeper analysis. An extension of the problem has been formulated by integrating a second objective function that simultaneously balances the workload of the members of staff while maximizing utility of the students. The algorithmic approach has been prototypically implemented in a computer system. One important aspect in this context is the application of the research work to problems of other scientific institutions, and therefore the provision of decision support functionalities.
[ { "version": "v1", "created": "Fri, 5 Sep 2008 17:02:55 GMT" } ]
2008-09-08T00:00:00
[ [ "Geiger", "Martin Josef", "" ], [ "Wenger", "Wolf", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0809.1132
Vandy Berten
Vandy Berten, Chi-Ju Chang, Tei-Wei Kuo
Managing Varying Worst Case Execution Times on DVS Platforms
null
null
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Energy efficient real-time task scheduling attracted a lot of attention in the past decade. Most of the time, deterministic execution lengths for tasks were considered, but this model fits less and less with the reality, especially with the increasing number of multimedia applications. It's why a lot of research is starting to consider stochastic models, where execution times are only known stochastically. However, authors consider that they have a pretty much precise knowledge about the properties of the system, especially regarding to the worst case execution time (or worst case execution cycles, WCEC). In this work, we try to relax this hypothesis, and assume that the WCEC can vary. We propose miscellaneous methods to react to such a situation, and give many simulation results attesting that with a small effort, we can provide very good results, allowing to keep a low deadline miss rate as well as an energy consumption similar to clairvoyant algorithms.
[ { "version": "v1", "created": "Sat, 6 Sep 2008 04:38:34 GMT" } ]
2008-09-09T00:00:00
[ [ "Berten", "Vandy", "" ], [ "Chang", "Chi-Ju", "" ], [ "Kuo", "Tei-Wei", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0809.1138
Alex Feigel
Alexander Feigel, Avraham Englander and Assaf Engel
Derivation of evolutionary payoffs from observable behavior
9 pages, 3 figures
null
null
null
q-bio.PE cs.GT physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interpretation of animal behavior, especially as cooperative or selfish, is a challenge for evolutionary theory. Strategy of a competition should follow from corresponding Darwinian payoffs for the available behavioral options. The payoffs and decision making processes, however, are difficult to observe and quantify. Here we present a general method for the derivation of evolutionary payoffs from observable statistics of interactions. The method is applied to combat of male bowl and doily spiders, to predator inspection by sticklebacks and to territorial defense by lions, demonstrating animal behavior as a new type of game theoretical equilibrium. Games animals play may be derived unequivocally from their observable behavior, the reconstruction, however, can be subjected to fundamental limitations due to our inability to observe all information exchange mechanisms (communication).
[ { "version": "v1", "created": "Sat, 6 Sep 2008 06:43:57 GMT" } ]
2008-09-09T00:00:00
[ [ "Feigel", "Alexander", "" ], [ "Englander", "Avraham", "" ], [ "Engel", "Assaf", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0809.1171
Cheng-Wei Luo
Cheng-Wei Luo, Hsiao-Fei Liu, Peng-An Chen, and Kun-Mao Chao
Minkowski Sum Selection and Finding
23 pages, 10 figures, accepted by ISAAC 2008
null
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the \textsc{Minkowski Sum Selection} problem with linear objective functions, we obtain the following results: (1) optimal $O(n\log n)$ time algorithms for $\lambda=1$; (2) $O(n\log^2 n)$ time deterministic algorithms and expected $O(n\log n)$ time randomized algorithms for any fixed $\lambda>1$. For the \textsc{Minkowski Sum Finding} problem with linear objective functions or objective functions of the form $f(x,y)=\frac{by}{ax}$, we construct optimal $O(n\log n)$ time algorithms for any fixed $\lambda\geq 1$.
[ { "version": "v1", "created": "Sat, 6 Sep 2008 14:31:49 GMT" } ]
2008-09-09T00:00:00
[ [ "Luo", "Cheng-Wei", "" ], [ "Liu", "Hsiao-Fei", "" ], [ "Chen", "Peng-An", "" ], [ "Chao", "Kun-Mao", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0809.1177
Andrzej Karbowski
Andrzej Karbowski
Amdahl's and Gustafson-Barsis laws revisited
null
null
null
null
cs.DC cs.GT cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a simple derivation of the Gustafson-Barsis law from the Amdahl's law. In the computer literature these two laws describing the speedup limits of parallel applications are derived separately. It is shown, that treating the time of the execution of the sequential part of the application as a constant, in few lines the Gustafson-Barsis law can be obtained from the Amdahl's law and that the popular claim, that Gustafson-Barsis law overthrows Amdahl's law is a mistake.
[ { "version": "v1", "created": "Sat, 6 Sep 2008 15:06:53 GMT" } ]
2008-09-09T00:00:00
[ [ "Karbowski", "Andrzej", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0809.1181
Robert Grossman
Yunhong Gu and Robert L Grossman
Sector and Sphere: Towards Simplified Storage and Processing of Large Scale Distributed Data
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cloud computing has demonstrated that processing very large datasets over commodity clusters can be done simply given the right programming model and infrastructure. In this paper, we describe the design and implementation of the Sector storage cloud and the Sphere compute cloud. In contrast to existing storage and compute clouds, Sector can manage data not only within a data center, but also across geographically distributed data centers. Similarly, the Sphere compute cloud supports User Defined Functions (UDF) over data both within a data center and across data centers. As a special case, MapReduce style programming can be implemented in Sphere by using a Map UDF followed by a Reduce UDF. We describe some experimental studies comparing Sector/Sphere and Hadoop using the Terasort Benchmark. In these studies, Sector is about twice as fast as Hadoop. Sector/Sphere is open source.
[ { "version": "v1", "created": "Sat, 6 Sep 2008 18:37:51 GMT" }, { "version": "v2", "created": "Sat, 17 Jan 2009 00:34:47 GMT" } ]
2009-01-17T00:00:00
[ [ "Gu", "Yunhong", "" ], [ "Grossman", "Robert L", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0809.1205
Liang-Liang Xie
Liang-Liang Xie
On Information-Theoretic Scaling Laws for Wireless Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the analysis of the hierarchical scheme, the potential influence of the pre-constant in deriving scaling laws is exposed. It is found that a modified hierarchical scheme can achieve a throughput arbitrarily times higher than the original one, although it is still diminishingly small compared to the linear scaling. The study demonstrates the essential importance of the throughput formula itself, rather than the scaling laws consequently derived.
[ { "version": "v1", "created": "Sun, 7 Sep 2008 03:14:13 GMT" }, { "version": "v2", "created": "Mon, 22 Sep 2008 04:13:33 GMT" }, { "version": "v3", "created": "Tue, 7 Jul 2009 18:54:26 GMT" } ]
2009-09-29T00:00:00
[ [ "Xie", "Liang-Liang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.1208
Abdellatif Zaidi
Abdellatif Zaidi and Luc Vandendorpe
Bounds on the Capacity of the Relay Channel with States at the Source
This paper has been withdrawn
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn by the authors
[ { "version": "v1", "created": "Mon, 8 Sep 2008 12:32:46 GMT" }, { "version": "v2", "created": "Tue, 9 Sep 2008 13:08:47 GMT" }, { "version": "v3", "created": "Wed, 3 Jun 2009 21:13:52 GMT" } ]
2009-06-04T00:00:00
[ [ "Zaidi", "Abdellatif", "" ], [ "Vandendorpe", "Luc", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.1226
Boris Ryabko
Boris Ryabko
Applications of Universal Source Coding to Statistical Analysis of Time Series
accepted for publication
null
null
null
cs.IT cs.AI math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show how universal codes can be used for solving some of the most important statistical problems for time series. By definition, a universal code (or a universal lossless data compressor) can compress any sequence generated by a stationary and ergodic source asymptotically to the Shannon entropy, which, in turn, is the best achievable ratio for lossless data compressors. We consider finite-alphabet and real-valued time series and the following problems: estimation of the limiting probabilities for finite-alphabet time series and estimation of the density for real-valued time series, the on-line prediction, regression, classification (or problems with side information) for both types of the time series and the following problems of hypothesis testing: goodness-of-fit testing, or identity testing, and testing of serial independence. It is important to note that all problems are considered in the framework of classical mathematical statistics and, on the other hand, everyday methods of data compression (or archivers) can be used as a tool for the estimation and testing. It turns out, that quite often the suggested methods and tests are more powerful than known ones when they are applied in practice.
[ { "version": "v1", "created": "Sun, 7 Sep 2008 15:37:48 GMT" } ]
2008-09-09T00:00:00
[ [ "Ryabko", "Boris", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0809.1236
Pierre Ganty
Pierre Ganty, Rupak Majumdar, Benjamin Monmege
Bounded Underapproximations
30 pages, 2 figures, v4 added complexity results, various improvements
Formal Methods in System Design 40(2) (2012) 206-231
10.1007/s10703-011-0136-y
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show a new and constructive proof of the following language-theoretic result: for every context-free language L, there is a bounded context-free language L' included in L which has the same Parikh (commutative) image as L. Bounded languages, introduced by Ginsburg and Spanier, are subsets of regular languages of the form w1*w2*...wk* for some finite words w1,...,wk. In particular bounded subsets of context-free languages have nice structural and decidability properties. Our proof proceeds in two parts. First, using Newton's iterations on the language semiring, we construct a context-free subset Ls of L that can be represented as a sequence of substitutions on a linear language and has the same Parikh image as L. Second, we inductively construct a Parikh-equivalent bounded context-free subset of Ls. We show two applications of this result in model checking: to underapproximate the reachable state space of multithreaded procedural programs and to underapproximate the reachable state space of recursive counter programs. The bounded language constructed above provides a decidable underapproximation for the original problems. By iterating the construction, we get a semi-algorithm for the original problems that constructs a sequence of underapproximations such that no two underapproximations of the sequence can be compared. This provides a progress guarantee: every word w in L is in some underapproximation of the sequence. In addition, we show that our approach subsumes context-bounded reachability for multithreaded programs.
[ { "version": "v1", "created": "Sun, 7 Sep 2008 22:21:33 GMT" }, { "version": "v2", "created": "Fri, 3 Oct 2008 20:35:08 GMT" }, { "version": "v3", "created": "Thu, 8 Oct 2009 10:16:06 GMT" }, { "version": "v4", "created": "Sun, 17 Jan 2010 15:00:58 GMT" } ]
2012-07-03T00:00:00
[ [ "Ganty", "Pierre", "" ], [ "Majumdar", "Rupak", "" ], [ "Monmege", "Benjamin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0809.1241
Xinjia Chen
Xinjia Chen
A New Framework of Multistage Estimation
254 pages, no figure; added more references; main results appeared in Proceedings of SPIE, Orlando, Florida, USA, April 2010 and 2011
null
10.1103/PhysRevE.79.026307
null
math.ST cs.LG math.PR stat.ME stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we have established a unified framework of multistage parameter estimation. We demonstrate that a wide variety of statistical problems such as fixed-sample-size interval estimation, point estimation with error control, bounded-width confidence intervals, interval estimation following hypothesis testing, construction of confidence sequences, can be cast into the general framework of constructing sequential random intervals with prescribed coverage probabilities. We have developed exact methods for the construction of such sequential random intervals in the context of multistage sampling. In particular, we have established inclusion principle and coverage tuning techniques to control and adjust the coverage probabilities of sequential random intervals. We have obtained concrete sampling schemes which are unprecedentedly efficient in terms of sampling effort as compared to existing procedures.
[ { "version": "v1", "created": "Mon, 8 Sep 2008 14:03:24 GMT" }, { "version": "v10", "created": "Tue, 7 Apr 2009 16:48:35 GMT" }, { "version": "v11", "created": "Fri, 24 Apr 2009 17:17:49 GMT" }, { "version": "v12", "created": "Mon, 27 Apr 2009 18:33:01 GMT" }, { "version": "v13", "created": "Mon, 29 Jun 2009 01:01:34 GMT" }, { "version": "v14", "created": "Wed, 23 Sep 2009 16:53:22 GMT" }, { "version": "v15", "created": "Wed, 23 Sep 2009 20:01:39 GMT" }, { "version": "v16", "created": "Fri, 20 Nov 2009 22:10:54 GMT" }, { "version": "v17", "created": "Wed, 2 Dec 2009 22:01:56 GMT" }, { "version": "v18", "created": "Mon, 21 Dec 2009 22:43:19 GMT" }, { "version": "v19", "created": "Sun, 7 Mar 2010 04:49:46 GMT" }, { "version": "v2", "created": "Thu, 16 Oct 2008 16:14:26 GMT" }, { "version": "v20", "created": "Sat, 7 Aug 2010 00:17:28 GMT" }, { "version": "v21", "created": "Mon, 15 Nov 2010 02:38:02 GMT" }, { "version": "v22", "created": "Thu, 25 Nov 2010 00:30:46 GMT" }, { "version": "v23", "created": "Tue, 1 Feb 2011 00:08:06 GMT" }, { "version": "v24", "created": "Mon, 21 Feb 2011 00:58:11 GMT" }, { "version": "v25", "created": "Mon, 6 Jun 2011 01:11:59 GMT" }, { "version": "v26", "created": "Wed, 13 Jul 2011 18:13:33 GMT" }, { "version": "v27", "created": "Sun, 31 Jul 2011 19:29:34 GMT" }, { "version": "v28", "created": "Sun, 4 Sep 2011 18:46:04 GMT" }, { "version": "v29", "created": "Tue, 29 Nov 2011 19:21:24 GMT" }, { "version": "v3", "created": "Sun, 2 Nov 2008 23:25:28 GMT" }, { "version": "v30", "created": "Thu, 29 Dec 2011 17:10:00 GMT" }, { "version": "v31", "created": "Thu, 9 Feb 2012 19:54:11 GMT" }, { "version": "v32", "created": "Tue, 15 May 2012 16:10:57 GMT" }, { "version": "v33", "created": "Sat, 1 Sep 2012 21:53:39 GMT" }, { "version": "v34", "created": "Sun, 30 Sep 2012 20:46:09 GMT" }, { "version": "v35", "created": "Wed, 5 Dec 2012 00:39:40 GMT" }, { "version": "v4", "created": "Tue, 2 Dec 2008 21:40:37 GMT" }, { "version": "v5", "created": "Fri, 30 Jan 2009 02:04:54 GMT" }, { "version": "v6", "created": "Mon, 2 Mar 2009 18:51:46 GMT" }, { "version": "v7", "created": "Mon, 2 Mar 2009 21:35:54 GMT" }, { "version": "v8", "created": "Sun, 29 Mar 2009 20:07:10 GMT" }, { "version": "v9", "created": "Sun, 5 Apr 2009 21:07:25 GMT" } ]
2013-11-05T00:00:00
[ [ "Chen", "Xinjia", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0809.1252
Georg B\"ocherer
Georg B\"ocherer, Valdemar Cardoso da Rocha Jr. and Cecilio Pimentel
Maximum Entropy Rate of Markov Sources for Systems With Non-regular Constraints
5 pages, to presented at the ISITA 2008 in Auckland, NZ
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using the concept of discrete noiseless channels, it was shown by Shannon in A Mathematical Theory of Communication that the ultimate performance of an encoder for a constrained system is limited by the combinatorial capacity of the system if the constraints define a regular language. In the present work, it is shown that this is not an inherent property of regularity but holds in general. To show this, constrained systems are described by generating functions and random walks on trees.
[ { "version": "v1", "created": "Sun, 7 Sep 2008 21:00:42 GMT" } ]
2008-09-09T00:00:00
[ [ "Böcherer", "Georg", "" ], [ "Rocha", "Valdemar Cardoso da", "Jr." ], [ "Pimentel", "Cecilio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.1257
Ozgur Yilmaz
I. Daubechies, C.S. G\"unt\"urk, Y. Wang, \"O. Yilmaz
The Golden Ratio Encoder
24 pages, 9 figures
null
10.1109/TIT.2010.2059750
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a novel Nyquist-rate analog-to-digital (A/D) conversion algorithm which achieves exponential accuracy in the bit-rate despite using imperfect components. The proposed algorithm is based on a robust implementation of a beta-encoder where the value of the base beta is equal to golden mean. It was previously shown that beta-encoders can be implemented in such a way that their exponential accuracy is robust against threshold offsets in the quantizer element. This paper extends this result by allowing for imperfect analog multipliers with imprecise gain values as well. A formal computational model for algorithmic encoders and a general test bed for evaluating their robustness is also proposed.
[ { "version": "v1", "created": "Sun, 7 Sep 2008 22:29:59 GMT" } ]
2010-10-19T00:00:00
[ [ "Daubechies", "I.", "" ], [ "Güntürk", "C. S.", "" ], [ "Wang", "Y.", "" ], [ "Yilmaz", "Ö.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.1258
Salah A. Aly
Salah A. Aly, Ahmed E. Kamal
Network Protection Codes Against Link Failures Using Network Coding
null
Proc. of IEEE Globecom 08, New Orleans, LA, 2008
10.1109/GLOCOM.2008.ECP.516
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Protecting against link failures in communication networks is essential to increase robustness, accessibility, and reliability of data transmission. Recently, network coding has been proposed as a solution to provide agile and cost efficient network protection against link failures, which does not require data rerouting, or packet retransmission. To achieve this, separate paths have to be provisioned to carry encoded packets, hence requiring either the addition of extra links, or reserving some of the resources for this purpose. In this paper, we propose network protection codes against a single link failure using network coding, where a separate path using reserved links is not needed. In this case portions of the link capacities are used to carry the encoded packets. The scheme is extended to protect against multiple link failures and can be implemented at an overlay layer. Although this leads to reducing the network capacity, the network capacity reduction is asymptotically small in most cases of practical interest. We demonstrate that such network protection codes are equivalent to error correcting codes for erasure channels. Finally, we study the encoding and decoding operations of such codes over the binary field.
[ { "version": "v1", "created": "Sun, 7 Sep 2008 23:03:22 GMT" }, { "version": "v2", "created": "Sun, 21 Dec 2008 20:40:01 GMT" } ]
2016-11-17T00:00:00
[ [ "Aly", "Salah A.", "" ], [ "Kamal", "Ahmed E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.1264
Michael Baer
Michael Baer
Tight Bounds on Minimum Maximum Pointwise Redundancy
5 pages, 1 figure, presented at ISIT 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents new lower and upper bounds for the optimal compression of binary prefix codes in terms of the most probable input symbol, where compression efficiency is determined by the nonlinear codeword length objective of minimizing maximum pointwise redundancy. This objective relates to both universal modeling and Shannon coding, and these bounds are tight throughout the interval. The upper bounds also apply to a related objective, that of dth exponential redundancy.
[ { "version": "v1", "created": "Mon, 8 Sep 2008 01:28:53 GMT" } ]
2008-09-09T00:00:00
[ [ "Baer", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.1270
Marcus Hutter
Marcus Hutter
Predictive Hypothesis Identification
16 pages
null
null
null
cs.LG math.ST stat.ML stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While statistics focusses on hypothesis testing and on estimating (properties of) the true sampling distribution, in machine learning the performance of learning algorithms on future data is the primary issue. In this paper we bridge the gap with a general principle (PHI) that identifies hypotheses with best predictive performance. This includes predictive point and interval estimation, simple and composite hypothesis testing, (mixture) model selection, and others as special cases. For concrete instantiations we will recover well-known methods, variations thereof, and new ones. PHI nicely justifies, reconciles, and blends (a reparametrization invariant variation of) MAP, ML, MDL, and moment estimation. One particular feature of PHI is that it can genuinely deal with nested hypotheses.
[ { "version": "v1", "created": "Mon, 8 Sep 2008 04:18:17 GMT" } ]
2009-12-30T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0809.1300
Jossy Sayir
Jossy Sayir
What makes a good role model
This paper is dedicated to Jim Massey on the occasion of his 75th birthday. Submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The role model strategy is introduced as a method for designing an estimator by approaching the output of a superior estimator that has better input observations. This strategy is shown to yield the optimal Bayesian estimator when a Markov condition is fulfilled. Two examples involving simple channels are given to illustrate its use. The strategy is combined with time averaging to construct a statistical model by numerically solving a convex program. The role model strategy was developed in the context of low complexity decoder design for iterative decoding. Potential applications outside the field of communications are discussed.
[ { "version": "v1", "created": "Mon, 8 Sep 2008 09:51:04 GMT" } ]
2008-09-09T00:00:00
[ [ "Sayir", "Jossy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.1318
Alawi Abdulrahman Al-saggaf
Alawi A. Al-saggaf, H. S. Acharya
A Fuzzy Commitment Scheme
4 pages, IEEE International Conference on Advances in Computer Vision and Information Technology 28-30 November 2007 - India
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper attempt has been made to explain a fuzzy commitment scheme. In the conventional Commitment schemes, both committed string m and valid opening key are required to enable the sender to prove the commitment. However there could be many instances where the transmission involves noise or minor errors arising purely because of the factors over which neither the sender nor the receiver have any control. The fuzzy commitment scheme presented in this paper is to accept the opening key that is close to the original one in suitable distance metric, but not necessarily identical. The concept itself is illustrated with the help of simple situation.
[ { "version": "v1", "created": "Mon, 8 Sep 2008 11:34:45 GMT" } ]
2008-09-09T00:00:00
[ [ "Al-saggaf", "Alawi A.", "" ], [ "Acharya", "H. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0809.1330
Gerhard Maierbacher
G. Maierbacher, J. Barros
Low-Complexity Coding and Source-Optimized Clustering for Large-Scale Sensor Networks
26 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the distributed source coding problem in which correlated data picked up by scattered sensors has to be encoded separately and transmitted to a common receiver, subject to a rate-distortion constraint. Although near-tooptimal solutions based on Turbo and LDPC codes exist for this problem, in most cases the proposed techniques do not scale to networks of hundreds of sensors. We present a scalable solution based on the following key elements: (a) distortion-optimized index assignments for low-complexity distributed quantization, (b) source-optimized hierarchical clustering based on the Kullback-Leibler distance and (c) sum-product decoding on specific factor graphs exploiting the correlation of the data.
[ { "version": "v1", "created": "Mon, 8 Sep 2008 13:28:37 GMT" } ]
2008-09-09T00:00:00
[ [ "Maierbacher", "G.", "" ], [ "Barros", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.1344
Urs Niesen
Urs Niesen, Piyush Gupta, Devavrat Shah
The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks
37 pages, 7 figures, to appear in IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, vol. 56, pp. 2249-2271, May 2010
10.1109/TIT.2010.2043979
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the question of determining the scaling of the $n^2$-dimensional balanced unicast and the $n 2^n$-dimensional balanced multicast capacity regions of a wireless network with $n$ nodes placed uniformly at random in a square region of area $n$ and communicating over Gaussian fading channels. We identify this scaling of both the balanced unicast and multicast capacity regions in terms of $\Theta(n)$, out of $2^n$ total possible, cuts. These cuts only depend on the geometry of the locations of the source nodes and their destination nodes and the traffic demands between them, and thus can be readily evaluated. Our results are constructive and provide optimal (in the scaling sense) communication schemes.
[ { "version": "v1", "created": "Mon, 8 Sep 2008 14:26:17 GMT" }, { "version": "v2", "created": "Mon, 11 May 2009 14:11:35 GMT" }, { "version": "v3", "created": "Wed, 24 Jun 2009 20:10:19 GMT" }, { "version": "v4", "created": "Thu, 14 Jan 2010 00:03:02 GMT" }, { "version": "v5", "created": "Thu, 21 Jan 2010 17:36:31 GMT" } ]
2016-11-18T00:00:00
[ [ "Niesen", "Urs", "" ], [ "Gupta", "Piyush", "" ], [ "Shah", "Devavrat", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.1348
Thorsten Hehn
Thorsten Hehn, Johannes B. Huber, Stefan Laendner
MBBP for improved iterative channel decoding in 802.16e WiMAX systems
5 pages, 3 figures, submitted to IEEE ICC 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose the application of multiple-bases belief-propagation, an optimized iterative decoding method, to a set of rate-1/2 LDPC codes from the IEEE 802.16e WiMAX standard. The presented approach allows for improved decoding performance when signaling over the AWGN channel. As all required operations for this method can be run in parallel, the decoding delay of this method and standard belief-propagation decoding are equal. The obtained results are compared to the performance of LDPC codes optimized with the progressive edge-growth algorithm and to bounds from information theory. It will be shown that the discussed method mitigates the gap to the well-known random coding bound by about 20 percent.
[ { "version": "v1", "created": "Mon, 8 Sep 2008 14:45:00 GMT" } ]
2008-09-09T00:00:00
[ [ "Hehn", "Thorsten", "" ], [ "Huber", "Johannes B.", "" ], [ "Laendner", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.1366
Lu\'isa Lima
Lu\'isa Lima, Jo\~ao P. Vilela, Paulo F. Oliveira and Jo\~ao Barros
Network Coding Security: Attacks and Countermeasures
8 pages, 4 figures
null
null
null
cs.CR cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
By allowing intermediate nodes to perform non-trivial operations on packets, such as mixing data from multiple streams, network coding breaks with the ruling store and forward networking paradigm and opens a myriad of challenging security questions. Following a brief overview of emerging network coding protocols, we provide a taxonomy of their security vulnerabilities, which highlights the differences between attack scenarios in which network coding is particularly vulnerable and other relevant cases in which the intrinsic properties of network coding allow for stronger and more efficient security solutions than classical routing. Furthermore, we give practical examples where network coding can be combined with classical cryptography both for secure communication and secret key distribution. Throughout the paper we identify a number of research challenges deemed relevant towards the applicability of secure network coding in practical networks.
[ { "version": "v1", "created": "Mon, 8 Sep 2008 15:34:03 GMT" } ]
2008-09-09T00:00:00
[ [ "Lima", "Luísa", "" ], [ "Vilela", "João P.", "" ], [ "Oliveira", "Paulo F.", "" ], [ "Barros", "João", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.1379
Rui Costa
Rui A. Costa, Joao Barros
A Max-Flow Min-Cut Theorem with Applications in Small Worlds and Dual Radio Networks
22 pages, 4 figures, Submitted to JSAC Special Issue on Stochastic Geometry and Random Graphs for Wireless Networks
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intrigued by the capacity of random networks, we start by proving a max-flow min-cut theorem that is applicable to any random graph obeying a suitably defined independence-in-cut property. We then show that this property is satisfied by relevant classes, including small world topologies, which are pervasive in both man-made and natural networks, and wireless networks of dual devices, which exploit multiple radio interfaces to enhance the connectivity of the network. In both cases, we are able to apply our theorem and derive max-flow min-cut bounds for network information flow.
[ { "version": "v1", "created": "Mon, 8 Sep 2008 16:53:27 GMT" }, { "version": "v2", "created": "Fri, 30 Jan 2009 11:50:22 GMT" } ]
2009-01-30T00:00:00
[ [ "Costa", "Rui A.", "" ], [ "Barros", "Joao", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0809.1398
Jose Javier Ramasco
Muhittin Mungan, Jose J. Ramasco
Stability of Maximum likelihood based clustering methods: exploring the backbone of classifications (Who is keeping you in that community?)
19 pages, 9 figures
J. Stat. Mech. (2010) P04028
null
null
physics.soc-ph cond-mat.stat-mech cs.IT math.IT physics.comp-ph physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Components of complex systems are often classified according to the way they interact with each other. In graph theory such groups are known as clusters or communities. Many different techniques have been recently proposed to detect them, some of which involve inference methods using either Bayesian or Maximum Likelihood approaches. In this article, we study a statistical model designed for detecting clusters based on connection similarity. The basic assumption of the model is that the graph was generated by a certain grouping of the nodes and an Expectation Maximization algorithm is employed to infer that grouping. We show that the method admits further development to yield a stability analysis of the groupings that quantifies the extent to which each node influences its neighbors group membership. Our approach naturally allows for the identification of the key elements responsible for the grouping and their resilience to changes in the network. Given the generality of the assumptions underlying the statistical model, such nodes are likely to play special roles in the original system. We illustrate this point by analyzing several empirical networks for which further information about the properties of the nodes is available. The search and identification of stabilizing nodes constitutes thus a novel technique to characterize the relevance of nodes in complex networks.
[ { "version": "v1", "created": "Mon, 8 Sep 2008 19:04:06 GMT" }, { "version": "v2", "created": "Thu, 29 Apr 2010 17:04:23 GMT" } ]
2010-04-30T00:00:00
[ [ "Mungan", "Muhittin", "" ], [ "Ramasco", "Jose J.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0809.1409
Anshuman Sinha
Anshuman Sinha, Haritha Nandela, Vijaya Balakrishna
Domain Specific Software Architecture for Design Center Automation
158 pages
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Domain specific software architecture aims at software reuse through construction of domain architecture reference model. The constructed reference model presents a set of individual components and their interaction points. When starting on a new large software project, the design engineer starts with pre-constructed model, which can be easily browsed and picks up opportunities of use in the new solution design. This report discusses application of domain reference design methods by deriving domain specific reference architecture for a product ordering system in a design center. The product in this case is instock and special order blinds from different manufacturers in a large supply store. The development of mature domain specific reference software architecture for this domain is not the objective of this report. However, this report would like to capture the method used in one such process and that is the primary concern of this report. This report lists subjective details of such a process applied to the domain of ordering custom and instock blinds from a large home construction and goods supply store. This report also describes the detailed process of derivation of knowledge models, unified knowledge models and the reference architecture for this domain. However, this domain model is only partially complete which may not be used for any real applications. This report is a result of a course project undertaken while studying this methodology.
[ { "version": "v1", "created": "Mon, 8 Sep 2008 19:07:17 GMT" } ]
2008-11-06T00:00:00
[ [ "Sinha", "Anshuman", "" ], [ "Nandela", "Haritha", "" ], [ "Balakrishna", "Vijaya", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0809.1437
Fotis Georgatos Drs
Fotis Georgatos
How applicable is Python as first computer language for teaching programming in a pre-university educational environment, from a teacher's point of view?
135 pages, 20 tables, 10 figures (incl. evolution of computer languages)
null
null
null
cs.PL cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This project report attempts to evaluate the educational properties of the Python computer language, in practice. This is done by examining computer language evolution history, related scientific background work, the existing educational research on computer languages and Python's experimental application in higher secondary education in Greece, during first half of year 2002. This Thesis Report was delivered in advance of a thesis defense for a Masters/Doctorandus (MSc/Drs) title with the Amstel Institute/Universiteit van Amsterdam, during the same year.
[ { "version": "v1", "created": "Tue, 9 Sep 2008 14:39:57 GMT" } ]
2008-09-10T00:00:00
[ [ "Georgatos", "Fotis", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0809.1465
Krishnendu Chatterjee
Krishnendu Chatterjee and Thomas A. Henzinger
Probabilistic Systems with LimSup and LimInf Objectives
The paper will appear in ILC proceedings
null
null
null
cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give polynomial-time algorithms for computing the values of Markov decision processes (MDPs) with limsup and liminf objectives. A real-valued reward is assigned to each state, and the value of an infinite path in the MDP is the limsup (resp. liminf) of all rewards along the path. The value of an MDP is the maximal expected value of an infinite path that can be achieved by resolving the decisions of the MDP. Using our result on MDPs, we show that turn-based stochastic games with limsup and liminf objectives can be solved in NP \cap coNP.
[ { "version": "v1", "created": "Tue, 9 Sep 2008 00:12:05 GMT" } ]
2008-09-10T00:00:00
[ [ "Chatterjee", "Krishnendu", "" ], [ "Henzinger", "Thomas A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0809.1476
Qin Xiaolin
Yong Feng, Jingzhong Zhang, Xiaolin Qin, Xun Yuan
Obtaining Exact Interpolation Multivariate Polynomial by Approximation
14 pages
null
null
null
cs.SC cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In some fields such as Mathematics Mechanization, automated reasoning and Trustworthy Computing etc., exact results are needed. Symbolic computations are used to obtain the exact results. Symbolic computations are of high complexity. In order to improve the situation, exactly interpolating methods are often proposed for the exact results and approximate interpolating methods for the approximate ones. In this paper, we study how to obtain exact interpolation polynomial with rational coefficients by approximate interpolating methods.
[ { "version": "v1", "created": "Tue, 9 Sep 2008 02:33:30 GMT" } ]
2008-09-10T00:00:00
[ [ "Feng", "Yong", "" ], [ "Zhang", "Jingzhong", "" ], [ "Qin", "Xiaolin", "" ], [ "Yuan", "Xun", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0809.1489
Jukka Suomela
Patrik Flor\'een, Joel Kaasinen, Petteri Kaski, Jukka Suomela
An optimal local approximation algorithm for max-min linear programs
16 pages, 3 figures
null
10.1145/1583991.1584058
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a local algorithm (constant-time distributed algorithm) for approximating max-min LPs. The objective is to maximise $\omega$ subject to $Ax \le 1$, $Cx \ge \omega 1$, and $x \ge 0$ for nonnegative matrices $A$ and $C$. The approximation ratio of our algorithm is the best possible for any local algorithm; there is a matching unconditional lower bound.
[ { "version": "v1", "created": "Tue, 9 Sep 2008 06:11:31 GMT" } ]
2012-05-15T00:00:00
[ [ "Floréen", "Patrik", "" ], [ "Kaasinen", "Joel", "" ], [ "Kaski", "Petteri", "" ], [ "Suomela", "Jukka", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0809.1493
Francis Bach
Francis Bach (INRIA Rocquencourt)
Exploring Large Feature Spaces with Hierarchical Multiple Kernel Learning
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For supervised and unsupervised learning, positive definite kernels allow to use large and potentially infinite dimensional feature spaces with a computational cost that only depends on the number of observations. This is usually done through the penalization of predictor functions by Euclidean or Hilbertian norms. In this paper, we explore penalizing by sparsity-inducing norms such as the l1-norm or the block l1-norm. We assume that the kernel decomposes into a large sum of individual basis kernels which can be embedded in a directed acyclic graph; we show that it is then possible to perform kernel selection through a hierarchical multiple kernel learning framework, in polynomial time in the number of selected kernels. This framework is naturally applied to non linear variable selection; our extensive simulations on synthetic datasets and datasets from the UCI repository show that efficiently exploring the large feature space through sparsity-inducing norms leads to state-of-the-art predictive performance.
[ { "version": "v1", "created": "Tue, 9 Sep 2008 06:48:10 GMT" } ]
2008-09-10T00:00:00
[ [ "Bach", "Francis", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0809.1522
J\'anos K\"orner
Gerard Cohen, Emanuela Fachini, Janos Korner
On the permutation capacity of digraphs
11 pages, no figures
null
null
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extend several results of the third author and C. Malvenuto on graph-different permutations to the case of directed graphs and introduce new open problems. Permutation capacity is a natural extension of Sperner capacity from finite directed graphs to infinite digraphs. Our subject is combinatorial in nature, but can be equally regarded as zero-error information theory.
[ { "version": "v1", "created": "Tue, 9 Sep 2008 09:38:24 GMT" } ]
2008-09-10T00:00:00
[ [ "Cohen", "Gerard", "" ], [ "Fachini", "Emanuela", "" ], [ "Korner", "Janos", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]